User Guide
DDOC0108-000-A2
CNS4 CSfC
6 - 14
Operation
Revision 1.0
Examples
Create a crypto officer account with username john, password aBcDeFg1, with internal key generation stored on
the SRAM
Create a crypto officer account with username john, password aBcDeFg1, with external key generation stored on
the EEPROM
Create a user account with username marty, password gHpErCf7
6.4.2.5
ILE Login
The login process is a two-step process where a username and password must first be provided to
login. The second step is to decrypt the user token and use that decrypted user token along with
the provided nonce to generate an HMAC-SHA256 to complete the challenge. Refer to paragraph
Login with username user, password Password1
Complete the login process by submitting the HMAC-SHA256
6.4.2.6
Key Transfer
NOTE
Key transfer is applicable only if external mode has been selected.
The command example below transfers the PSK and DEK:
•
from the user's equipment to CNS4 ILE 0 (0=first encryptor of four within the ILE).
•
in plain text (non-encrypted transfer).
cns>
cm_create_account -u john -p aBcDeFg1 -m i -k s
[cm_create_account]
user_token=0xab491feccdd158654adab4bb10ddfffe3948571fddeee43f6b7c9a0cc0013693
token_hmac=0xce6256b4220638eefb3bb3c428ddd853353bc9ce3f436062ab59d9fcd9f93642
status=OK
[!cm_create_Account]
cns>
cm_create_account -u john -p aBcDeFg1 -m e -k e
[cm_create_account]
user_token=0xc9ed6c3bbc3de43110d4e5b67da39ea4d1d79d1fb269d25759b38a25db0a8552c72
158ebc19e7e60
token_hmac=0x8ba8729d3a22bc6787b404a13f7cbec190ce5f64fc0e770c8710f60318274259
status=OK
[!cm_create_account]
cns>
cm_create_account -u marty -p gHpErCf7
[cm_create_account]
user_token=0xa77650375de646873a61d4c18954d2c4aaf35cd2af59bd9f0646b5a55223011a
token_hmac=0xbd7147c5119728ffea5aa2d517c3c747242ab8ad2e3259561a59d9dbe8e43248
status=OK
[!cm_create_account]
cns>
cm_login -u user -p Password1
[cm_login]
challenge_nonce=0xf9ccab6b0838c5ab2c1d51085df7cb3a2b9d11b7f7264b39b20116085f6282
55d5c72906af864026f18a7e39e7da5afe2666b839f258a37eb90386a6493726b2
status=OK
[!cm_login]
cns>
cm_login --hmac
30fc2e0ced04edb0942b8cae01dc0692e61bfedf172404da45edbaab72fb0791
[cm_login]
challenge_hmac=0x30fc2e0ced04edb0942b8cae01dc0692e61bfedf172404da45edbaab72fb079
1
status=OK
[!cm_login]