System Requirements
-------------------
The eVV Validator was tested with Java 5 and 6. 

The following libraries are need to run the eVV Validator:
- Apache XML Security 1.4.2
- Apache Commons Logging 1.1.1

When you use the eVV Validator with Java 6
you must change the default XML Security API provider to the Apache XML Security libraray. To change 
the Provider you must put the Apache XML Security Library in the Java endorsed directory.


The following article show how to change the Java endorsed directory.
http://java.sun.com/javase/6/docs/technotes/guides/standards/index.html


GUI: eVV Validator
------------------
The console application can be started with gui-evv-validator.bat or with gui-evv-validator-java6.bat.


Consoloe: eVV Validator
------------------

The console app can be started with evv-validator.bat or with evv-validator-java6.bat.


-file   the eVV file which should be validated

-dir    all eVV files in this directory are being validated

-date   the date which should be used if the certificate is valid. The
        format of the date is YYYY.MM.DD-HH:MM:SS or YYYY.MM.DD. If
	    no date was specified the timestamp from the eVV is used.

-ca     the CA certificate which should be used to verify the signature

-crl    the CRL file which should be used to check if the ca certificate
		is in the certificate revocation list.

-out	in this directory are the validation logs stored. If the output 
        directory was not specified all logs are only printed to console.

-help	display this help text

        evv-validator [-file | -dir] [-ca] [-date] [-crl] [-out] [-help | -h]

		
Examples:

validate a eVV file

        evv-validator -file foo_evv.xml -ca ca_certificate.crt
		

validate all eVV files in a directory

        evv-validator -dir evv_directory -ca ca_certificate.crt



API: SignatureValidator
-----------------------
You can integrate the JAR edec-signature-validator-X.X.X.jar in your current Java project and validate the
XML signature with the class ch.admin.bit.edec.dsig.SignatureValidator.



Admin-Root-CA
--------------
The Root CA Certificate can be found on the admin pki homepage (http://www.pki.admin.ch) or in
the directory ca. You will need the ca certificate with the name AdminCA-CD-T01.crt from the section 
"Klasse C & D".



CRL (Certificate Revocation List)
----------------------------------
The current CRL can be found on http://www.pki.admin.ch/crl.php. You will need the CRL for 
"Klasse C & D".
