After you set up your Cryptographic Coprocessor, you can begin
writing programs to make use of your Cryptographic Coprocessor's cryptographic
functions.
This section is mainly for i5/OS™ application use of the Cryptographic
Coprocessor.
Note: Many of the pages in this section include one or more program examples.
Change these programs to suit your specific needs. Some require that you change
only one or two parameters while others require more extensive changes. For
security reasons, IBM® recommends that you individualize these program examples
rather than using the default values provided.