-
Notifications
You must be signed in to change notification settings - Fork 1.6k
New issue
Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? # to your account
verify singed data (with pkcs7 standard) #6413
Comments
Most legacy protocols use PKCS#1 v1.5 with RSA keys. Please try again with |
i did it but same error.. Invalid signature .. |
Sorry, I just noticed that you are doing PKCS#7. I should have read your code more carefully. PyCA cryptography has no public PKCS#7 verification API yet. There is only an internal helper for unit tests at cryptography/tests/hazmat/primitives/test_pkcs7.py Lines 81 to 84 in 1d996e5
|
thank you! |
Be aware that is not public API. Closing in favor if #5471. We do need users to articulate exactly what they need out of a PKCS7 verification API before we can build it though. |
Hi everyone!
I have a message that i signed with pkcs7/cms format.
i read in Doc and i used:
i created .cms file and i can parse it by openssl command line.
Now, i want to verify the signature. i extract the signature from the cms file (by asn1crypyo lib)
i saw this:
but i cant verify .. thow exception that the signature is invalid..
i succeed to run opemssl command:
"openssl cms -verify -inform DER -in file.cms -content text.txt -certfile file.cert.pem -noverify"
someone can help me how to verify this?
The text was updated successfully, but these errors were encountered: