z/OS Cryptographic Services ICSF Administrator's Guide
Previous topic | Next topic | Contents | Index | Contact z/OS | Library | PDF


Appendix B. Control Vector Table

z/OS Cryptographic Services ICSF Administrator's Guide
SA22-7521-17

Note:
The Control Vectors used in ICSF are exactly the same as in CCA and the TSS publication.

The master key enciphers all keys operational on your system. A transport key enciphers keys that are distributed off your system. Prior to a master key or transport key enciphering a key, ICSF exclusive ORs both halves of the master key or transport key with a control vector. The same control vector is exclusive ORed to the left and right half of a master key or transport key.

Also, if you are entering a key part, ICSF exclusive ORs each half of the key part with a control vector prior to placing the key part into the CKDS.

Each type of key on ICSF (except the master key) has either one or two unique control vectors associated with it. The control vector that ICSF exclusive ORs the master key or transport key with depends on the type of key the master key or transport key is enciphering. For double-length keys, a unique control vector exists for each half of a specific key type. For example, there is a control vector for the left half of an input PIN-encrypting key, and a control vector for the right half of an input PIN-encrypting key.

If you are entering a key part into the CKDS, ICSF exclusive ORs the key part with the unique control vector(s) associated with the key type. ICSF also enciphers the key part with two master key variants for a key part. One master key variant enciphers the left half of the key part, and another master key variant enciphers the right half of the key part. ICSF creates the master key variants for a key part by exclusive ORing the master key with the control vectors for key parts. These procedures protect key separation.

Table 29 displays the default value of the control vector that is associated with each type of key. For keys that are double-length, ICSF enciphers a unique control vector on each half. Control vectors indicated with an "*" are supported by the CCF.

Table 29. Default Control Vector Values
Key TypeControl Vector Value (Hex) Value for Single-length Key or Left Half of Double-length KeyControl Vector Value (Hex) Value for Right Half of Double-length Key
*AKEK00 00 00 00 00 00 00 00
CIPHER00 03 71 00 03 00 00 00
CIPHER (double length)00 03 71 00 03 41 00 0000 03 71 00 03 21 00 00
CVARDEC00 3F 42 00 03 00 00 00
CVARENC00 3F 48 00 03 00 00 00
CVARPINE00 3F 41 00 03 00 00 00
CVARXCVL00 3F 44 00 03 00 00 00
CVARXCVR00 3F 47 00 03 00 00 00
*DATA00 00 00 00 00 00 00 00
DATAC00 00 71 00 03 41 00 0000 00 71 00 03 21 00 00
*DATAM generation key (external)00 00 4D 00 03 41 00 0000 00 4D 00 03 21 00 00
*DATAM key (internal)00 05 4D 00 03 00 00 0000 05 4D 00 03 00 00 00
*DATAMV MAC verification key (external)00 00 44 00 03 41 00 0000 00 44 00 03 21 00 00
*DATAMV MAC verification key (internal)00 05 44 00 03 00 00 0000 05 44 00 03 00 00 00
*DATAXLAT00 06 71 00 03 00 00 00
DECIPHER00 03 50 00 03 00 00 00
DECIPHER (double-length)00 03 50 00 03 41 00 0000 03 50 00 03 21 00 00
DKYGENKY00 71 44 00 03 41 00 0000 71 44 00 03 21 00 00
ENCIPHER00 03 60 00 03 00 00 00
ENCIPHER (double-length)00 03 60 00 03 41 00 0000 03 60 00 03 21 00 00
*EXPORTER00 41 7D 00 03 41 00 0000 41 7D 00 03 21 00 00
IKEYXLAT00 42 42 00 03 41 00 0000 42 42 00 03 21 00 00
*IMP-PKA00 42 05 00 03 41 00 0000 42 05 00 03 21 00 00
*IMPORTER00 42 7D 00 03 41 00 0000 42 7D 00 03 21 00 00
*IPINENC00 21 5F 00 03 41 00 0000 21 5F 00 03 21 00 00
*MAC00 05 4D 00 03 00 00 00
MAC (double-length)00 05 4D 00 03 41 00 0000 05 4D 00 03 21 00 00
*MACVER00 05 44 00 03 00 00 00
MACVER (double-length)00 05 44 00 03 41 00 0000 05 44 00 03 21 00 00
OKEYXLAT00 41 42 00 03 41 00 0000 41 42 00 03 21 00 00
*OPINENC00 24 77 00 03 41 00 0000 24 77 00 03 21 00 00
*PINGEN00 22 7E 00 03 41 00 0000 22 7E 00 03 21 00 00
*PINVER00 22 42 00 03 41 00 0000 22 42 00 03 21 00 00
Notes:
  1. The external control vectors for DATAC, double-length MAC generation and MAC verification keys are also referred to as data compatibility control vectors.
  2. Double-length MAC and MACVER keys can now by specified by these key types on the IBM eServer zSeries 990, z890, z9 EC and z9 BC.

Go to the previous page Go to the next page




Copyright IBM Corporation 1990, 2014