User Guide
DDOC0099-000-AG
DTS1 CSfC
6 - 2
Quick Start
© 2020 Curtiss-Wright Defense Solutions
Revision 0.0
Figure 6.1
Initialization Quick Start Process Flow
NOTE
The PSK is provided on a removable label placed on top of DTS1 when shipped.
2. Using a 3rd-party application and factory supplied PSK, decrypt user token obtained in step 1.
Save resulting decrypted user token for future use / logins.
3. Generate challenge:
cmlogin -u username -p password -L
The challenge will be a random string 80 characters long.
4. Generate HMAC string using challenge generated in step 3 as input MESSAGE and
unencrypted user token from step 2 as KEY.
5. Log into crypto module:
cmlogin -M generated HMAC string
6. Verify successful login:
cmlogin
CMLOGIN: state=ready init=1 status=OK
NOTE
The DEK is a user-generated 64 character string. There are no requirements other than being able
to remember it.
NOTE
<loc> refers to location (0 through 31) where key will be stored.
7. Create/save encryption key:
cmkey -d DEK string -p Curtiss-Wright provided
PSK string--save <loc>
User
DTS1
Hardware
Encryption
Software
Encryption
3rd-Party
Application
Legend
Hardware
Software
Check RMC Status
(rmcctl)
Check RMC Status
(rmcctl)
Generates
User
Token
Generates
Challenge
String
Provide
RMC
Status
RMC Readied
For Software
Encryption
RMC Accessible
With CSfC
Encryption Enabled
Decrypts
User
Token
Generates
HMAC
String
Obtain
User Token
(cmlogin -u -p -I)
DDOC0099-0048
USER T
OKEN / HMAC / PSK
HMAC STRING
USER T
OKEN
CHALLENGE
STRING
Generate
Challenge
(cmlogin -u -p -L)
Log Into
Crypto Module
(cmlogin -M)
Assign Services
to RMC
(rmcctl --serv NAS)
Initialize Software
Encryption
(rmcctl --force -C)
Open Software
Encrypted Container
(rmcctl -E)
Enter Password /
Passphrase
Software
Encryption
Container Created
Load
Encryption Key
(cmkey --load <loc> -s 0)
Create/Save
Encryption Key
(cmkey -d -p --save <loc>)