Contents
1. Common Data Security Architecture (CDSA) White Paper
Glossary of CDSA Terms and Acronyms . . . . . . . . . . . . . . . . . . . . . . . . . .4
What Is CDSA? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11
HP’s Implementation of CDSA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11
CDSA Components in
CDSA in the Context of Other Security Applications . . . . . . . . . . . . .15
HP’s Paradigm Shift . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17
Common Security Services Manager (CSSM) API . . . . . . . . . . . . . . . . .18 CSSM Module Information Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19
Cryptography Service Provider (CSP) API. . . . . . . . . . . . . . . . . . . . . . . .21 Public/Private Key Algorithms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21 Interaction between CSP and Applications . . . . . . . . . . . . . . . . . . . . .26 CSP Operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .27
Certificate Library Services (CL) API . . . . . . . . . . . . . . . . . . . . . . . . . . .34 What is a Certificate? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .34 Operations on Certificates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .37
Introduction to
How to Create a CDSA
Completing the Development of a CSP that Performs Integrity Checking 63
1