[xmlsec] XMLsec Command Line Utility and MSCrypto
Edward Shallow
ed.shallow at rogers.com
Thu Sep 18 21:00:07 PDT 2003
Aleksey,
For Ms Crypto, if you simply specify the following in the template, is
that sufficient for all cert/key pre-requisites ? Private or public ? Sign
and encrypt ?
<KeyInfo>
<KeyName>Ed Shallow</KeyName>
</KeyInfo>
-----Original Message-----
From: xmlsec-admin at aleksey.com [mailto:xmlsec-admin at aleksey.com] On Behalf
Of Aleksey Sanin
Sent: September 18, 2003 8:58 PM
To: xmlsec at aleksey.com
--privkey option loads private key in the keys manager. If you already have
a key in MSCrypto store *there is no need* to load it in keys manager
because in MS Crypto case, keys manager would've search MS Crypto store
*anyway*.
"--privkey" option *does not* select the key for crypto operation.
Sorry, I don't understand
what do you want.
Aleksey
Edward Shallow wrote:
>Understood,
>
> But isn't the presence of the keys/EdCert.p12 redundant in your
>example if as you say step 2) makes a formal request of the "keys
>manager" to get the cert/key from the MS Crypto Store ? This is a
utility-specific question.
>In the MSCrypto case, I am assuming that Wouter's new implementation
>will search the MS Crypto Store using the "name" provided which in MS's
>case is imply the CN portion of the DN and yes there can be duplicates.
>But assuming there aren't any ... We are forced to refer to a
>pkcs12:test-key name and its associated file EdCert.p12 when in fact
>they will just be "ignored" when step 2) makes the "official" request
>to the crypto-specific keys manager. I am assuming that all keys have
>already been loaded into the MS Crypto Store and we are now just using the
utility.
>
> My point is ... why can't we just also allow the generic xmlsec
>utility to simply specify a name and NOT a key file as an option ... e.g.
>
>sign --privkey:test-key --pwd 1234 something.tmpl
>
>In the absence of a key file (i.e. keys/EdCert.p12) the utility should
>just delegate to the default keys manager for cert/key handling.
>
>It is a very simple request to have each utility and the associated
>keys manager do its job based simply on a name search.
>
>Ed
>
>
>
>
>-----Original Message-----
>From: Aleksey Sanin [mailto:aleksey at aleksey.com]
>Sent: September 18, 2003 3:24 PM
>To: Edward Shallow
>Cc: 'Wouter'; xmlsec at aleksey.com
>
>I can explain what happens in general. Suppose there is a command line
>like
>this:
>
> sign --pkcs12:test-key keys/EdCert.p12 --pwd 1234 something.tmpl
>
>Then the following happens:
>
>1) xmlsec loads key and certificate from keys/EdCert.p12 and puts this
>key in default crypto keys manager with "test-key" name.
>2) When xmlsec singns the something.tmpl and finds out that it needs a
>private key with a name "test-key", it requests keys manager to find
>such key (internaly, the request is represented in xmlSecKeyReq object).
>3) Keys manager does the search and finds the key we loaded on step 1).
>4) xmlsec uses returned key for signature.
>
>Note that on step 1) we used words "default crypto keys manager". This
>means that
> - different crypto engines may have *different* default keys managers
>(for example, OpenSSL uses plain stupid list of keys; NSS uses the same
>plain list of keys and NSS key db; MSCrypto uses the same plain list of
>keys and MS Crypto store)
> - xmlsec command line utility uses "default" keys manager but
>application might replace it with whatever is needed (for example, one
>might have all keys and/or certificates in a database)
>
>
>Currently, xmlsec utility does not have an option that says "load key
>and use *this* key for signature or encryption". The key selection is
>done inderectly thru keys manager (i.e. signature/encryption template
>should have a key name that references to a key in keys manager). But
>you can do it in your application (if needed) by setting desired
>siganture/encryption key in signature/encryption context. Also today you
can use the "--session-key"
>option if you want to sign/encrypt something with session key (specific
>for this xml file). But the session key by itself would be encrypted
>with an indirectly selected key from keys manager. Again, in the
>application you can select second key from your application directly (if
you want).
>
>Hope this make things a little bit more clear :)
>
>Aleksey
>
>
>
>
>
>
>
>
>
>
>
>
_______________________________________________
xmlsec mailing list
xmlsec at aleksey.com
http://www.aleksey.com/mailman/listinfo/xmlsec
More information about the xmlsec
mailing list