iTP Secure WebServer System Administrator's Guide (Version 7.0)
Integrating the WebSafe2 Internet Security 
Processor (WISP)
iTP Secure WebServer System Administrator’s Guide—523346-012
5-10
Generating the Public/Private Key Pair and
Obtaining the Certificate
Generating the Public/Private Key Pair and Obtaining the 
Certificate
The WISP generates a public/private key pair and sends it to the NonStop system, 
where it is stored in the file named by the keyfile statement in wid.config. A 
certificate is obtained by sending a certificate request to a recognized Certificate 
Authority (CA). To generate the public/private key pair and obtain a certificate, 
complete these steps:
1. Obtain a KEK pair using variant 0. This KEK pair will be used to encrypt the 
public/private key pair for transmission to the NonStop system. You use the SCT to 
generate the KEK pair. For further details, see Step 1. Obtaining a Key Exchange 
Key (KEK) Using Variant 0.
2. Generate a public/private key pair and a certificate request. You use the keyadmin 
command to do this. For further details, see Step 2. Generating a Public/Private 
Key Pair and a Certificate Request on page 5-11.
3. Request a certificate from a CA. For further details, see Step 3. Requesting a 
Certificate From a Certificate Authority (CA) on page 5-13.
4. Obtain a KEK using variant 31. You use the SCT to perform this task. For further 
details, see Step 4. Obtaining a KEK Pair Using Variant 31 on page 5-13.
5. Install the certificate received from the CA by using the keyadmin command. For 
further details, see Step 5. Installing the Certificate on page 5-14.
Step 1. Obtaining a Key Exchange Key (KEK) Using 
Variant 0
You use the SCT Calculate Crypto function to obtain a KEK. Following the steps 
outlined will generate two forms of double-length (16-byte) KEK: the in-the-clear form 
and the form encrypted using the MFK. 
For detailed information about the SCT and the Calculate Crypto function, see the 
WebSafe Internet Security Processor Installation and Operations Manual. That manual 
gives a detailed procedure for obtaining a KEK using variant 0. As you follow that 
procedure, keep in mind that the double-length KEK is too long to display on the SCT 
screen. Therefore you create the left part first, recording first the clear (unencrypted) 
text followed by the cryptogram, and then you create the right part, recording first the 
clear text followed by the cryptogram: 
a. Select Encryption Key MFK1.
b. Define Key Under MFK1.
c. Select double length (F2).
d. Enter 1 as the number of key parts.
e. Select the MFK.










