On 4/9/2014 9:42 AM, Jeff Young wrote:
What encryption / decryption methods are available on the i to dohttp://pic.dhe.ibm.com/infocenter/iseries/v6r1m0/topic/apis/catcrypt.htm is a good place to start.
this? At this time, the client has not chosen an encryption method
and they want to ensure that the decryption process is available for
This mailing list archive is Copyright 1997-2015 by MIDRANGE dot COM and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available here. If you have questions about this, please contact