That's it!

Many thanks for the help!


Frank Wockenfuß

-----Ursprüngliche Nachricht-----
Von: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Im Auftrag von Marek Marcola
Gesendet: Donnerstag, 2. August 2007 18:25
An: openssl-users@openssl.org
Betreff: Re: AW: RSA_public_decrypt problem UPDATE

Hello,
> The content at my example is 128 byte long (as long as the RSA signature). 
> The original hash that was signed was 32 byte long.
> I find the orignial hash inside the decrypted content. It lays on the last 32 
> byte. 
> Before this is mostly FF. How do I surely get the original hash out of the 
> content?
Looks promissing.
Now you may try to remove padding by RSA_public_decrypt() using 
RSA_PKCS1_PADDING flag (instead of RSA_NO_PADDING) and you will get
ASN1 structure called DigestInfo.

Best regards,
--
Marek Marcola <[EMAIL PROTECTED]>

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to