IBM 2 Computer Hardware User Manual


 
PKA_Symmetric_Key_Generate CCA Release 2.54
Key-encrypting keys, either effective single-length or true double-length, are
generated with the details dependent on the keyword you use to control the key
formatting technique.
PKA92 With this keyword, the verb generates a key-encrypting key and
returns two copies of the key. You must specify a pair of
complementary control vectors that conform to the rules for an
OPEX case as defined for the Key_Generate verb. The control
vector for one key copy must be from the EXPORTER class while
the control vector for the other key-copy must be from the
IMPORTER class.
The verb enciphers one key copy using the RSA_public_key and
the key encipherment technique defined in “PKA92 Key Format and
Encryption Process” on page C-14. The control vector for this key
is taken from an internal (operational) DES key token that must be
present on input in the RSA_enciphered_key_token variable.
The control vector for the local key is taken from a DES key token
that must be present on input in the local_enciphered_key_identifier
variable or in the key token identified by the key label in that
variable.
Note: A node-identification (EID) value must have been
established prior to use of the PKA92 keyword. Use the
Cryptographic_Facility_Control verb to set the EID.
NL-EPP-5 With this keyword, the verb generates a key-encrypting key and
returns two copies of the key. The verb enciphers one key copy
using the key encipherment technique defined by certain OEM
equipment. See “Encrypting a Key_Encrypting Key in the
NL-EPP-5 Format” on page C-16. On input, the
RSA_enciphered_key_token variable must contain a DES internal
key token that contains a control vector for an IMPORTER
key-encrypting-key.
The control vector for the local key is taken from a DES key token
that must be present on input in the local_enciphered_key_identifier
variable or in the key token identified by the key label in that
variable.
Restrictions
The permissible key-length of the RSA public key is limited by the value specified in
the function control vector for RSA encipherment of keys.
5-82 IBM 4758 CCA Basic Services, Release 2.54, February 2005