RSA Security 4.3 Home Security System User Manual


 
Algorithm Methods
6 RSA BSAFE Crypto-C Intel Hardware User’s Guide
capabilities. The AMs required to support the Intel security hardware are included as
part of Crypto-C.
As with all algorithm methods, the hardware-compatible AMs in Crypto-C are only
available for certain algorithm info types (AIs). The AIs in Crypto-C offer differing
levels of support for hardware, as follows:
Crypto-C AIs that support hardware only, such as AI_HW_Random. For these AIs,
the hardware-compatible AMs are listed in the Crypto-C Library Reference Manual
as “Algorithm methods to include in application’s algorithm chooser.”
Crypto-C AIs that support both hardware and software. For these AIs, the
hardware-compatible algorithm methods are listed in the Crypto-C Library
Reference Manual as “Token-based algorithm methods.”
Crypto-C AIs that support only software and cannot be used with a hardware
device. In this case, there are no AMs that can be used for hardware.
The hardware-compatible AMs supported by these AIs are part of the generic Crypto-
C/BHAPI interface. To maintain flexibility in Crypto-C and allow support for
hardware created by different manufacturers, BHAPI requires the manufacturer to
supply a hardware method that is specific for the device.
Intel Hardware Algorithm Methods
To use the Intel hardware security features, you must create a special session chooser,
which associates the Intel-specific hardware methods with the generic hardware
methods built into the Crypto-C interface.
Table 2-1 Intel hardware capabilities and corresponding Crypto-C functions
Generic Hardware AM
Intel AM to Use in
Session Chooser Crypto-C AI Primitive
AM_HW_RANDOM HW_INTEL_RANDOM AI_HW_Random random number
generation