Phil,

No excuse lie that ...I wasn't sure dude ...so now I can experiment and find 
out ...love it

Scott ford
www.identityforge.com
from my IPAD

'Infinite wisdom through infinite means'


On Apr 28, 2013, at 8:50 AM, Phil Smith <p...@voltage.com> wrote:

> Scott Ford wrote:
>> We use our own encryption routines ..I was wondering if I could make use of 
>> crypto cards, I am not familiar with them because we develop on Z/Pdt ...
> 
> That's "zPDT". And it does full CEX emulation, I believe, so that's actually 
> no excuse :)
> 
> You can call the CPACF instructions yourself. You can also call ICSF (if it's 
> running), and as long as the function you call doesn't *require* a CEX it 
> will work.
> 
> ...phsiii
> 
> ----------------------------------------------------------------------
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Reply via email to