Re: id-RSASSA-PSS question

2011-09-13 Thread Stef Hoeben
Hi, there's currently a mistake in the SOD, I'll probably be able to send it when it's fixed. Thx, Stef On 09/13/2011 12:07 AM, Dr. Stephen Henson wrote: > Can you include the DER format message itself instead of the ASN1 dump? This > will be very useful when CMS+PSS is implemented. ___

id-RSASSA-PSS question

2011-09-12 Thread Stef Hoeben
Hi, we have an SOD (a CMS for e-passports and e-ID cards) file that we can read out and verify nicely if the signature algo is RSA_PKCS1_PADDING. But if the algo is RSA_PKCS1_PSS_PADDING (see attached txt for an asn1 dump), the verification fails. Below is a part of the stack trace, it looks lik

Order of the DN components in X509_NAME_cmp()

2011-05-30 Thread Stef Hoeben
Hello, After getting back an OCSP repsonse, OCSP_basic_verify() says it can't find the responder cert in the OCSP response. However, the responder cert is present in the response. Some more investigation shows that the parts of the DN are inversed: - subject name in the responder ID: "/CN=Test

Re: CMS_verify() with a public key instead of a cert

2011-05-06 Thread Stef Hoeben
Hi, > CMS_verify() works fine if you have the signer cert, but now we have > a CMS file for which only the (trusted) signer public key is available. > > Q: is there a high level function like CMS_verify() that works with a > public key? > > If not: what would be the best alternative for us? >

CMS_verify() with a public key instead of a cert

2011-04-28 Thread Stef Hoeben
Hi, CMS_verify() works fine if you have the signer cert, but now we have a CMS file for which only the (trusted) signer public key is available. Q: is there a high level function like CMS_verify() that works with a public key? If not: what would be the best alternative for us? - Rewrite the CMS

BN_gcd() efficiency

2010-12-08 Thread Stef Hoeben
Hi, it looks like the BN_gcd() doesn't implement the 'full-strength' Euclidean algorithm (do a - k.b in each loop) but instead a simplification (do a - b in each loop). So if the initial a and b differ by e.g. a factor 1, you'll get 1 iterations instead of 1; and also afterwards much more

RE: Private Key from Windows Cert Store

2010-11-28 Thread Stef Hoeben
Hi Tom, here's the code of a little cmd line tool we use to test our CSPs. Cheers, Stef > -Original Message- > From: owner-openssl-us...@openssl.org [mailto:owner-openssl- > us...@openssl.org] On Behalf Of Fili, Tom > Sent: zondag 28 november 2010 18:19 > To: openssl-users@openssl.org >

RE: EC domain params instead of the OID in the pkcs8 key file?

2010-11-10 Thread Stef Hoeben
l Message- > From: owner-openssl-us...@openssl.org [mailto:owner-openssl- > us...@openssl.org] On Behalf Of Victor Duchovni > Sent: dinsdag 9 november 2010 22:11 > To: openssl-users@openssl.org > Subject: Re: EC domain params instead of the OID in the pkcs8 key file? > > On T

EC domain params instead of the OID in the pkcs8 key file?

2010-11-09 Thread Stef Hoeben
Hi, using the openssl tool, we generated an Elliptic Curve key pair and put it into a pkcs8 file: 0 48: SEQUENCE { 32: INTEGER 0 6 48: SEQUENCE { 86: OBJECT IDENTIFIER ecPublicKey (1 2 840 10045 2 1) 176: OBJECT IDENTIFIER '1 2 840 10045 3 1 7' :

RE: PKCS7 - SubjectKeyIdentifier CHOICE in SignerIdentifier fails?

2010-04-16 Thread Stef Hoeben
2 maart 2010 13:54 > To: openssl-users@openssl.org > Subject: Re: PKCS7 - SubjectKeyIdentifier CHOICE in SignerIdentifier fails? > > On Mon, Mar 22, 2010, Stef Hoeben wrote: > > > Hello, > > > > subjectKeyIdentifier [0] SubjectKeyIdentifier } > > >

PKCS7 - SubjectKeyIdentifier CHOICE in SignerIdentifier fails?

2010-03-22 Thread Stef Hoeben
igestAlgorithm DigestAlgorithmIdentifier, [...] SignerIdentifier ::= CHOICE { issuerAndSerialNumber IssuerAndSerialNumber, subjectKeyIdentifier [0] SubjectKeyIdentifier } Could it be that the SubjectKeyIdentifier CHOICE isn't supported here, that the parser expects a IssuerAndSerialNumber on

Entering non-ASCII character with the openssl tool?

2006-01-16 Thread Stef Hoeben
Hi, (sorry if you received this mail twice) We want to make pkcs10 request with "openssl -req", in which the CN contains non-ASCII chars (greek, arab, chinese, ...) Is there a way to do so with the openssl tool? E.g. by using escape characters, or by specifying the CN in openssl.conf in some wa