RSA Security 5 manual Token-based algorithm methods

Models: 5

1 376
Download 376 pages 51.16 Kb
Page 42
Image 42

AI_DES_EDE3_CBC_IV8

input that is a multiple of 8 bytes.

Token-based algorithm methods:

AI_DES_EDE3_CBC_IV8 may be used to access the hardware-related algorithm methods AM_TOKEN_DES_EDE3_CBC_ENCRYPT and AM_TOKEN_DES_EDE3_CBC_DECRYPT, for use with BHAPI.

Token-based key info types:

When used with one of the hardware algorithm methods listed above,

AI_DES_EDE3_CBC_IV8 should be used with KI_Token or KI_ExtendedToken.

3 2

R S A B S A F E C r y p t o - C L i b r a r y R e f e r e n c e M a n u a l

Page 42
Image 42
RSA Security 5 manual Token-based algorithm methods