On 06/10/2012 08:45 PM, Nikos Mavrogiannopoulos wrote:
On 06/10/2012 07:36 PM, Carolin Latze wrote:
I am sorry, but this still causes me some troubles.
As far as I understand it, the hash in PKCS#1 is:
bytes 00 - 14: algorithm identifier + some more bytes
bytes 15 - 20: the hash
So I thought it might be sufficient do define a new gnutls_datum_t vdata
with
vdata.data =&raw_data->data[15]
vdata.size = raw_data->size-15
Why do you do that? You're not supposed to interpret that data, just
sign it using raw RSA. You should treat it the same way you treated the
MD5+SHA1 combo in TLS 1.0.
Hm. I cannot send more than 20 bytes to the TPM sign function, so I
would need to encrypt. As far as I remember the TLS 1.2 RFC, the goal
was to have 20 bytes and be able to use standard signature functions
instead of encryption as it was in TLS <1.2. So maybe other
cryptographic modules are able to handle the complete PKCS#1 structure,
but unfortunately, the TPM is not.
_______________________________________________
Help-gnutls mailing list
[email protected]
https://lists.gnu.org/mailman/listinfo/help-gnutls