partition ciphershow
Shows the cipher suites available for cloning operations.
Multiple cipher suite options are available for use by Cloning Protocol version 4 (CPv4). When two CPv4 partitions begin a cloning operation, they negotiate for the strongest cipher suite available to both parties. You can affect the result by disabling some suites - all are enabled by default. Use the partition cipherenable and partition cipherdisable commands.
Cloning cipher suites for CPv4 have the following format:
CPv4 <signature><key agreement<symmetric>
CPv4 ECDSA-P521-SHA-512 ECDH-P521 AES-256-KWP
In addition, CPv3 has a single cipher suite, which can be disabled (enabled by default).
Cloning cipher suite for CPv3 has the following format:
CPv3 <key transport><symmetric>
CPv3 RSA-4096-PKCS-SHA-284 AES-256-GCM
If all cipher suites are disabled, cloning (including backup) is not possible for the partition and contents.
If Partition Policy 42 is set (allow CPv1), then CPv3 and CPv4 are disabled.
Syntax
partition ciphershow
Example
lunacm:>partition ciphershow Cipher ID Cipher Suite Enabled __________________________________________________________________________________ 0 CPv3 RSA-4096-PKCS-SHA-384 AES-256-GCM Yes 1 CPv4 ECDSA-P521-SHA-512 ECDH-P521-SHA512 AES-256-GCM Yes 2 CPv4 ECDSA-P521-SHA-512 ECDH-P521-SHA512 Yes AES-256-CTR-SHA256-HMAC 3 CPv4 ECDSA-BP521-SHA-512 ECDH-BP521-SHA512 AES-256-GCM Yes 4 CPv4 ECDSA-BP521-SHA-512 ECDH-BP521-SHA512 Yes AES-256-CTR-SHA256-HMAC 5 CPv4 ECDSA-P521-SHA3-512 ECDH-P521-SHA3-512 AES-256-GCM Yes 6 CPv4 ECDSA-P521-SHA3-512 ECDH-P521-SHA3-512 Yes AES-256-CTR-SHA256-HMAC 7 CPv4 ECDSA-BP521-SHA3-512 ECDH-BP521-SHA3-512 Yes AES-256-GCM 8 CPv4 ECDSA-BP521-SHA3-512 ECDH-BP521-SHA3-512 Yes AES-256-CTR-SHA256-HMAC Command Result : No Error
The above list might change with time, as newer cipher suites are added, or others age out.