Investigating this further....

.ko signatures are CMS signatures, which are ANS.1 structures. THey are
tested, such that SignedData is a wrapper, around DigestedData, which is
a wrapper around ContentInfo, which is a warapper around raw binary
input.

The nice property of DigestedData is that it contains version, hash
algo, and digest fields, and the raw binary data is actually optional.

Meaning, one can Create CMS ANS.1 DER encoded DigestedData object, with
raw binary data discarded. Transfer that to the signing service, which
should be able to produce detached signatures.

Original desire to make large data optional, is in case the data to be
signed is a very large stream / tape, which is impossible or impractical
to hold in memory; and yet one still wants to generate signatures for
it.

None of the existing APIs to work CMS appear to trivially support
creating / serializing DigestedData, then deserialize it to sign it and
produce detached signatures. Ideally this should be done in DER encoding
such that it is platform/architecture independent.

I am pondering to add more APIs to OpenSSL or extend some of the
available CMS golang or rust libraries.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1930454

Title:
  support for .ko.hash signatures  or .o -> ko -> detached signatures

To manage notifications about this bug go to:
https://bugs.launchpad.net/launchpad/+bug/1930454/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to