AAL2GenGenPasswordCmd
  • 22 Jan 2025
  • 1 Minute à lire
  • Sombre
    Lumière
  • PDF

AAL2GenGenPasswordCmd

  • Sombre
    Lumière
  • PDF

The content is currently unavailable in French. You are viewing the default English version.
Résumé de l’article

Function prototype

aat_int32 AAL2GenGenPasswordCmd(
                                aat_byte        *Cmd,
                                aat_int32       *CmdSize,
                                TDigipassBlob   *DPData,
                                TKernelParms    *CallParms,
                                aat_ascii       *aStorageKeyNameIn,
                                aat_ascii       *aIVIn,
                                aat_ascii       *aChallengeIn);

Description

If Virtual Mobile Authenticator is supported and activated for the given authenticator application BLOB, this function can be used to generate a dynamic one-time password.

With this function, you can address the HSM storage key by name and to specify an initial vector. The initial vector is used during the 3DES/AES encryption of the sensitive authenticator application BLOB data.

The password generation on the HSM is identical to the functionality available with the Authentication Suite Server SDK Software Password Generation Service. For information on the associated functions, refer to the Authentication Suite Server SDK C-C++ Programmer's Guide.

This function must be used with the post-HSM API AAL2ProcGenPasswordRpl.

Parameters

  Table: Parameters (AAL2GenGenPasswordCmd)
TypeNameUseDescription
aat_byte *CmdO

Up to 455 bytes that serialize the GENERATE PASSWORD command type and the input data to the generate password function on the HSM:

  • Command type - 2 bytes
  • An authenticator application BLOB - 192 bytes
  • Run time parameters - 80 bytes
  • StorageKeyName - up to 128 characters
  • InitialVector - 8 bytes
  • Challenge - up to 17 characters
  • Host time - 4 bytes

Plus 24 bytes for Authentication Suite Server SDK internal use.

aat_int32 *CmdSizeI/O

On entry, this parameter contains the size of the Cmd buffer.On exit, this parameter contains the length of the Cmd message.

TDigipassBlob *DPDataIauthenticator application BLOB.
TKernelParms *CallParmsI

Structure of runtime parameters to use during this function call.

aat_ascii * aStorage KeyNameIn I

String of up to 128+1 characters, left-justified, null-terminated, or right-padded with spaces. This is the label of the HSM storage key used to encrypt the sensitive Digipass application BLOB data.

aat_ascii *aIVInI

String of 16 hexadecimal characters, left-justified, null-terminated, or right-padded with spaces. This is the initial vector used to encrypt the sensitive authenticator application BLOB data.

aat_ascii *aChallengeInI

String of up to 17 numeric characters, left-justified, null-terminated, or right-padded with spaces. This parameter holds the challenge that is used to generate the password. If no challenge is needed, this parameter should be NULL.

Return codes

  Table: Return codes (AAL2GenGenPasswordCmd)
CodeMeaningCodeMeaning
0Success590Invalid command pointer
149Invalid initial vector length706Invalid data buffer pointer
412Invalid checksum (software)1000Function does not support EMV-CAP
413Invalid Base64 format1018Invalid TLV item pointer
510Invalid Digipass data pointer1025Data buffer too small

Cet article vous a-t-il été utile ?

Changing your password will log you out immediately. Use the new password to log back in.
First name must have atleast 2 characters. Numbers and special characters are not allowed.
Last name must have atleast 1 characters. Numbers and special characters are not allowed.
Enter a valid email
Enter a valid password
Your profile has been successfully updated.
ESC

Ozzy, facilitant la découverte de connaissances grâce à l’intelligence conversationnelle