> I was wondering if anyone could tell me if it is in fact possible to 
> verify a signature created using WTLS-8? 
> A reference to the specification of this curve can be found here: 
> http://technical.openmobilealliance.org/tech/affiliates/wap/wap-261-wtls-20010406-a.pdf
>  
> (page 90)
>

>From page 64 of the document you cited:

    enum { anonymous(0), ecdsa_sha(1), rsa_sha(2), (255)} 
SignatureAlgorithm;

You should be OK with rsa_sha, but its not clear to me if all the ecdsa_sha 
are supported. To understand why, you need to look at Table 8 on page 86 
and the curves WTLS calls out. I *think* Crypto++ will support about 8 of 
the 12 they specify.
 

> We are currently looking at alternatives to OpenSSL and Crypto++ seems 
> like a good way to go.
> I have spent a little time trying to do this in Crypto++ but I have not 
> had any success as yet. Before I go any further I thought I'd ask the 
> knowledgable folk here.
>

I think it depends on what you want to accomplish.

Are you interested *only* in verifying a signature that's already been 
parsed? Or are you interested in the bigger package? Here, the bigger 
package includes things like implementing the protocol (sub tasks will 
include asynchronous socket I/O, record layer implementation, X.509 
parsing, key exchange, bulk transfer, etc).

If its the former, then Crypto++ should do fine. If the latter, then you 
are going to have a lot of work because it looks like a re-implementation 
of TLS. In the case of the latter, you should evaluate another library.

>From your other message:

> At the moment, all I have is the public key. I can use OpenSSL to dump
> the output of the public key and can convert it to DER format in Crypto++
> and what I pass it through dumpasn1 it matches...

This should help if its in PEM format: 
http://www.cryptopp.com/wiki/PEM_Pack. You won't need to use OpenSSL to 
convert it to ASN.1/DER.

> eg (I'm not entirely comfortable posting the key in a public forum so I
> have obfuscated some of the detail here):

That's fine. Call out the curve you are using from page 88. Or, post the 
OID, Curve Name or domain parameters (Curve, Base Point and Modulus); keep 
the Public Point (Q) and the Private Exponent (x) to yourself.

Jeff

-- 
-- 
You received this message because you are subscribed to the "Crypto++ Users" 
Google Group.
To unsubscribe, send an email to [email protected].
More information about Crypto++ and this group is available at 
http://www.cryptopp.com.
--- 
You received this message because you are subscribed to the Google Groups 
"Crypto++ Users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
For more options, visit https://groups.google.com/d/optout.

Reply via email to