> Date: Fri, 21 Oct 2011 11:19:59 +0000 (UTC)
> From: Jonas <[email protected]>
>
> I have not a real problem, but I do not understand the result of
> RSA_pubblic_decrpyt.
>
> I made a 20 Byte long hash and signed it with the private key of the TPM
with
> TSPI_HASH_SIGN(). This signature I transfer to another computer which
has the
> matching public key. There I want to verify the signature and decrypt it
with
> RSA_PUBLIC_DECRYPT(). This works. But I'm not getting the 20 Byte hash
alone.
> The function returns a 35 Byte long decrypted hash. The last 20 Byte of
it is
> the hash value I signed before. And I do not know what are the 15 Bytes
in
> front. There is no sense for me. And I do not think, that this is right.
>
> Any ideas?
The 15 bytes are the OID (object identifier).
See the TPM spec Part 1 31.2.1 or the PKCS#1 standard for details.
Typically, one calls a signature verify function that does the decrypt,
then checks the padding, OID, and hash within the function. However,
the raw decrypt is very useful for debugging.
------------------------------------------------------------------------------
The demand for IT networking professionals continues to grow, and the
demand for specialized networking skills is growing even more rapidly.
Take a complimentary Learning@Cisco Self-Assessment and learn
about Cisco certifications, training, and career opportunities.
http://p.sf.net/sfu/cisco-dev2dev
_______________________________________________
TrouSerS-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/trousers-users