RE: Manually verifying signature on X.509 certificate

2008-05-09 Thread David Schwartz
> Well the first embedded SEQUENCE is the tbsCertificate data. You > need to hash > all of that including the SEQUENCE tag+length bytes. This is correct. My previous statement that you don't include the tag and length bytes was incorrect. Sorry. DS

RE: Manually verifying signature on X.509 certificate

2008-05-09 Thread Anthony Floyd
> There is an example here: > > http://www.openssl.org/docs/apps/rsautl.html#EXAMPLES > Awesome, that is exactly what I'm looking for. Thanks! Anthony. __ OpenSSL Project http://www.openssl.org

Re: Manually verifying signature on X.509 certificate

2008-05-09 Thread Dr. Stephen Henson
On Fri, May 09, 2008, Anthony Floyd wrote: > To generate the signature, has that first embedded SEQUENCE (the one > that contains the certificate data) been hashed entirely? Including the > tag and length fields? Or has some subset of that been hashed? I > assume that the SEQUENCE with the hash

Re: Manually verifying signature on X.509 certificate

2008-05-09 Thread Dr. Stephen Henson
On Fri, May 09, 2008, Anthony Floyd wrote: > To generate the signature, has that first embedded SEQUENCE (the one > that contains the certificate data) been hashed entirely? Including the > tag and length fields? Or has some subset of that been hashed? I > assume that the SEQUENCE with the hash

RE: Manually verifying signature on X.509 certificate

2008-05-09 Thread Anthony Floyd
> This page is helpful as well: > http://en.wikipedia.org/wiki/X.509 > > Under "Structure of a certificate", it shows that a > certificate consists of > an inner certificate (sometimes called the TBS certificate), > followed by the > certificate signature algorithm and the signature itself. The

RE: Manually verifying signature on X.509 certificate

2008-05-09 Thread Anthony Floyd
> To do that properly you do need to at least parse some of the > ASN1 data. There > is some header information at the start which contains the > SEQUENCE tag+length > bytes. Right. This isn't a problem, as I've been pulling the data out by parsing the ASN.1 data anyway. > The actual bit you

RE: Manually verifying signature on X.509 certificate

2008-05-09 Thread David Schwartz
> To do that properly you do need to at least parse some of the > ASN1 data. There > is some header information at the start which contains the > SEQUENCE tag+length > bytes. > > The actual bit you will hash is in the middle of the data. One SEQUENCE > header is deleted from the start and some dat

Re: Manually verifying signature on X.509 certificate

2008-05-08 Thread Dr. Stephen Henson
On Thu, May 08, 2008, Anthony Floyd wrote: > Hi, > > I have a self-signed certificate generated by OpenSSL. I'm using Python > and various libraries (PyCrypto, tlslite) to programmatically access the > certificate. I'm not having any problems pulling the data out of the > certificate. > > Now

RE: Manually verifying signature on X.509 certificate

2008-05-08 Thread Anthony Floyd
> So to check the signature, it should be as easy as to hash > the data, decrypt the signature with the public key and > compare the two. Of course, I meant: hash the data, encrypt the hash with the public key and compare to signature. Thanks, Anthony.