Installing the Support Program

Procedure to install the IBM Common Cryptographic Architecture (CCA) Support Program on the coprocessor host computer.

The IBM® Common Cryptographic Architecture (CCA) Support Program consists of several components, including:
  • Device drivers and an operating system for the PCIe cryptographic coprocessor hardware
  • Support for the IBM Common Cryptographic Architecture (CCA) application program interface (API)
  • A function-control vector (FCV)
    Note: An FCV is a signed value provided by IBM. It enables the CCA application within the coprocessor to yield a level of cryptographic service consistent with applicable cryptographic implementation import and export regulations.
  • Utility applications where the coprocessor must be installed that runs on the host machine
To install and configure the IBM Common Cryptographic Architecture (CCA) Support Program, complete these steps:
  1. Choose the platform support packages that are appropriate to your setup:
    AIX® 6.1 or later.
    See Obtaining coprocessor hardware and software for details.
  2. Place an order for the hardware with IBM or your IBM Business Partner. See Obtaining coprocessor hardware and software describes how to order and receive the coprocessor hardware from IBM.
  3. Download the Support Program for your operating system. See Obtaining coprocessor hardware and software describes how to install the embedded operating system, and the CCA application program into the PCIe Cryptographic Coprocessor.
  4. Install the Support Program onto the coprocessor host computer.
  5. Install the coprocessor hardware. See Obtaining coprocessor hardware and software for details.
  6. Load the coprocessor software. See Loading and Unloading software into the coprocessor for details.
  7. Set up a CCA test node. You can establish a CCA cryptographic node by using the utilities provided with the Support Program, or link your application programs to the CCA API. Also verify the access control and other setup requirements imposed by the application software you plan to use with the IBM 4765. The CCA Node Management (CNM) utility, described in Managing the cryptographic node by using the CNM and CNI utilities, includes setup and management functions needed to:
    • Load the FCV
    • Create and edit the access control data
    • Manage the coprocessor master key
    • Manage primary key encrypting keys (KEKs)
    • Manage the storage of data keys
    • Create lists (scripts) for the CCA Node Initialization (CNI) utility
  8. Run test programs that utilize the CCA libraries. See Building applications to use with the CCA API for details.