On 3/10/2016 11:47 PM, Dmitri Toubelis wrote:
> Same thing - you just extract public key from the certificate and use it
> to verify signature. You don't need TPM to validate signature and you
> don't even need TSS - everything can be done in OpenSSL. The key thing
> to keep in mind is that "verify" == "decrypt_with_public_key" . Here is
> working example:
If you're signing using the standard padding and OID, that low level
code can be replaced by:
int RSA_verify(int type, const unsigned char *m, unsigned int m_len,
unsigned char *sigbuf, unsigned int siglen, RSA *rsa);
------------------------------------------------------------------------------
Transform Data into Opportunity.
Accelerate data analysis in your applications with
Intel Data Analytics Acceleration Library.
Click to learn more.
http://pubads.g.doubleclick.net/gampad/clk?id=278785111&iu=/4140
_______________________________________________
TrouSerS-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/trousers-users