diff options
Diffstat (limited to 'manual/html_node/Hardware-security-modules-and-abstract-key-types.html')
-rw-r--r-- | manual/html_node/Hardware-security-modules-and-abstract-key-types.html | 216 |
1 files changed, 0 insertions, 216 deletions
diff --git a/manual/html_node/Hardware-security-modules-and-abstract-key-types.html b/manual/html_node/Hardware-security-modules-and-abstract-key-types.html deleted file mode 100644 index 92d5a5df50..0000000000 --- a/manual/html_node/Hardware-security-modules-and-abstract-key-types.html +++ /dev/null @@ -1,216 +0,0 @@ -<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"> -<html> -<!-- This manual is last updated 4 March 2015 for version -3.5.4 of GnuTLS. - -Copyright (C) 2001-2015 Free Software Foundation, Inc.\\ -Copyright (C) 2001-2015 Nikos Mavrogiannopoulos - -Permission is granted to copy, distribute and/or modify this document -under the terms of the GNU Free Documentation License, Version 1.3 or -any later version published by the Free Software Foundation; with no -Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A -copy of the license is included in the section entitled "GNU Free -Documentation License". --> -<!-- Created by GNU Texinfo 6.1, http://www.gnu.org/software/texinfo/ --> -<head> -<title>GnuTLS 3.5.4: Hardware security modules and abstract key types</title> - -<meta name="description" content="GnuTLS 3.5.4: Hardware security modules and abstract key types"> -<meta name="keywords" content="GnuTLS 3.5.4: Hardware security modules and abstract key types"> -<meta name="resource-type" content="document"> -<meta name="distribution" content="global"> -<meta name="Generator" content="makeinfo"> -<meta http-equiv="Content-Type" content="text/html; charset=utf-8"> -<link href="index.html#Top" rel="start" title="Top"> -<link href="Function-and-Data-Index.html#Function-and-Data-Index" rel="index" title="Function and Data Index"> -<link href="index.html#SEC_Contents" rel="contents" title="Table of Contents"> -<link href="index.html#Top" rel="up" title="Top"> -<link href="Abstract-key-types.html#Abstract-key-types" rel="next" title="Abstract key types"> -<link href="Selecting-an-appropriate-authentication-method.html#Selecting-an-appropriate-authentication-method" rel="prev" title="Selecting an appropriate authentication method"> -<style type="text/css"> -<!-- -a.summary-letter {text-decoration: none} -blockquote.indentedblock {margin-right: 0em} -blockquote.smallindentedblock {margin-right: 0em; font-size: smaller} -blockquote.smallquotation {font-size: smaller} -div.display {margin-left: 3.2em} -div.example {margin-left: 3.2em} -div.lisp {margin-left: 3.2em} -div.smalldisplay {margin-left: 3.2em} -div.smallexample {margin-left: 3.2em} -div.smalllisp {margin-left: 3.2em} -kbd {font-style: oblique} -pre.display {font-family: inherit} -pre.format {font-family: inherit} -pre.menu-comment {font-family: serif} -pre.menu-preformatted {font-family: serif} -pre.smalldisplay {font-family: inherit; font-size: smaller} -pre.smallexample {font-size: smaller} -pre.smallformat {font-family: inherit; font-size: smaller} -pre.smalllisp {font-size: smaller} -span.nolinebreak {white-space: nowrap} -span.roman {font-family: initial; font-weight: normal} -span.sansserif {font-family: sans-serif; font-weight: normal} -ul.no-bullet {list-style: none} -body { - margin: 2%; - padding: 0 5%; - background: #ffffff; -} -h1,h2,h3,h4,h5 { - font-weight: bold; - padding: 5px 5px 5px 5px; - background-color: #c2e0ff; - color: #336699; -} -h1 { - padding: 2em 2em 2em 5%; - color: white; - background: #336699; - text-align: center; - letter-spacing: 3px; -} -h2 { text-decoration: underline; } -pre { - margin: 0 5%; - padding: 0.5em; -} -pre.example,pre.verbatim { - padding-bottom: 1em; - - border: solid #c2e0ff; - background: #f0faff; - border-width: 1px 1px 1px 5px; - margin: 1em auto; - width: 90%; -} - -div.node { - margin: 0 -5% 0 -2%; - padding: 0.5em 0.5em; - margin-top: 0.5em; - margin-bottom: 0.5em; - font-weight: bold; -} -dd, li { - padding-top: 0.1em; - padding-bottom: 0.1em; -} -div.float { - - margin-bottom: 0.5em; - text-align: center; -} - -table { - text-align: left; - margin-left:auto; - margin-right:auto; - border-spacing: 7px; - width: 50%; -} - -th { - padding: 0; - color: #336699; - background-color: #c2e0ff; - border: solid #000000; - border-width: 0px; - margin: 1em auto; - text-align: