z/OS Cryptographic Services ICSF Application Programmer's Guide
Previous topic | Next topic | Contents | Index | Contact z/OS | Library | PDF


PKA Key Tokens

z/OS Cryptographic Services ICSF Application Programmer's Guide
SA22-7522-16

PKA key tokens contain RSA, DSS or ECC private or public keys. PKA tokens are variable length because they contain either RSA, DSS, or ECC key values, which are variable in length. Consequently, length parameters precede all PKA token parameters. The maximum allowed size is 3500 bytes. PKA key tokens consist of a token header, any required sections, and any optional sections. Optional sections depend on the token type. PKA key tokens can be public or private, and private key tokens can be internal or external. Therefore, there are three basic types of tokens, each of which can contain either RSA, DSS, or ECC information:

  • A public key token
  • A private external key token
  • A private internal key token

Public key tokens contain only the public key. Private key tokens contain the public and private key pair. Table 7 summarizes the sections in each type of token.

Table 7. Summary of PKA Key Token Sections
SectionPublic External Key TokenPrivate External Key TokenPrivate Internal Key Token
HeaderXXX
RSA, DSS, or ECC private key informationXX
RSA, DSS, or ECC public key informationXXX
Key name (optional)XX
Internal informationX

As with DES and AES key tokens, the first byte of a PKA key token contains the token identifier which indicates the type of token.

A first byte of X'1E' indicates an external token with a cleartext public key and optionally a private key that is either in cleartext or enciphered by a transport key-encrypting key. An external key token is in importable key form. It can be sent on the link.

A first byte of X'1F' indicates an internal token with a cleartext public key and a private key that is enciphered by the PKA master key and ready for internal use. An internal key token is in operational key form. A PKA private key token must be in operational form for ICSF to use it. (PKA public key tokens are used directly in the external form.)

Formats for public and private external and internal RSA, DSS, and ECC key tokens begin in RSA Public Key Token.

Go to the previous page Go to the next page




Copyright IBM Corporation 1990, 2014