On Fri, Apr 17, 2009, Rodrigo Canellas wrote:

> Hi!
> 
> 
> 
> I am trying to use 'RSA_verify' to verify a signature, but I am getting the 
> error "67567722", which is translated to: "error:0407006A:rsa 
> routines:RSA_padding_check_PKCS1_type_1:block type is not 01".
> 
> 
> 
> When I use 'openssl pkcs7  -in TEST_KEY.RSA -print_certs -text -noout -inform 
> DER', I get:
> "
> Certificate:
>     Data:
>         Version: 3 (0x2)
>         Serial Number:
>             a7:01:33:46:d1:d9:e3:d0
>         Signature Algorithm: sha1WithRSAEncryption
>         Issuer: C=BR, ST=RJ, O=TQTVD, OU=Development, CN=Astro Root CA 
> Certificate/emailaddress=rcanel...@tqtvd.com
>         Validity
>             Not Before: Feb  3 13:50:52 2009 GMT
>             Not After : Feb  3 13:50:52 2010 GMT
>         Subject: C=BR, ST=RJ, O=TQTVD, OU=Test, CN=Astro Test Certificate
>         Subject Public Key Info:
>             Public Key Algorithm: rsaEncryption
>             RSA Public Key: (1024 bit)
>                 Modulus (1024 bit):
>                     00:8b:2d:a8:e6:e8:8f:7c:29:4e:ff:b3:28:b2:3e:
>                     61:aa:ee:50:6e:2c:9a:5e:11:5d:2a:48:e9:dc:93:
>                     7f:e5:74:d1:6f:6b:65:fb:0a:43:3a:69:fe:b4:64:
>                     9a:bf:c3:17:2f:ca:f3:4d:92:be:9c:24:4c:0a:cd:
>                     13:08:8c:a3:32:9b:b1:b1:a2:06:bb:41:b9:ce:22:
>                     37:5f:0b:de:a2:0d:f7:49:cb:cd:b1:77:72:e8:ab:
>                     04:2f:e7:a7:73:2d:95:d4:ae:7e:8a:7c:7c:9b:92:
>                     86:83:6e:5b:46:b7:a1:bc:0f:d4:22:bf:a3:74:df:
>                     75:26:6b:21:72:ec:ae:6e:9b
>                 Exponent: 65537 (0x10001)
>         X509v3 extensions:
>             X509v3 Basic Constraints: 
>                 CA:FALSE
>             Netscape Comment: 
>                 OpenSSL Generated Certificate
>             X509v3 Subject Key Identifier: 
>                 AF:2D:B9:4E:87:03:CD:53:90:BF:C5:BE:1C:BC:6A:4B:F2:86:67:D8
>             X509v3 Authority Key Identifier: 
>                 
> keyid:96:E6:89:95:4C:72:BB:46:17:4F:90:B6:2C:C3:AC:61:1D:37:82:10
> 
> 
> 
>     Signature Algorithm: sha1WithRSAEncryption
>         06:90:74:58:c1:fb:5a:50:fd:fe:97:26:2f:f0:4c:f1:4c:93:
>         2e:6a:86:63:ad:57:b7:8c:9c:c5:43:e9:c1:70:c9:11:68:4a:
>         18:a4:08:a7:6b:3f:2b:99:31:96:cb:53:21:7a:a3:dc:7d:02:
>         0e:c3:da:30:8e:93:3a:5a:19:af:b7:ca:8f:30:2b:e8:17:f6:
>         59:ac:3e:47:a7:8b:45:35:f5:8f:1f:ac:b6:ec:db:f2:57:21:
>         ce:79:67:a5:f4:3d:03:05:cd:65:b6:c0:7e:70:77:a2:7e:be:
>         8f:00:40:2a:51:65:a7:c5:11:82:ec:6e:b1:2b:6b:d3:2d:47:
>         6e:99
> 
> 
> 
> Certificate:
>     Data:
>         Version: 3 (0x2)
>         Serial Number:
>             a7:01:33:46:d1:d9:e3:cf
>         Signature Algorithm: sha1WithRSAEncryption
>         Issuer: C=BR, ST=RJ, O=TQTVD, OU=Development, CN=Astro Root CA 
> Certificate/emailaddress=rcanel...@tqtvd.com
>         Validity
>             Not Before: Feb  3 13:15:26 2009 GMT
>             Not After : Feb  3 13:15:26 2012 GMT
>         Subject: C=BR, ST=RJ, O=TQTVD, OU=Development, CN=Astro Root CA 
> Certificate/emailaddress=rcanel...@tqtvd.com
>         Subject Public Key Info:
>             Public Key Algorithm: rsaEncryption
>             RSA Public Key: (1024 bit)
>                 Modulus (1024 bit):
>                     00:a9:f9:f8:70:d7:aa:a2:16:83:59:69:11:af:f8:
>                     dc:6d:f2:0b:e1:b1:39:12:90:4c:28:e2:24:da:8b:
>                     49:78:3c:97:2f:4e:ca:2e:1f:29:a4:f9:94:40:17:
>                     b2:6b:30:5b:51:20:f9:50:f3:be:1f:f4:ce:35:fb:
>                     05:93:98:04:37:aa:d8:1f:90:a5:f7:04:43:ed:b3:
>                     8a:fd:00:fa:f1:36:a8:ef:29:bb:cf:92:95:5f:e0:
>                     04:f2:2b:64:52:63:ac:f2:77:b7:b1:60:cf:5e:13:
>                     e9:ec:8e:37:ef:c3:de:ca:55:51:1d:f5:61:c2:c8:
