I have found the reason for the problem. Deep inside my program was a bug that
switched modulus and exponent, so I set the wrong values to n and e.
I've fixed the bug and also removed the leading 00 so that I get a good 128
byte long modulus and a 4 byte long exponent.
If I call RSA_verify I
Gesendet: Donnerstag, 2. August 2007 18:00
An: openssl-users@openssl.org
Betreff: Re: RSA_public_decrypt problem UPDATE
Hello,
I have found the reason for the problem. Deep inside my program was a bug
that switched modulus and exponent, so I set the wrong values to n and e.
My first suggestion
Hello,
The content at my example is 128 byte long (as long as the RSA signature).
The original hash that was signed was 32 byte long.
I find the orignial hash inside the decrypted content. It lays on the last 32
byte.
Before this is mostly FF. How do I surely get the original hash out of
Hello,
I have found the reason for the problem. Deep inside my program was a bug
that switched modulus and exponent, so I set the wrong values to n and e.
My first suggestion :-)
I've fixed the bug and also removed the leading 00 so that I get a good 128
byte long modulus and a 4 byte long
That's it!
Many thanks for the help!
Frank Wockenfuß
-Ursprüngliche Nachricht-
Von: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Im Auftrag von Marek Marcola
Gesendet: Donnerstag, 2. August 2007 18:25
An: openssl-users@openssl.org
Betreff: Re: AW: RSA_public_decrypt problem UPDATE