-
Use the following command to generate an AES key:
›_ Console
> p11tool2 Slot=<slot_ID> LoginUser=<user_password> KeyAttr=CKA_LABEL=<key_label>,CKA_ID=<key_ID>,CKA_EXTRACTABLE=CK_TRUE GenerateKey=AES -
Navigate to the folder where you have the byoktool Execute the following command to wrap the key by using the key, downloaded from GCP:
›_ Console
> byoktool.exe Dev=<IP_of_UTIMACO_HSM> LogonPass=USR_0000,<user_password> Label="<key_label>" CSP=gcp PublicKey=" C:\wrappingKey.der" WrappedKey="C:\WrappedKey.byok"
Make sure to have appropriate permissions to be able to generate keys on the HSM as well as to write files in the directory.