IBM 2 manuals 
Computer Equipment > Computer Hardware 
When we buy new device such as IBM 2 we often through away most of the documentation but the warranty.
Very often issues with IBM 2 begin only after the warranty period ends and you may want to find how to repair it or just do some service work.
Even oftener it is hard to remember what does each function in Computer Hardware IBM 2 is responsible for and what options to choose for expected result.
Fortunately you can find all manuals for Computer Hardware on our side using links below.
508 pages 1.15 Mb 
 
   3  Contents 9  Figures 13  Notices 15 About This Publication Revision History Revision History CCA Release 2.54 16 Eleventh Edition, April, 2004, CCA Support Program, Release 2.52Tenth Edition, February 2004, CCA Support Program, Release 2.51 17 Ninth Edition, Revised September, 2003, CCA Support Program, Release 2.41Ninth Edition, Revised August 2002, CCA Support Program, Release 2.41 Revision History CCA Release 2.54  18 Eighth Edition, Revised, CCA Support Program, Release 2.41Eighth Edition, CCA Support Program, Release 2.41 19 Seventh Edition, CCA Support Program, Release 2.40 Revision History CCA Release 2.54 20 Sixth Edition, CCA Support Program, Release 2.30/2.3121 Fifth Edition, CCA Support Program, Release 2.30 22  Organization23  Related Publications  Cryptography Publications 25 Chapter 1. Introduction to Programming for the IBM CCA39 Chapter 2. CCA Node-Management and Access-Control105  Chapter 3. RSA Key-Management 135 Chapter 4. Hashing and Digital Signatures  Hashing 136  Digital Signatures137      Digital_Signature_Generate    138  Digital_Signature_Generate (CSNDDSG)  Restrictions  Format  Parameters 141  Digital_Signature_Verify (CSNDDSV)  Restrictions  Format  Parameters 144  MDC_Generate (CSNBMDG)  Restrictions 147  One_Way_Hash (CSNBOWH)  Restrictions  Format 151  Chapter 5. DES Key-Management 243 Chapter 6. Data Confidentiality and Data IntegrityEncryption and Message Authentication Codes Ensuring Data Confidentiality 245 Ensuring Data Integrity247  Decipher (CSNBDEC)  Restrictions  Format  Parameters 250  Encipher (CSNBENC)  Restrictions  Format  Parameters 253  MAC_Generate (CSNBMGN)  Restrictions 256  MAC_Verify (CSNBMVR)  Restrictions 259  Chapter 7. Key-Storage Verbs 283 Chapter 8. Financial Services Support Verbs361 Appendix A. Return Codes and Reason Codes373  Appendix B. Data Structures  Key Tokens Master Key Verification Pattern 374 Token-Validation Value and Record-Validation Value Null Key-Token 375  DES Key-Tokens377 External DES Key-TokenFigure B-4. External DES Key-Token Format, Version X'00' Figure B-5. External DES Key-Token Format, Version X'01'    378 RSA PKA Key-TokensB-6     379 RSA Key-Token Sections380 PKA Key-Token IntegrityNumber Representation in PKA Key-Tokens381   Figure B-8. RSA Key-Token Header 382   Figure B-9. RSA Private Key, 1024-Bit Modulus-Exponent Format B-10  383   Figure B-10 (Page 1 of 2). Private Key, 2048-BitChinese-Remainder Format 384   Figure B-10 (Page 2 of 2). Private Key, 2048-BitChinese-Remainder Format B-12  385   Figure B-11. RSA Private Key, 1024-Bit Modulus-Exponent Format with OPK 386   Figure B-12 (Page 1 of 2). RSA Private Key,Chinese-Remainder Format withOPK B-14  387   Figure B-12 (Page 2 of 2). RSA Private Key,Chinese-Remainder Format withOPK 388   Figure B-13. RSA Public Key B-16 Figure B-14. RSA Private-Key Name  390   Figure B-17. RSA Public-Key Certificate(s) Optional Information Subsection Header B-18 Figure B-18. RSA Public-Key Certificate(s) User Data TLV Figure B-19. RSA Public-Key Certificate(s) Environment Identifier (EID) TLV Figure B-20. RSA Public-Key Certificate(s) Serial Number TLV  391   Figure B-21. RSA Public-Key Certificate(s) Signature Subsection  392  B-20 RSA Private-Key Blinding Information:  Figure B-22. RSA Private-Key Blinding Information   Chaining-Vector RecordsFigure B-23. Cipher, MAC_Generate, and MAC_Verify Chaining-Vector Format     393  Key-Storage Records394   Figure B-24. Key-Storage-File Header, Record 1 (not OS/400) B-22  395   Figure B-25. Key-Storage File Header, Record 2 (not OS/400) Figure B-26. Key-Record Format in Key Storage (not OS/400) 396   Figure B-27. DES Key-Record Format, OS/400 Key Storage B-24 Figure B-28. PKA Key-Record Format, OS/400 Key Storage      397 Key_Record_List Data Set398   Figure B-29 (Page 2 of 2). Key-Record-List Data SetFormat (Other ThanOS/400) B-26  399   Figure B-30 (Page 1 of 2). Key-Record-List Data SetFormat (OS/400 only)   Figure B-30 (Page 2 of 2). Key-Record-List Data SetFormat (OS/400 only)  B-28  400 Access-Control Data Structures401  Role Structure404  Profile StructureB-32 This section describes the data structures related to user profiles.  Basic Structure of a Profile 405 Aggregate Profile StructureAuthentication Data Structure 408 Examples of the Data Structures413 Master Key Shares Data FormatsFigure B-46. Cloning Information Token Data Structure Figure B-47. Master Key Share TLV Figure B-48. Cloning Information Signature TLV    414 Function Control VectorB-42  415   Figure B-49 (Page 2 of 2). FCV Distribution Structure  417 Appendix C. CCA Control-Vector Definitions and Key Encryption441 Appendix D. Algorithms and Processes461 Appendix E. Financial System Verbs Calculation Methods and Data Formats481  Appendix F. Verb ListFigure F-1 (Page 1 of 3). Security API Verbsin Supported Environments 482   Figure F-1 (Page 2 of 3). Security API Verbsin Supported Environments F-2  483   Figure F-1 (Page 3 of 3). Security API Verbsin Supported Environments  485  Appendix G. Access-Control-Point Codes486   G-2 Figure G-1 (Page 1 of 4). Supported CCA Commands  487        Appendix G. Access-Control-Point Codes G-3 Figure G-1 (Page 2 of 4). Supported CCA Commands 488   G-4 Figure G-1 (Page 3 of 4). Supported CCA Commands  489        Appendix G. Access-Control-Point Codes G-5 Figure G-1 (Page 4 of 4). Supported CCA Commands  491 List of Abbreviations493  Glossary A 494 BC D 495 EF G 496 HI J K L M 497 NO P R 498 ST 499 UV W Numerics 501  Index A B C 502 D503 EF H 504 IK 505 L506 MN O P R 507 ST U V X  
 
 
72 pages 1.4 Mb 
 
 
Also you can find more IBM manuals or manuals for other Computer Equipment.