Berin, I have asked permission from owners of the files/keys I am using. If they agree do I have your permission to post the files to your personal mailbox.
Unfortunately I very much doubt they will agree to me posting these files on a public newsgroup. Steve -----Original Message----- From: Berin Lautenbach [mailto:[EMAIL PROTECTED] Sent: 29 May 2005 01:03 To: security-dev@xml.apache.org Subject: Re: ASN.1 encoding for DSA Steve, I don't *believe* (but I've been known time and time again to be wrong :>) that the problem is the key. The error you are getting is that the signature is expected to be 40 bytes - which it does not appear to be. That's nothing to do with the key, just that when the library has read in the signature value from the document, it has found it is the incorrect length. Do you have a sample signed XML file that you could send me? (With a cert or public key would be fantastic.) Cheers, Berin Cullum, Steve wrote: > Hello again, > > If my understanding of this problem is correct. The certificate itself is fine, the problem is in the way the certificate has been exported into a transfer format. > > I received the certificate as a P12, imported into the Windows key store via a "double click" and then at a later stage read the certificate via the mscryptoAPI's. > > Does Microsoft or OpenSLL provide any tools/utilities that I can use to remove the ASN encoding of this P12? Before I import it into the Windows key store. > > All I found was that was close was.. > OpenSSL DSA -inform DER -outform PEM -in MyKey.cer -out NewKey.cer > > But this command line just tells me "EXPECTING PRIVATE KEY" > > > > > > > > > > -----Original Message----- > From: Cullum, Steve > Sent: 26 May 2005 11:26 > To: 'security-dev@xml.apache.org' > Subject: ASN.1 encoding for DSA > > (Original thread... > RE: XML Security-C:: HCRYPTPROV DSS/RSA providers not set via Win CAPI > CryptoX509 using just the PCCERT_CONTEXT cosntructor) > > Does this affect TSIK -> xml-security interoperability in general or would this be just an isolated incident caused by the creators of my key not using appropriate options? > > Has anyone else encountered this problem? > > Can you think of a workaround? > > I was thinking about calling the MSCryptoAPI functions directly - doing something along the lines of VeriftDetatchedSignature() against the data; unfortunately I don't know how to do the OpenSSL equivalent. > > Lots of questions.. > > Thanks a lot for all the time & trouble this community is taking to help me. > > Muchos appreciated... > > Steve > > > > > -----Original Message----- > From: Milan Tomic [mailto:[EMAIL PROTECTED] > Sent: 26 May 2005 07:23 > To: security-dev@xml.apache.org > Subject: RE: XML Security-C:: HCRYPTPROV DSS/RSA providers not set via > Win CAPI CryptoX509 using just the PCCERT_CONTEXT cosntructor > > > W3C XML Signature recommendation doesn't mention ASN.1 encoding for DSA: > > http://www.w3.org/TR/xmldsig-core/#DSAKeyValue > > http://www.w3.org/TR/xmldsig-core/#dsa-sha1 > > so I would say that proper signing procedure is not to encode DSA > signature in ASN.1 after signing and before Base64 encoding. > > However, we could consider adding support for ASN.1 encoded DSA > signatures during verification process. Berin? Others? > > Best regards, > Milan > >