Common Data Security Architecture (CDSA) White Paper

Validating the CSP Credentials

Figure 1-11 Verifying the validity of the CSP library

.MF file, containing hash of

shared library and library name

CSP file

SHA-1

Are

.CSP shared

SHA-1

No library has been

HASH

hashes

tampered with.

function

equal?

STOP!

 

Yes

CSP shared library is valid

5.If the values match, the shared library is loaded. If the hashes do not match, CDSA execution will terminate.

The Self Check

Once an HP-UX shared library is loaded, it is initialized. Then control is returned to the function that initiated loading of the shared library.

In the self check, the CSP add-in module that has just been loaded checks itself, to make sure it has not been tampered with.

1.The signer’s public key is extracted from the CSP shared library and used to directly verify the signature on .SF file. No chaining validation is necessary.

2.After the signature is validated, the SHA-1 hash of the section in the .MF file referring to the shared library just loaded is calculated and compared with the hash in the .SF file.

3.If these hashes match, a hash of the CSP shared library is calculated and compared to the hash in the .MF file.

4.If the hash matches (indicating the .MF file has not been tampered with), control is returned back to the function which initiated loading of the shared library.

Chapter 1

69

Page 69
Image 69
HP UX Security Products and Features Software manual Self Check, Verifying the validity of the CSP library