diff -r 000000000000 -r 2c201484c85f cryptoservices/certificateandkeymgmt/testcertificates/openssl/readme.txt --- /dev/null Thu Jan 01 00:00:00 1970 +0000 +++ b/cryptoservices/certificateandkeymgmt/testcertificates/openssl/readme.txt Wed Jul 08 11:25:26 2009 +0100 @@ -0,0 +1,24 @@ +The oscpResponder.pl script requires the ocsp responder to support DSA + +the following patch can be applied to openssl 0.9.7b or 0.9.7c: + +--- openssl-0.9.7b.ORIG/apps/ocsp.c 2003-03-26 02:47:06.000000000 +0200 ++++ openssl-0.9.7b/apps/ocsp.c 2004-02-22 16:11:18.000000000 +0200 +@@ -1115,7 +1115,16 @@ + + OCSP_copy_nonce(bs, req); + +- OCSP_basic_sign(bs, rcert, rkey, EVP_sha1(), rother, flags); ++ { ++ /*in case of DSA keys we should use EVP_dss1()*/ ++ const EVP_MD *evp_md; ++ /* ++ * - EVP_dss1 only or can be EVP_dss for some DSA keys ? ++ * - should we use method EVP_PKEY_type() ? ++ */ ++ evp_md = (rkey->type == EVP_PKEY_DSA) ? EVP_dss1() : EVP_sha1(); ++ OCSP_basic_sign(bs, rcert, rkey, evp_md, rother, flags); ++ } + + *resp = OCSP_response_create(OCSP_RESPONSE_STATUS_SUCCESSFUL, bs); +