For some reason I didn't get any newsfeeds after re-subscribing, so I can't 
really post to my earlier inquiry.

I've figured this out.

1) Convert Key's CipherValue from base64-to-binary
2) rsautl against the Key's CipherValue.bin - gives binary version of the 
decoded key  (uses the private key)
3) Convert the binary version of the decoded key to hex - this will be the -K 
for bulk operations (the shared secret)
4) Convert the Body's Cipher Value from base64-to-binary
5) Save off the first 16 bytes for the IV - converting to Hex (becomes the 
Initialization Vector)
6) Save off the remainder of the BodyCipherValue.bin (len-16 - this was where I 
messed up)
7) Decrypt with cipher -in BodyCipherValueRemainder.bin with -K and -iv values

The -K is RSA encrypted with the public key, but the IV is in "cleartext", 
prepended to the AES/bulk encrypted part. 
_______________________
Carlo Milono
Director of Engineering
TIBCO Software Inc.
Direct: +1(650) 846-5152
mailto: cmil...@tibco.com




______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to