30.03.2009 kl. 18:30 skrev Anthony Scarpino:

> John Zolnowsky x69422/408-404-5064 wrote:
>>> Date: Sat, 28 Mar 2009 04:02:08 +0100
>>> From: Andreas Portele <ultrasparc at rechnerpool.de>
>>> 28.03.2009 kl. 03:41 skrev John Zolnowsky x69422/408-404-5064:
>>>>> Date: Sat, 28 Mar 2009 03:01:07 +0100
>>>>> From: Andreas Portele <ultrasparc at rechnerpool.de>
>>>>>
>>>>> I have a wired problem loading a signed kcf crypto provider. I was
>>>>> already able to load it back in time, but it stopped working for  
>>>>> some
>>>>> unknown reason.
[...]
>>>>>
>>>>> #elfsign verify -v padlock
>>> elfsign: verification of padlock passed.
>>> format: rsa_sha1.
>>> signer: C=US, CN=portele.
>>          ^^^^^^^^^^^^^^^^
>> The padlock crypto module was not signed with a cryptographic  
>> framework
>> key/certificate pair.  For example:
>> # elfsign verify -v  /kernel/crypto/aes
>> elfsign: verification of /kernel/crypto/aes passed.
>> format: rsa_sha1.
>> signer: O=Sun Microsystems Inc, OU=Solaris Cryptographic Framework,  
>> CN=SunOS 5.10.
>> signed on: Wed Dec 10 22:59:42 2008.

This was it! THX.. I had for whatever reason another cert with the  
same key as the cert I got from Anthony Scarpino so an elfsign verify  
does fine all the time, as the module loading does, as long I didn't  
fill in a cipher function. So this all was completely wired, but it  
works now with the right cert :-))



Reply via email to