cmu verifypkc

Verify a Public Key Confirmation from the HSM.

Syntax

cmu verifypkc -inputFile=<filename>

NOTE   The private key used must have attribute sign=true because the cmu does a sign verify on test data internally.

Argument(s) Description
-inputFile =<filename>  Defines the name of the file that contains the PKC.

Common CMU Options

Some options are commonly available to all cmu commands. They are described below.

Argument(s) Description
-ecdsasigpadalways Specifies that you wish to pad ecdsa signature R and S values with a leading 0.
-ecdsasigpadnever Specifies that you do not wish to pad ecdsa signature R and S values.

-password=<password>

-pin=<password>

The password for the role accessing the current slot, with the current command. If this is not specified, it is prompted.
-slot=<slot#> The slot to be acted upon, by the current command. If this is not specified, it is prompted.
-so Specifies that you wish to perform the command as Partition Security Officer for that slot. If a role is not specified, the Crypto Officer role is used by default.

Example

cmu verifypkc –inputFile=test.pkc