Common Data Security Architecture (CDSA) White Paper

Cryptography Service Provider (CSP) API

CSP_GenerateMacFinal ()

Each operation accepts as input a handle to a cryptographic context describing the MAC operation and the data on which to operate. The result of the completed MAC operation is returned in a CSSM_DATA structure.

CSP_VerifyMac ()

CSP_VerifyMacInit ()

CSP_VerifyMacUpdate ()

CSP_VerifyMacFinal ()

Each operation accepts as input a handle to a cryptographic context describing the MAC operation and the data on which to operate. The result of the completed verify operation is a CSSM_RETURN value.

CSP_QuerySize ()

Accepts as input a handle to a cryptographic context describing the encryption or decryption operation, and an array of input block sizes. This function returns the output block sizes corresponding to the input sizes for the specified algorithm.

CSP_EncryptData ()

CSP_EncryptDataInit ()

CSP_EncryptDataUpdate ()

CSP_EncryptDataFinal ()

Each operation accepts as input a handle to a cryptographic context describing the encryption operation and the data to operate on. The encrypted data is returned in CSSM_DATA structures.

CSP_DecryptData ()

CSP_DecryptDataInit ()

CSP_DecryptDataUpdate ()

CSP_DecryptDataFinal ()

Each operation accepts as input a handle to a cryptographic context describing the decryption operation and the data on which to operate. The decrypted data is returned in CSSM_DATA structures.

CSP_GenerateKey ()

Accepts as input a handle to a cryptographic context describing the generate key operation and attributes of the new key. The key is returned in a CSSM_KEY structure.

28

Chapter 1

Page 28
Image 28
HP UX Security Products and Features Software manual Cryptography Service Provider CSP API