CKM_TUAK_SIGN
Supported Operations
Encrypt and Decrypt | No |
Sign and Verify | Yes (Single-part sign only) |
SignRecover and VerifyRecover | No |
Digest | No |
Generate Key/Key-Pair | No |
Wrap and Unwrap | No |
Derive | No |
Available in FIPS Mode | Yes |
Restrictions in FIPS Mode | None |
Key Size Range (bytes) and Parameters
Minimum | 16 |
FIPS Minimum | 16 |
Maximum | 32 |
Parameter | CK_TUAK_SIGN_PARAMS
|
Description
This mechanism is used to perform MAC calculation for TUAK functions F1, F1* and F2 as per the specification TS-35.231, available at http://www.3gpp.org, using the PKCS functions C_SignInit() and C_Sign().
The mechanism requires the 16- or 32-byte TUAK key 'K' to be initialized as an AES key on the HSM slot. The key should have the CKA_SIGN attribute set to TRUE. The 16- or 32-byte Operator Variant key should be stored on the HSM slot as a Generic Secret key (CKK_GENERIC_SECRET).
The mechanism takes a parameter, CK_TUAK_SIGN_PARAMS. See ctvdef.h for description.
NOTE Only a 16- or 32-byte AES key and a 16- or 32-byte Operator Variant are supported with this mechanism.
Return to ProtectToolkit-C Mechanisms