Cryptographic usage
An Independent Software Vendor (ISV) IBM Z Program Development Tool (IBM zPDT) (ISV zPDT) system can emulate multiple cryptographic adapters as CEX8S devices.1 Each CEX8S emulated adapter runs as separate Linux processes. If sufficient base processor cores are available so that these threads can be dispatched in parallel by Linux, the emulated adapters can run asynchronously with the ISV zPDT CPs.
Do not confuse a cryptographic adapter (often known as a co-processor) with the cryptographic instructions that are always available ...

Get ISV IBM zPDT Guide and Reference now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.