Previous topic |
Next topic |
Contents |
Index |
Contact z/OS |
Library |
PDF
Algorithm for calculating a verification pattern z/OS Cryptographic Services ICSF Administrator's Guide SA22-7521-17 |
|
To enter a master key or operational key manually, you enter key parts. When you enter a key part, ICSF displays a verification pattern for that key part on a panel. To verify that you entered the key part correctly, you can use the value of the key part you enter to calculate the verification pattern. Check that the verification pattern you calculate matches the verification ICSF calculates. To calculate this verification pattern, use this algorithm:
The resulting 64-bit value is the verification pattern. The verification pattern for the master key appears on the Coprocessor Selection and Hardware Status panels. If a master key register is full, the panels display the master key verification pattern. The verification patterns for two identical master keys are the same. You can use the verification patterns to verify that master keys in two different key storage units are the same. ICSF records a master key verification pattern in the SMF record when you enter a master key part or activate a master key. The ICSF SMF record also records a verification pattern when you enter an operational key part. |
Copyright IBM Corporation 1990, 2014
|