VerifyingKey.verify() with 71 bytes signature #273
              
                Unanswered
              
          
                  
                    
                      Bastien-BO
                    
                  
                
                  asked this question in
                Q&A
              
            Replies: 1 comment
-
| See https://github.com/tlsfuzzer/python-ecdsa#openssl-compatibility | 
Beta Was this translation helpful? Give feedback.
                  
                    0 replies
                  
                
            
  
    Sign up for free
    to join this conversation on GitHub.
    Already have an account?
    Sign in to comment
  
        
    
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
Hello,
i'm curently trying to use python-ecdsa to verify message's integrity from gpay.
to do so google give a sig that is 71 bytes:
That folow this structure (i believe):
6 byte | DER encoding overhead
32 byte | r-value
32 byte | S-value
1 byte | Signature Hash
Exemple
the error message i get: "ecdsa.keys.BadSignatureError: ('Malformed formatting of signature', MalformedSignature('Invalid length of signature, expected 64 bytes long, provided string is 71 bytes long'))"
Is there a way to use this signature as is with the lib ? Or do i need to trim unnecessary bytes, if so do you have any advises ?
regards,
Beta Was this translation helpful? Give feedback.
All reactions