> signtool -d something -v testy.jar
> archive "testy.jar" has passed crypto verification.
> 
>           status   path
>     ------------   -------------------
> 
> 
> This was done using signtool from NSS 3.11.5 on Linux.
> So I wonder how it could pass the crypto verification?

What are the contents of testy.jar exactly? Does it include the META-INF
subdirectory with manifest.mf and zigbert.{sf,rsa}? Otherwise, the above
message is simply what you get when checking an unsigned jar:

  [EMAIL PROTECTED] ~]$ unzip -l foo.zip
  Archive:  foo.zip
    Length     Date   Time    Name
   --------    ----   ----    ----
          0  02-09-07 06:46   foo.txt
   --------                   -------
          0                   1 file
  [EMAIL PROTECTED] ~]$ signtool -d path/to/cert/db -v foo.zip
  using certificate directory: path/to/cert/db
  archive "foo.zip" has passed crypto verification.

            status   path
      ------------   -------------------
  [EMAIL PROTECTED] ~]$

Maybe signtool's output is somewhat misleading in this case, but the
files it really verified would appear in a listing like this:

  archive "foo.zip" has passed crypto verification.

            status   path
      ------------   -------------------
          verified   foo.txt

Kaspar
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to