Hi Michael,

would we be better off if iText doesn't use the given provider for
hashing? The specified provider is usually intended for the signing
stuff. And BC is always a good choice for hashing algorithms.

My proposal:
Try hashing with BC. If the given algo is not available in BC, give the
specified provider a try.

Greetings

Andreas
> Eric,
>
> Eric Chow wrote
>> java.security.NoSuchAlgorithmException: no such algorithm: SHA1 for
>> provider SunPKCS11-GD
>>      at sun.security.jca.GetInstance.getService(GetInstance.java:70)
>>      at sun.security.jca.GetInstance.getInstance(GetInstance.java:190)
>>      at java.security.Security.getImpl(Security.java:662)
>>      at java.security.MessageDigest.getInstance(MessageDigest.java:185)
>>      at
>> com.itextpdf.text.pdf.security.MakeSignature.signDetached(MakeSignature.java:128)
>>      at TestSign.sign(TestSign.java:46)
>>      at TestSign.main(TestSign.java:74)
> There seems to be a small inconsistency concerning the use of the SunPKCS11
> provider in iText: MakeSignature.signDetached uses the given provider
> (unless it is null) to retrieve the hash algorithm, too, while the PdfPKCS7
> constructor (to which the provider value is forwarded) uses it to retrieve
> the hash algorithm only if it doesn't start with "SunPKCS11". This surely
> will be made consistent.
>
> The actual problem is IMO that there are two different uses for the given
> provider: It is used both for retrieving a digest algorithm and for
> retrieving a Signature instance. Sometimes, though, you need different
> providers for these tasks. Unless resorting to not using provider arguments,
> therefore, there should be overloads with two provider arguments.
>
> Regards,   Michael.
>
> --
> View this message in context: 
> http://itext-general.2136553.n4.nabble.com/iText-5-3-0-digital-signature-problem-tp4655635p4655637.html
> Sent from the iText - General mailing list archive at Nabble.com.
>
> ------------------------------------------------------------------------------
> Live Security Virtual Conference
> Exclusive live event will cover all the ways today's security and 
> threat landscape has changed and how IT managers can respond. Discussions 
> will include endpoint security, mobile security and the latest in malware 
> threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
> _______________________________________________
> iText-questions mailing list
> iText-questions@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/itext-questions
>
> iText(R) is a registered trademark of 1T3XT BVBA.
> Many questions posted to this list can (and will) be answered with a 
> reference to the iText book: http://www.itextpdf.com/book/
> Please check the keywords list before you ask for examples: 
> http://itextpdf.com/themes/keywords.php
>


-- 
Andreas Kühne 
phone: +49 177 293 24 97 
mailto: kue...@trustable.de

Trustable Ltd. Niederlassung Deutschland Ströverstr. 18 - 59427 Unna 
Amtsgericht Hamm HRB 5868

Directors Andreas Kühne, Heiko Veit

Company UK Company No: 5218868 Registered in England and Wales 


------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
iText-questions mailing list
iText-questions@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/itext-questions

iText(R) is a registered trademark of 1T3XT BVBA.
Many questions posted to this list can (and will) be answered with a reference 
to the iText book: http://www.itextpdf.com/book/
Please check the keywords list before you ask for examples: 
http://itextpdf.com/themes/keywords.php

Reply via email to