partition ciphershow
Shows the cipher suites available for cloning operations.
Multiple cipher suite options are available for use by Cloning Protocol version 4 (CPv4). When two CPv4 partitions begin a cloning operation, they negotiate for the strongest cipher suite available to both parties. You can affect the result by disabling some suites - all are enabled by default. Use the partition cipherenable and partition cipherdisable commands.
Cloning cipher suites for CPv4 have the following format:
CPv4 <signature><key agreement<symmetric>
CPv4 ECDSA-P521-SHA-512 ECDH-P521 AES-256-KWP
In addition, CPv3 has a single cipher suite, which can be disabled (enabled by default).
Cloning cipher suite for CPv3 has the following format:
CPv3 <key transport><symmetric>
CPv3 RSA-4096-PKCS-SHA-284 AES-256-GCM
If all cipher suites are disabled, cloning (including backup) is not possible for the partition and contents.
If Partition Policy 42 is set (allow CPv1), then CPv3 and CPv4 are disabled.
Syntax
partition ciphershow
Example using Luna HSM Firmware 7.9.0 or Newer
lunacm:>partition ciphershow Cipher ID Cipher Suite Enabled __________________________________________________________________________________ 0 CPv3 RSA-4096-PKCS-SHA2-384 AES-256-GCM Yes 1 CPv4 ECDSA-P521-SHA2-512 ECDH-P521-SHA2-512 AES-256-GCM Yes 2 CPv4 ECDSA-P521-SHA2-512 ECDH-P521-SHA2-512 Yes AES-256-CTR-HMAC-SHA2-512 3 CPv4 ECDSA-BP512-SHA2-512 ECDH-BP512-SHA2-512 Yes AES-256-GCM 4 CPv4 ECDSA-BP512-SHA2-512 ECDH-BP512-SHA2-512 Yes AES-256-CTR-HMAC-SHA2-512 5 CPv4 ECDSA-P521-SHA3-512 ECDH-P521-SHA3-512 AES-256-GCM Yes 6 CPv4 ECDSA-P521-SHA3-512 ECDH-P521-SHA3-512 Yes AES-256-CTR-HMAC-SHA3-512 7 CPv4 ECDSA-BP512-SHA3-512 ECDH-BP512-SHA3-512 Yes AES-256-GCM 8 CPv4 ECDSA-BP512-SHA3-512 ECDH-BP512-SHA3-512 Yes AES-256-CTR-HMAC-SHA3-512 9 CPv4 ECDSA-P521-SHA2-512 ECDH-P521-ML-KEM1024-SHA2-512 Yes AES-256-GCM 10 CPv4 ECDSA-P521-SHA2-512 ECDH-P521-ML-KEM1024-SHA2-512 Yes AES-256-CTR-HMAC-SHA2-512 11 CPv4 ECDSA-BP512-SHA2-512 Yes ECDH-BP512-ML-KEM1024-SHA2-512 AES-256-GCM 12 CPv4 ECDSA-BP512-SHA2-512 Yes ECDH-BP512-ML-KEM1024-SHA2-512 AES-256-CTR-HMAC-SHA2-512 13 CPv4 ECDSA-P521-SHA3-512 ECDH-P521-ML-KEM1024-SHA3-512 Yes AES-256-GCM 14 CPv4 ECDSA-P521-SHA3-512 ECDH-P521-ML-KEM1024-SHA3-512 Yes AES-256-CTR-HMAC-SHA3-512 15 CPv4 ECDSA-BP512-SHA3-512 Yes ECDH-BP512-ML-KEM1024-SHA3-512 AES-256-GCM 16 CPv4 ECDSA-BP512-SHA3-512 Yes ECDH-BP512-ML-KEM1024-SHA3-512 AES-256-CTR-HMAC-SHA3-512 Command Result : No Error
Example using Luna HSM Firmware 7.8.9 or Older
lunacm:>partition ciphershow Cipher ID Cipher Suite Enabled __________________________________________________________________________________ 0 CPv3 RSA-4096-PKCS-SHA-384 AES-256-GCM Yes 1 CPv4 ECDSA-P521-SHA-512 ECDH-P521-SHA512 AES-256-GCM Yes 2 CPv4 ECDSA-P521-SHA-512 ECDH-P521-SHA512 Yes AES-256-CTR-SHA256-HMAC 3 CPv4 ECDSA-BP521-SHA-512 ECDH-BP521-SHA512 AES-256-GCM Yes 4 CPv4 ECDSA-BP521-SHA-512 ECDH-BP521-SHA512 Yes AES-256-CTR-SHA256-HMAC 5 CPv4 ECDSA-P521-SHA3-512 ECDH-P521-SHA3-512 AES-256-GCM Yes 6 CPv4 ECDSA-P521-SHA3-512 ECDH-P521-SHA3-512 Yes AES-256-CTR-SHA256-HMAC 7 CPv4 ECDSA-BP521-SHA3-512 ECDH-BP521-SHA3-512 Yes AES-256-GCM 8 CPv4 ECDSA-BP521-SHA3-512 ECDH-BP521-SHA3-512 Yes AES-256-CTR-SHA256-HMAC Command Result : No Error
The above list might change with time, as newer cipher suites are added, or others age out.