I have reviewed following action items:
- AI11 : current working draft 04, section 6.2.11 “DSA without hashing” table 53 states “20, 28, 32, 48, or 64 bytes” instead of “20, 28, 32, 48, or 64 bits”
- AI15 : current working draft 04, section 6.7 “Wrapping/unwrapping private keys” replaces statement “This encryption must be done in CBC mode with PKCS padding.” by the more generic
statement “This encryption is defined in the section for the respective key wrapping mechanism.”
- AI17 : reviewing the wording for CKA_PUBLIC_EXPONENT of an RSA key, I noticed the following sentence in section 4.9 Private key objects, last paragraph: “In particular, the RSA private
key description has been modified in <this version> to add the CKA_PUBLIC_EXPONENT to the list of attributes required for an RSA private key.” I have replaced “<this version>” by “PKCS #11 V2.40”. Section 6.1.3 in working draft 04 consistently defines that
“Effective with version 2.40, tokens MUST also store CKA_PUBLIC_EXPONENT” and “The only attributes from Table 34 for which a Cryptoki implementation is
required to be able to return values are CKA_MODULUS, CKA_PUBLIC_EXPONENT and
CKA_PRIVATE_EXPONENT”. CKA_PUBLIC_EXPONENT now formatted bold, same as other attributes.
Best regards,
Dieter
Utimaco IS GmbH
Germanusstr. 4, D.52080 Aachen, Germany, Tel: +49-241-1696-0, www.utimaco.com
Seat: Aachen – Registergericht Aachen HRB 18922
VAT ID No.: DE 815 496 496
Managementboard: Stefan Auerbach (Chairman) CEO, Malte Pollmann CSO, Martin Stamm CFO
This communication is confidential. If you are not the intended recipient, any use, interference with, disclosure or copying of this material is unauthorised and prohibited. Please inform us immediately and destroy the email.
|