RSA Security 4.3 manual Crypto-CAlgorithm Methods, Using Intel Hardware With Crypto-C, Chapter

Models: 4.3

1 38
Download 38 pages 55.71 Kb
Page 9
Image 9
Using Intel Hardware With Crypto-C

Chapter 2

Using Intel Hardware With Crypto-C

Crypto-C uses the RSA BSAFE Hardware API (BHAPI) to access the Intel hardware security features. In order to use this interface, you need to match the appropriate Crypto-C and Intel algorithm methods via a session chooser. In addition, your application must be linked with the SEC32IPI.lib library that comes with the security driver provided by Intel. See Appendix C, “Redistributing the Intel Security Driver” for instructions on installing the Intel security driver.

Algorithm Methods

The Intel features are supplied to BHAPI via application-specific algorithm methods (AMs), which are then used to set the appropriate algorithm object. Therefore, as the first step in setting up your BHAPI application, you must set up a session chooser that specifies which hardware methods to use.

Crypto-C Algorithm Methods

The Crypto-C interface specifies certain AMs that can be used for hardware. These AMs are generic and do not provide any hardware functionality; they are stubs that provide an interface between Crypto-C and the features of any hardware vendor. The vendor supplies a vendor-specific AM that can be used to access their hardware

5

Page 9
Image 9
RSA Security 4.3 manual Crypto-CAlgorithm Methods, Using Intel Hardware With Crypto-C, Chapter