Change-Id: I0345d16e22024419e0a538c0a09376ef74b8e440
Signed-off-by: Mauro Sardara <[email protected]>
PARCByteArray *bytearray = parcBuffer_Array(sigbits);
unsigned signatureLength = (unsigned) parcBuffer_Remaining(sigbits);
uint8_t *sigbuffer = parcByteArray_Array(bytearray);
- size_t signatureOffset = parcBuffer_ArrayOffset(sigbits);
+ size_t signatureOffset = parcBuffer_Position(sigbits);
success = ECDSA_verify(openssl_digest_type,
(unsigned char *) parcByteArray_Array(parcBuffer_Array(parcCryptoHash_GetDigest(localHash))),
assertNotNull(keystore, "Parameter must be non-null PARCPkcs12KeyStore");
+#if 0
if (keystore->public_key_digest == NULL) {
AUTHORITY_KEYID *akid = X509_get_ext_d2i(keystore->x509_cert, NID_authority_key_identifier, NULL, NULL);
if (akid != NULL) {
AUTHORITY_KEYID_free(akid);
}
}
+#endif
// If we could not load the digest from the certificate, then calculate it from the public key.
if (keystore->public_key_digest == NULL) {