Ah, that worked, thanks.
https://gerrit.asterisk.org/c/asterisk/+/18534
> On May 6, 2022, at 12:43 AM, Tomas Mraz wrote:
>
> Please look at
> demos/signature/rsa_pss_direct.c
>
> If you want to use the old PKCS1 v1.5 padding then just replace
> RSA_PKCS1_PSS_PADDING with RSA_PKCS1_PADDING.
Please look at
demos/signature/rsa_pss_direct.c
If you want to use the old PKCS1 v1.5 padding then just replace
RSA_PKCS1_PSS_PADDING with RSA_PKCS1_PADDING.
Tomas
On Thu, 2022-05-05 at 10:35 -0600, Philip Prindeville wrote:
> Bonjour. Et milles mercis.
>
> That was helpful.
>
> One more que
Bonjour. Et milles mercis.
That was helpful.
One more question: if I want to reproduce RSA_sign() (and RSA_verify()) using
evp_key_sign() and evp_key_verify() then I'll need add code to do the ASN.1
marshaling, right? There's no convenience function to do that (seems like an
oversight if tha
Bonjour,
The ASN.1 structure (it's a DigestInfo) is part of the PKCS#1 v1.5 padding
for signature operations.
PKCS#1v1.5 is rewritten in RFC2313.
Using the command line tool, you can reproduce this:
echo -n "Mary had a little lamb." > datatosign
either one of the following can be used to sign d
Hi,
I did the following in trying to build some validation steps to use against my
own rewrite of the crypto functions in Asterisk (to use EVP-PKEY).
% echo -n "Mary had a little lamb." | openssl sha1 -binary > digest
% od -t x1 digest
000 4e 07 b8 c7 aa f2 a4 ed 4c e3 9e 76 f6 5d 2a 04
000