Reference Guide

ii Contents
RSA BSAFE Crypto-C Micro Edition 3.x to 4.1.4 Migration Guide
Chapter 5: Cryptographic API Changes ................................................................41
Pseudo-random Number Generation................................................................................. 42
Symmetric Key Encryption Cryptographic Objects ......................................................... 44
Initialization Vector Generation ................................................................................ 45
AES-XTS ................................................................................................................... 46
Asymmetric Key Operations............................................................................................. 48
Cryptographic Objects ............................................................................................... 48
Key Object and Key Data Information Identifiers..................................................... 48
Asymmetric Key Assurance ...................................................................................... 49
DSA Key and Key Parameter Generation ................................................................. 50
Chapter 6: Changes Between Releases 4.1.2 and 4.1.4.................................. 53
FIPS 140-2 Mode is the Default Mode ............................................................................. 54
Cryptographic Strength Enforcement ............................................................................... 55
Asymmetric Key Assurance.............................................................................................. 57
DSA Key and Key Parameter Generation......................................................................... 58
Diffie-Hellman Operations ............................................................................................... 60
Pre-defined Diffie-Hellman Parameters .................................................................... 63
Key Wrapping ...................................................................................................................64
Create a Cryptographic Object................................................................................... 64
Initialize the Cryptographic Object............................................................................ 65
Wrap the Key Data..................................................................................................... 66
Initialization Vector Generation........................................................................................ 67
Elliptic Curve Private Key Format.................................................................................... 68
Binary Incompatibility with Previous Versions of Crypto-C ME .................................... 68
Signature Files Embedded into the FIPS 140-2 Master Library File................................ 68
Namespace Changes ......................................................................................................... 69
RSA Signature Generation and Verification using SHA-512/256................................... 69