APIs by Example: More New Cryptographic Services APIs and Exit Points at Release 6.1

This APIs by Example continues the coverage begun in the preceding installment of this column (see “New Cryptographic Services APIs and Exit Points at Release 6.1,” June 24, 2010, article ID 65255 at SystemiNetwork.com). That coverage is of the new Cryptographic Services APIs and exit points introduced by IBM with release 6.1. For today’s issue, […]

Writing RPG Applications Using Cryptographic Services APIs

The need to protect sensitive and private data using cryptographic methods is becoming increasingly important to many organizations. The drivers behind this development are legislation, regulations, standards as well as current types of applications requiring such measures and efforts. Fortunately, the System i operating system includes a versatile, comprehensive and advanced cryptographic API tool set, […]

APIs by Example: Crypto Key Management — Creating Data Key Stores and More

With release V5R4, IBM added significant and comprehensive support of cryptographic key management to the Cryptographic Services APIs. This support included the introduction of key stores and new key management facilities as well as the integration of these valuable additions to the existing collection of cryptographic functions. These new offerings all in all provide the […]

APIs by Example: Cryptographic Key Management – Creating, Displaying, and Deleting Key Records

This column has so far demonstrated a number of cryptographic key management utilities based on equivalent Cryptographic Services Key Management APIs. Armed with these tools, you can now establish and manage a cryptographic master key table, as well as create and maintain key store files whose content is protected by the master keys. Links to […]

APIs by Example: Cryptographic Key Management – Testing and Clearing Master Keys

In a previous newsletter, I introduced a new suite of master key management APIs called the Cryptographic Services APIs and explained the Load Master Key Part (LODMSTKP) and Set Master Key (SETMSTK) commands, which provide interfaces to their identical API counterparts. This time around, I complete my introduction to master key management APIs with a […]