summaryrefslogtreecommitdiff
path: root/BKUApplet
diff options
context:
space:
mode:
authortkellner <tkellner@8a26b1a7-26f0-462f-b9ef-d0e30c41f5a4>2013-12-13 01:57:31 +0000
committertkellner <tkellner@8a26b1a7-26f0-462f-b9ef-d0e30c41f5a4>2013-12-13 01:57:31 +0000
commitda6c49cbea9c80ad057a5fc3b698ce14ad9a7415 (patch)
tree2179084a1c0352a0a5a432de716a2778781f86bb /BKUApplet
parentd311d0f7b7ef9ed5bc383d6744b7d61239aafbc1 (diff)
downloadmocca-da6c49cbea9c80ad057a5fc3b698ce14ad9a7415.tar.gz
mocca-da6c49cbea9c80ad057a5fc3b698ce14ad9a7415.tar.bz2
mocca-da6c49cbea9c80ad057a5fc3b698ce14ad9a7415.zip
Add DigestMethod to STAL SignRequest, check digest value in secure viewer
NOTE: This currently disables viewing signature data which uses the ExcludeByteRange feature, e.g. PAdES signatures. git-svn-id: https://joinup.ec.europa.eu/svn/mocca/trunk@1263 8a26b1a7-26f0-462f-b9ef-d0e30c41f5a4
Diffstat (limited to 'BKUApplet')
-rw-r--r--BKUApplet/src/main/java/at/gv/egiz/bku/online/applet/AppletSecureViewer.java8
1 files changed, 4 insertions, 4 deletions
diff --git a/BKUApplet/src/main/java/at/gv/egiz/bku/online/applet/AppletSecureViewer.java b/BKUApplet/src/main/java/at/gv/egiz/bku/online/applet/AppletSecureViewer.java
index c6a2f72a..773bab80 100644
--- a/BKUApplet/src/main/java/at/gv/egiz/bku/online/applet/AppletSecureViewer.java
+++ b/BKUApplet/src/main/java/at/gv/egiz/bku/online/applet/AppletSecureViewer.java
@@ -196,9 +196,9 @@ public class AppletSecureViewer implements SecureViewer {
log.debug("Digesting reference " + signedRefId + " (" + mimeType + ";" + encoding + ")");
}
- if (signedDigestAlg.startsWith("CMS:")) {
- log.info("CMS signature - skip verifying hashdata for now");
- } else {
+// if (signedDigestAlg.startsWith("CMS:")) {
+// log.info("CMS signature - skip verifying hashdata for now");
+// } else {
byte[] hashDataInputDigest = digest(hdi, signedDigestAlg);
log.debug("Comparing digest to claimed digest value for reference {}.", signedRefId);
@@ -206,7 +206,7 @@ public class AppletSecureViewer implements SecureViewer {
log.error("Bad digest value for reference {}.", signedRefId);
throw new DigestException("Bad digest value for reference " + signedRefId);
}
- }
+// }
verifiedHashDataInputs.add(new ByteArrayHashDataInput(hdi, signedRefId, mimeType, encoding, filename));
}