RSA Security Home Security System 4.3 Instrukcja Użytkownika Strona 1

Przeglądaj online lub pobierz Instrukcja Użytkownika dla Podręczniki do oprogramowania RSA Security Home Security System 4.3. RSA Security Home Security System 4.3 User's Manual Instrukcja obsługi

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj

Podsumowanie treści

Strona 1 - Crypto-C

RSA BSAFE®Crypto-CCryptographic Components for CIntel® Security Hardware User’s GuideVersion 4.3

Strona 2

Algorithm Methods6 RSA BSAFE Crypto-C Intel Hardware User’s Guidecapabilities. The AMs required to support the Intel security hardware are included as

Strona 3 - Contents

Chapter 2 Using Intel Hardware With Crypto-C 7The Session ChooserThe Session ChooserAny Crypto-C application which uses hardware requires your applic

Strona 4 - Index 33

The Session Chooser8 RSA BSAFE Crypto-C Intel Hardware User’s GuideCreating the Hardware ChooserA hardware chooser is a list of manufacturer-supplied

Strona 5 - Overview

Chapter 2 Using Intel Hardware With Crypto-C 9Hardware Availabilitymake the actual Crypto-C function call during the Crypto-C Init step, for example,

Strona 6 - How This Book Is Organized

Hardware Errors10 RSA BSAFE Crypto-C Intel Hardware User’s GuideHardware ErrorsIf the hardware fails, Crypto-C will return an error of BE_HARDWARE or

Strona 7 - Application

Chapter 2 Using Intel Hardware With Crypto-C 11Hardware ErrorsA_RSA_EXTENDED_ERRORThis Crypto-C structure is defined specifically for retrieving Inte

Strona 8 - The Six-Step Sequence

Hardware Errors12 RSA BSAFE Crypto-C Intel Hardware User’s Guide

Strona 9 - Algorithm Methods

13Chapter 3Using the Intel Random Number GeneratorThis chapter gives some background on random number generators and shows how to use the Intel Random

Strona 10 - AI_HW_Random. For these AIs

Random Numbers14 RSA BSAFE Crypto-C Intel Hardware User’s GuideThe Intel Random Number GeneratorThe Intel Random Number Generator is dedicated hardwar

Strona 11 - The Session Chooser

Chapter 3 Using the Intel Random Number Generator 15Random NumbersPseudo-Random Number Generators (PRNGs)Crypto-C provides several pseudo-random numb

Strona 12 - Creating the Session Chooser

© 1999 RSA SECURITY INC. 001-19001-430-001-000Copyright Notice© 1999 RSA Security Inc. All rights reserved. This work contains proprietary inform

Strona 13 - Hardware Availability

Generating Random Numbers16 RSA BSAFE Crypto-C Intel Hardware User’s GuideGenerating Random NumbersThis example demonstrates how to use the Intel Hard

Strona 14 - Hardware Errors

Chapter 3 Using the Intel Random Number Generator 17Generating Random NumbersStep 1: Create an Algorithm ObjectThe next task is to create the algori

Strona 15 - A_RSA_EXTENDED_ERROR

Generating Random Numbers18 RSA BSAFE Crypto-C Intel Hardware User’s GuideStep 4: Update the Random ObjectStep 4 is not needed for random number seedi

Strona 16

Chapter 3 Using the Intel Random Number Generator 19Generating Random NumbersStep 6b: Free the Session ChooserFree the session chooser. It is importa

Strona 17 - Generator

Generating Random Numbers20 RSA BSAFE Crypto-C Intel Hardware User’s Guidesoftware. After the seed has been passed to the software algorithm info type

Strona 18 - Unavailability of Hardware

Chapter 3 Using the Intel Random Number Generator 21Generating Random NumbersStep 3: Initialize the Random AlgorithmTo initialize the random algorit

Strona 19

Generating Random Numbers22 RSA BSAFE Crypto-C Intel Hardware User’s Guidecall would be identical in a software implementation: Step 5: Generate R

Strona 20 - Generating Random Numbers

23Appendix ACrypto-C Error CodesTable A-1 lists the hardware-related error values returned by Crypto-C. If Crypto-C receives a hardware-level error fr

Strona 21

24 RSA BSAFE Crypto-C Intel Hardware User’s Guide

Strona 22 - Step 6: Destroy All Objects

25Appendix BIntel Security Hardware Error CodesTable B-1 lists the error values returned by the underlying Intel hardware. If Crypto-C returns an erro

Strona 23

iiiContentsChapter 1 Overview 1Intel Hardware Security Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1RSA

Strona 24

26 RSA BSAFE Crypto-C Intel Hardware User’s Guide

Strona 25

27Appendix CRedistributing the Intel Security DriverDetermining That the Firmware Hub Is Installed on the Target SystemBefore installing the Intel Sec

Strona 26 - Step 6: Destroy all Objects

Redistributing the Driver28 RSA BSAFE Crypto-C Intel Hardware User’s GuideRedistributing the DriverThe Intel Security Driver can be redistributed in t

Strona 27 - Crypto-C Error Codes

Appendix C Redistributing the Intel Security Driver 29Redistributing the DriverFiles InstalledThe silent install places the driver files in the follo

Strona 28

Redistributing the Driver30 RSA BSAFE Crypto-C Intel Hardware User’s GuideRedistributing the Driver via .inf FilesInstead of running the InstallShield

Strona 29 - B_GetExtendedErrorInfo

Appendix C Redistributing the Intel Security Driver 31Redistributing the DriverMicrosoft Windows 951. Copy the following files from the Crypto-C CD t

Strona 30

Redistributing the Driver32 RSA BSAFE Crypto-C Intel Hardware User’s GuideMicrosoft Windows 981. Copy the following files from the Crypto-C CD to a fl

Strona 31 - Appendix C

33IndexAalgorithm info type 3AI_HW_Random 6support for hardware 6algorithm method 3, 5AM_HW_RANDOM 6, 16hardware method corresponding to 8hardware-awa

Strona 32 - Redistributing the Driver

34 RSA BSAFE Crypto-C Intel Security Hardware User’s Guide

Strona 33 - Files Installed

iv RSA BSAFE Crypto-C Intel Hardware User’s GuideObtaining a Random Seed from Hardware. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Strona 34 - Microsoft Windows NT 4.0

1Chapter 1OverviewRSA Security Inc. and Intel Corporation have teamed to provide C programmers access to the Intel Random Number Generator via the RSA

Strona 35 - Microsoft Windows 95

How This Book Is Organized2 RSA BSAFE Crypto-C Intel Hardware User’s Guidecertain features in their BSAFE Crypto-C software applications.How This Book

Strona 36 - Microsoft Windows 98

Chapter 1 Overview 3Overview of a Crypto-C Hardware ApplicationOverview of a Crypto-C Hardware ApplicationCreating a Crypto-C application that can us

Strona 37

The Six-Step Sequence4 RSA BSAFE Crypto-C Intel Hardware User’s GuideThe Six-Step SequenceThe model for building a hardware-aware application with Cry

Strona 38

5Chapter 2Using Intel Hardware With Crypto-CCrypto-C uses the RSA BSAFE Hardware API (BHAPI) to access the Intel hardware security features. In order

Komentarze do niniejszej Instrukcji

Brak uwag