On 7/15/10 11:47 AM, Mark Bishop wrote:
> Where can I find out the details on how a signature is created for a
> certificate and how it differs from creating a signature on a data file?
>
> Is it as simple as running MD5, SHA-1, SHA-256, etc on the cert,
> encrypting the hash with the private key and sticking the results on
> the end of the cert (X509)?  Or am I missing a key concept?
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    openssl-users@openssl.org
> Automated List Manager                           majord...@openssl.org
You are looking for something called X.509 (available from itu.int, the
09/2005 edition is available for free) and for the Internet Profile for
PKI (PKIX, most lately in RFC5280).

What you do is this: You create something called a 'tbsCertificate'
structure ('tbs' means 'to be signed').  Then, you follow the rules
defined to specify the hash function in use (and its context/semantics);
create the hash using those semantics; and encrypt it with the private
key used as the Authority which signed it.

There's a fair amount of voodoo that must happen to make it work, so you
will really have to look at the standards to see the precise order of steps.

-Kyle H

Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

Reply via email to