Key-token verification patterns

These verification pattern techniques are used in the several types of CCA key tokens.

The techniques are:
  • AES and ECC key tokens: leftmost 8 bytes of SHA-256 hash of the string formed by pre-pending X'01' to the cleartext key value.
  • DES key tokens:
    • Triple-length master key, key token version X'00': leftmost 8 bytes of SHA-1 hash
    • Triple-length master key, key token version X'03': leftmost 2 bytes of SHA-1 hash
    • Double-length master key, key token version X'00': leftmost 8 bytes of z/OS® hash
    • Double-length master key, key token version X'03': leftmost 2 bytes of SHA-1 hash
  • RSA key tokens:
    • Private-key section types X'06' and X'08': 16-byte MDC-4 value
    • Private-key section types X'02' and X'05': leftmost 2 bytes of SHA-1 hash
  • Trusted blocks: 16-byte MDC-4 value