Hello Stephen! Thank you *AGAIN* to the help! I'm getting much fun with OpenSSL package. :D
I could not figure out how I should use "openssl rsautl" on those purely binary BIGNUMs that are used by Lynksys|Sipura in their proprietary "MiniCertificate" standard. What I did is: BN_mod_exp( result, original_sig, pub_exp, pub_mod, ctx); Hurray! I got this as the "result": 01FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF \ FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF \ FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF \ FFFFFFFFFFFFFF00A2A420DF49B17508946305979D24DD4040B8FA2C The lower digits are exactly the "sha1" hash of the concatenated buffer with user name, expiry date etc. (It all works this way only if I use the "RSA_F4" as the "public exponent") This hash seems padded. Now my question is - How is this padding called? I do think now, I must use not the "RSA_sign()" but the combination of low-level functions like "RSA_private_encrypt()" with properly padded hashes to them. Or, as of my "gen-mc v0.91", I must put some "pad the hash" code between the "EVP_DigestFinal_ex()" and the "RSA_sign()". Please advise. -- Best regards, Tony mailto:[EMAIL PROTECTED] ______________________________________________________________________ OpenSSL Project http://www.openssl.org User Support Mailing List [email protected] Automated List Manager [EMAIL PROTECTED]
