Manage the Cryptographic Coprocessor

After you set up your Cryptographic Coprocessor, you can begin writing programs to make use of your Cryptographic Coprocessor's cryptographic functions.

This section is mainly for i5/OS™ application use of the Cryptographic Coprocessor.

Note: Many of the pages in this section include one or more program examples. Change these programs to suit your specific needs. Some require that you change only one or two parameters while others require more extensive changes. For security reasons, IBM® recommends that you individualize these program examples rather than using the default values provided.