IBM Computer Hardware 2 User Manual Page 392

  • Download
  • Add to my manuals
  • Print
  • Page
    / 508
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 391
CCA Release 2.54
RSA Private-Key Blinding Information:
Figure B-22. RSA Private-Key Blinding Information
Offset
(Bytes)
Length
(Bytes)
Description
000 001 X'FF', Section identifier, private-key blinding information.
Used with internal key-tokens created by the CCA Support Program, Version
1 (having section identifiers X'02' or X'05').
001 001 The version number (X'00')
002 002 Section length, 34 + rrr + iii
004 020 SHA-1 hash value of the internal information subsection cleartext, offset 28 to
the section end. This hash value is checked after an enciphered private key
is deciphered for use.
024 002 Length in bytes of the encrypted secure subsection
026 002 Reserved, binary zero
028 Start of the encrypted secure subsection. An internal token with section identifiers
X'02' or X'05' uses the asymmetric master key and the EDE3 algorithm.
See“Triple-DES Ciphering Algorithms” on page D-10 .
028 002 Length of the random number r, in bytes: rrr
030 002 Length of the random number inverse r
-1
, in bytes: iii
032 002 Length of the padding field, in bytes xxx
034 rrr Random number r (used in blinding)
034
+rrr
iii Random number r
-1
(used in blinding)
034
+rrr
+iii
xxx X'00' padding of length xxx bytes such that the length from the start of the
encrypted subsection to the end of the padding field is a multiple of eight
bytes.
End of the encrypted subsection.
Note: See “Number Representation in PKA Key-Tokens” on page B-8.
Chaining-Vector Records
The chaining_vector parameter specifies an address that points to the place in
main storage that contains an 18-byte work area that is required with the Cipher,
MAC_Generate and MAC_Verify, verbs. The application program should not
change the chaining-vector information. The verb uses the chaining vector to carry
information between procedure calls.
Figure B-23. Cipher, MAC_Generate, and MAC_Verify Chaining-Vector Format
Offset Length Meaning
00-07 8 The cryptographic Output Chaining-Vector (OCV) of the service. When used
with the MAC_Generate and MAC_Verify verbs, the OCV is enciphered as a
cryptographic variable
08 1 The count of the bytes that are carried over and not processed (from 0 to 7)
09-15 7 The bytes that are carried over and left-justified
16 2 The token master-key verification pattern
Note: See “Number Representation in PKA Key-Tokens” on page B-8.
B-20 IBM 4758 CCA Basic Services, Release 2.54, February 2005
Page view 391
1 2 ... 387 388 389 390 391 392 393 394 395 396 397 ... 507 508

Comments to this Manuals

No comments