Csfba00 Icsf Pkcs11 Hcr77c0.Pdf

Csfba00 Icsf Pkcs11 Hcr77c0.Pdf

z/OS Version 2 Release 3 Cryptographic Services Integrated Cryptographic Service Facility Writing PKCS #11 Applications IBM SC14-7510-04 Note Before using this information and the product it supports, read the information in “Notices” on page 101. This edition applies to ICSF FMID HCR77C0 and Version 2 Release 3 of z/OS (5650-ZOS) and to all subsequent releases and modifications until otherwise indicated in new editions. Last updated: 2019-06-24 © Copyright International Business Machines Corporation 2007, 2019. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Tables................................................................................................................. vii About this document.............................................................................................ix Who should read this document................................................................................................................. ix How this document is organized.................................................................................................................ix How to use this document.......................................................................................................................... ix Where to find more information...................................................................................................................x IBM Crypto Education.............................................................................................................................x How to send your comments to IBM.......................................................................xi If you have a technical problem..................................................................................................................xi Summary of changes...........................................................................................xiii Changes made in Cryptographic Support for z/OS V2R1 - z/OS V2R2 (FMID HCR77C0)....................... xiii Changes made in Cryptographic Support for z/OS V1R13 - z/OS V2R2 (FMID HCR77B1).....................xiii Changes made in Enhanced Cryptographic Support for z/OS V1R13 - z/OS V2R1 (FMID HCR77B0)....xiv Changes made in Cryptographic Support for z/OS V1R13-V2R1 (FMID HCR77A1)................................ xv Chapter 1. Overview of z/OS support for PKCS #11.................................................1 Tokens.......................................................................................................................................................... 1 Secure key PKCS #11.............................................................................................................................2 The token data set (TKDS)......................................................................................................................2 Controlling token access and key policy................................................................................................2 Managing tokens ....................................................................................................................................7 Sample scenario for setting up z/OS PKCS #11 tokens........................................................................ 7 Sample scenario for controlling clear key processing .......................................................................... 9 Auditing PKCS #11 functions...................................................................................................................... 9 Component trace for PKCS #11 functions................................................................................................10 Object types............................................................................................................................................... 10 Session objects.....................................................................................................................................10 Token objects....................................................................................................................................... 11 Operating in compliance with FIPS 140-2................................................................................................11 Requiring signature verification for ICSF module CSFINPV2............................................................. 13 Requiring FIPS 140-2 compliance from all z/OS PKCS #11 applications.......................................... 14 Requiring FIPS 140-2 compliance from select z/OS PKCS #11 applications....................................15 Preparing to use PKCS #11 applications.................................................................................................. 16 Tasks for the system programmer....................................................................................................... 16 Tasks for the security administrator.................................................................................................... 17 Tasks for the auditor.............................................................................................................................17 Tasks for application programmers..................................................................................................... 17 Optional Crypto Express adapters.............................................................................................................17 Chapter 2. The C API........................................................................................... 19 Using the C API.......................................................................................................................................... 19 Deleting z/OS PKCS #11 tokens.......................................................................................................... 19 Environment......................................................................................................................................... 19 Cross memory considerations............................................................................................................. 20 Key types and mechanisms supported..................................................................................................... 20 Objects and attributes supported............................................................................................................. 29 iii Library, slot, and token information.......................................................................................................... 47 Functions supported..................................................................................................................................48 Standard functions supported ............................................................................................................ 48 Non-standard functions supported..................................................................................................... 59 Non-standard mechanisms supported................................................................................................60 Enterprise PKCS #11 coprocessors.......................................................................................................... 61 Key algorithms/usages that are unsupported or disallowed by the Enterprise PKCS #11 coprocessors .................................................................................................................................. 61 PKCS #11 Coprocessor Access Control Points................................................................................... 62 Standard compliance modes............................................................................................................... 66 Function return codes................................................................................................................................66 Troubleshooting PKCS #11 applications.................................................................................................. 67 Chapter 3. Sample PKCS #11 C programs ............................................................ 69 Running the pre-compiled version of testpkcs11.....................................................................................69 Steps for running the pre-compiled version of testpkcs11................................................................ 69 Building sample PKCS #11 applications from source code..................................................................... 70 Chapter 4. Regional cryptographic servers........................................................... 73 Regional cryptographic server key types and mechanisms supported....................................................73 CKM_IBM_SM2.....................................................................................................................................75 CKM_IBM_SM2_ENCRYPT...................................................................................................................75 CKM_IBM_SM2_KEY_PAIR_GEN.........................................................................................................76 CKM_IBM_SM2_SM3........................................................................................................................... 76 CKM_IBM_SM3.....................................................................................................................................77

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    140 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us