I remembered encountering this problem before. And although I don't remember 
all the details now, the basic idea is that openssl will only allocate enough 
memory for the "significant" bits of the signature. So if your signature has 
the first byte of 0x00, it will not store that byte. And if you want consistent 
signature length (64 in your case), you have to manually pad it with zeros. You 
have to go back to the comments in the function header to get the details. But 
I'm pretty positive that is the case.

________________________________________
From: owner-openssl-us...@openssl.org [owner-openssl-us...@openssl.org] on 
behalf of redpath [redp...@us.ibm.com]
Sent: Tuesday, September 17, 2013 2:48 PM
To: openssl-users@openssl.org
Subject: Re: Concerning the ECDSA_sig size

I am glad someone is asking this question.
I sign the same data with same private key and sometimes the signature is 63
and sometimes it is 64 but overall the verification works for each
anyhow.








--
View this message in context: 
http://openssl.6102.n7.nabble.com/Concerning-the-ECDSA-sig-size-tp46553p46559.html
Sent from the OpenSSL - User mailing list archive at Nabble.com.
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           
majordomo@openssl.org______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to