On Wed, Nov 09, 2005, Antonio Ruiz Martnez wrote:

> 
> The question is that I have received a PKCS#1 that claims to be 
> compliant with PKCS#1 v2.1. With the openssl, with rsautl, I'm getting 
> an error telling me that the object is too long....
> Then I have decrypted the information received and I have seen that its 
> length it is 20 bytes, that is, a sha-1 digest. In PKCS#1 v1.5, it is 
> not possible because we have to used the DigestInfo structure and that 
> it is the reason because I'm getting the error with rsautl.
> Then, I have been reading the PKCS#1 v2.1 standard and the funtions 
> RSASSA-PSS and RSASSA-PKCS1-V1_5 have and encoding function but RSASP1, 
> RSAVP1 not. After reading it I'm not sure it is possible to put directly 
> the hash and openssl is not fully compliant or I don't understand very 
> well the standard.
> 

Well there is support for PSS and OAEP from PKCS#1 v2.1 but it isn't fully
integrated into the API.

I'm assuming you've used the -verify option to rsautl and no other options to
change padding mode.

If it uses PSS and/or OAEP then you wouln't get that error instead you'd get a
padding check failure.

What I suspect you have is a non-standard PKCS#1 v1.5 which doesn't use the
expected DigestInfo but uses the raw digest instead.

If you want to confirm this you can use the -raw option and -hexdump.
If it has loads of 0XFF characters that will show its PKCS#1 v1.5.

Steve.
--
Dr Stephen N. Henson. Email, S/MIME and PGP keys: see homepage
OpenSSL project core developer and freelance consultant.
Funding needed! Details on homepage.
Homepage: http://www.drh-consultancy.demon.co.uk
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to