Previous topic |
Next topic |
Contents |
Index |
Contact z/OS |
Library |
PDF
Authorization z/OS Cryptographic Services ICSF Application Programmer's Guide SA22-7522-16 |
|
There are two keys involved in this service: the unwrapping key and the target key (the new key created from the wrapped key).
|
Copyright IBM Corporation 1990, 2014
|