Hi Harald,

ThankQ for the information , but my doubt is if I do signing at sender side
with a flag (PKCS7_sign(x509 , priv , NULL , in , PKCS7_DETACHED)), then at
receiving side when I am doing verification how can I will be knowing that
the sender has sent the data with the flag PKCS7_DETACHED ...
and coming to the compression do any API's are there in Openssl (version
0.9.7e) ,for CMS envelope , so that we can use directly ...

Thanks in advance
--shankar

On 4/22/08, Harald Latzko <[EMAIL PROTECTED]> wrote:
>
> Hi Shankar,
>
> if you're dealing with OFTP2 (I assume you're implementing this because of
> older posts refering to the protocol and its RFC), you may inspect the field
> SFIDSEC. Taken from the RFC 5024, ch. 5.3.3:
>
>      Value: '00'  No security services
>             '01'  Encrypted
>             '02'  Signed
>             '03'  Encrypted and signed
>
>             Indicates whether the file has been signed and/or encrypted
>             before transmission.
>
> This should answer your question. Anticipating your next question:
> compression is indicated via the flag SFIDCOMP (where a value of  zero [0]
> means no compression and one [1] is ZLIB compression).
>
> Regards,
> Harald
>
>
> Am 21.04.2008 um 20:32 schrieb shankar ks:
>
> Hi ..
> >
> > When we sign a file using pkcs7_sign with the given set of flags , how
> > does the receiver know and have to use the appropriate flag for verification
> > ..
> >
> >
> > --
> > --Best Regards
> > Shankar
> >
>
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    openssl-users@openssl.org
> Automated List Manager                           [EMAIL PROTECTED]
>



-- 
--Best Regards
Shankar

Reply via email to