That's it!
Many thanks for the help!
Frank Wockenfuß
-Ursprüngliche Nachricht-
Von: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Im Auftrag von Marek Marcola
Gesendet: Donnerstag, 2. August 2007 18:25
An: openssl-users@openssl.org
Betreff: Re: AW: RSA_public_decrypt problem U
Hello,
> The content at my example is 128 byte long (as long as the RSA signature).
> The original hash that was signed was 32 byte long.
> I find the orignial hash inside the decrypted content. It lays on the last 32
> byte.
> Before this is mostly FF. How do I surely get the original hash out
Gesendet: Donnerstag, 2. August 2007 18:00
An: openssl-users@openssl.org
Betreff: Re: RSA_public_decrypt problem UPDATE
Hello,
> I have found the reason for the problem. Deep inside my program was a bug
> that switched modulus and exponent, so I set the wrong values to n and e.
My first sugg
Hello,
> I have found the reason for the problem. Deep inside my program was a bug
> that switched modulus and exponent, so I set the wrong values to n and e.
My first suggestion :-)
> I've fixed the bug and also removed the leading 00 so that I get a good 128
> byte long modulus and a 4 byte lo
I have found the reason for the problem. Deep inside my program was a bug that
switched modulus and exponent, so I set the wrong values to n and e.
I've fixed the bug and also removed the leading 00 so that I get a good 128
byte long modulus and a 4 byte long exponent.
If I call RSA_verify I get