AW: AW: RSA_public_decrypt problem UPDATE

2007-08-02 Thread Wockenfuß , Frank
That's it! Many thanks for the help! Frank Wockenfuß -Ursprüngliche Nachricht- Von: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Im Auftrag von Marek Marcola Gesendet: Donnerstag, 2. August 2007 18:25 An: openssl-users@openssl.org Betreff: Re: AW: RSA_public_decrypt problem U

Re: AW: RSA_public_decrypt problem UPDATE

2007-08-02 Thread Marek Marcola
Hello, > The content at my example is 128 byte long (as long as the RSA signature). > The original hash that was signed was 32 byte long. > I find the orignial hash inside the decrypted content. It lays on the last 32 > byte. > Before this is mostly FF. How do I surely get the original hash out

AW: RSA_public_decrypt problem UPDATE

2007-08-02 Thread Wockenfuß , Frank
Gesendet: Donnerstag, 2. August 2007 18:00 An: openssl-users@openssl.org Betreff: Re: RSA_public_decrypt problem UPDATE Hello, > I have found the reason for the problem. Deep inside my program was a bug > that switched modulus and exponent, so I set the wrong values to n and e. My first sugg

Re: RSA_public_decrypt problem UPDATE

2007-08-02 Thread Marek Marcola
Hello, > I have found the reason for the problem. Deep inside my program was a bug > that switched modulus and exponent, so I set the wrong values to n and e. My first suggestion :-) > I've fixed the bug and also removed the leading 00 so that I get a good 128 > byte long modulus and a 4 byte lo

RSA_public_decrypt problem UPDATE

2007-08-02 Thread Wockenfuß , Frank
I have found the reason for the problem. Deep inside my program was a bug that switched modulus and exponent, so I set the wrong values to n and e. I've fixed the bug and also removed the leading 00 so that I get a good 128 byte long modulus and a 4 byte long exponent. If I call RSA_verify I get