Re: id-RSASSA-PSS question

2011-09-13 Thread Stef Hoeben
Hi, there's currently a mistake in the SOD, I'll probably be able to send it when it's fixed. Thx, Stef On 09/13/2011 12:07 AM, Dr. Stephen Henson wrote: Can you include the DER format message itself instead of the ASN1 dump? This will be very useful when CMS+PSS is implemented.

id-RSASSA-PSS question

2011-09-12 Thread Stef Hoeben
Hi, we have an SOD (a CMS for e-passports and e-ID cards) file that we can read out and verify nicely if the signature algo is RSA_PKCS1_PADDING. But if the algo is RSA_PKCS1_PSS_PADDING (see attached txt for an asn1 dump), the verification fails. Below is a part of the stack trace, it looks

Order of the DN components in X509_NAME_cmp()

2011-05-30 Thread Stef Hoeben
Hello, After getting back an OCSP repsonse, OCSP_basic_verify() says it can't find the responder cert in the OCSP response. However, the responder cert is present in the response. Some more investigation shows that the parts of the DN are inversed: - subject name in the responder ID: /CN=Test

Re: CMS_verify() with a public key instead of a cert

2011-05-06 Thread Stef Hoeben
Hi, CMS_verify() works fine if you have the signer cert, but now we have a CMS file for which only the (trusted) signer public key is available. Q: is there a high level function like CMS_verify() that works with a public key? If not: what would be the best alternative for us? -

CMS_verify() with a public key instead of a cert

2011-04-28 Thread Stef Hoeben
Hi, CMS_verify() works fine if you have the signer cert, but now we have a CMS file for which only the (trusted) signer public key is available. Q: is there a high level function like CMS_verify() that works with a public key? If not: what would be the best alternative for us? - Rewrite the

BN_gcd() efficiency

2010-12-08 Thread Stef Hoeben
Hi, it looks like the BN_gcd() doesn't implement the 'full-strength' Euclidean algorithm (do a - k.b in each loop) but instead a simplification (do a - b in each loop). So if the initial a and b differ by e.g. a factor 1, you'll get 1 iterations instead of 1; and also afterwards much

RE: Private Key from Windows Cert Store

2010-11-28 Thread Stef Hoeben
Hi Tom, here's the code of a little cmd line tool we use to test our CSPs. Cheers, Stef -Original Message- From: owner-openssl-us...@openssl.org [mailto:owner-openssl- us...@openssl.org] On Behalf Of Fili, Tom Sent: zondag 28 november 2010 18:19 To: openssl-users@openssl.org

RE: EC domain params instead of the OID in the pkcs8 key file?

2010-11-10 Thread Stef Hoeben
...@openssl.org [mailto:owner-openssl- us...@openssl.org] On Behalf Of Victor Duchovni Sent: dinsdag 9 november 2010 22:11 To: openssl-users@openssl.org Subject: Re: EC domain params instead of the OID in the pkcs8 key file? On Tue, Nov 09, 2010 at 09:34:42PM +0100, Stef Hoeben wrote: Hi

EC domain params instead of the OID in the pkcs8 key file?

2010-11-09 Thread Stef Hoeben
Hi, using the openssl tool, we generated an Elliptic Curve key pair and put it into a pkcs8 file: 0 48: SEQUENCE { 32: INTEGER 0 6 48: SEQUENCE { 86: OBJECT IDENTIFIER ecPublicKey (1 2 840 10045 2 1) 176: OBJECT IDENTIFIER '1 2 840 10045 3 1 7'

RE: PKCS7 - SubjectKeyIdentifier CHOICE in SignerIdentifier fails?

2010-04-16 Thread Stef Hoeben
To: openssl-users@openssl.org Subject: Re: PKCS7 - SubjectKeyIdentifier CHOICE in SignerIdentifier fails? On Mon, Mar 22, 2010, Stef Hoeben wrote: Hello, subjectKeyIdentifier [0] SubjectKeyIdentifier } Could it be that the SubjectKeyIdentifier CHOICE isn't supported here

PKCS7 - SubjectKeyIdentifier CHOICE in SignerIdentifier fails?

2010-03-22 Thread Stef Hoeben
, [...] SignerIdentifier ::= CHOICE { issuerAndSerialNumber IssuerAndSerialNumber, subjectKeyIdentifier [0] SubjectKeyIdentifier } Could it be that the SubjectKeyIdentifier CHOICE isn't supported here, that the parser expects a IssuerAndSerialNumber only? Thx, best regards, Stef Hoeben Software

Entering non-ASCII character with the openssl tool?

2006-01-16 Thread Stef Hoeben
Hi, (sorry if you received this mail twice) We want to make pkcs10 request with openssl -req, in which the CN contains non-ASCII chars (greek, arab, chinese, ...) Is there a way to do so with the openssl tool? E.g. by using escape characters, or by specifying the CN in openssl.conf in some