Previous topic |
Next topic |
Contents |
Index |
Contact z/OS |
Library |
PDF
Authorization z/OS Cryptographic Services ICSF Application Programmer's Guide SA22-7522-16 |
|
There are two key objects used by this service, the source key (the key to be wrapped) and the wrapping key.
|
Copyright IBM Corporation 1990, 2014
|