VerifyingKey.verify() with 71 bytes signature #273
Unanswered
Bastien-BO
asked this question in
Q&A
Replies: 1 comment
-
See https://github.com/tlsfuzzer/python-ecdsa#openssl-compatibility |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Hello,
i'm curently trying to use python-ecdsa to verify message's integrity from gpay.
to do so google give a sig that is 71 bytes:
That folow this structure (i believe):
6 byte | DER encoding overhead
32 byte | r-value
32 byte | S-value
1 byte | Signature Hash
Exemple
the error message i get: "ecdsa.keys.BadSignatureError: ('Malformed formatting of signature', MalformedSignature('Invalid length of signature, expected 64 bytes long, provided string is 71 bytes long'))"
Is there a way to use this signature as is with the lib ? Or do i need to trim unnecessary bytes, if so do you have any advises ?
regards,
Beta Was this translation helpful? Give feedback.
All reactions