VerifyingKey.verify() with 71 bytes signature #273
Unanswered
Bastien-BO
asked this question in
Q&A
Replies: 1 comment
-
See https://github.com/tlsfuzzer/python-ecdsa#openssl-compatibility |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
Hello,
i'm curently trying to use python-ecdsa to verify message's integrity from gpay.
to do so google give a sig that is 71 bytes:
That folow this structure (i believe):
6 byte | DER encoding overhead
32 byte | r-value
32 byte | S-value
1 byte | Signature Hash
Exemple
the error message i get: "ecdsa.keys.BadSignatureError: ('Malformed formatting of signature', MalformedSignature('Invalid length of signature, expected 64 bytes long, provided string is 71 bytes long'))"
Is there a way to use this signature as is with the lib ? Or do i need to trim unnecessary bytes, if so do you have any advises ?
regards,
Beta Was this translation helpful? Give feedback.
All reactions