Technically, the mime-type application/xml requires that ALL content
be encoded in UTF-8.  (This is an artifact of XML itself specifying
that it is always UTF-8.)

If it's not valid UTF-8, then it's not valid XML, which (depending on
your environment) may not even need to be evaluated for its signature.

-Kyle H

On Tue, Jun 24, 2008 at 12:18 PM, javierm <[EMAIL PROTECTED]> wrote:
> Oh Boy!! Eureka,
>
> Yes the HEX number in "messageDigest" converted to base64 gives me the MIC
> that the trading partner expects, though, I can not figure out how this
> value is obtained based on the original content between the first and second
> boundary. I calculated the message digest for this "original content" in
> SHA1 obtaining a binary data which I then convert to base64 using openssl,
> but in all variations of end of line with mime without mime header (the rfc
> 1767 header for EDI object), with end of line at the end of the EDI record,
> and I don't get the same value that comes out from the signature in the
> second part of the signed message. I also used an online tool for
> translating all sorts of numbers at http://www.paulschou.com/tools/xlate/
> and pasting my original content on first box of this translator, gives me a
> completely new SHA1 value. .
>
> Linux has one straightforward "sha1sum" GNU command to do the same without
> openssl, and it gives the same result as the one obtained with openssl, so I
> don't think I'm using the tool in a wrong way because it only needs the name
> of the file...WHAT DO YOU THINK?
>
> The rfc 4130 mentions precisely what you said:
>
> a. The message integrity check (MIC or Message Digest), is
>             decrypted using the sender's public key. (I use as1parse, and
> get the messageDigest record)
>
>          b. A MIC on the signed contents (the MIME header and encoded
>             EDI object, as per RFC 1767) in the message received is
>             calculated using the same one-way hash function that the
>             sending trading partner used.
>
>          c. The MIC extracted from the message that was sent and the MIC
>             calculated using the same one-way hash function that the
>             sending trading partner used are compared for equality.
>
> jkoehring wrote:
> Yes, I believe the messageDigest in the ASN.1 dump is, indeed, the hash of
> the data that was signed.
>
> ________________________________
> View this message in context: Re: RFC 4130 checksum in SHA1
> Sent from the OpenSSL - User mailing list archive at Nabble.com.
>
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to