On 4/9/2014 9:42 AM, Jeff Young wrote:
What encryption / decryption methods are available on the i to dohttp://pic.dhe.ibm.com/infocenter/iseries/v6r1m0/topic/apis/catcrypt.htm is a good place to start.
this? At this time, the client has not chosen an encryption method
and they want to ensure that the decryption process is available for