Hi zouzou,

I would recommend just to accept that iText is build to use BC. It's not
just the of the JCA provider but also the direct reference to BC classes
from the iText code. The internal structure of BC and iaik classes is
very different. So you have to have BC in the classpath and can register
it as crypto provider, too. You won't see any benefit from adding iaik.

Greetings

Andreas
> Hello Michael and other contributors,
>
> I wonder if there are good practices for the provider adds the JVM and the
> usage of storage iText-5.3.0 for signed SHA256?
>
> Currently I worked on an applet that signature using SHA1 PDF and
> iText-2.0.4
> This applet signs the pdf without adding BC before the provider signature
> verification. The IAIK provider is to add on to launch the applet. And it
> works very well.
>
> Now, I worked on the development of this applet to sign with SHA256. So I
> change the version of iText I switched to the latest version 5.3.0 I have
> also changed with the version of BC-bcpkix jdk15on bcprov-147
> and-147-jdk15on.
>
> At this level reaches the applet signed but failed to verify the signature.
>
> And when I add the provider BC Vanat just the verification of the signature
> [Security.addProvider (new BouncyCastleProvider ());] applet comes to being
> signed and verified with suucès.
>
> Only in this project I use the IAIK provider for cryptographic functions.
>
> my questions are:
>
> What are best practices for using iText-5.3.0 with another provider for that
> BC sign with SHA256?
>
> In the previous post to answer me you talked about overload functions, what
> are these functions?
>
> If one has no choice to use another provider than BC when or in what place
> should add?
>
> Regards.
>
> --
> View this message in context: 
> http://itext-general.2136553.n4.nabble.com/iText-and-signing-pdf-fils-tp4655392p4655590.html
> Sent from the iText - General mailing list archive at Nabble.com.
>
> ------------------------------------------------------------------------------
> Live Security Virtual Conference
> Exclusive live event will cover all the ways today's security and 
> threat landscape has changed and how IT managers can respond. Discussions 
> will include endpoint security, mobile security and the latest in malware 
> threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
> _______________________________________________
> iText-questions mailing list
> [email protected]
> https://lists.sourceforge.net/lists/listinfo/itext-questions
>
> iText(R) is a registered trademark of 1T3XT BVBA.
> Many questions posted to this list can (and will) be answered with a 
> reference to the iText book: http://www.itextpdf.com/book/
> Please check the keywords list before you ask for examples: 
> http://itextpdf.com/themes/keywords.php


-- 
Andreas Kühne 
phone: +49 177 293 24 97 
mailto: [email protected]

Trustable Ltd. Niederlassung Deutschland Ströverstr. 18 - 59427 Unna 
Amtsgericht Hamm HRB 5868

Directors Andreas Kühne, Heiko Veit

Company UK Company No: 5218868 Registered in England and Wales 


------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
iText-questions mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/itext-questions

iText(R) is a registered trademark of 1T3XT BVBA.
Many questions posted to this list can (and will) be answered with a reference 
to the iText book: http://www.itextpdf.com/book/
Please check the keywords list before you ask for examples: 
http://itextpdf.com/themes/keywords.php

Reply via email to