z/OS Cryptographic Services ICSF Application Programmer's Guide
Previous topic |
Next topic
|
Contents
|
Index
|
Contact z/OS
|
Library
|
PDF
Figures
z/OS Cryptographic Services ICSF Application Programmer's Guide
SA22-7522-16
Overview of trusted block contents
Simplified RKX key-token structure
Trusted block creation
Exporting keys using a trusted block
Generating keys using a trusted block
Typical flow of callable services for remote key export
PKA Key Management
Control Vector Base Bit Map (Common Bits and Key-Encrypting Keys)
Control Vector Base Bit Map (Data Operation Keys)
Control Vector Base Bit Map (PIN Processing Keys and Cryptographic Variable-Encrypting Keys)
Control Vector Base Bit Map (Key Generating Keys)
Control Vector Translate Callable Service Mask_Array Processing
Control Vector Translate Callable Service
3624 PIN Generation Algorithm
GBP PIN Generation Algorithm
PIN-Offset Generation Algorithm
PIN Verification Algorithm
GBP PIN Verification Algorithm
PVV Generation Algorithm
The CDMF Key Transformation Algorithm
Copyright IBM Corporation 1990, 2014