Table 40
shows Role and Service Access to CSPs:
R – Read: the data item is read into memory.
●
W – Write: the data item is written into memory.
●
Z – Zeroize: the data item is actively destroyed.
●
Table 40: Role and service access to CSPs
PRNG Keys
RW
Z
IKE Preshared
RW
Keys
Z
Pre-shared
Session Key
(SKEYID)
Ephemeral DH
private key
Ephemeral DH
shared secret
HASH_I,
HASH_R
IKE Session
phase-1 secret
(SKEYID_d)
IKE phase-1
HMAC Key
(SKEYID_a)
IKE Session
phase-1 key
(SKEYID_e)
IKE Session
phase-1 TDES
IKE Session
phase-1 DES
IKE Session
phase-1 AES
ZW
W
Z
Z
Z
Z
Z
Z
Z
Z
Z
Z
Z
Z
R
Z
R
Z
RW
Z
RW
Z
RW
Z
RW
Z
RW
Z
RW
Z
RW
Z
RW
Z
RW
Z
RW
Issue 1.1 June 2005
Overview
1 of 3
505