> > Any ideas? > The 15 bytes are the OID (object identifier). > See the TPM spec Part 1 31.2.1 or the PKCS#1 standard > for details. > Typically, one calls a signature verify function that > does the decrypt, > then checks the padding, OID, and hash within the > function. However, > the raw decrypt is very useful for debugging.
thanks for the help, the mistake was, that the padding of the legacy key wasn't set to PKCS#1 I forgot to do this by key creation: Tspi_SetAttribUint32(*hkey, TSS_TSPATTRIB_KEY_INFO, TSS_TSPATTRIB_KEYINFO_ENCSCHEME, TSS_ES_RSAESPKCSV15); so this mistake has been solved! THX ------------------------------------------------------------------------------ RSA® Conference 2012 Save $700 by Nov 18 Register now! http://p.sf.net/sfu/rsa-sfdev2dev1 _______________________________________________ TrouSerS-users mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/trousers-users
