Cryptoki: a cryptographic Token Interface



Download 360.55 Kb.
Page46/196
Date22.12.2023
Size360.55 Kb.
#63026
1   ...   42   43   44   45   46   47   48   49   ...   196
v201-95
pkcs11-base-v2.40-cos01

9.5. Key objects


The following figure illustrates details of key objects:

Figure 6, Key Attribute Detail
Key objects hold encryption or authentication keys, which can be public keys, private keys, or secret keys. The following common footnotes apply to all the tables describing attributes of keys:
Table 18, Common footnotes for key attribute tables

1 Must be specified when object is created with C_CreateObject.
2 Must not be specified when object is created with C_CreateObject.
3 Must be specified when object is generated with C_GenerateKey or C_GenerateKeyPair.
4 Must not be specified when object is generated with C_GenerateKey or C_GenerateKeyPair.
5 Must be specified when object is unwrapped with C_UnwrapKey.
6 Must not be specified when object is unwrapped with C_Unwrap.
7 Cannot be revealed if object has its CKA_SENSITIVE attribute set to TRUE or its CKA_EXTRACTABLE attribute set to FALSE.
8 May be modified after object is created with a C_SetAttributeValue call, or in the process of copying object with a C_CopyObject call. As mentioned previously, however, it is possible that a particular token may not permit modification of the attribute, or may not permit modification of the attribute during the course of a C_CopyObject call.
9 Default value is token-specific, and may depend on the values of other attributes.

The following table defines the attributes common to public key, private key and secret key classes, in addition to the common attributes listed in Table 14:


Table 19, Common Key Attributes


Download 360.55 Kb.

Share with your friends:
1   ...   42   43   44   45   46   47   48   49   ...   196




The database is protected by copyright ©ininet.org 2024
send message

    Main page