Signature Algorithm: rsassaPss
Hash Algorithm: sha384
Mask Algorithm: mgf1 with sha384
Salt Length: 0x30
Trailer Field: 0xBC (default)
params = BerObject {
header: BerObjectHeader {
class: Universal,
structured: 1,
tag: Sequence,
len: Definite(
52,
),
raw_tag: Some(
[
48,
],
),
},
content: Sequence(
[
BerObject {
header: BerObjectHeader {
class: ContextSpecific,
structured: 1,
tag: EndOfContent,
len: Definite(
15,
),
raw_tag: Some(
[
160,
],
),
},
content: Unknown(
EndOfContent,
[
48,
13,
6,
9,
96,
134,
72,
1,
101,
3,
4,
2,
2,
5,
0,
],
),
},
BerObject {
header: BerObjectHeader {
class: ContextSpecific,
structured: 1,
tag: Boolean,
len: Definite(
28,
),
raw_tag: Some(
[
161,
],
),
},
content: Unknown(
Boolean,
[
48,
26,
6,
9,
42,
134,
72,
134,
247,
13,
1,
1,
8,
48,
13,
6,
9,
96,
134,
72,
1,
101,
3,
4,
2,
2,
5,
0,
],
),
},
BerObject {
header: BerObjectHeader {
class: ContextSpecific,
structured: 1,
tag: Integer,
len: Definite(
3,
),
raw_tag: Some(
[
162,
],
),
},
content: Unknown(
Integer,
[
2,
1,
48,
],
),
},
],
),
}
Here is a x509 pem cert.txt signed with RSA_PSS_SHA384.
openssl x509 -text -in cert.txt -nooutgives clear info of the signature algorithm:Unfortunately with your crate
certificate.signature_algorithm.parametersare parsed into a mess:Would you please fix it?