RSA Security Home Security System 4.3 Bedienungsanleitung Seite 1

Stöbern Sie online oder laden Sie Bedienungsanleitung nach Software-Handbücher RSA Security Home Security System 4.3 herunter. RSA Security Home Security System 4.3 User's Manual Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken

Inhaltsverzeichnis

Seite 1 - Crypto-C

RSA BSAFE®Crypto-CCryptographic Components for CIntel® Security Hardware User’s GuideVersion 4.3

Seite 2

Algorithm Methods6 RSA BSAFE Crypto-C Intel Hardware User’s Guidecapabilities. The AMs required to support the Intel security hardware are included as

Seite 3 - Contents

Chapter 2 Using Intel Hardware With Crypto-C 7The Session ChooserThe Session ChooserAny Crypto-C application which uses hardware requires your applic

Seite 4 - Index 33

The Session Chooser8 RSA BSAFE Crypto-C Intel Hardware User’s GuideCreating the Hardware ChooserA hardware chooser is a list of manufacturer-supplied

Seite 5 - Overview

Chapter 2 Using Intel Hardware With Crypto-C 9Hardware Availabilitymake the actual Crypto-C function call during the Crypto-C Init step, for example,

Seite 6 - How This Book Is Organized

Hardware Errors10 RSA BSAFE Crypto-C Intel Hardware User’s GuideHardware ErrorsIf the hardware fails, Crypto-C will return an error of BE_HARDWARE or

Seite 7 - Application

Chapter 2 Using Intel Hardware With Crypto-C 11Hardware ErrorsA_RSA_EXTENDED_ERRORThis Crypto-C structure is defined specifically for retrieving Inte

Seite 8 - The Six-Step Sequence

Hardware Errors12 RSA BSAFE Crypto-C Intel Hardware User’s Guide

Seite 9 - Algorithm Methods

13Chapter 3Using the Intel Random Number GeneratorThis chapter gives some background on random number generators and shows how to use the Intel Random

Seite 10 - AI_HW_Random. For these AIs

Random Numbers14 RSA BSAFE Crypto-C Intel Hardware User’s GuideThe Intel Random Number GeneratorThe Intel Random Number Generator is dedicated hardwar

Seite 11 - The Session Chooser

Chapter 3 Using the Intel Random Number Generator 15Random NumbersPseudo-Random Number Generators (PRNGs)Crypto-C provides several pseudo-random numb

Seite 12 - Creating the Session Chooser

© 1999 RSA SECURITY INC. 001-19001-430-001-000Copyright Notice© 1999 RSA Security Inc. All rights reserved. This work contains proprietary inform

Seite 13 - Hardware Availability

Generating Random Numbers16 RSA BSAFE Crypto-C Intel Hardware User’s GuideGenerating Random NumbersThis example demonstrates how to use the Intel Hard

Seite 14 - Hardware Errors

Chapter 3 Using the Intel Random Number Generator 17Generating Random NumbersStep 1: Create an Algorithm ObjectThe next task is to create the algori

Seite 15 - A_RSA_EXTENDED_ERROR

Generating Random Numbers18 RSA BSAFE Crypto-C Intel Hardware User’s GuideStep 4: Update the Random ObjectStep 4 is not needed for random number seedi

Seite 16

Chapter 3 Using the Intel Random Number Generator 19Generating Random NumbersStep 6b: Free the Session ChooserFree the session chooser. It is importa

Seite 17 - Generator

Generating Random Numbers20 RSA BSAFE Crypto-C Intel Hardware User’s Guidesoftware. After the seed has been passed to the software algorithm info type

Seite 18 - Unavailability of Hardware

Chapter 3 Using the Intel Random Number Generator 21Generating Random NumbersStep 3: Initialize the Random AlgorithmTo initialize the random algorit

Seite 19

Generating Random Numbers22 RSA BSAFE Crypto-C Intel Hardware User’s Guidecall would be identical in a software implementation: Step 5: Generate R

Seite 20 - Generating Random Numbers

23Appendix ACrypto-C Error CodesTable A-1 lists the hardware-related error values returned by Crypto-C. If Crypto-C receives a hardware-level error fr

Seite 21

24 RSA BSAFE Crypto-C Intel Hardware User’s Guide

Seite 22 - Step 6: Destroy All Objects

25Appendix BIntel Security Hardware Error CodesTable B-1 lists the error values returned by the underlying Intel hardware. If Crypto-C returns an erro

Seite 23

iiiContentsChapter 1 Overview 1Intel Hardware Security Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1RSA

Seite 24

26 RSA BSAFE Crypto-C Intel Hardware User’s Guide

Seite 25

27Appendix CRedistributing the Intel Security DriverDetermining That the Firmware Hub Is Installed on the Target SystemBefore installing the Intel Sec

Seite 26 - Step 6: Destroy all Objects

Redistributing the Driver28 RSA BSAFE Crypto-C Intel Hardware User’s GuideRedistributing the DriverThe Intel Security Driver can be redistributed in t

Seite 27 - Crypto-C Error Codes

Appendix C Redistributing the Intel Security Driver 29Redistributing the DriverFiles InstalledThe silent install places the driver files in the follo

Seite 28

Redistributing the Driver30 RSA BSAFE Crypto-C Intel Hardware User’s GuideRedistributing the Driver via .inf FilesInstead of running the InstallShield

Seite 29 - B_GetExtendedErrorInfo

Appendix C Redistributing the Intel Security Driver 31Redistributing the DriverMicrosoft Windows 951. Copy the following files from the Crypto-C CD t

Seite 30

Redistributing the Driver32 RSA BSAFE Crypto-C Intel Hardware User’s GuideMicrosoft Windows 981. Copy the following files from the Crypto-C CD to a fl

Seite 31 - Appendix C

33IndexAalgorithm info type 3AI_HW_Random 6support for hardware 6algorithm method 3, 5AM_HW_RANDOM 6, 16hardware method corresponding to 8hardware-awa

Seite 32 - Redistributing the Driver

34 RSA BSAFE Crypto-C Intel Security Hardware User’s Guide

Seite 33 - Files Installed

iv RSA BSAFE Crypto-C Intel Hardware User’s GuideObtaining a Random Seed from Hardware. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Seite 34 - Microsoft Windows NT 4.0

1Chapter 1OverviewRSA Security Inc. and Intel Corporation have teamed to provide C programmers access to the Intel Random Number Generator via the RSA

Seite 35 - Microsoft Windows 95

How This Book Is Organized2 RSA BSAFE Crypto-C Intel Hardware User’s Guidecertain features in their BSAFE Crypto-C software applications.How This Book

Seite 36 - Microsoft Windows 98

Chapter 1 Overview 3Overview of a Crypto-C Hardware ApplicationOverview of a Crypto-C Hardware ApplicationCreating a Crypto-C application that can us

Seite 37

The Six-Step Sequence4 RSA BSAFE Crypto-C Intel Hardware User’s GuideThe Six-Step SequenceThe model for building a hardware-aware application with Cry

Seite 38

5Chapter 2Using Intel Hardware With Crypto-CCrypto-C uses the RSA BSAFE Hardware API (BHAPI) to access the Intel hardware security features. In order

Kommentare zu diesen Handbüchern

Keine Kommentare