RSA Security Home Security System 4.3 User Manual

Browse online or download User Manual for Software manuals RSA Security Home Security System 4.3. RSA Security Home Security System 4.3 User's Manual

  • Download
  • Add to my manuals
  • Print

Summary of Contents

Page 1 - Crypto-C

RSA BSAFE®Crypto-CCryptographic Components for CIntel® Security Hardware User’s GuideVersion 4.3

Page 2

Algorithm Methods6 RSA BSAFE Crypto-C Intel Hardware User’s Guidecapabilities. The AMs required to support the Intel security hardware are included as

Page 3 - Contents

Chapter 2 Using Intel Hardware With Crypto-C 7The Session ChooserThe Session ChooserAny Crypto-C application which uses hardware requires your applic

Page 4 - Index 33

The Session Chooser8 RSA BSAFE Crypto-C Intel Hardware User’s GuideCreating the Hardware ChooserA hardware chooser is a list of manufacturer-supplied

Page 5 - Overview

Chapter 2 Using Intel Hardware With Crypto-C 9Hardware Availabilitymake the actual Crypto-C function call during the Crypto-C Init step, for example,

Page 6 - How This Book Is Organized

Hardware Errors10 RSA BSAFE Crypto-C Intel Hardware User’s GuideHardware ErrorsIf the hardware fails, Crypto-C will return an error of BE_HARDWARE or

Page 7 - Application

Chapter 2 Using Intel Hardware With Crypto-C 11Hardware ErrorsA_RSA_EXTENDED_ERRORThis Crypto-C structure is defined specifically for retrieving Inte

Page 8 - The Six-Step Sequence

Hardware Errors12 RSA BSAFE Crypto-C Intel Hardware User’s Guide

Page 9 - Algorithm Methods

13Chapter 3Using the Intel Random Number GeneratorThis chapter gives some background on random number generators and shows how to use the Intel Random

Page 10 - AI_HW_Random. For these AIs

Random Numbers14 RSA BSAFE Crypto-C Intel Hardware User’s GuideThe Intel Random Number GeneratorThe Intel Random Number Generator is dedicated hardwar

Page 11 - The Session Chooser

Chapter 3 Using the Intel Random Number Generator 15Random NumbersPseudo-Random Number Generators (PRNGs)Crypto-C provides several pseudo-random numb

Page 12 - Creating the Session Chooser

© 1999 RSA SECURITY INC. 001-19001-430-001-000Copyright Notice© 1999 RSA Security Inc. All rights reserved. This work contains proprietary inform

Page 13 - Hardware Availability

Generating Random Numbers16 RSA BSAFE Crypto-C Intel Hardware User’s GuideGenerating Random NumbersThis example demonstrates how to use the Intel Hard

Page 14 - Hardware Errors

Chapter 3 Using the Intel Random Number Generator 17Generating Random NumbersStep 1: Create an Algorithm ObjectThe next task is to create the algori

Page 15 - A_RSA_EXTENDED_ERROR

Generating Random Numbers18 RSA BSAFE Crypto-C Intel Hardware User’s GuideStep 4: Update the Random ObjectStep 4 is not needed for random number seedi

Page 16

Chapter 3 Using the Intel Random Number Generator 19Generating Random NumbersStep 6b: Free the Session ChooserFree the session chooser. It is importa

Page 17 - Generator

Generating Random Numbers20 RSA BSAFE Crypto-C Intel Hardware User’s Guidesoftware. After the seed has been passed to the software algorithm info type

Page 18 - Unavailability of Hardware

Chapter 3 Using the Intel Random Number Generator 21Generating Random NumbersStep 3: Initialize the Random AlgorithmTo initialize the random algorit

Page 19

Generating Random Numbers22 RSA BSAFE Crypto-C Intel Hardware User’s Guidecall would be identical in a software implementation: Step 5: Generate R

Page 20 - Generating Random Numbers

23Appendix ACrypto-C Error CodesTable A-1 lists the hardware-related error values returned by Crypto-C. If Crypto-C receives a hardware-level error fr

Page 21

24 RSA BSAFE Crypto-C Intel Hardware User’s Guide

Page 22 - Step 6: Destroy All Objects

25Appendix BIntel Security Hardware Error CodesTable B-1 lists the error values returned by the underlying Intel hardware. If Crypto-C returns an erro

Page 23

iiiContentsChapter 1 Overview 1Intel Hardware Security Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1RSA

Page 24

26 RSA BSAFE Crypto-C Intel Hardware User’s Guide

Page 25

27Appendix CRedistributing the Intel Security DriverDetermining That the Firmware Hub Is Installed on the Target SystemBefore installing the Intel Sec

Page 26 - Step 6: Destroy all Objects

Redistributing the Driver28 RSA BSAFE Crypto-C Intel Hardware User’s GuideRedistributing the DriverThe Intel Security Driver can be redistributed in t

Page 27 - Crypto-C Error Codes

Appendix C Redistributing the Intel Security Driver 29Redistributing the DriverFiles InstalledThe silent install places the driver files in the follo

Page 28

Redistributing the Driver30 RSA BSAFE Crypto-C Intel Hardware User’s GuideRedistributing the Driver via .inf FilesInstead of running the InstallShield

Page 29 - B_GetExtendedErrorInfo

Appendix C Redistributing the Intel Security Driver 31Redistributing the DriverMicrosoft Windows 951. Copy the following files from the Crypto-C CD t

Page 30

Redistributing the Driver32 RSA BSAFE Crypto-C Intel Hardware User’s GuideMicrosoft Windows 981. Copy the following files from the Crypto-C CD to a fl

Page 31 - Appendix C

33IndexAalgorithm info type 3AI_HW_Random 6support for hardware 6algorithm method 3, 5AM_HW_RANDOM 6, 16hardware method corresponding to 8hardware-awa

Page 32 - Redistributing the Driver

34 RSA BSAFE Crypto-C Intel Security Hardware User’s Guide

Page 33 - Files Installed

iv RSA BSAFE Crypto-C Intel Hardware User’s GuideObtaining a Random Seed from Hardware. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Page 34 - Microsoft Windows NT 4.0

1Chapter 1OverviewRSA Security Inc. and Intel Corporation have teamed to provide C programmers access to the Intel Random Number Generator via the RSA

Page 35 - Microsoft Windows 95

How This Book Is Organized2 RSA BSAFE Crypto-C Intel Hardware User’s Guidecertain features in their BSAFE Crypto-C software applications.How This Book

Page 36 - Microsoft Windows 98

Chapter 1 Overview 3Overview of a Crypto-C Hardware ApplicationOverview of a Crypto-C Hardware ApplicationCreating a Crypto-C application that can us

Page 37

The Six-Step Sequence4 RSA BSAFE Crypto-C Intel Hardware User’s GuideThe Six-Step SequenceThe model for building a hardware-aware application with Cry

Page 38

5Chapter 2Using Intel Hardware With Crypto-CCrypto-C uses the RSA BSAFE Hardware API (BHAPI) to access the Intel hardware security features. In order

Comments to this Manuals

No comments