z/OS Cryptographic Services ICSF Administrator's Guide
Previous topic | Next topic | Contents | Index | Contact z/OS | Library | PDF


Public Key Object Details panel

z/OS Cryptographic Services ICSF Administrator's Guide
SA22-7521-17

If a public key object is selected on the Token Details panel, the ICSF Token Management - Public Key Object Details panel is presented:

Figure 231. ICSF Token Management - Public Key Object Details panel
CSFTBR31 --------- ICSF Token Management - Public Key Object Details ----------

Object 5      from token label: SAMPLE.TOKEN                                   
                                                                               
Select an Action:                                                              
  1  Process select DER fields(*) using external command                       
        Enter UNIX command pathname (formatter must accept input from STDIN):  
        _____________________________________________________________________  
  2  Modify one or more fields with the new values specified                   
  3  Delete the entire object                                                  

-------------------------------------------------------------------------------
                                                                   More:     + 
   OBJECT CLASS:                   PUBLIC KEY                                  
   PRIVATE:                        FALSE                                       
   MODIFIABLE:                     TRUE                                        
   LABEL:                          public key cx021A                           
                        New value:                                             
   TRUSTED:                        TRUE                                        
   SUBJECT*:                       Not-specified                            
                                                                               
   ID:                             83A7F0F2F1C1                                
                        New value:                                             
   KEY TYPE:                       RSA                                         
   START DATE:                     20050103                                    
                        New value:               YYYYMMDD                      
   END DATE:                       20071231                                    
                        New value:               YYYYMMDD                      
   DERIVE:                         FALSE                                       
   LOCAL:                          FALSE                                       
   KEY GEN MECHANISM:              UNAVAILABLE INFORMATION                     
   ENCRYPT:                        FALSE                                       
                        New value: TRUE                                        
   VERIFY:                         TRUE                                        
                        New value: FALSE                                       
   VERIFY RECOVER:                 FALSE                                       
                        New value: TRUE                                        
   WRAP:                           TRUE                                        
                        New value: FALSE                                       
   FIPS140                         FALSE                                       
   APPLICATION:                    90893E31                                    
   MODULUS BITS:                   4096                               
   PUBLIC EXPONENT:                                                   
      010001                                                          
   MODULUS:
      F35F5EF1E1AC5D5289A7EB6340E41FDA18695CBBB2EB5E27BC3FA1C0FA0D215D
      18F017AEA80631223A2F268304894246BE8F629BEF7DB621B1E1C5F90D00F1AC 
      662119D2179DC02F20966591E39079D7A621F522F29451F4663E664D830A2F61 
      5E51A722EE6124F102A8334B113426A86028F6DC1F0D4F05EBE4AE9F57BA6805
      CE54B8C4C1866870110D3550689E435A6EDDA1FFA74D46C77C8850F7716EAF6E
      69AD03FBFBBCC5990EDDF8C1A34D607AC3B7728D7E6ABBDA566A626980E0D888 
      C83661867992AF0EE415CA3B392C40D5138A18E983784676736A67D82F69D12B
      95778A0CF92F752338CB811E1C68FBC04E8D9471B487C14942945AD6B345B562
      3EACCC1C25742C25924612B407869788F3236AF037B7D7EBBB03C0FB6529A376
      CF8161AACAA0B9C3D285D772C71B78264B56DE152B8B70975CE8B57D3EB048FF
      26629B0A1756A4004418B6AED201AC6831CB0F555B4C1CA4721F96272C741F73
      C439C3312C180BA67F5EAF823673904C78A6440A29A900B7F1C301C9FE9E7EB0
      A7B286943B62AF22995CA15A1AC4FE3AB28C3C53629C581A97773CDAA6A366AD
      7EA29F4128D7EF45FC8D8C7A35FE51B87A3F14CCF0E5B3A7B7F80AB5A72EDAB0
      10B582BB67A9048FFEE3631D50661E8FDC22E6754CAE46E06AC70F16667A7553 
      1C83C61047605D205C14E0032BC0C2E611B54AE1EF2DEFA67B4AEC8181910753
COMMAND ===>

The format of the ICSF Token Management - Public Key Object Details panel will differ slightly depending on the type of key (RSA, DSA, Diffie-Hellman, or Elliptic Curve) selected.

