Previous topic |
Next topic |
Contents |
Index |
Contact z/OS |
Library |
PDF
Algorithm for calculating an authentication pattern z/OS Cryptographic Services ICSF Administrator's Guide SA22-7521-17 |
|
When you initialize a CKDS, ICSF uses the current master key and the authentication pattern algorithm to calculate an authentication pattern for the CKDS. ICSF places the value of the authentication pattern in the header record of the CKDS. At ICSF startup, ICSF uses the authentication pattern to verify that the master key enciphers the current CKDS specified at ICSF startup. It compares the authentication pattern that is stored in the CKDS with the authentication pattern it calculates for the master key. If the authentication patterns do not match, ICSF startup fails, and ICSF gives you a message that states that the master key is not valid. To calculate the authentication pattern, ICSF uses this algorithm:
The resulting 64-bit value is the authentication pattern. |
Copyright IBM Corporation 1990, 2014
|