HP UX Security Products and Features Software manuals
Computer Equipment > Software
When we buy new device such as HP UX Security Products and Features Software we often through away most of the documentation but the warranty.
Very often issues with HP UX Security Products and Features Software begin only after the warranty period ends and you may want to find how to repair it or just do some service work.
Even oftener it is hard to remember what does each function in Software HP UX Security Products and Features Software is responsible for and what options to choose for expected result.
Fortunately you can find all manuals for Software on our side using links below.
HP UX Security Products and Features Software Manual
62 pages 0 b
130 pages 250.55 Kb
1 Contents1. Common Data Security Architecture (CDSA) White Paper 2 A.Sample Install ProgramB.Generating the Credential File C.Sample Add-inModule Code D.Functions Needed for Add-inModule Integrity E.Trouble Shooting HP CDSA F.Migrating to CDSA G.ZIP format H.The Private Key File 3 Common Data SecurityArchitecture (CDSA) White PaperGlossary of CDSA Terms and Acronyms 4 Glossary of CDSA Terms and Acronyms11 HP’s Implementation of CDSA13 CDSA Components in HP-UXUse CSSM_CL* APIs for developing applications using the CL shared library Use CL_* APIs for developing CL add-inmodules 15 CDSA in the Context of Other Security ApplicationsCDSA, shown relative to higher-levelprotocols and user applications 16 End User ApplicationsHigher-LevelSecurity Protocols (PKCS, SSL, S/MIME, IPSEC, SET, et al.) Common Security Services Manager (CSSM) APIsCrypotgraphy Certificate Data Storage Trust Policy Services Cryptography Certificate Data Trust Services Storage Policy Provider (CL) (CSP) (DL) (TP) 17 HP’s Paradigm ShiftCommon Security Services Manager (CSSM) API 18 Common Security Services Manager (CSSM)API 19 CSSM Module Information Files21 Public/Private Key Algorithms26 Interaction between CSP and Applications27 CSP Operations30 Extensibility FunctionsSupported Functions and Algorithms 31 Algorithm IDs, shown with keysize specification in bits:—CSSM_ALGID_CDMF; The effective key size of a 64-bitCDMF key is 40 bits —CSSM_ALGID_RC2; <=40, in any multiple of 8, between 8 and —CSSM_ALGID_RC4; <=40, in any multiple of 8, between 8 and —CSSM_ALGID_MD5, unlimited —CSSM_ALGID_SHA1 unlimited •Asymmetric Key Generation Algorithm ID, shown with keysize specification: —CSSM_ALGID_RSA; 512, 768 —CSSM_ALGID_DSA; 512, 768 —CSSM_ALGID_DH; 512, 768 Only keys with 512 bits length are allowed for key derivation 32 •Digital Signature and Validation Algorithm ID:—CSSM_ALGID_MD5WithRSA —CSSM_ALGID_SHA1WithRSA —CSSM_ALGID_SHA1WithDSA •Parameter Generation Algorithm ID: —CSSM_ALGID_DSA —CSSM_ALGID_DH •Key Wrapping and Unwrapping Algorithm ID, shown with keysize specification in bits: —CSSM_ALGID_RSA; —CSSM_ALGID_RC2; <=40 —CSSM_ALGID_RC4; <=40 •Key Derivation Algorithm ID, shown with supported derived key type: —CSSM_ALGID_DH; CDMF, RC2, RC4 —CSSM_ALGID_MD5_PBE; CDMF —CSSM_ALGID_SHA1_PBE; CDMF Purpose Pass-ThroughID 34 What is a Certificate37 Operations on Certificates48 The Role of Add-InModules in the CDSA Framework49 Design Criteria for Add-InModulesGlobal Unique Identifier (GUID) 50 Initializer51 Code to Register Services with CSSMAdd-InModule Install Program 53 How to Create a CDSA Add-InModule forHP-UX 55 Implementing Integrity Checking in Add-InModules56 Programming Self-CheckFunctions into the InitializerISL_SelfCheck ISL_SelfCheck does the following: ISL_SelfCheck •Retrieves self-checkcredentials from /usr/lib/cdsa/meta-inf •Verifies the add-inmodule •ISL_RetrieveSelfCheckCredentials •ISL_RetrieveSelfCheckSectionName •ISL_RetrieveSelfCheckKey 57 ISL_RetrieveSelfCheckCredentials58 GetModulePathThe credential name has the form /usr/lib/cdsa/meta-inf/some-add-in.dsa 59 ISL_RetrieveSelfCheckKeyTo make this function, the add-inprovider needs to ask HP to: •create a DSA public/private key pair for the add-inprovider •embed the public key in the function whose prototype is shown below The private key will be used in the signing process to create a credential file 60 Programming AddInAuthenticate() to Perform Bilateral Authentication63 Completing the Development of a CSP that Performs Integrity Checking65 The Credential FileX.509 Certificate Chain 66 The Validation Sequence67 Integrity Check prior to Loading.DSA file, containing signer's DSA signature DSA Did the Signer's Verify Signature verify public key Yes .SF file containing hash .SF file was created by Signer 68 .SF file, containing hash of data in .MF fileAre .MF or .SF file SHA-1 has been HASH hashes tampered with function equal STOP Proceed to verify hash of shared library .MF file, containing hash of shared library and library name .CSP shared library has been CSP shared library is valid 69 The Self Check70 Bilateral AuthenticationIn-Memoryvs. Static Checking 71 Further References 73 Sample Install Program83 Generating the Credential File85 C Sample Add-inModule Code105 D Functions Needed for Add-inModule Integrity107 E Trouble Shooting HP CDSA121 Migrating to CDSA125 G ZIP format129 H The Private Key File
Also you can find more HP manuals or manuals for other Computer Equipment.