Using keys with CPACF, clear key or no key

Follow the steps in this procedure to use keys with CPACF, clear key or no key.

Procedure

  1. An eligible CCA verb call (see lists in Access control points that affect CPACF protected key operations) comes into the CCA library.
  2. No CEX*C is necessary, so no check for availability or Cryptographic Resource Allocate (CSUACRA) call will be implied.
  3. The CCA library prepares an appropriate CPACF clear key (key-c) structure using the clear key passed to the CCA verb (key-v).
  4. The CCA library directs the operation to the CPACF using the key-c.