Utilities

You can use a utility to verify an installation. An additional utility is available to administer cryptographic coprocessors in setups without a TKE workstation.

These two utilities are called ivp.e and panel.exe.

ivp.e
This is an easy-to-use utility used to verify an installation.

It calls the Cryptographic Facility Query verb for all available adapters to report the firmware and configuration details.

This utility is installed by default to the following path in the Linux® system:

/opt/IBM/CCA/bin/ivp.e

You can invoke this utility without any arguments. It presents information for all available CEX*C features on the system.

panel.exe
This utility provides a Linux native mechanism for administering and initializing certain characteristics of active cryptographic coprocessors. It is intended as a basic administration tool for Linux-only IBM Z® configurations, where a Trusted Key Entry (TKE) solution is not available. Note that panel.exe only covers some basic functions, but not the complete scope of a TKE workstation.

The panel.exe utility is installed by the Linux on IBM® Z cryptographic coprocessor install package (RPM or DEB) to this path in the Linux system:

/opt/IBM/CCA/bin/panel.exe

For mixed z/OS® and Linux configurations, it is recommended that administration be accomplished using the z/OS TSO panels as described in the z/OS Cryptographic Services ICSF Administrator's Guide.

Important: As of CCA 6.0, the panel.exe interface has changed to offer a new default interface. The former interface is still available if the environment variable CSU_LEGACY_PANEL is set as follows:
export CSU_LEGACY_PANEL=TRUE

Go back to the new panel.exe interface:

unset CSU_LEGACY_PANEL

Be aware that CEX6C and newer functionality of panel.exe is only available from the default interface.

There is more detailed information in The panel.exe utility.