Table 24. Information displayed in Public Key Object Details panel for RSA, DSA, Diffie-Hellman, and Elliptic Curve keys
For this type of key:Identified in the panel's KEY TYPE field as:The panel will contain fields for:
RSARSAThe RSA modulus size, the public key exponent, and the RSA modulus. For example:
   MODULUS BITS:                   4096                               
   PUBLIC EXPONENT:                                                   
      010001                                                          
   MODULUS:                                                           
      F35F5EF1E1AC5D5289A7EB6340E41FDA18695CBBB2EB5E27BC3FA1C0FA0D215D
      18F017AEA80631223A2F268304894246BE8F629BEF7DB621B1E1C5F90D00F1AC 
      662119D2179DC02F20966591E39079D7A621F522F29451F4663E664D830A2F61 
      5E51A722EE6124F102A8334B113426A86028F6DC1F0D4F05EBE4AE9F57BA6805
      CE54B8C4C1866870110D3550689E435A6EDDA1FFA74D46C77C8850F7716EAF6E
      69AD03FBFBBCC5990EDDF8C1A34D607AC3B7728D7E6ABBDA566A626980E0D888 
      C83661867992AF0EE415CA3B392C40D5138A18E983784676736A67D82F69D12B
      95778A0CF92F752338CB811E1C68FBC04E8D9471B487C14942945AD6B345B562
      3EACCC1C25742C25924612B407869788F3236AF037B7D7EBBB03C0FB6529A376
      CF8161AACAA0B9C3D285D772C71B78264B56DE152B8B70975CE8B57D3EB048FF
      26629B0A1756A4004418B6AED201AC6831CB0F555B4C1CA4721F96272C741F73
      C439C3312C180BA67F5EAF823673904C78A6440A29A900B7F1C301C9FE9E7EB0
      A7B286943B62AF22995CA15A1AC4FE3AB28C3C53629C581A97773CDAA6A366AD
      7EA29F4128D7EF45FC8D8C7A35FE51B87A3F14CCF0E5B3A7B7F80AB5A72EDAB0
      10B582BB67A9048FFEE3631D50661E8FDC22E6754CAE46E06AC70F16667A7553 
      1C83C61047605D205C14E0032BC0C2E611B54AE1EF2DEFA67B4AEC8181910753
DSADSAThe DSA prime p, subprime q, base g, and public value. For example:
   PRIME:                                                              
      2A5C655610E93CF27FF5B65B7FF69DDE1A4780C6D71012304869CFDFC3285F5A
      ED4493E75E438DD4A107CAE127AB8FC6B842A20AB4877C34166CA9D1F510EB33
      C8193EA4A391526169262C9F4369274C682339DFB17B599B587F7B99B1AB37C9
      4490C4837B5656776E9FFDA073EAED869B19F7E197970DBE5665E8F87F964C57
   SUBPRIME:                                                           
      DF9048626B9AD71EF6F33081890DF9048626B9AD                         
   BASE:                                                               
      F21C09419230CAD25CB4C865BAF7A3FE59AAEC7D97A12D8C787C29D699F6650A
      D7DF6D09412C3727F4DB1F269B8C62433CCBBD52E651E5444D0A00834F6B4CCE
      1362CDDD387DC31501C9E4E5DBE9F42CFB8E0DB77CA121C4E612843DA035D4E1
      1D4CD1CF81076A7BED411ECE6B9851936D08A5F651DC7FF3414EEB73109DFE40
   VALUE:                                                              
      3992F874061239B0A0B2E52BDBC33237A1CEAB624B613AD91D23CDCCFC58D575
