IBM 2 Computer Hardware User Manual


 
CCA Release 2.54
Figure F-1 (Page 2 of 3). Security API Verbs in Supported Environments
Pseudonym Entry-Point OS/2 AIX NT OS/400 Page
Data Confidentiality and Data Integrity Verbs
Decipher CSNBDEC 6-5
Digital_Signature_Generate CSNDDSG 4-4
Digital_Signature_Verify CSNDDSV 4-7
Encipher CSNBENC 6-8
MAC_Generate CSNBMGN 6-11
MAC_Verify CSNBMVR 6-14
MDC_Generate CSNBMDG 4-10
One_Way_Hash CSNBOWH 4-13
Coprocessor Control Verbs
Access_Control_Initialization CSUAACI 2-21
Access_Control_Maintenance CSUAACM 2-24
Cryptographic_Facility_Control CSUACFC 2-30
Cryptographic_Facility_Query CSUACFQ 2-34
Cryptographic_Resource_Allocate CSUACRA 2-44
Cryptographic_Resource_Deallocate CSUACRD 2-46
Key_Storage_Designate CSUAKSD 2-48
Logon_Control CSUALCT 2-52
Master_Key_Distribution CSUAMKD 2-55
Master_Key_Process CSNBMKP 2-59
RSA Key Administration and Key Storage Verbs
Key_Storage_Initialization CSNBKSI 2-50
PKA_Key_Generate CSNDPKG 3-7
PKA_Key_Import CSNDPKI 3-11
PKA_Key_Token_Build CSNDPKB 3-14
PKA_Key_Token_Change CSNDKTC 3-22
PKA_Key_Record_Create CSNDKRC 7-11
PKA_Key_Record_Delete CSNDKRD 7-13
PKA_Key_Record_List CSNDKRL 7-15
PKA_Key_Record_Read CSNDKRR 7-17
PKA_Key_Record_Write CSNDKRW 7-19
PKA_Public_Key_Extract CSNDPKX 3-24
PKA_Public_Key_Hash_Register CSNDPKH 3-26
PKA_Public_Key_Register CSNDPKR 3-28
Retained_Key_Delete CSNDRKD 7-21
Retained_Key_List CSNDRKL 7-22
F-2 IBM 4758 CCA Basic Services, Release 2.54, February 2005