center; - margin-left:auto; - margin-right:auto; -} - -td { - padding: 0; - border: solid #000000; - background-color: #f0faff; - border-width: 0px; - margin: 1em auto; - text-align: left; - margin-left:auto; - margin-right:auto; - padding-left: 1em; -} - -dl { - text-align: left; - margin-left:auto; - margin-right:auto; - width: 50%; - - padding-left: 1em; - border: solid #c2e0ff; - background: #f0faff; - border-width: 5px 1px 1px 1px; - margin: 1em auto; -} - ---> -</style> - - -</head> - -<body lang="en"> -<a name="Hardware-security-modules-and-abstract-key-types"></a> -<div class="header"> -<p> -Next: <a href="How-to-use-GnuTLS-in-applications.html#How-to-use-GnuTLS-in-applications" accesskey="n" rel="next">How to use GnuTLS in applications</a>, Previous: <a href="Authentication-methods.html#Authentication-methods" accesskey="p" rel="prev">Authentication methods</a>, Up: <a href="index.html#Top" accesskey="u" rel="up">Top</a> [<a href="index.html#SEC_Contents" title="Table of contents" rel="contents">Contents</a>][<a href="Function-and-Data-Index.html#Function-and-Data-Index" title="Index" rel="index">Index</a>]</p> -</div> -<hr> -<a name="Abstract-keys-types-and-Hardware-security-modules"></a> -<h2 class="chapter">5 Abstract keys types and Hardware security modules</h2> - -<p>In several cases storing the long term cryptographic keys in a hard disk or -even in memory poses a significant risk. Once the system they are stored -is compromised the keys must be replaced as the secrecy of future sessions -is no longer guaranteed. Moreover, past sessions that were not protected by a -perfect forward secrecy offering ciphersuite are also to be assumed compromised. -</p> -<p>If such threats need to be addressed, then it may be wise storing the keys in a security -module such as a smart card, an HSM or the TPM chip. Those modules ensure the -protection of the cryptographic keys by only allowing operations on them and -preventing their extraction. The purpose of the abstract key API is to provide -an API that will allow the handle of keys in memory and files, as well as keys -stored in such modules. -</p> -<p>In GnuTLS the approach is to handle all keys transparently by the high level API, e.g., -the API that loads a key or certificate from a file. -The high-level API will accept URIs in addition to files that specify keys on an HSM or in TPM, -and a callback function will be used to obtain any required keys. The URI format is defined in -[<em>PKCS11URI</em>]. -</p> -<p>More information on the API is provided in the next sections. Examples of a URI of a certificate -stored in an HSM, as well as a key stored in the TPM chip are shown below. To discover the URIs -of the objects the <code>p11tool</code> (see <a href="p11tool-Invocation.html#p11tool-Invocation">p11tool Invocation</a>). -</p><div class="example"> -<pre class="example">pkcs11:token=Nikos;serial=307521161601031;model=PKCS%2315; \ -manufacturer=EnterSafe;object=test1;type=cert - -</pre></div> - - -<table class="menu" border="0" cellspacing="0"> -<tr><td align="left" valign="top">• <a href="Abstract-key-types.html#Abstract-key-types" accesskey="1">Abstract key types</a>:</td><td> </td><td align="left" valign="top"> -</td></tr> -<tr><td align="left" valign="top">• <a href="Application_002dspecific-keys.html#Application_002dspecific-keys" accesskey="2">Application-specific keys</a>:</td><td> </td><td align="left" valign="top"> -</td></tr> -<tr><td align="left" valign="top">• <a href="Smart-cards-and-HSMs.html#Smart-cards-and-HSMs" accesskey="3">Smart cards and HSMs</a>:</td><td> </td><td align="left" valign="top"> -</td></tr> -<tr><td align="left" valign="top">• <a href="Trusted-Platform-Module.html#Trusted-Platform-Module" accesskey="4">Trusted Platform Module</a>:</td><td> </td><td align="left" valign="top"> -</td></tr> -</table> - -<hr> -<div class="header"> -<p> -Next: <a href="How-to-use-GnuTLS-in-applications.html#How-to-use-GnuTLS-in-applications" accesskey="n" rel="next">How to use GnuTLS in applications</a>, Previous: <a href="Authentication-methods.html#Authentication-methods" accesskey="p" rel="prev">Authentication methods</a>, Up: <a href="index.html#Top" accesskey="u" rel="up">Top</a> [<a href="index.html#SEC_Contents" title="Table of contents" rel="contents">Contents</a>][<a href="Function-and-Data-Index.html#Function-and-Data-Index" title="Index" rel="index">Index</a>]</p> -</div> - - - -</body> -</html> |