Phil, No excuse lie that ...I wasn't sure dude ...so now I can experiment and find out ...love it
Scott ford www.identityforge.com from my IPAD 'Infinite wisdom through infinite means' On Apr 28, 2013, at 8:50 AM, Phil Smith <p...@voltage.com> wrote: > Scott Ford wrote: >> We use our own encryption routines ..I was wondering if I could make use of >> crypto cards, I am not familiar with them because we develop on Z/Pdt ... > > That's "zPDT". And it does full CEX emulation, I believe, so that's actually > no excuse :) > > You can call the CPACF instructions yourself. You can also call ICSF (if it's > running), and as long as the function you call doesn't *require* a CEX it > will work. > > ...phsiii > > ---------------------------------------------------------------------- > For IBM-MAIN subscribe / signoff / archive access instructions, > send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN