Am 09.01.2015 um 01:11 schrieb Matt Caswell: On 09/01/15 00:05,
Christian Weber wrote:
Thanks Matt, i just assumed the BIGNUMs were the coordinates without any
projection - obviously that assumption was wrong - mislead by the funtions name.
What interests me is to how you accessed the BIGNUMs in the first place!
The EC_POINT structure is opaque and is defined in an internal header
file!! Applications shouldn't be reaching into those.
Matt
Actually i imported the internal header so the structure was known. I
marked the import as HACK to access exactly that EC_POINT structure. The
hack was carried out because of the lack of knowledge about how to
access the public key.
I yust did not understand the intention for hiding the EC_POINT
structure and didn't find information about how to access the coordinate
values which i need to compare with coordinates from other sources (XML
Dsig, Element <ds:KeyValue>) or placing them elsewhere.
So could you please give a hint or a pointer to where the intended
access can be found?
BTW: How does one find out which type of ECC is being used (binary or
prime)?
BTW2: Which compact representation of any public key would you recommend
(for program internal comparisons)?
Surely i will ban the internal header from my sources as they are not
neccessary.
Chris
_______________________________________________
openssl-users mailing list
openssl-users@openssl.org
https://mta.openssl.org/mailman/listinfo/openssl-users