Common Data Security Architecture (CDSA) White Paper

Validating the CSP Credentials

Figure 1-11 Verifying the validity of the CSP library

.MF file, containing hash of

shared library and library name

 

 

 

 

SHA-1

Are

No

 

.CSP shared

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

SHA-1

 

library has been

 

 

CSP file

 

 

HASH

 

 

 

 

 

hashes

 

 

tampered with.

 

 

 

 

 

function

 

 

 

 

 

 

 

equal?

 

 

STOP!

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Yes

CSP shared library is valid

5.If the values match, the shared library is loaded. If the hashes do not match, CDSA execution will terminate.

The Self Check

Once an HP-UX shared library is loaded, it is initialized. Then control is returned to the function that initiated loading of the shared library.

In the self check, the CSP add-in module that has just been loaded checks itself, to make sure it has not been tampered with.

1.The signer’s public key is extracted from the CSP shared library and used to directly verify the signature on .SF file. No chaining validation is necessary.

2.After the signature is validated, the SHA-1 hash of the section in the .MF file referring to the shared library just loaded is calculated and compared with the hash in the .SF file.

3.If these hashes match, a hash of the CSP shared library is calculated and compared to the hash in the .MF file.

4.If the hash matches (indicating the .MF file has not been tampered with), control is returned back to the function which initiated loading of the shared library.

Chapter 1

69