WidgetCertificateData result;
result.chainId = data.getSignatureNumber();
+ LogDebug("result.chainId : " << result.chainId);
result.owner = data.isAuthorSignature() ?
WidgetCertificateData::AUTHOR : WidgetCertificateData::DISTRIBUTOR;
AddStep(&TaskCertify::stepFinalize);
}
-void TaskCertify::processDistributorSignature(const SignatureData &data,
- bool first)
+void TaskCertify::processDistributorSignature(const SignatureData &data)
{
// this signature is verified -
// no point in check domain WAC_ROOT and WAC_RECOGNIZED
m_contextData.wacSecurity.getCertificateChainListRef().push_back(
collection);
- if (first) {
+ if (data.getSignatureNumber() == 1) {
m_contextData.wacSecurity.getCertificateListRef().push_back(
toWidgetCertificateData(data, true));
m_contextData.wacSecurity.getCertificateListRef().push_back(
SignatureFileInfoSet::reverse_iterator iter = signatureFiles.rbegin();
LogInfo("Number of signatures: " << signatureFiles.size());
- bool firstDistributorSignature = true;
bool testCertificate = false;
bool complianceMode = GlobalDAOReadOnly::getComplianceMode();
continue;
}
// now signature _must_ be verified
- processDistributorSignature(data, firstDistributorSignature);
- firstDistributorSignature = false;
+ processDistributorSignature(data);
}
bool developerMode = GlobalDAOReadOnly::GetDeveloperMode();
void stepFinalize();
void createInstallPopup(PopupType type, const std::string &label);
- void processDistributorSignature(const ValidationCore::SignatureData &data,
- bool first);
+ void processDistributorSignature(const ValidationCore::SignatureData &data);
void processAuthorSignature(const ValidationCore::SignatureData &data);
std::string createAuthorWidgetInfo() const;