On Wed, May 25, 2005, Chris Covell wrote:

> Victor,
> 
> > > $ openssl smime -verify -inform PEM -in signature.pk7 -CAfile
> > > development_cm.pem  -content content.txt
> 
> > Yes, CR/LF can be a problem. Many MTA feel free to convert eol from
> > CR/LF to LF and vice versa.
> 
> Yeah, but I am not using an MTA, I am signing the data in FireFox
> browser and storing the resultant base64 encoded data in a database.
>  
> > Try to play with -text and -crlfeol options of openssl smime.
> 
> Does not seem to make any difference.
> 
> > For us there was more problems with generation of S/MIME messages which pass
> > all the mail servers on the way to recipient.
> 
> Yeah, I have seen that too.
> 
> I can't believe other people have not seen this problem before, i.e.
> signing on the client browser and verifying on the server using
> OpenSSL !
> 

Have you tried the -binary option too?

I had no problems verifying signatures from the old signText function.

If you look at the PKCS#7 structure using:

openssl asn1parse -in p7.pem

and look for a line with 'messageDigest' and an OCTET STRING following it that
will give you the message digest value the content should be.

Steve.
--
Dr Stephen N. Henson. Email, S/MIME and PGP keys: see homepage
OpenSSL project core developer and freelance consultant.
Funding needed! Details on homepage.
Homepage: http://www.drh-consultancy.demon.co.uk
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to