On Tue, Aug 28, 2012, GWu wrote:

> 
> Great, thanks a lot. I've been able to reproduce this on the erroneous
> messages as well, and a correctly signed message gives for example
> 
> openssl rsautl -verify -certin -inkey s.pem -in sig.der -asn1parse
>     0:d=0  hl=2 l=  33 cons: SEQUENCE
>     2:d=1  hl=2 l=   9 cons:  SEQUENCE
>     4:d=2  hl=2 l=   5 prim:   OBJECT            :sha1
>    11:d=2  hl=2 l=   0 prim:   NULL
>    13:d=1  hl=2 l=  20 prim:  OCTET STRING
>       0000 - 42 f7 3b c1 41 4f 04 e9-ac f3 4c 1f 33 3f de 73   
> B.;.AO....L.3?.s
>       0010 - e3 d9 e8 76                                       ...v
> 
> Could you confirm which RFC is violated by that missing DigestInfo
> structure, RFC 2315?
> I'd like to inform the author of the crypto module that their output
> isn't correct (until now they deny that).
> 

Well the RSA scheme used is mentioned in the PKCS#1 specification see the
comments about the EMSA-PKCS1-v1_5 operation.

> Any ideas why Outlook (for example) accepts this malformed signature?
> Is there some alternate RFC/RFC version/format/..., which allows this
> kind of raw data (or is it maybe just more "fault tolerant" on the
> structure)?

I think it is the latter: it just tolerates the raw form.

Steve.
--
Dr Stephen N. Henson. OpenSSL project core developer.
Commercial tech support now available see: http://www.openssl.org
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to