z/OS Cryptographic Services ICSF Application Programmer's Guide
Previous topic | Next topic | Contents | Index | Contact z/OS | Library | PDF


Usage Notes

z/OS Cryptographic Services ICSF Application Programmer's Guide
SA22-7522-16

This table lists the access control points in the ICSF role that control the function for this service.

Table 144. HMAC Generate Access Control Points
Hash methodAccess control point
SHA-1HMAC Generate - SHA-1
SHA-224HMAC Generate - SHA-224
SHA-256HMAC Generate - SHA-256
SHA-384HMAC Generate - SHA-384
SHA-512HMAC Generate - SHA-512

This table lists the required cryptographic hardware for each server type and describes restrictions for this callable service.

Table 145. HMAC generate required hardware
ServerRequired cryptographic hardwareRestrictions
IBM eServer zSeries 900This service is not supported.
IBM eServer zSeries 990

IBM eServer zSeries 890

This service is not supported.
IBM System z9 EC

IBM System z9 BC

This service is not supported.
IBM System z10 EC

IBM System z10 BC

Crypto Express2 CoprocessorThis service is not supported.
Crypto Express3 CoprocessorHMAC keys not supported.
z196Crypto Express3 Coprocessor

HMAC key support requires the Nov. 2010 or later licensed internal code (LIC).

Go to the previous page Go to the next page




Copyright IBM Corporation 1990, 2014