Hello Michel, thanks, I found some discussions about deferred signing:

http://itext-general.2136553.n4.nabble.com/How-to-get-same-hash-again-td4649641.html
http://itext-general.2136553.n4.nabble.com/Sign-with-external-hash-td3086546.html#a3088565
http://itext-general.2136553.n4.nabble.com/Hash-computation-problem-td2158378.html

Certainly, the FileID and the ModDate are mentioned but nothing about
the order of the objects is discussed. Where I can read about that? Is
this documented?

-
Alvaro

On 10 September 2012 23:57, mkl <[email protected]> wrote:
> Alvaro,
>
> Alvaro Cuno wrote
>>  I noticed the fact because I was experimenting implement digital
>> signatures using
>> multiple machines so I can use only local variables.
>
> You will soon see that there are more differences than just the order of
> objects: dates and ids especially.
>
> Please search the archives for "deferred signing".each time you create a
> stamper for signing, the hash of the bytes to sign is different. Some ideas
> on how to get around this problem have been presented on this list.
>
> Regards,   Michael
>
>
>
> --
> View this message in context: 
> http://itext-general.2136553.n4.nabble.com/are-the-dictionary-elements-randomly-placed-tp4656235p4656255.html
> Sent from the iText - General mailing list archive at Nabble.com.
>
> ------------------------------------------------------------------------------
> Live Security Virtual Conference
> Exclusive live event will cover all the ways today's security and
> threat landscape has changed and how IT managers can respond. Discussions
> will include endpoint security, mobile security and the latest in malware
> threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
> _______________________________________________
> iText-questions mailing list
> [email protected]
> https://lists.sourceforge.net/lists/listinfo/itext-questions
>
> iText(R) is a registered trademark of 1T3XT BVBA.
> Many questions posted to this list can (and will) be answered with a 
> reference to the iText book: http://www.itextpdf.com/book/
> Please check the keywords list before you ask for examples: 
> http://itextpdf.com/themes/keywords.php

------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
iText-questions mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/itext-questions

iText(R) is a registered trademark of 1T3XT BVBA.
Many questions posted to this list can (and will) be answered with a reference 
to the iText book: http://www.itextpdf.com/book/
Please check the keywords list before you ask for examples: 
http://itextpdf.com/themes/keywords.php

Reply via email to