![]() '0x1ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff003021300906052b0e03021a050004145e3246e50a4dad079a61f99fa3297c01d802e038L' Having emulated the process described in the link, one then wants to see what it means for the MIB2. I've loaded up openssl but I really need to know in simple terms using an online process or tool how to compute the process "signature s raised to the power of 3 modulus n".Īny help most appreciated. I guess somewhere on the net there are some boxes to fill in that gives you theĠx1ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff003021300906052b0e03021a050004145e3246e50a4dad079a61f99fa3297c01d802e038 I can't work out the process for doing "signature s raised to the power of 3 modulus n" (my two maths degrees were too long ago for that). ![]() The n in the example is a chunk of the public key. I sort of guess that the public key is the same or failing that it can be read from the unit ?. ![]() Problem is I need an A, B, C of how to do the activities. Basically it covers the MetafileChecksum and the signatures. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |