i2d and d2i fucntions

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hello Dave,

What you said is right. Have checked ecs_ossl.c and implemented similar way
to truncate the digest based on the order.

Now, handshake is successful even for TLS1.2.

Thanks alot.

Rajeswari.

On Mon, Feb 16, 2015 at 11:53 PM, Dave Thompson <dthompson at prinpay.com>
wrote:

> > From: openssl-users On Behalf Of Rajeswari K
> > Sent: Friday, February 13, 2015 23:50
> > Hello Dave,
> > Based on your input, have stopped calling i2d_ECDSA_SIG()
> > and used BN_bn2bin() to overcome the der headers.
> > And now, my verification is working fine.
>
> ECDSA_verify in ecs_vrf.c only uses i2d to *check* that the
> input was canonical, to block certain possible attacks. It's
> the d2i that parsed the signature, and the internal form
> (ECDSA_SIG structure) is used for the actual verification.
>
> > Is there any function at openssl, to get the HASH used for
> > the digest at ECDSA_verify()?
> > I see that, for ECDSA_verify(), first argument is type. But
> > when its calling the function pointer, ECDSA_verify() is not
> > passing the type of the hash.
> > So, would like to get the hash type from digest data.
>
> ECDSA (and DSA) signatures do not care about the hash
> algorithm, only the length of the hash *value*. Notice
> that ECDSA_verify does not pass type to ECDSA_do_verify,
> which does the actual dispatch to a possible engine.
> (This differs from RSA, at least PKCS#1 as used by SSL/TLS,
> where the hash algorithm identifier is included in padding.)
>
> > I can understand that for TLS1.2, openssl uses SHA512.
> > But the same information i would like to get from digest data.
> > Is there any way to get this? Please share.
>
> For the ServerKeyExchange message (the case you said
> you cared about) in TLS1.2, it appears OpenSSL server uses
> the client's preference as stated in the sigalgs extension,
> except in 1.0.2 a new SuiteB option forces SuiteB choices.
> If the client offers all current hashes for ECDSA in strength
> order, which is very reasonable, SHA512 will be the choice.
>
>
>
> _______________________________________________
> openssl-users mailing list
> To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mta.openssl.org/pipermail/openssl-users/attachments/20150217/3dcbe06f/attachment.html>


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux