1. Trang chủ >
  2. Công Nghệ Thông Tin >
  3. An ninh - Bảo mật >

Appendix A. 4758 cryptographic coprocessor hardware commands

Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (9.81 MB, 506 trang )


Command

description



Cmd

code



Standard roles when three profiles are created



Compute Verification

Pattern (N/A AS/400)



001D



Y



Translate Key



001F



Y



Generate Random

Master Key



0020



Y



Clear New Master Key

(symmetric)



0032



Y



Clear Old Master Key

(symmetric)



0033



Y



Generate Diversified

Key



0040



Y



Load 1st Master Key

Part (asymmetric)



0053



Y



Combine Master Key

Parts - middle/last

(asymmetric)



0054



Y



Set Master Key

(asymmetric)



0057



Y



Clear New Master Key

(asymmetric)



0060



Y



Clear Old Master Key

(asymmetric)



0061



Y



Generate Key Set



008C



Generate Key



CRYPSEC



CRYPADMN



Default



Y



Y



Y



Y



Y



Y



Y



Y



Y



Y



008E



Y



Y



Y



Y



Re-encipher to Current Master Key



0090



Y



Y



Y



Y



Generate Clear 3624

PIN



404



00A0



Y



Y



Y



Y



iSeries Wired Network Security



CRYPMSTR



Command

description



Cmd

code



Generate Clear 3624

PIN Offset



Standard roles when three profiles are created

CRYPMSTR



CRYPSEC



CRYPADMN



Default



00A4



Y



Y



Y



Y



Verify Encrypted 3624

PIN



00AB



Y



Y



Y



Y



Verify Encrypted GPB

PIN



00AC



Y



Y



Y



Y



Verify Encrypted VISA

PVV



00AD



Y



Y



Y



Y



Verify Encrypted

InterBank PIN



00AE



Y



Y



Y



Y



Format and Encrypt

PIN



00AF



Y



Y



Y



Y



Generate Formatted

and Encrypted GBP

PIN



00B1



Y



Y



Y



Y



Generate Formatted

and Encrypted InterBank PIN



00B2



Y



Y



Y



Y



Translate PIN with No

Format Control to No

Format Control



00B3



Y



Y



Y



Y



Reformat PIN with No

Format Control to No

Format Control



00B7



Y



Y



Y



Y



Generate Clear VISA

PVV Alternate



00BB



Y



Y



Y



Y



Encipher Under Master Key



00C3



Y



Y



Y



Y



Encipher Under Master Key Extended



00C4



Y



Y



Y



Y



Lower Export Authority



00CD



Y



Y



Y



Y



Appendix A. 4758 cryptographic coprocessor hardware commands



405



Command

description



Cmd

code



Translate Control Vector



Standard roles when three profiles are created

CRYPSEC



CRYPADMN



Default



00D6



Y



Y



Y



Y



Generate Key Set

Extended



00D7



Y



Y



Y



Y



Encipher Crypto Variable



00DA



Y



Y



Y



Y



Replicate Key



00DB



Y



Y



Y



Y



Generate CVV



00DF



Y



Y



Y



Y



Verify CVV



00E0



Y



Y



Y



Y



Derive Key For Unique

Key Per Transaction



00E1



Y



Y



Y



Y



Generate Initial PEK

for UKPT PIN Pad



00E2



Y



Y



Y



Y



Digital Signature

Generate



0100



Y



Digital Signature Verify



0101



Y



Key Token Change



0102



Y



Y



PKA Key Generate



0103



Y



Y



PKA Key Import



0104



Y



Y



Y



Y



Symmetric Key Export



0105



Y



Y



Y



Y



Symmetric Key Import



0106



Y



Y



Y



Y



One Way Hash



0107



Y



Y



Y



Y



Data Key Import



0109



Y



Y



Y



Y



Data Key Export



010A



Y



Y



Y



Y



Compose SET Block



010B



Y



Y



Y



Y



Decompose SET Block



406



CRYPMSTR



010C



Y



Y



Y



Y



iSeries Wired Network Security



Y



Y



Y



Y



Command

description



Cmd

code



PKA92 Symmetric Key

Generate



Standard roles when three profiles are created

CRYPMSTR



CRYPSEC



CRYPADMN



Default



010D



Y



Y



Y



Y



NL-EPP-5 Symmetric

Key Generate



010E



Y



Y



Y



Y



Reset Intrusion Latch



010F



Y



Set Clock



0110



Y



Reinitialize Device



0111



Y



Initialize Access Control



0112



Y



Change Expiration

Date Of Profile



0113



Y



Change Passphrase



0114



Y



Reset Logon Failure

Count



0115



Y



Load Roles And Profiles



0116



Y



Delete Profile



0117



Y



Delete Role



0118



Y



Load FCV



0119



Y



Clear FCV



011A



Y



Force User Logoff



011B



Y



Set EID



011C



Y



Initialize Master Key

Cloning



011D



Y



RSA Encipher Clear

Data



011E



Y



Y



Y



Appendix A. 4758 cryptographic coprocessor hardware commands



Y



407



Command

description



Cmd

code



RSA Decipher Clear

Data



Standard roles when three profiles are created

CRYPSEC



CRYPADMN



Default



011F



Y



Y



Y



Y



Generate Random

Master Key (asymmetric)



0120



Y



Register PKA Public

Key Hash



0200



Y



Register PKA Public

Key with Cloning



0201



Y



Register PKA Public

Key



0202



Y



Delete Retained Key



0203



Y



Y



Y



Y



PKA Clone Key Generate



0204



Y



Y



PKA Clone Key

Generate Part2



0205



Y



Y



Clone Info Obtain 1



0211



Y



Clone Info Obtain 2



0212



Y



Clone Info Obtain 3



0213



Y



Clone Info Obtain 4



0214



Y



Clone Info Obtain 5



0215



Y



Clone Info Obtain 6



0216



Y



Clone Info Obtain 7



0217



Y



Clone Info Obtain 8



0218



Y



Clone Info Obtain 9



0219



Y



Clone Info Obtain 10



021A



Y



Clone Info Obtain 11



408



CRYPMSTR



021B



Y



iSeries Wired Network Security



Command

description



Cmd

code



Standard roles when three profiles are created



Clone Info Obtain 12



021C



Y



Clone Info Obtain 13



021D



Y



Clone Info Obtain 14



021E



Y



Clone Info Obtain 15



021F



Y



Clone Info Install 1



0221



Y



Clone Info Install 2



0222



Y



Clone Info Install 3



0223



Y



Clone Info Install 4



0224



Y



Clone Info Install 5



0225



Y



Clone Info Install 6



0226



Y



Clone Info Install 7



0227



Y



Clone Info Install 8



0228



Y



Clone Info Install 9



0229



Y



Clone Info Install 10



022A



Y



Clone Info Install 11



022B



Y



Clone Info Install 12



022C



Y



Clone Info Install 13



022D



Y



Clone Info Install 14



022E



Y



Clone Info Install 15



022F



Y



List Retained Key



0230



Generate Clear

NL-PIN-1 Offset

Verify Encrypted

NL-PIN-1 Offset



CRYPMSTR



CRYPSEC



CRYPADMN



Default



Y



Y



Y



Y



0231



Y



Y



Y



Y



0232



Y



Y



Y



Y



Appendix A. 4758 cryptographic coprocessor hardware commands



409



Command

description



Cmd

code



PKA92 Symmetric Key

Import



Standard roles when three profiles are created

CRYPSEC



CRYPADMN



Default



0235



Y



Y



Y



Y



PKA92 PIN Key Import



0236



Y



Y



Y



Y



Zero-pad Symmetric

Key Generate



023C



Y



Y



Y



Y



Zero-pad Symmetric

Key Import



023D



Y



Y



Y



Y



Zero-pad Symmetric

Key Export



023E



Y



Y



Y



Y



PKCS-1.2 Symmetric

Key Generate



410



CRYPMSTR



023F



Y



Y



Y



Y



iSeries Wired Network Security



Appendix B. Granting access to the *SYSTEM certificate store

When you run an application that uses a certificate, you need to access the

key database file holding the certificate. For SSL using applications defined in

the Digital Certificate Manager (DCM), this file is the *SYSTEM certificate

store.

The best way to grant a user profile access to the *SYSTEM certificate store

for SSL processing is by using Operations Navigator. There is a specific

option just for this. It is not recommended that you give access by granting

authority to the key database file and to all the directories in the path to the

file. This is because it is cumbersome, it gives users authority to several

directories that they should not use, and IBM may change the DCM

implementation later so it no longer works at all.

When a user profile is named on a DCM application definition, the DCM

grants that profile access to the *SYSTEM certificate store for SSL

processing. When the user profile is taken off the DCM application definition,

or the application definition is removed, the user’s access is not revoked. If it

should be revoked, you must do this manually.

Note



There are two ways of granting access to the *SYSTEM certificate store

with Operations Navigator. The first way, described in this section, shows a

way to authorize individual user profiles to one or more applications or

stores. The second way is to grant access for one application or certificate

store to multiple users at the same time. If you want to read more about the

second approach, refer to 3.3.5, “Authorizing users to use object signing

applications” on page 137. For the second method, just select the

*SYSTEM certificate store instead of the object signing application.



To give a user profile access to the *SYSTEM certificate store using

Operations Navigator, complete these steps:

1. Start Operations Navigator.

2. Open your AS/400 system.

3. Double-click Users and Groups to expand.



© Copyright IBM Corp. 2001



411



Figure 300. Giving access to the *SYSTEM certificate store 1



4. Double-click All Users, or Groups, to expand.

5. Double-click the user profile or group profile you want to give access to so

that their properties are displayed, as shown in Figure 301.



Figure 301. Giving access to the *SYSTEM certificate store 2



6. Click Capabilities and then the Applications tab. You will see the display

in Figure 302.



412



iSeries Wired Network Security



Xem Thêm
Tải bản đầy đủ (.pdf) (506 trang)

×