IBM 2 manuals
Computer Equipment > Computer Hardware
When we buy new device such as IBM 2 we often through away most of the documentation but the warranty.
Very often issues with IBM 2 begin only after the warranty period ends and you may want to find how to repair it or just do some service work.
Even oftener it is hard to remember what does each function in Computer Hardware IBM 2 is responsible for and what options to choose for expected result.
Fortunately you can find all manuals for Computer Hardware on our side using links below.
508 pages 1.15 Mb
3 Contents 9 Figures 13 Notices 15 About This Publication Revision History Revision History CCA Release 2.54 16 Eleventh Edition, April, 2004, CCA Support Program, Release 2.52Tenth Edition, February 2004, CCA Support Program, Release 2.51 17 Ninth Edition, Revised September, 2003, CCA Support Program, Release 2.41Ninth Edition, Revised August 2002, CCA Support Program, Release 2.41 Revision History CCA Release 2.54 18 Eighth Edition, Revised, CCA Support Program, Release 2.41Eighth Edition, CCA Support Program, Release 2.41 19 Seventh Edition, CCA Support Program, Release 2.40 Revision History CCA Release 2.54 20 Sixth Edition, CCA Support Program, Release 2.30/2.3121 Fifth Edition, CCA Support Program, Release 2.30 22 Organization23 Related Publications Cryptography Publications 25 Chapter 1. Introduction to Programming for the IBM CCA39 Chapter 2. CCA Node-Management and Access-Control105 Chapter 3. RSA Key-Management 135 Chapter 4. Hashing and Digital Signatures Hashing 136 Digital Signatures137 Digital_Signature_Generate 138 Digital_Signature_Generate (CSNDDSG) Restrictions Format Parameters 141 Digital_Signature_Verify (CSNDDSV) Restrictions Format Parameters 144 MDC_Generate (CSNBMDG) Restrictions 147 One_Way_Hash (CSNBOWH) Restrictions Format 151 Chapter 5. DES Key-Management 243 Chapter 6. Data Confidentiality and Data IntegrityEncryption and Message Authentication Codes Ensuring Data Confidentiality 245 Ensuring Data Integrity247 Decipher (CSNBDEC) Restrictions Format Parameters 250 Encipher (CSNBENC) Restrictions Format Parameters 253 MAC_Generate (CSNBMGN) Restrictions 256 MAC_Verify (CSNBMVR) Restrictions 259 Chapter 7. Key-Storage Verbs 283 Chapter 8. Financial Services Support Verbs361 Appendix A. Return Codes and Reason Codes373 Appendix B. Data Structures Key Tokens Master Key Verification Pattern 374 Token-Validation Value and Record-Validation Value Null Key-Token 375 DES Key-Tokens377 External DES Key-TokenFigure B-4. External DES Key-Token Format, Version X'00' Figure B-5. External DES Key-Token Format, Version X'01' 378 RSA PKA Key-TokensB-6 379 RSA Key-Token Sections380 PKA Key-Token IntegrityNumber Representation in PKA Key-Tokens381 Figure B-8. RSA Key-Token Header 382 Figure B-9. RSA Private Key, 1024-Bit Modulus-Exponent Format B-10 383 Figure B-10 (Page 1 of 2). Private Key, 2048-BitChinese-Remainder Format 384 Figure B-10 (Page 2 of 2). Private Key, 2048-BitChinese-Remainder Format B-12 385 Figure B-11. RSA Private Key, 1024-Bit Modulus-Exponent Format with OPK 386 Figure B-12 (Page 1 of 2). RSA Private Key,Chinese-Remainder Format withOPK B-14 387 Figure B-12 (Page 2 of 2). RSA Private Key,Chinese-Remainder Format withOPK 388 Figure B-13. RSA Public Key B-16 Figure B-14. RSA Private-Key Name 390 Figure B-17. RSA Public-Key Certificate(s) Optional Information Subsection Header B-18 Figure B-18. RSA Public-Key Certificate(s) User Data TLV Figure B-19. RSA Public-Key Certificate(s) Environment Identifier (EID) TLV Figure B-20. RSA Public-Key Certificate(s) Serial Number TLV 391 Figure B-21. RSA Public-Key Certificate(s) Signature Subsection 392 B-20 RSA Private-Key Blinding Information: Figure B-22. RSA Private-Key Blinding Information Chaining-Vector RecordsFigure B-23. Cipher, MAC_Generate, and MAC_Verify Chaining-Vector Format 393 Key-Storage Records394 Figure B-24. Key-Storage-File Header, Record 1 (not OS/400) B-22 395 Figure B-25. Key-Storage File Header, Record 2 (not OS/400) Figure B-26. Key-Record Format in Key Storage (not OS/400) 396 Figure B-27. DES Key-Record Format, OS/400 Key Storage B-24 Figure B-28. PKA Key-Record Format, OS/400 Key Storage 397 Key_Record_List Data Set398 Figure B-29 (Page 2 of 2). Key-Record-List Data SetFormat (Other ThanOS/400) B-26 399 Figure B-30 (Page 1 of 2). Key-Record-List Data SetFormat (OS/400 only) Figure B-30 (Page 2 of 2). Key-Record-List Data SetFormat (OS/400 only) B-28 400 Access-Control Data Structures401 Role Structure404 Profile StructureB-32 This section describes the data structures related to user profiles. Basic Structure of a Profile 405 Aggregate Profile StructureAuthentication Data Structure 408 Examples of the Data Structures413 Master Key Shares Data FormatsFigure B-46. Cloning Information Token Data Structure Figure B-47. Master Key Share TLV Figure B-48. Cloning Information Signature TLV 414 Function Control VectorB-42 415 Figure B-49 (Page 2 of 2). FCV Distribution Structure 417 Appendix C. CCA Control-Vector Definitions and Key Encryption441 Appendix D. Algorithms and Processes461 Appendix E. Financial System Verbs Calculation Methods and Data Formats481 Appendix F. Verb ListFigure F-1 (Page 1 of 3). Security API Verbsin Supported Environments 482 Figure F-1 (Page 2 of 3). Security API Verbsin Supported Environments F-2 483 Figure F-1 (Page 3 of 3). Security API Verbsin Supported Environments 485 Appendix G. Access-Control-Point Codes486 G-2 Figure G-1 (Page 1 of 4). Supported CCA Commands 487 Appendix G. Access-Control-Point Codes G-3 Figure G-1 (Page 2 of 4). Supported CCA Commands 488 G-4 Figure G-1 (Page 3 of 4). Supported CCA Commands 489 Appendix G. Access-Control-Point Codes G-5 Figure G-1 (Page 4 of 4). Supported CCA Commands 491 List of Abbreviations493 Glossary A 494 BC D 495 EF G 496 HI J K L M 497 NO P R 498 ST 499 UV W Numerics 501 Index A B C 502 D503 EF H 504 IK 505 L506 MN O P R 507 ST U V X
72 pages 1.4 Mb
Also you can find more IBM manuals or manuals for other Computer Equipment.