Variable-length symmetric key tokens

CCA supports a variable-length symmetric key-token. This key token has a version number of X'05' (offset 4). Use the Key Token Build2 (CSNBKTB2) verb to build skeleton variable-length symmetric key tokens used as input by the Key Generate2 (CSNBKGN2) or Key Part Import2 (CSNBKPI2) verbs, which return these key tokens with encrypted keys in the key-token payload.

Table 1 shows the general format of the token version number X'05' key token.
Table 1 shows the format of the CIPHER variable-length symmetric key-token that can be used with the AES algorithm. An AES CIPHER key-token is used by the Symmetric_Algorithm_Decipher (CSNBSAD) and Symmetric_Algorithm_Encipher (CSNBSAE) verbs to decipher or encipher data with the AES algorithm.
Table 1 shows the format of the MAC variable-length symmetric key-token that can be used with the AES algorithm.
Table 1 shows the format of the MAC variable-length symmetric key-token that can be used with the HMAC algorithm. An HMAC MAC key-token is used by the HMAC_Generate (CSNBHMG) and HMAC_Verify (CSNBHMV) verbs to generate or verify keyed hash message authentication codes.
Table 1 shows the format of the EXPORTER and IMPORTER variable-length symmetric key tokens that can be used with the AES algorithm. An EXPORTER operational key-token is used by the Symmetric_Key_Export (CSNDSYX) verb to export an internal AES or HMAC variable-length symmetric key-token into an external variable-length symmetric key-token, either into an AESKW or PKOAEP2 wrapped payload. An IMPORTER operational key-token is used by the Symmetric_Key_Import2 (CSNDSYI2) verb to import an external AES or HMAC variable-length symmetric key-token, containing either an AESKW or PKOAEP2 wrapped payload, into an internal variable-length symmetric key-token.
Table 1 shows the format of the PINPROT, PINCALC, and PINPRW variable-length symmetric key tokens that can be used with the AES algorithm.
Table 1 shows the format of the DESUSECV variable-length symmetric key tokens that can be used with the AES algorithm.

AES DKYGENKY variable-length symmetric key token shows the format of the DKYGENKY variable-length symmetric key tokens that can be used with the AES algorithm.

Table 1 shows the format of the SECMSG variable-length symmetric key tokens that can be used with the AES algorithm.