z/OS Cryptographic Services ICSF System Programmer's Guide
Previous topic | Next topic | Contents | Index | Contact z/OS | Library | PDF


Tables

z/OS Cryptographic Services ICSF System Programmer's Guide
SA22-7520-17

  1. z/OS ICSF FMIDs
  2. FMID and Hardware
  3. Exit Identifiers and Exit Invocations
  4. Summary of new and changed ICSF callable services
  5. Coprocessor activation example
  6. Coprocessor activation example (ECC support based only on CEX3C coprocessors)
  7. IPCS Symbols and Format References for the ICSF Control Blocks
  8. DISPLAY GRS command syntax ICSF key data set ENQ resources
  9. EXPB Control Block Format for Mainline Exits
  10. CSFEXIT1 Parameters
  11. CSFEXIT2 and CSFEXIT3 Parameters
  12. CSFEXIT4 and CSFEXIT5 Parameters
  13. Format of the Exit Name Table
  14. Services and Their ICSF Names
  15. Compatibility Services and Their ICSF Names
  16. EXPB Control Block Format for Services
  17. SPB Control Block Format
  18. The CKDS Entry Retrieval Exit Parameters
  19. CVXP Control Block Format
  20. RWXP Control Block Format
  21. Parameters Received by the Security Service Exit
  22. Parameters Received by the Security Key Exit
  23. KGXP Control Block Format
  24. Format of Records in the Override File
  25. Cryptographic Key Data Set Header Record Format
  26. Cryptographic Key Data Set Record Format
  27. Cryptographic Key Data Set Header Record Format
  28. Variable-Length Cryptographic Key Data Set Record Format
  29. Public Key Data Set Header Record Format
  30. Public Key Data Set Record Format
  31. Format of the header record of the token data set
  32. Format of the common section of the token and object records
  33. Format of the unique section of the token record
  34. Format of the token object flags
  35. Format of the token certificate object
  36. Format of the token public key object (Version 0)
  37. Format of the token public key object (Version 1)
  38. Format of the token public key object (Version 2)
  39. Format of the token private key object (Version 0)
  40. Format of the token private key object (Version 1)
  41. Format of the token private key object (Version 2)
  42. Format of the token secret key object (Version 0)
  43. Format of the token secret key object (Version 1)
  44. Format of the token domain parameters object (Version 1)
  45. Format of the token domain parameters object (Version 2)
  46. Format of the token data object
  47. Internal Key Token Format
  48. Internal Key Token Format
  49. Format of External Key Tokens
  50. External RKX DES key-token format, version X'10'
  51. Format of Null Key Tokens
  52. Variable-length Symmetric Key Token
  53. HMAC Algorithm Key-usage fields
  54. AES Algorithm KEK Key-usage fields
  55. AES Algorithm Cipher Key Associated Data
  56. Variable-length Symmetric Null Token
  57. Format of PKA Null Key Tokens
  58. RSA Public Key Token
  59. RSA Private External Key Token Basic Record Format
  60. RSA Private Key Token, 1024-bit Modulus-Exponent External Format
  61. RSA Private Key Token, 4096-bit Modulus-Exponent External Format
  62. RSA Private Key Token, 4096-bit Chinese Remainder Theorem External Format
  63. RSA Private Internal Key Token Basic Record Format
  64. RSA Private Internal Key Token, 1024-bit ME Form for Cryptographic Coprocessor Feature
  65. RSA Private Internal Key Token, 1024-bit ME Form for PCICC, PCIXCC, CEX2C, or CEX3C
  66. RSA Private Internal Key Token, 4096-bit Chinese Remainder Theorem Internal Format
  67. DSS Public Key Token
  68. DSS Private External Key Token
  69. DSS Private Internal Key Token
  70. ECC Key Token Format
  71. Associated Data Format for ECC Private Key Token
  72. AESKW Wrapped Payload Format for ECC Private Key Token
  73. Trusted block header
  74. Trusted block trusted RSA public-key section (X'11')
  75. Trusted block rule section (X'12')
  76. Summary of trusted block rule subsection
  77. Transport key variant subsection (X'0001' of trusted block rule section (X'12')
  78. Transport key rule reference subsection (X'0002') of trusted block rule section (X'12')
  79. Common export key parameters subsection (X'0003') of trusted block rule section (X'12')
  80. Source key rule reference subsection (X'0004' of trusted block rule section (X'12')
  81. Export key CCA token parameters subsection (X'0005') of trusted block rule section (X'12')
  82. Trusted block key label (name) section X'13'
  83. Trusted block information section X'14'
  84. Summary of trusted block information subsections
  85. Protection information subsection (X'0001') of trusted block information section (X'14')
  86. Activation and expiration dates subsection (X'0002') of trusted block information section (X'14')
  87. Trusted block application-defined data section X'15'
  88. Cryptographic Communication Vector Table
  89. Cryptographic Communication Vector Table Extension
  90. DES Master Key Verification Pattern Block Format
  91. Generic Service Table Block Format
  92. RMF Measurements Record Format
  93. SMF type 82 server user or end user audit section
  94. Tag-Length-Value (TLV) triplet structure (SMF82AUD_TRIPLET)
  95. TLV triplet tag values

Go to the previous page Go to the next page




Copyright IBM Corporation 1990, 2014