Cryptographic usage
A zPDT system can emulate multiple cryptographic adapters as CEX5S devices.1 Each CEX5S emulated adapter runs as separate Linux processes. If sufficient base processor cores are available to permit these threads to be dispatched in parallel by Linux, the emulated adapters can run asynchronously with the zPDT CPs.
Do not confuse a cryptographic adapter with the cryptographic instructions that are always available with a zPDT system. These are the KM, KMC, KIMD, KLMD, KMAC, and associated instructions (known as the CPACF instructions) ...

Get IBM zPDT Guide and Reference now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.