2. Verify the 20 byte SHA1HMAC of TEMP5 using DSK against SIG if if fails the blob is invalid.
3. Split TEMP5 in LEN(PUBLIC_KEY_BYTES) , PUBLIC_KEY_BYTES and TEMP4.
4. Decrypt TEMP4 using DEK with an IV of 0x4adda22c79e82105 in CBC mode with PKCS1 padding call the result TEMP3.
-5. Reverse the order of the octects in TEMP3 and call the result TEMP2.
+5. Reverse the order of the octects in TEMP3 and call the result TEMP2.
6. Split TEMP2 in IV (first 8 bytes) and TEMP1 (rest).
7. Decrypt TEMP1 using DEK (3DES) and IV in CBC mode with PKCS1 padding. Call the plaintext PRIVATE_KEY_BYTES.