That's it! Many thanks for the help!
Frank Wockenfuß -----Ursprüngliche Nachricht----- Von: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Im Auftrag von Marek Marcola Gesendet: Donnerstag, 2. August 2007 18:25 An: openssl-users@openssl.org Betreff: Re: AW: RSA_public_decrypt problem UPDATE Hello, > The content at my example is 128 byte long (as long as the RSA signature). > The original hash that was signed was 32 byte long. > I find the orignial hash inside the decrypted content. It lays on the last 32 > byte. > Before this is mostly FF. How do I surely get the original hash out of the > content? Looks promissing. Now you may try to remove padding by RSA_public_decrypt() using RSA_PKCS1_PADDING flag (instead of RSA_NO_PADDING) and you will get ASN1 structure called DigestInfo. Best regards, -- Marek Marcola <[EMAIL PROTECTED]> ______________________________________________________________________ OpenSSL Project http://www.openssl.org User Support Mailing List openssl-users@openssl.org Automated List Manager [EMAIL PROTECTED]