RSA Security 5 manual When used with one of the should be used with

Models: 5

1 376
Download 376 pages 51.16 Kb
Page 189
Image 189
KI_Token

AI_RC2_CBC

Algorithm methods to include in application’s algorithm chooser:

AM_RC2_CBC_ENCRYPT for encryption and AM_RC2_CBC_DECRYPT for decryption.

Key info types for keyObject in B_EncryptInit or B_DecryptInit:

KI_8Byte, KI_Item, KI_RC2WithBSAFE1Params, or KI_RC2_BSAFE1.

Input constraints:

During encryption, this algorithm does not pad the output. Thus, you must provide input that is a multiple of 8 bytes.

Token-based algorithm methods:

AI_RC2_CBC may be used to access the hardware-related algorithm

methods AM_TOKEN_RC2_CBC_ENCRYPT and AM_TOKEN_RC2_CBC_DECRYPT, for use with

BHAPI.

Token-based key info types:

When used with one of the should be used with

hardware algorithm methods listed above, AI_RC2_CBC or KI_ExtendedToken.

C h a p t e r 2 A l g o r i t h m I n f o Ty p e s

179

Page 189
Image 189
RSA Security 5 manual When used with one of the should be used with