We use Verisign certs for signing and encrypting our email. This year Verisign changed the algorithm used for their certs from md5RSA to sha1RSA. Now all my unix and mac clients can no longer import their certs because openssl apparently doesn't understand that algorithm.

This is the result of the following command for an md5RSA cert - openssl pkcs12 -in certname:

Bag Attributes: <Empty Attributes>
subject=/O=The University of Texas System/OU=VeriSign Trust Network/OU=Terms of use at https://www.verisign.com/rpa (c)99/OU=Class 2 CA - OnSite Individual Subscriber/CN=The University of Texas at Dallas CA issuer=/C=US/O=VeriSign, Inc./OU=Class 2 Public Primary Certification Authority - G2/OU=(c) 1998 VeriSign, Inc. - For authorized use only/OU=VeriSign Trust Network

This is the result of the same command for a sha1RSA cert:

88566:error:0D0680A8:asn1 encoding routines:ASN1_CHECK_TLEN:wrong tag:/usr/src/secure/lib/libcrypto/../../../crypto/openssl/crypto/asn1/tasn_dec.c:1294: 88566:error:0D07803A:asn1 encoding routines:ASN1_ITEM_EX_D2I:nested asn1 error:/usr/src/secure/lib/libcrypto/../../../crypto/openssl/crypto/asn1/tasn_dec.c:380:Type=PKCS12

Is there a roadmap in the development plan for including sha1RSA in the algorithms that openssl understands?

--
Paul Schmehl
As if it wasn't already obvious,
my opinions are my own and not
those of my employer.

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to