IBM 2 Computer Hardware User Manual


 
CCA Release 2.54 Master_Key_Process
FE 1 1 FE FE 1 1 FE /ᑍ possibly semi-weak ᑍ/
E 1F 1 FE F1 E 1 FE /ᑍ possibly semi-weak ᑍ/
E 1 1F FE F1 1 E FE /ᑍ possibly semi-weak ᑍ/
FE 1F 1F FE FE E E FE /ᑍ possibly semi-weak ᑍ/
1F FE 1 E E FE 1 F1 /ᑍ possibly semi-weak ᑍ/
1 FE 1F E 1 FE E F1 /ᑍ possibly semi-weak ᑍ/
1F E 1 FE E F1 1 FE /ᑍ possibly semi-weak ᑍ/
1 E 1F FE 1 F1 E FE /ᑍ possibly semi-weak ᑍ/
1 1 E E 1 1 F1 F1 /ᑍ possibly semi-weak ᑍ/
1F 1F E E E E F1 F1 /ᑍ possibly semi-weak ᑍ/
1F 1 FE E E 1 FE F1 /ᑍ possibly semi-weak ᑍ/
1 1F FE E 1 E FE F1 /ᑍ possibly semi-weak ᑍ/
1F 1 E FE E 1 F1 FE /ᑍ possibly semi-weak ᑍ/
1 1F E FE 1 E F1 FE /ᑍ possibly semi-weak ᑍ/
1 1 FE FE 1 1 FE FE /ᑍ possibly semi-weak ᑍ/
1F 1F FE FE E E FE FE /ᑍ possibly semi-weak ᑍ/
FE FE E E FE FE F1 F1 /ᑍ possibly semi-weak ᑍ/
E FE FE E F1 FE FE F1 /ᑍ possibly semi-weak ᑍ/
FE E E FE FE F1 F1 FE /ᑍ possibly semi-weak ᑍ/
E E FE FE F1 F1 FE FE /ᑍ possibly semi-weak ᑍ/
Chapter 2. CCA Node-Management and Access-Control 2-63