first thank you all, 

>> & does the CONSTRAINED BY which is a user-defined constraint,  can it
>> be ignored here?

> I think the anwser may be yes. According to the ASN.1 standard X.682, user-   >   
> defined constraint is
> equivalent to a special ASN.1 comment. If you are designing a general testing   > 
> device, ignoring
> the user-defined constraint is a good idea because the general tool can not deal > 
> with it easily.
> However, if you are constructing a tool to handle the H.323 protocol suite          
> > specially, you may
> need the constraint and develop a special H.323 tool to extract the constraint     > 
> and handle it.

Naveen-> yes iam trying to construct a tool to handle H.323 protocol
suite, so then how do i proceed?? how are the structures defined now,
if i cant ignore the CONSTRAINED BY which is a user-defined
constraint?

>Author Name: Wang Hao

> > In the ITU-T Recommendation H.235 I found the ASN.1 expression
> >
> > SIGNED { ToBeSigned } ::= SEQUENCE {
> >            toBeSigned ToBeSigned,
> >            algorithmOID OBJECT IDENTIFIER,
> >            paramS Params, -- any "runtime" parameters
> >            signature BIT STRING -- could be an RSA or an ASN.1
> 
>                    coded ECGDSASignature
> > } ( CONSTRAINED BY { -- Verify or Sign Certificate -- } )
> >
> > this is my understanding of above structure N::= SIGNED { XYZ }
> >
> > is equalent of
> >
> > N::=SEQUENCE {
> >           toBeSigned XYZ,
> >           algorithmOID OBJECT IDENTIFIER,
> >            paramS Params, -- any "runtime" parameters
> >            signature BIT STRING -- could be an RSA or an ASN.1
> 
>                    coded ECGDSASignature
> > } ( CONSTRAINED BY { -- Verify or Sign Certificate -- } )
> >
> > is my understanding right?
> 
> 
> Yes, for the purposes of encoding. However, it probably better be
> compiled into something that facilitates computing a signature
> of XYZ. Some special structure or something. Depends on the compiler
> though.
> 
> > & does the CONSTRAINED BY which is a user-defined constraint,  can it
> > be ignored here?
> 
> 
> Only if you want do deliberately break the protocol this structure
> is defined for. An example would be if you want to display the contents
> of the bad certificate without doing any computations to Verify or
> Sign the certificate.
> 
> 
> 

Naveen-> no i do not want to break the protocol this structure is
defined for. so hw do i proceed?

> > ENCRYPTED { ToBeEncrypted } ::= SEQUENCE {
> >            algorithmOID OBJECT IDENTIFIER,
> >            paramS Params, -- any "runtime" parameters
> >            encryptedData OCTET STRING
> > } ( CONSTRAINED BY { -- Encrypt or Decrypt -- ToBeEncrypted } )
> >
> > HASHED { ToBeHashed } ::= SEQUENCE {
> >            algorithmOID OBJECT IDENTIFIER,
> >            paramS Params, -- any "runtime" parameters
> >            hash BIT STRING
> > } ( CONSTRAINED BY { -- Hash -- ToBeHashed } )
> >
> > the ENCRYPTED & HASHED structures, also have same issues as SIGNED
> 
> 
> They are the same. These syntaxes are defined in X.683 (ISO 8824-4),
> Parametrization of ASN.1 specifications.
> 
> > Thanks a lot
> >
> > Naveen Kumar B K
> > Encore Software Limited
> > _______________________________________________
> > ASN1 mailing list
> > [EMAIL PROTECTED]
> > http://lists.asn1.org/mailman/listinfo/asn1
> 
> --
> Lev Walkin
> [EMAIL PROTECTED]
>
_______________________________________________
ASN1 mailing list
[EMAIL PROTECTED]
http://lists.asn1.org/mailman/listinfo/asn1

Reply via email to