RSA Security Home Security System 4.3 Manual do Utilizador

Consulte online ou descarregue Manual do Utilizador para Manuais de software RSA Security Home Security System 4.3. RSA Security Home Security System 4.3 User's Manual Manual do Utilizador

  • Descarregar
  • Adicionar aos meus manuais
  • Imprimir

Resumo do Conteúdo

Página 1 - Crypto-C

RSA BSAFE®Crypto-CCryptographic Components for CIntel® Security Hardware User’s GuideVersion 4.3

Página 2

Algorithm Methods6 RSA BSAFE Crypto-C Intel Hardware User’s Guidecapabilities. The AMs required to support the Intel security hardware are included as

Página 3 - Contents

Chapter 2 Using Intel Hardware With Crypto-C 7The Session ChooserThe Session ChooserAny Crypto-C application which uses hardware requires your applic

Página 4 - Index 33

The Session Chooser8 RSA BSAFE Crypto-C Intel Hardware User’s GuideCreating the Hardware ChooserA hardware chooser is a list of manufacturer-supplied

Página 5 - Overview

Chapter 2 Using Intel Hardware With Crypto-C 9Hardware Availabilitymake the actual Crypto-C function call during the Crypto-C Init step, for example,

Página 6 - How This Book Is Organized

Hardware Errors10 RSA BSAFE Crypto-C Intel Hardware User’s GuideHardware ErrorsIf the hardware fails, Crypto-C will return an error of BE_HARDWARE or

Página 7 - Application

Chapter 2 Using Intel Hardware With Crypto-C 11Hardware ErrorsA_RSA_EXTENDED_ERRORThis Crypto-C structure is defined specifically for retrieving Inte

Página 8 - The Six-Step Sequence

Hardware Errors12 RSA BSAFE Crypto-C Intel Hardware User’s Guide

Página 9 - Algorithm Methods

13Chapter 3Using the Intel Random Number GeneratorThis chapter gives some background on random number generators and shows how to use the Intel Random

Página 10 - AI_HW_Random. For these AIs

Random Numbers14 RSA BSAFE Crypto-C Intel Hardware User’s GuideThe Intel Random Number GeneratorThe Intel Random Number Generator is dedicated hardwar

Página 11 - The Session Chooser

Chapter 3 Using the Intel Random Number Generator 15Random NumbersPseudo-Random Number Generators (PRNGs)Crypto-C provides several pseudo-random numb

Página 12 - Creating the Session Chooser

© 1999 RSA SECURITY INC. 001-19001-430-001-000Copyright Notice© 1999 RSA Security Inc. All rights reserved. This work contains proprietary inform

Página 13 - Hardware Availability

Generating Random Numbers16 RSA BSAFE Crypto-C Intel Hardware User’s GuideGenerating Random NumbersThis example demonstrates how to use the Intel Hard

Página 14 - Hardware Errors

Chapter 3 Using the Intel Random Number Generator 17Generating Random NumbersStep 1: Create an Algorithm ObjectThe next task is to create the algori

Página 15 - A_RSA_EXTENDED_ERROR

Generating Random Numbers18 RSA BSAFE Crypto-C Intel Hardware User’s GuideStep 4: Update the Random ObjectStep 4 is not needed for random number seedi

Página 16

Chapter 3 Using the Intel Random Number Generator 19Generating Random NumbersStep 6b: Free the Session ChooserFree the session chooser. It is importa

Página 17 - Generator

Generating Random Numbers20 RSA BSAFE Crypto-C Intel Hardware User’s Guidesoftware. After the seed has been passed to the software algorithm info type

Página 18 - Unavailability of Hardware

Chapter 3 Using the Intel Random Number Generator 21Generating Random NumbersStep 3: Initialize the Random AlgorithmTo initialize the random algorit

Página 19

Generating Random Numbers22 RSA BSAFE Crypto-C Intel Hardware User’s Guidecall would be identical in a software implementation: Step 5: Generate R

Página 20 - Generating Random Numbers

23Appendix ACrypto-C Error CodesTable A-1 lists the hardware-related error values returned by Crypto-C. If Crypto-C receives a hardware-level error fr

Página 21

24 RSA BSAFE Crypto-C Intel Hardware User’s Guide

Página 22 - Step 6: Destroy All Objects

25Appendix BIntel Security Hardware Error CodesTable B-1 lists the error values returned by the underlying Intel hardware. If Crypto-C returns an erro

Página 23

iiiContentsChapter 1 Overview 1Intel Hardware Security Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1RSA

Página 24

26 RSA BSAFE Crypto-C Intel Hardware User’s Guide

Página 25

27Appendix CRedistributing the Intel Security DriverDetermining That the Firmware Hub Is Installed on the Target SystemBefore installing the Intel Sec

Página 26 - Step 6: Destroy all Objects

Redistributing the Driver28 RSA BSAFE Crypto-C Intel Hardware User’s GuideRedistributing the DriverThe Intel Security Driver can be redistributed in t

Página 27 - Crypto-C Error Codes

Appendix C Redistributing the Intel Security Driver 29Redistributing the DriverFiles InstalledThe silent install places the driver files in the follo

Página 28

Redistributing the Driver30 RSA BSAFE Crypto-C Intel Hardware User’s GuideRedistributing the Driver via .inf FilesInstead of running the InstallShield

Página 29 - B_GetExtendedErrorInfo

Appendix C Redistributing the Intel Security Driver 31Redistributing the DriverMicrosoft Windows 951. Copy the following files from the Crypto-C CD t

Página 30

Redistributing the Driver32 RSA BSAFE Crypto-C Intel Hardware User’s GuideMicrosoft Windows 981. Copy the following files from the Crypto-C CD to a fl

Página 31 - Appendix C

33IndexAalgorithm info type 3AI_HW_Random 6support for hardware 6algorithm method 3, 5AM_HW_RANDOM 6, 16hardware method corresponding to 8hardware-awa

Página 32 - Redistributing the Driver

34 RSA BSAFE Crypto-C Intel Security Hardware User’s Guide

Página 33 - Files Installed

iv RSA BSAFE Crypto-C Intel Hardware User’s GuideObtaining a Random Seed from Hardware. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Página 34 - Microsoft Windows NT 4.0

1Chapter 1OverviewRSA Security Inc. and Intel Corporation have teamed to provide C programmers access to the Intel Random Number Generator via the RSA

Página 35 - Microsoft Windows 95

How This Book Is Organized2 RSA BSAFE Crypto-C Intel Hardware User’s Guidecertain features in their BSAFE Crypto-C software applications.How This Book

Página 36 - Microsoft Windows 98

Chapter 1 Overview 3Overview of a Crypto-C Hardware ApplicationOverview of a Crypto-C Hardware ApplicationCreating a Crypto-C application that can us

Página 37

The Six-Step Sequence4 RSA BSAFE Crypto-C Intel Hardware User’s GuideThe Six-Step SequenceThe model for building a hardware-aware application with Cry

Página 38

5Chapter 2Using Intel Hardware With Crypto-CCrypto-C uses the RSA BSAFE Hardware API (BHAPI) to access the Intel hardware security features. In order

Comentários a estes Manuais

Sem comentários