RSA Security Home Security System 4.3 Uživatelský manuál Strana 1

Procházejte online nebo si stáhněte Uživatelský manuál pro Softwarové příručky RSA Security Home Security System 4.3. RSA Security Home Security System 4.3 User's Manual Uživatelská příručka

  • Stažení
  • Přidat do mých příruček
  • Tisk

Shrnutí obsahu

Strany 1 - Crypto-C

RSA BSAFE®Crypto-CCryptographic Components for CIntel® Security Hardware User’s GuideVersion 4.3

Strany 2

Algorithm Methods6 RSA BSAFE Crypto-C Intel Hardware User’s Guidecapabilities. The AMs required to support the Intel security hardware are included as

Strany 3 - Contents

Chapter 2 Using Intel Hardware With Crypto-C 7The Session ChooserThe Session ChooserAny Crypto-C application which uses hardware requires your applic

Strany 4 - Index 33

The Session Chooser8 RSA BSAFE Crypto-C Intel Hardware User’s GuideCreating the Hardware ChooserA hardware chooser is a list of manufacturer-supplied

Strany 5 - Overview

Chapter 2 Using Intel Hardware With Crypto-C 9Hardware Availabilitymake the actual Crypto-C function call during the Crypto-C Init step, for example,

Strany 6 - How This Book Is Organized

Hardware Errors10 RSA BSAFE Crypto-C Intel Hardware User’s GuideHardware ErrorsIf the hardware fails, Crypto-C will return an error of BE_HARDWARE or

Strany 7 - Application

Chapter 2 Using Intel Hardware With Crypto-C 11Hardware ErrorsA_RSA_EXTENDED_ERRORThis Crypto-C structure is defined specifically for retrieving Inte

Strany 8 - The Six-Step Sequence

Hardware Errors12 RSA BSAFE Crypto-C Intel Hardware User’s Guide

Strany 9 - Algorithm Methods

13Chapter 3Using the Intel Random Number GeneratorThis chapter gives some background on random number generators and shows how to use the Intel Random

Strany 10 - AI_HW_Random. For these AIs

Random Numbers14 RSA BSAFE Crypto-C Intel Hardware User’s GuideThe Intel Random Number GeneratorThe Intel Random Number Generator is dedicated hardwar

Strany 11 - The Session Chooser

Chapter 3 Using the Intel Random Number Generator 15Random NumbersPseudo-Random Number Generators (PRNGs)Crypto-C provides several pseudo-random numb

Strany 12 - Creating the Session Chooser

© 1999 RSA SECURITY INC. 001-19001-430-001-000Copyright Notice© 1999 RSA Security Inc. All rights reserved. This work contains proprietary inform

Strany 13 - Hardware Availability

Generating Random Numbers16 RSA BSAFE Crypto-C Intel Hardware User’s GuideGenerating Random NumbersThis example demonstrates how to use the Intel Hard

Strany 14 - Hardware Errors

Chapter 3 Using the Intel Random Number Generator 17Generating Random NumbersStep 1: Create an Algorithm ObjectThe next task is to create the algori

Strany 15 - A_RSA_EXTENDED_ERROR

Generating Random Numbers18 RSA BSAFE Crypto-C Intel Hardware User’s GuideStep 4: Update the Random ObjectStep 4 is not needed for random number seedi

Strany 16

Chapter 3 Using the Intel Random Number Generator 19Generating Random NumbersStep 6b: Free the Session ChooserFree the session chooser. It is importa

Strany 17 - Generator

Generating Random Numbers20 RSA BSAFE Crypto-C Intel Hardware User’s Guidesoftware. After the seed has been passed to the software algorithm info type

Strany 18 - Unavailability of Hardware

Chapter 3 Using the Intel Random Number Generator 21Generating Random NumbersStep 3: Initialize the Random AlgorithmTo initialize the random algorit

Strany 19

Generating Random Numbers22 RSA BSAFE Crypto-C Intel Hardware User’s Guidecall would be identical in a software implementation: Step 5: Generate R

Strany 20 - Generating Random Numbers

23Appendix ACrypto-C Error CodesTable A-1 lists the hardware-related error values returned by Crypto-C. If Crypto-C receives a hardware-level error fr

Strany 21

24 RSA BSAFE Crypto-C Intel Hardware User’s Guide

Strany 22 - Step 6: Destroy All Objects

25Appendix BIntel Security Hardware Error CodesTable B-1 lists the error values returned by the underlying Intel hardware. If Crypto-C returns an erro

Strany 23

iiiContentsChapter 1 Overview 1Intel Hardware Security Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1RSA

Strany 24

26 RSA BSAFE Crypto-C Intel Hardware User’s Guide

Strany 25

27Appendix CRedistributing the Intel Security DriverDetermining That the Firmware Hub Is Installed on the Target SystemBefore installing the Intel Sec

Strany 26 - Step 6: Destroy all Objects

Redistributing the Driver28 RSA BSAFE Crypto-C Intel Hardware User’s GuideRedistributing the DriverThe Intel Security Driver can be redistributed in t

Strany 27 - Crypto-C Error Codes

Appendix C Redistributing the Intel Security Driver 29Redistributing the DriverFiles InstalledThe silent install places the driver files in the follo

Strany 28

Redistributing the Driver30 RSA BSAFE Crypto-C Intel Hardware User’s GuideRedistributing the Driver via .inf FilesInstead of running the InstallShield

Strany 29 - B_GetExtendedErrorInfo

Appendix C Redistributing the Intel Security Driver 31Redistributing the DriverMicrosoft Windows 951. Copy the following files from the Crypto-C CD t

Strany 30

Redistributing the Driver32 RSA BSAFE Crypto-C Intel Hardware User’s GuideMicrosoft Windows 981. Copy the following files from the Crypto-C CD to a fl

Strany 31 - Appendix C

33IndexAalgorithm info type 3AI_HW_Random 6support for hardware 6algorithm method 3, 5AM_HW_RANDOM 6, 16hardware method corresponding to 8hardware-awa

Strany 32 - Redistributing the Driver

34 RSA BSAFE Crypto-C Intel Security Hardware User’s Guide

Strany 33 - Files Installed

iv RSA BSAFE Crypto-C Intel Hardware User’s GuideObtaining a Random Seed from Hardware. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Strany 34 - Microsoft Windows NT 4.0

1Chapter 1OverviewRSA Security Inc. and Intel Corporation have teamed to provide C programmers access to the Intel Random Number Generator via the RSA

Strany 35 - Microsoft Windows 95

How This Book Is Organized2 RSA BSAFE Crypto-C Intel Hardware User’s Guidecertain features in their BSAFE Crypto-C software applications.How This Book

Strany 36 - Microsoft Windows 98

Chapter 1 Overview 3Overview of a Crypto-C Hardware ApplicationOverview of a Crypto-C Hardware ApplicationCreating a Crypto-C application that can us

Strany 37

The Six-Step Sequence4 RSA BSAFE Crypto-C Intel Hardware User’s GuideThe Six-Step SequenceThe model for building a hardware-aware application with Cry

Strany 38

5Chapter 2Using Intel Hardware With Crypto-CCrypto-C uses the RSA BSAFE Hardware API (BHAPI) to access the Intel hardware security features. In order

Komentáře k této Příručce

Žádné komentáře