O'Reilly logo

IBM zPDT Guide and Reference: System z Personal Development Tool by Bill Ogden

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Cryptographic usage
A zPDT system can emulate several cryptographic adapters as CEX5S devices.1 Each CEX5S emulated adapter runs as separate Linux processes. If sufficient base processors are available to permit these threads to be dispatched in parallel by Linux, the emulated adapters can run asynchronously with the zPDT CPs. CEX5S includes these items:
DES (56, 112, 168 bits), with encryption, decryption, MAC, and key management.
PIN processing (for credit cards).
AES (128, 192, and 256 bits), with encryption, decryption, and key management. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required