Hello Michel, thanks, I found some discussions about deferred signing: http://itext-general.2136553.n4.nabble.com/How-to-get-same-hash-again-td4649641.html http://itext-general.2136553.n4.nabble.com/Sign-with-external-hash-td3086546.html#a3088565 http://itext-general.2136553.n4.nabble.com/Hash-computation-problem-td2158378.html
Certainly, the FileID and the ModDate are mentioned but nothing about the order of the objects is discussed. Where I can read about that? Is this documented? - Alvaro On 10 September 2012 23:57, mkl <[email protected]> wrote: > Alvaro, > > Alvaro Cuno wrote >> I noticed the fact because I was experimenting implement digital >> signatures using >> multiple machines so I can use only local variables. > > You will soon see that there are more differences than just the order of > objects: dates and ids especially. > > Please search the archives for "deferred signing".each time you create a > stamper for signing, the hash of the bytes to sign is different. Some ideas > on how to get around this problem have been presented on this list. > > Regards, Michael > > > > -- > View this message in context: > http://itext-general.2136553.n4.nabble.com/are-the-dictionary-elements-randomly-placed-tp4656235p4656255.html > Sent from the iText - General mailing list archive at Nabble.com. > > ------------------------------------------------------------------------------ > Live Security Virtual Conference > Exclusive live event will cover all the ways today's security and > threat landscape has changed and how IT managers can respond. Discussions > will include endpoint security, mobile security and the latest in malware > threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ > _______________________________________________ > iText-questions mailing list > [email protected] > https://lists.sourceforge.net/lists/listinfo/itext-questions > > iText(R) is a registered trademark of 1T3XT BVBA. > Many questions posted to this list can (and will) be answered with a > reference to the iText book: http://www.itextpdf.com/book/ > Please check the keywords list before you ask for examples: > http://itextpdf.com/themes/keywords.php ------------------------------------------------------------------------------ Live Security Virtual Conference Exclusive live event will cover all the ways today's security and threat landscape has changed and how IT managers can respond. Discussions will include endpoint security, mobile security and the latest in malware threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ _______________________________________________ iText-questions mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/itext-questions iText(R) is a registered trademark of 1T3XT BVBA. Many questions posted to this list can (and will) be answered with a reference to the iText book: http://www.itextpdf.com/book/ Please check the keywords list before you ask for examples: http://itextpdf.com/themes/keywords.php
