CKM_ENCODE_PKCS_10
This section provides a summary of CKM_ENCODE_PKCS_10.
Supported operations
| Operation | Supported |
|---|---|
| Encrypt and Decrypt | No |
| Sign and Verify | No |
| SignRecover and VerifyRecover | No |
| Digest | No |
| Generate Key/Key-Pair | No |
| Wrap and Unwrap | No |
| Derive | Yes |
FIPS Mode support
| Available in FIPS Mode | Restrictions in FIPS Mode |
|---|---|
| Yes | None |
Key Size Range and Parameters
| Key size minimum/maximum | Value |
|---|---|
| Minimum | 0 |
| FIPS Minimum | 0 |
| Maximum | None |
Parameter
None
Mechanism description
This mechanism is used with the C_DeriveKey function to create a PKCS#10 certification request from a public key. Either an RSA or DSA public key can be used with this function. The PKCS#10 certificate request could then be sent to a Certificate authority for signing.
From PKCS#10
A certification request consists of a distinguished name, a public key and optionally a set of attributes that are collectively signed by the entity requesting certification. Certification requests are sent to a certification authority, which will transform the request to an X.509 public-key certificate.
Usage
-
Use
CKM_RSA_PKCS_KEY_PAIR_GENto generate a key. -
Add a
CKA_SUBJECTattribute to the public key, containing the subject's distinguished name. -
Initialize the signature mechanism to sign the request. Note that a digest/sign mechanism must be chosen. For example,
CKM_SHA1_RSA_PKCS -
Call C_DeriveKey with the
CKM_ENCODE_PKCS_10mechanism to perform the generation. -
On success, an object handle for the certificate request is returned.
-
The object's
CKA_VALUEattribute contains the PKCS#10 request.
Return to ProtectToolkit-C mechanisms.