      1CB5FE0364D37BF74721AA5473DD1ECC2E65B82138BE7103477C438B3486C548
      0CCAD36D7882C9659CA32744E776DE894193953F6DF32C8AC3ACFC0A364A641A
      A19B74BDC43E6EC84D8CB409B46A82D666A7F963D31A2CC897B971D378959509
Diffie-HellmanDHThe Diffie-Hellman prime p, base g, and public value. For example:
   PRIME:                                                               
      F35F5EF1E1AC5D5289A7EB6340E41FDA18695CBBB2EB5E27BC3FA1C0FA0D215D
      18F017AEA80631223A2F268304894246BE8F629BEF7DB621B1E1C5F90D00F1AC 
      662119D2179DC02F20966591E39079D7A621F522F29451F4663E664D830A2F61 
      5E51A722EE6124F102A8334B113426A86028F6DC1F0D4F05EBE4AE9F57BA6805
      CE54B8C4C1866870110D3550689E435A6EDDA1FFA74D46C77C8850F7716EAF6E
      69AD03FBFBBCC5990EDDF8C1A34D607AC3B7728D7E6ABBDA566A626980E0D888 
      C83661867992AF0EE415CA3B392C40D5138A18E983784676736A67D82F69D12B
      95778A0CF92F752338CB811E1C68FBC04E8D9471B487C14942945AD6B345B562
   BASE:                                                                
      3EACCC1C25742C25924612B407869788F3236AF037B7D7EBBB03C0FB6529A376
      CF8161AACAA0B9C3D285D772C71B78264B56DE152B8B70975CE8B57D3EB048FF
      26629B0A1756A4004418B6AED201AC6831CB0F555B4C1CA4721F96272C741F73
      C439C3312C180BA67F5EAF823673904C78A6440A29A900B7F1C301C9FE9E7EB0
      A7B286943B62AF22995CA15A1AC4FE3AB28C3C53629C581A97773CDAA6A366AD
      7EA29F4128D7EF45FC8D8C7A35FE51B87A3F14CCF0E5B3A7B7F80AB5A72EDAB0
      10B582BB67A9048FFEE3631D50661E8FDC22E6754CAE46E06AC70F16667A7553 
      1C83C61047605D205C14E0032BC0C2E611B54AE1EF2DEFA67B4AEC8181910753
   VALUE:                                                               
      2A5C655610E93CF27FF5B65B7FF69DDE1A4780C6D71012304869CFDFC3285F5A
      ED4493E75E438DD4A107CAE127AB8FC6B842A20AB4877C34166CA9D1F510EB33
      C8193EA4A391526169262C9F4369274C682339DFB17B599B587F7B99B1AB37C9
      4490C4837B5656776E9FFDA073EAED869B19F7E197970DBE5665E8F87F964C57
      F21C09419230CAD25CB4C865BAF7A3FE59AAEC7D97A12D8C787C29D699F6650A
      D7DF6D09412C3727F4DB1F269B8C62433CCBBD52E651E5444D0A00834F6B4CCE
      1362CDDD387DC31501C9E4E5DBE9F42CFB8E0DB77CA121C4E612843DA035D4E1
      1D4CD1CF81076A7BED411ECE6B9851936D08A5F651DC7FF3414EEB73109DFE40
Elliptic CurveECThe elliptic curve parameters and the elliptic curve point. For example:
 _ EC PARAMS*:             Named Curve - secp521r1
 _ EC POINT*:                                                          
      3992F874061239B0A0B2E52BDBC33237A1CEAB624B613AD91D23CDCCFC58D575
      1CB5FE0364D37BF74721AA5473DD1ECC2E65B82138BE7103477C438B3486C548
      0CCAD36D7882C9659CA32744E776DE894193953F6DF32C8AC3ACFC0A364A641A
      A19B74BDC43E6EC84D8CB409B46A82D666A7F963D31A2CC897B971D378959509 
      308189028181008B53    

Go to the previous page Go to the next page




Copyright IBM Corporation 1990, 2014