Previous topic |
Next topic |
Contents |
Index |
Contact z/OS |
Library |
PDF
Usage Notes z/OS Cryptographic Services ICSF Application Programmer's Guide SA22-7522-16 |
||||||||||||||||||||||||||||||||||
SAF may be invoked to verify the caller is authorized to use this callable service, the key label, or internal secure key tokens that are stored in the CKDS or PKDS. This is the message layout used to encode the key material exported with the new PKOAEP2 formatting method.
This table lists the access control points in the ICSF role that control the function for this service.
When the Symmetric Key Import2 - disallow weak import access control point is enabled, a key token wrapped with a weaker key will not be imported. When the Variable-length Symmetric Token - warn when weak wrap access control point is enabled, the reason code will indicate when the wrapping key is weaker than the key being imported. This table lists the required cryptographic hardware for each server type and describes restrictions for this callable service.
|
Copyright IBM Corporation 1990, 2014
|