Release Notes

Hardware Devices 27
RSA BSAFE Crypto-C Micro Edition 4.1.4 Release Notes
Cryptographic Operations on Hardware
The following table lists the cryptographic and key operations on PKCS #11 hardware
devices tested in this release of Crypto-C ME. These operations reflect the device
capabilities.
Table 7 Cryptographic Operations on Hardware
Supported Operation
RSA SecurID
800
Solaris Crypto
Softtoken -
Solaris 11
Thales nShield
Connect+
Cryptographic Operations
RSA sign 
RSA verify 
RSA PSS sign/verify
DSA sign/verify 
ECDSA sign/verify
1

AES encrypt/decrypt 
Triple DES encrypt/decrypt 
RSA encrypt 
RSA decrypt 
RSA private key encrypt 
RSA public key decrypt 
SHA-1 message digest 
SHA-2 message digest 
HMAC SHA-1 sign/verify
HMAC SHA-2 sign/verify
DH key exchange 
ECDH
1

Pseudo-random number
generation (PRNG)

PRNG seeding