XI
12.37.3 Twofish key generation........................................................................................................377
12.37.4 Twofish -CBC.......................................................................................................................377
13 CRYPTOKI TIPS AND REMINDERS.............................................................................................377
13.1 OPERATIONS, SESSIONS, AND THREADS......................................................................................377
13.2 MULTIPLE APPLICATION ACCESS BEHAVIOR.............................................................................378
13.3 OBJECTS, ATTRIBUTES, AND TEMPLATES.................................................................................... 379
13.4 SIGNING WITH RECOVERY......................................................................................................... 379
14 MANIFEST CONSTANTS.................................................................................................................381
15 TOKEN PROFILES............................................................................................................................389
15.1 GOVERNMENT AUTHENTICATION-ONLY.....................................................................................390
15.2 CELLULAR DIGITAL PACKET DATA...........................................................................................390
15.3 OTHER PROFILES...................................................................................................................... 390
16 COMPARISON OF CRYPTOKI AND OTHER APIS...................................................................391
16.1 FORTEZZA CIPG, REV. 1.52.................................................................................................391
16.2 GCS-API................................................................................................................................. 393
17 INTELLECTUAL PROPERTY CONSIDERATIONS...................................................................395
18 METHOD FOR EXPOSING MULTIPLE-PINS ON A TOKEN THROUGH CRYPTOKI
(DEPRECATED)........................................................................................................................................396
19 REVISION HISTORY.........................................................................................................................397
List of Figures
Figure 1, General Cryptoki Model.....................................................................................14
Figure 2, Object Hierarchy................................................................................................16
Figure 3, Read-Only Session States...................................................................................20
Figure 4, Read/Write Session States..................................................................................21
Figure 5, Object Attribute Hierarchy.................................................................................65
List of Tables
Table 1, Symbols...............................................................................................................10
Table 2, Prefixes................................................................................................................10
Table 3, Character Set........................................................................................................12
Table 4, Read-Only Session States....................................................................................21
Table 5, Read/Write Session States...................................................................................22
Table 6, Access to Different Types Objects by Different Types of Sessions...................22
June 2004 Copyright © 2004 RSA Security Inc.