Verifying The Midlet Suite Jar; Table 26 Actions Performed Of Signer Certificate Verification - Motorola V3x Technical Manual

2 cameras; 320x240 display
Hide thumbs Also See for V3x:
Table of Contents

Advertisement

5. If attribute MIDlet-Certificate-<n>-<m> with <n> being greater than 1 are present
The Table 26 describes actions performed upon completion of signer certificate
verification:
Result
Attempted to validate <n> paths. No public keys of the
issuer for the certificate can be found, or none of the
certificate paths can be validated.
More than one full certification path is established and
validated.
Only one certification path established and validated.

Verifying the MIDlet Suite JAR

The following are the steps taken to verify the MIDlet suite JAR:
1. Get the public key from the verified signer certificate.
2. Get the MIDlet-JAR-RSA-SHA1 attribute from the JAD.
3. Decode the attribute value from base64 yielding a PKCS #1 signature, and refer
4. Use the signer's public key, signature, and SHA-1 digest of JAR to verify the
5. Once the certificate, signature, and JAR have been verified, the MIDlet suite is
The Table 27 is a summary of MIDlet suite verification including dialog prompts:
Initial State
JAD not present, JAR downloaded
and full certification path could not be established after verifying MIDlet-
Certificate-<1>-<m> certificates, then repeat step 1 through 3 for the value <n>
greater by 1 than the previous value.

Table 26 Actions performed of signer certificate verification

to RFC 2437 for more detail.
signature. If the signature verification fails, reject the JAD and MIDlet suite. The
MIDlet suite will not be installed or allow MIDlets from the MIDlet suite to be
invoked as shown in the following table.
known to be trusted and will be installed (authentication process will be
performed during installation).
Authentication can not be performed, will install JAR. MIDlet suite is
treated as untrusted. The following error prompt will be shown,
Action
Authentication fails, JAR installation is not
allowed.
Implementation proceeds with the signature
verification using the first successfully verified
certificate path for authentication and
authorization.
Implementation proceeds with the signature
verification.
Verification Result
91

Advertisement

Table of Contents
loading

Table of Contents