1,271 questions
Hi @mc ,
Consider the follow steps.
- Compute the hash of the string using the MD5 algorithm. Ensure that the input string is properly encoded to bytes using a consistent encoding (e.g., UTF-8).
- After computing the hash, you sign it using the RSA private key. This operation generates a digital signature that binds the hash value to the private key.
Best Regards.
Jiachen Li
If the answer is helpful, please click "Accept Answer" and upvote it.
Note: Please follow the steps in our documentation to enable e-mail notifications if you want to receive the related email notification for this thread.