stcconfig cipherdisable
Disable the use of a symmetric encryption cipher algorithm for data encryption on an STC link. All data transmitted over the STC link will be encrypted using the cipher that is both enabled and that offers the highest level of security. For example, if AES 192 and AES 256 are enabled, and AES 128 is disabled, AES 256 will be used. You can use the command stcconfig ciphershow to show which ciphers are currently enabled and the command stc status to display the cipher that is currently being used.
NOTE Performance is reduced for larger ciphers.
Syntax
stcconfig cipherdisable -slot <slot_ID> -id <cipher_ID> [-all] [-force]
Argument(s) | Shortcut | Description |
---|---|---|
-all | -a | Disable all ciphers. |
-force | -f | Force the action without prompting for confirmation. |
-id <cipher_ID> | -id | Specifies the numerical identifier of the cipher you want to allow or disallow, as listed by stcconfig ciphershow |
-slot <slot_ID> | -s |
Specifies the slot containing the partition for which you want to allow or disallow a cipher algorithm. This argument is available only if you are logged into the HSM's Admin partition. |
Example
lunacm:> stcconfig cipherdisable This table lists the ciphers supported for STC links to the current slot. Enabled ciphers are accepted during STC link negotiation with a client. If all ciphers are disabled, STC links to the partition are not encrypted. STC Encryption: On Cipher ID Cipher Name Enabled __________________________________________________________________ 1 AES 128 Bit with Cipher Block Chaining No 2 AES 192 Bit with Cipher Block Chaining Yes 3 AES 256 Bit with Cipher Block Chaining Yes Command Result : No Error lunacm:> stcconfig cipherdisable -id 3 AES 256 Bit with Cipher Block Chaining is now disabled for the current slot. Command Result : No Error