On Fri, Mar 04, 2005, Peter Cope wrote:

> Firstly I've searched the FAQ's and Google'd and not found an answer.  I'll 
> describe the scenario and hope someone can shed some light!
>  
> Machine-1: Generates keys/certs (Self Cert CA).  This is a UNIX (well AIX) 
> box, and runs openssl (latest release).  Keys/Certs are distributed to a 
> number of PC's as P12's. (since they use outlook) and also to a external 
> client.
>  
> Using this public key Machine-2 (Outlook) can sign+encrypt and send to 
> Machine-1 which can decrypt and verify. So OK.
> Using this public key our client (using Chilkatsoft ... not familiar with 
> this) and send to Machine-2 which can decrypt and verify. So OK. and also 
> sends to Machine-1 which can't decrypt it.  Complains about ASN.1 header 
> length being incorrect.  So here is my problem.
>  
> Examination of the ASN.1 (by hand as well as asn1parse) shows that pkcs7-data 
> part uses 128-bit rc2-cbc, and is followed by a binary chunk of some 60k in 
> size (this isn't itself structured .. unlike the des3-ede3-cbc produced by 
> default by openssl).  I've tried detaching this data to see if anything can 
> make sense of it, but no.
>  
> Anyone got any ideas, I'm assuming I'm missing a point somewhere!
>  

Hard to say without the file that OpenSSL doesn't like or the output of
asn1parse.

Steve.
--
Dr Stephen N. Henson. Email, S/MIME and PGP keys: see homepage
OpenSSL project core developer and freelance consultant.
Funding needed! Details on homepage.
Homepage: http://www.drh-consultancy.demon.co.uk
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to