Previous topic |
Next topic |
Contents |
Index |
Contact z/OS |
Library |
PDF
Using the BSAFE KI_TOKEN z/OS Cryptographic Services ICSF Application Programmer's Guide SA22-7522-16 |
|
Those ICSF functions that require a key, like encipher and decipher, expect the key in the form of a CCA token. If you already have a CCA token, perform the following steps before you try to set your algorithm object. For information about how to perform the following tasks, see BSAFE User’s Manual and BSAFE Library Reference Manual.
If you don't already have a CCA token, you can supply a clear key to the function using one of the key information types mentioned in the section discussing the function you are using. BSAFE will convert the key to a CCA token. If you supply a clear BSAFE KI type to one of the ICSF functions, and the function is performed successfully, you can retrieve the key as a CCA token by invoking B_GetKeyInfo with KI_TOKEN as the key information type. A KEY_TOKEN_INFO struct is returned. |
Copyright IBM Corporation 1990, 2014
|