stcconfig cipherenable
Enable the use of a symmetric encryption cipher algorithm for data encryption on an STC link. All data transmitted over the STC link will be encrypted using the cipher that is both enabled and that offers the highest level of security. For example, if AES 192 and AES 256 are enabled, and AES 128 is disabled, AES 256 will be used. You can use the command stcconfig ciphershow to show which ciphers are currently enabled and the command stc status to display the cipher that is currently being used.
NOTE Performance is reduced for larger ciphers.
Syntax
stcconfig cipherenable -slot <slot_ID> -id <cipher_ID> [-all]
Option | Shortcut | Description |
---|---|---|
-all | -a | Enable all ciphers. |
-id <cipher_ID> | -id | Specifies the numerical identifier of the cipher you want to allow or disallow, as listed by stcconfig ciphershow |
-slot <slot_ID> | -s |
Specifies the slot containing the partition for which you want to allow or disallow a cipher algorithm. This parameter is available only if you are logged into the HSM's Admin partition. |
Example
lunacm:> stcconfig ciphershow
This table lists the ciphers supported for STC links to the current slot.
Enabled ciphers are accepted during STC link negotiation with a client.
If all ciphers are disabled, STC links to the partition are not encrypted.
STC Encryption: On
Cipher ID Cipher Name Enabled
__________________________________________________________________
1 AES 128 Bit with Cipher Block Chaining No
2 AES 192 Bit with Cipher Block Chaining Yes
3 AES 256 Bit with Cipher Block Chaining Yes
Command Result : No Error
lunacm:> stcconfig ciphereneble -id 3
AES 256 Bit with Cipher Block Chaining is now enabled for the current slot.
Command Result : No Error