FYI : when submitting a buffer composed of
- a leading 00 byte,
- the 255 bytes encrypted session key value
to HSM/PKCS11 for decyption, decrypt returns without any errors, and returned plain session key is the one expected.
FYI : when submitting a buffer composed of
to HSM/PKCS11 for decyption, decrypt returns without any errors, and returned plain session key is the one expected.
Some enlightenments here because i may have not mention some info in the first place :
Our HSM is a certified FIPS 140-2, sec level3, hardware module, exposing a PKCS#11 v2.30 spec compliant API.