User Guide
DDOC0108-000-A2
CNS4 CSfC
5 - 15
Quick Start
Revision 1.0
13. Encrypt KEK using the plaintext KEK.
cns>
cm_crypto -p
3705708cb8a3616f7a0019b81699c7b1131a776de8ed601a1fdcee95c6d25223 -k
04170bc4b683ce47a6bbd473d3514a9f9f25cf3dcf0afe1b9a72d35f71405837
[cm_crypto]
plaintext=0x3705708cb8a3616f7a0019b81699c7b1131a776de8ed601a1fdcee95c6d2
5223
key=0x04170bc4b683ce47a6bbd473d3514a9f9f25cf3dcf0afe1b9a72d35f71405837
keywrap_output=0x38c69b9a3d1f84e5bdc86500b5454ea390405c12a6249edc387167e
43ce62acac4813c33b69f8893
[!cm_crypto]
14. Generate HMAC using the plaintext KEK as the key and the encrypted DEK as the text.
cns>
cm_crypto -t
38c69b9a3d1f84e5bdc86500b5454ea390405c12a6249edc387167e43ce62acac4813c33
b69f8893 -k
04170bc4b683ce47a6bbd473d3514a9f9f25cf3dcf0afe1b9a72d35f71405837
[cm_crypto]
text=0x38c69b9a3d1f84e5bdc86500b5454ea390405c12a6249edc387167e43ce62acac
4813c33b69f8893
key=0x04170bc4b683ce47a6bbd473d3514a9f9f25cf3dcf0afe1b9a72d35f71405837
hmac_output=0xa257cc5fd5bc0132e9fdf36ecf5da5a5d99ce3df0c470dc97c189bae7e
3cb5ea
[!cm_crypto]
15. Send to the ILE.
cns>
cm_key -e
38c69b9a3d1f84e5bdc86500b5454ea390405c12a6249edc387167e43ce62acac4813c33
b69f8893 -m
a257cc5fd5bc0132e9fdf36ecf5da5a5d99ce3df0c470dc97c189bae7e3cb5ea -s 0
[cm_key]
encrypted_dek=0x38c69b9a3d1f84e5bdc86500b5454ea390405c12a6249edc387167e4
3ce62acac4813c33b69f8893
generated_mac=0xa257cc5fd5bc0132e9fdf36ecf5da5a5d99ce3df0c470dc97c189bae
7e3cb5ea
status=OK
[!cm_key]
16. Confirm state.
cns>
cm_state
[cm_state]
ile_firmware_version=0.1
ile_id_number=666
ile_state=keys_loaded
encryptors_loaded=0
current_user=user
key_location=eeprom
key_gen_method=external
privilege_level=crypto_officer
[!cm_state]