> > Any ideas?
> The 15 bytes are the OID (object identifier). 
> See the TPM spec Part 1 31.2.1 or the PKCS#1 standard
> for details.
> Typically, one calls a signature verify function that
> does the decrypt,
> then checks the padding, OID, and hash within the
> function.  However,
> the raw decrypt is very useful for debugging.

thanks for the help, the mistake was, that the padding of the legacy key wasn't
set to PKCS#1

I forgot to do this by key creation:

Tspi_SetAttribUint32(*hkey, TSS_TSPATTRIB_KEY_INFO,
TSS_TSPATTRIB_KEYINFO_ENCSCHEME, TSS_ES_RSAESPKCSV15);

so this mistake has been solved! THX




------------------------------------------------------------------------------
RSA® Conference 2012
Save $700 by Nov 18
Register now!
http://p.sf.net/sfu/rsa-sfdev2dev1
_______________________________________________
TrouSerS-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/trousers-users

Reply via email to