Previous topic |
Next topic |
Contents |
Index |
Contact z/OS |
Library |
PDF
AES master key verification pattern algorithm z/OS Cryptographic Services ICSF Administrator's Guide SA22-7521-17 |
|
The AES master key verification pattern is calculated by:
The first eight bytes of the hash is the verification pattern |
Copyright IBM Corporation 1990, 2014
|