- 22 Jan 2025
- 3 Minutes à lire
- SombreLumière
- PDF
AAL2GenVerifyMessageSignatureCmd
- Mis à jour le 22 Jan 2025
- 3 Minutes à lire
- SombreLumière
- PDF
Function prototype
aat_int32 AAL2GenVerifyMessageSignatureCmd(
aat_byte *Cmd,
aat_int32 *CmdSize,
TDigipassBlob *DPData,
TKernelParms *CallParms,
aat_ascii *aStorageKeyNameIn,
aat_ascii *aIVIn,
aat_int32 MessageExpirationTime,
aat_ascii *Signature,
aat_ascii *SignedMessage,
aat_int32 DeferredSignatureData);
Description
This function creates a command that directs the HSM to verify a message signature using the given data and to return a result in the form of a reply.
The message signature validation on the HSM is identical to the functionality available with the Authentication Suite Server SDK Software Digipass Multi-Device Activation Service and the Digipass Secure Channel Service. For information on the associated functions, refer to the Authentication Suite Server SDK C-C++ Programmer's Guide..
This function must be used with the post-HSM API AAL2ProcVerifyMessageSignatureRpl.
Signed message optional expiration check
This function allows optionally checking a maximum amount of time authorized since the generation of Activation Message 2 or the request message for which the signature validation is performed. This message time validity check depends on the MessageExpirationTime parameter.
If MessageExpirationTime = 0, the function will not perform any message time validity check.
If MessageExpirationTime > 0, MessageExpirationTime represents the maximum amount of time (expressed in seconds) authorized since the generation of the message (Activation Message 2 or a request message).
Activation Message 2 or the request messages must have been MANDATORILLY generated by Authentication Suite Server SDK 3.15.1 or more if checking the time validity (i.e. MessageExpirationTime > 0).
The timestamp of the generation time is embedded in Activation Message 2 and the request messages only as of Authentication Suite Server SDK 3.15.1.