Hello,
> > Server decrypts this packet with client certificate, calculates its own
> > hash, compares this two hashes and accepts client authentication or not.
> 
> It is not way how DSA/ECDSA signatures work.
> If we are talking about RSA, we can talk about decrypting.
> But in El-Gamal style algorithms (DSA, ECDSA, GOST R 34.10) there is no
> way to "decrypt" signature and obtain original hash from signature.
> We can verify signature, i.e. take hash and public key from certificate, 
> and check whether
> signature was computed from same hash and corresponding private key.
Of course, this is why for DSA and ECDSA calculated hash is 20 bytes
length (SHA1). For this algorithms standard DSA/ECDSA procedure is
performed. Of course bigger hash data may be used for DSA when new
DSA/ECDSA parameters are generated (second prime of size equal to new
hash size) or hash is truncated to 20 bytes.(but accoring to FIPS SHA1
is standard).

Best regards,
-- 
Marek Marcola <[EMAIL PROTECTED]>

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to