On Mon, 3 Dec 2007 15:31:47 -0600, Paul Gilmartin
<[EMAIL PROTECTED]> wrote:
>On Mon, 3 Dec 2007 14:53:10 -0600, Ernest Nachtigall wrote:
>
>>Yes, I am now back monitoring
>>
>Thanks. Naturally I can hardly help wondering whether
>you (re)appeared so sudden
On Mon, 3 Dec 2007 12:58:53 -0600, Patrick O'Keefe
<[EMAIL PROTECTED]> wrote:
>Is there any doc comparing performance of crypto functions using
>the encryption hardware vs the same functions using software?
>
>I've seen a paper showing the performance of both CPACF and CEX2
>based on block sizes
On Mon, 3 Dec 2007 16:19:28 -0500, Farley, Peter x23353
<[EMAIL PROTECTED]> wrote:
>> -Original Message-----
>> From: Ernest Nachtigall [mailto:[EMAIL PROTECTED]
>> Sent: Monday, December 03, 2007 3:56 PM
>> To: IBM-MAIN@BAMA.UA.EDU
>> Subject: Re: Is CPA
CPACF is only accessible via ASM programs. The samples in the ICSF manual,
using API's that start with CSNB or CSF all require the CEX2.
--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROT
Yes, I am now back monitoring
Ernest
--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm
Because cryptography is export controlled, CPACF activation (Feature 3863)
was the way to verify that the CPU owner is allowed to use crypto based on
that control. CPACF activation provides the "authority" if you will, to then
also
add CEX2's.
-
Take a look at
http://www-03.ibm.com/support/techdocs/atsmastr.nsf/WebIndex/TD101250
--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search th
7 matches
Mail list logo