z/OS Cryptographic Services ICSF Application Programmer's Guide
Previous topic | Next topic | Contents | Index | Contact z/OS | Library | PDF


Figures

z/OS Cryptographic Services ICSF Application Programmer's Guide
SA22-7522-16

  1. Overview of trusted block contents
  2. Simplified RKX key-token structure
  3. Trusted block creation
  4. Exporting keys using a trusted block
  5. Generating keys using a trusted block
  6. Typical flow of callable services for remote key export
  7. PKA Key Management
  8. Control Vector Base Bit Map (Common Bits and Key-Encrypting Keys)
  9. Control Vector Base Bit Map (Data Operation Keys)
  10. Control Vector Base Bit Map (PIN Processing Keys and Cryptographic Variable-Encrypting Keys)
  11. Control Vector Base Bit Map (Key Generating Keys)
  12. Control Vector Translate Callable Service Mask_Array Processing
  13. Control Vector Translate Callable Service
  14. 3624 PIN Generation Algorithm
  15. GBP PIN Generation Algorithm
  16. PIN-Offset Generation Algorithm
  17. PIN Verification Algorithm
  18. GBP PIN Verification Algorithm
  19. PVV Generation Algorithm
  20. The CDMF Key Transformation Algorithm

Go to the next page




Copyright IBM Corporation 1990, 2014