Nils Larsch wrote:

> On Friday 19 September 2003 15:28, Frank wrote:
> > What I've seen so far with openssl is that there seems to be 10,000 ways
> > to do the same thing so I want to make sure I understand how to do a DSA
> > signature.  My questions are as follows:
> >
> > 1. Do you need a separte cert for signing RSA DSA? I created certs with
> > the following shell (create parms and ca cert in different steps):
> >
> > #! /bin/sh
> > openssl req -newkey dsa:dsa_param.pem -nodes -keyout $1_priv.pem -out
> > $1_req.pem
> > openssl ca -in $1_req.pem -out $1_cert.pem -policy policy_anything
> > -infiles < ca_in
> >
> > Now will a cert created this way be suitable for signing data with DSA
> > w/SHA1 hash?
>
> You don't need a cert to sign something only the private key matters.

Yes true, sorry I was not more specific, sign and check signature (thought
that would have been understood but I guess not). So really any public/prvate
key pair will do then right?  is there a better way to generate a public
private key pair in openssl then with creating certificates?

>
>
> >
> > 2.  If it will, then how do I sogn the data using the dsa(3) functions
> > or will the EVP funtions I used for signing RSA work too (i.e see
> > nothign that was RSA specific). i.e.
> > EVP_SignInit();
> > EVP_SignUpdate();
> > EVP_SignFinal();
>
> You can do it with both methods but using the EVP_Sign* API is
> recommened (and simpler).
>
> Nils
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    [EMAIL PROTECTED]
> Automated List Manager                           [EMAIL PROTECTED]

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to