PKCS#11 Interface
QNSP KMS uses PKCS11 for HSM communication.
PKCS#11 Interface
QNSP KMS uses PKCS#11 for HSM communication.
Overview
PKCS#11 is the standard cryptographic token interface used by HSMs.
Supported mechanisms
Symmetric
CKM_AES_KEY_GENCKM_AES_GCMCKM_AES_KEY_WRAP
Asymmetric (classical)
CKM_EC_KEY_PAIR_GENCKM_ECDSACKM_ECDH1_DERIVE
Key management
CKM_SHA256_HMACCKM_GENERIC_SECRET_KEY_GEN
Session management
- Long-lived sessions for performance
- Automatic reconnection
- Session pooling
Object attributes
Keys stored with attributes:
CKA_EXTRACTABLE: false (for root keys)CKA_SENSITIVE: trueCKA_TOKEN: true (persistent)
Error handling
| PKCS#11 Error | QNSP Response |
|---|---|
CKR_KEY_NOT_FOUND |
404 Key not found |
CKR_DEVICE_ERROR |
503 HSM unavailable |
CKR_SESSION_CLOSED |
Retry with new session |
Vendor extensions
Some HSMs provide extensions:
- Audit logging
- Key backup
- Cluster management
QNSP uses standard PKCS#11 where possible.