Previous topic |
Next topic |
Contents |
Index |
Contact z/OS |
Library |
PDF
Restrictions z/OS Cryptographic Services ICSF Application Programmer's Guide SA22-7522-16 |
|
The NIST security strength requirements will be enforced, with respect to ECC Curve type (input) and derived key length. Only the following key types will be generated, skeleton key tokens of any other type will fail.
|
Copyright IBM Corporation 1990, 2014
|