cmu verifypkc
Verify a Public Key Confirmation from the HSM.
Syntax
cmu verifypkc -inputFile=<filename>
NOTE The private key used must have attribute sign=true because the cmu does a sign verify on test data internally.
| Argument(s) | Description |
|---|---|
| -inputFile =<filename> | Defines the name of the file that contains the PKC. |
Common CMU Options
Some options are commonly available to all cmu commands. They are described below.
| Argument(s) | Description |
|---|---|
| -ecdsasigpadalways | Specifies that you wish to pad ecdsa signature R and S values with a leading 0. |
| -ecdsasigpadnever | Specifies that you do not wish to pad ecdsa signature R and S values. |
|
-password=<password> -pin=<password> |
The password for the role accessing the current slot, with the current command. If this is not specified, it is prompted. |
| -slot=<slot#> | The slot to be acted upon, by the current command. If this is not specified, it is prompted. |
| -so | Specifies that you wish to perform the command as Partition Security Officer for that slot. If a role is not specified, the Crypto Officer role is used by default. |
Example
cmu verifypkc –inputFile=test.pkc