>                     b0:e7:c2:3e:4b:1f:c3:16:49
>                 Exponent: 65537 (0x10001)
>         X509v3 extensions:
>             X509v3 Subject Key Identifier: 
>                 96:E6:89:95:4C:72:BB:46:17:4F:90:B6:2C:C3:AC:61:1D:37:82:10
>             X509v3 Authority Key Identifier: 
>                 
> keyid:96:E6:89:95:4C:72:BB:46:17:4F:90:B6:2C:C3:AC:61:1D:37:82:10
>                 DirName:/C=BR/ST=RJ/O=TQTVD/OU=Development/CN=Astro Root CA 
> Certificate/emailaddress=rcanel...@tqtvd.com
>                 serial:A7:01:33:46:D1:D9:E3:CF
> 
> 
> 
>             X509v3 Basic Constraints: 
>                 CA:TRUE
>     Signature Algorithm: sha1WithRSAEncryption
>         60:95:2e:f7:21:f0:16:bc:67:35:6c:c1:0d:ea:0d:25:38:2a:
>         c8:70:4e:8b:99:08:27:65:88:3e:ff:9c:eb:4d:26:e2:30:15:
>         34:2b:82:58:65:ff:29:d3:ec:9f:12:50:f9:65:c0:79:1c:63:
>         72:52:13:c3:b2:68:41:3a:b2:3c:8e:47:11:28:f2:c4:61:98:
>         1e:de:97:08:3d:b0:c6:06:db:44:f8:b2:92:6e:68:42:8c:5c:
>         b3:66:dd:f0:72:32:12:c9:ae:d2:a2:0b:7a:f5:ca:ea:30:cb:
>         11:f6:2b:31:d8:ac:eb:49:37:c2:79:07:e2:e9:78:51:6b:23:
>         a7:33
> "
> 
> 
> 
> The hash of the file that was signed by the first certificate in the chain, 
> i.e., serial "a7:01:33:46:d1:d9:e3:d0" is "11 18 41 32 20 0B 73 D9 B4 6B 35 
> B3 CF FA B4 73 96 66 3C 8F". I get this result from my program as well as 
> from 'sha1sum'.
> 
> 
> 
> 'RSA_verify' is called with:
> 'type' as "NID_sha1",
> 'm' as "11 18 41 32 20 0B 73 D9 B4 6B 35 B3 CF FA B4 73 96 66 3C 8F", 
> 'm_len' is "20", 
> 'sigbuf' is 
>        '06:90:74:58:c1:fb:5a:50:fd:fe:97:26:2f:f0:4c:f1:4c:93:
>         2e:6a:86:63:ad:57:b7:8c:9c:c5:43:e9:c1:70:c9:11:68:4a:
>         18:a4:08:a7:6b:3f:2b:99:31:96:cb:53:21:7a:a3:dc:7d:02:
>         0e:c3:da:30:8e:93:3a:5a:19:af:b7:ca:8f:30:2b:e8:17:f6:
>         59:ac:3e:47:a7:8b:45:35:f5:8f:1f:ac:b6:ec:db:f2:57:21:
>         ce:79:67:a5:f4:3d:03:05:cd:65:b6:c0:7e:70:77:a2:7e:be:
>         8f:00:40:2a:51:65:a7:c5:11:82:ec:6e:b1:2b:6b:d3:2d:47:
>         6e:99'
> 'siglen' is "128", 
> and 'rsa' is created like this (error checking and handling ommited):
> "
> rsa = RSA_new ();
> rsa->n = BN_bin2bn(bufPubKeyMod, pubKeyMod.size (), 0);
> rsa->e = BN_bin2bn(bufPubKeyExp, 3, 0);
> "
> where 'bufPubKeyMod' is 
>                   " 00:8b:2d:a8:e6:e8:8f:7c:29:4e:ff:b3:28:b2:3e:
>                     61:aa:ee:50:6e:2c:9a:5e:11:5d:2a:48:e9:dc:93:
>                     7f:e5:74:d1:6f:6b:65:fb:0a:43:3a:69:fe:b4:64:
>                     9a:bf:c3:17:2f:ca:f3:4d:92:be:9c:24:4c:0a:cd:
>                     13:08:8c:a3:32:9b:b1:b1:a2:06:bb:41:b9:ce:22:
>                     37:5f:0b:de:a2:0d:f7:49:cb:cd:b1:77:72:e8:ab:
>                     04:2f:e7:a7:73:2d:95:d4:ae:7e:8a:7c:7c:9b:92:
>                     86:83:6e:5b:46:b7:a1:bc:0f:d4:22:bf:a3:74:df:
>                     75:26:6b:21:72:ec:ae:6e:9b"
> 
> 
> 
> and 'bufPubKeyExp' is "01:00:01"
> 
> 
> 
> What I do not understand (and I think this is the cause of the error) is why 
> the modulus of the certificate "a7:01:33:46:d1:d9:e3:d0" has 129 bytes, 
> instead of 128? What does the first '0x00' byte mean?
> 
> 
> 
> But, as I am extremely newbie to cryptography, and even more to 'openssl', I 
> am sure I am making a, well, newbie mistake.
> 
> 
> 

That error usually means you are using the wrong key and/or signature or one
or the other has become corrupted.

In this case you are using the wrong signature altogether.

Unless you have a good reason to manually process a PKCS#7 signature I'd
suggest you use the "smime" utility instead or the documented S/MIME API.

Steve.
--
Dr Stephen N. Henson. Email, S/MIME and PGP keys: see homepage
OpenSSL project core developer and freelance consultant.
Homepage: http://www.drh-consultancy.demon.co.uk
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to