Johnny Gonzalez wrote:

I tryed using openca-digest too, but the output is
different from the PIN stored in the db, so my new
question is: how is this PIN generated? in the
"certificate" table in "data" field thereis a PIN, I
thinks that is the only parameter OpenCA uses to check
the CRIN, so I'm trying to use it too but that PIN
also is different to the output of openca-digest
command:

openca-digest sha1 TMS8hU+b8oPhoYS55b/NaQ
Digest: SHA1
String: TMS8hU+b8oPhoYS55b/NaQ
SHA1:   22H4PuGSCLvJdrqWhbT2hu/SIBg

and the cert  PIN in DB is:
PIN=5e86d229d29e4f856f9b798cad5fe007808c6afc

The PIN will be created during the certificate creation. Sometimes the users don't like it and use the PIN of the request but I describe the default model. This PIN will be hashed with SHA1. This hash/digest is stored in the header (PIN=...).

The original command is the following:

openssl dgst -sha1 < stdin

You can use "openssl dgst -sha1 CLEAR_PIN" too.

So are you sure that you have the correct clear text PIN? How do you get the clear text PIN.

Michael
--
_______________________________________________________________

Michael Bell                    Humboldt-Universitaet zu Berlin

Tel.: +49 (0)30-2093 2482       ZE Computer- und Medienservice
Fax:  +49 (0)30-2093 2704       Unter den Linden 6
[EMAIL PROTECTED]   D-10099 Berlin
_______________________________________________________________

Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

Reply via email to