You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
It seems even the most recent versions of OpenSSL don't support PKCS#8 v2 which includes the public key in the resulting document in addition to the private key. See: RustCrypto/formats#1349
NOTE: There exist some private key import functions that have not
picked up the new ASN.1 structure OneAsymmetricKey that is defined in
[RFC7748]. This means that they will not accept a private key
structure that contains the public key field. This means a balancing
act needs to be done between being able to do a consistency check on
the key pair and widest ability to import the key.
Concretely this would involve changing the PKCS#8 serializer to not include the public key, which would permit interop with OpenSSL.
In many ways this makes sense as the public key is easily computed from the private key via scalar multiplication.
The text was updated successfully, but these errors were encountered:
If this was done it would be nice if the choice of v1 vs v2 was in some way configurable, since some highly opinionated software (notably ring) require v2 PKCS8 encoding.
It seems even the most recent versions of OpenSSL don't support PKCS#8 v2 which includes the public key in the resulting document in addition to the private key. See: RustCrypto/formats#1349
From RFC8410 Section 7:
Concretely this would involve changing the PKCS#8 serializer to not include the public key, which would permit interop with OpenSSL.
In many ways this makes sense as the public key is easily computed from the private key via scalar multiplication.
The text was updated successfully, but these errors were encountered: