Open GoogleCodeExporter opened 9 years ago
When the certificate is included only in ds:KeyInfo it must be signed. It is
hard (not sure if possible on the Apache Santurario API) to ensure that the
signing certificate is in fact signed. Also, XAdES Baseline Profile [1]
mandates the usage of SigningCertificate.
Nevertheless, this is an aspect I'd like to solve, despite not having high
priority. This could also allow for simple XML-DSIG validation.
[1]
http://www.etsi.org/deliver/etsi_ts/103100_103199/103171/02.01.01_60/ts_103171v0
20101p.pdf
Original comment by luis.fgoncalv
on 5 Jul 2014 at 8:30
Thanks for your response, Luis.
This constraints are indicated in section 4.4.1 of ETSI TS 101 903 V1.4.1
(2009-06), downloadable at this link
http://uri.etsi.org/01903/v1.4.1/ts_101903v010401p.pdf
I created a proposal for a solution at this repository
https://github.com/entaksi/xades4j
Original comment by ruolui
on 7 Jul 2014 at 3:28
I know about the constraints. What I meant on the previous comment is that they
are hard to enforce. Your proposal is a possible first approach but:
* Doesn't support the case where only the certificate is signed and not the whole KeyInfo.
* Doesn't account for transforms over the KeyInfo reference. If no restrictions are made on the transforms, just checking the referenc's URI is not enough.
Nevertheless, I'll take this into account if/when I tackle this issue. Thanks!
Original comment by luis.fgoncalv
on 13 Jul 2014 at 11:19
Original issue reported on code.google.com by
ruolui
on 27 Jun 2014 at 8:46