INTRODUCTION XI
L.39.2 CMS Signature Mechanism Objects......................................................................................390
L.39.3 CMS mechanism parameters..................................................................................................391
CK_CMS_SIG_PARAMS, CK_CMS_SIG_PARAMS_PTR..............................................................391
L.39.4 CMS signatures......................................................................................................................392
L.40 BLOWFISH............................................................................................................................... 394
L.40.1 Definitions..............................................................................................................................394
L.40.2 BLOWFISH secret key objects...............................................................................................394
L.40.3 Blowfish key generation.........................................................................................................395
L.40.4 Blowfish -CBC........................................................................................................................395
L.41 TWOFISH................................................................................................................................. 396
L.41.1 Definitions..............................................................................................................................396
L.41.2 Twofish secret key objects......................................................................................................396
L.41.3 Twofish key generation..........................................................................................................397
L.41.4 Twofish -CBC.........................................................................................................................397
APPENDIX M: TOKEN MANAGEMENT OBJECTS........................................................................398
M.1 HARDWARE FEATURE OBJECTS.................................................................................................398
M.1.1 Clock........................................................................................................................................398
M.1.1.1 Definition.............................................................................................................................398
M.1.1.2 Description...........................................................................................................................398
M.1.2 Monotonic Counter Objects....................................................................................................398
M.1.2.1 Definition.............................................................................................................................398
M.1.2.2 Description...........................................................................................................................399
M.1.3 User Interface Objects............................................................................................................399
M.1.3.1 Definition.............................................................................................................................399
M.1.3.2 Description...........................................................................................................................399
APPENDIX N: CRYPTOKI TIPS AND REMINDERS.......................................................................402
N.1 OPERATIONS, SESSIONS, AND THREADS....................................................................................... 402
N.2 MULTIPLE APPLICATION ACCESS BEHAVIOR..............................................................................402
N.3 OBJECTS, ATTRIBUTES, AND TEMPLATES.....................................................................................403
N.4 SIGNING WITH RECOVERY..........................................................................................................403
APPENDIX O: MANIFEST CONSTANTS...........................................................................................405
APPENDIX P: TOKEN PROFILES.......................................................................................................415
APPENDIX Q: COMPARISON OF CRYPTOKI AND OTHER APIS.............................................417
APPENDIX R: INTELLECTUAL PROPERTY CONSIDERATIONS..............................................421
APPENDIX S: METHOD FOR EXPOSING MULTIPLE-PINS ON A TOKEN THROUGH
CRYPTOKI (DEPRECATED).................................................................................................................422
APPENDIX T: REVISION HISTORY...................................................................................................423
List of Figures
Figure 1, General Cryptoki Model.....................................................................................14
Figure 2, Object Hierarchy................................................................................................15
Figure 3, Read-Only Session States...................................................................................20
Figure 4, Read/Write Session States..................................................................................21
Draft 5, February 2004 Copyright © 2004 RSA Security Inc.