Not sure if helpful, but you can see, among other things,  what ciphers are enabled for a system, 7.3 and above, using RSE API REST API  /api/v1/security/tls (part of security services which include DCM-like function via REST APIs).
It will give u a response like the following:
{
  "supportedProtocols": [
    "TLSv1.3",
    "TLSv1.2"
  ],
  "eligibleDefaultProtocols": [
    "TLSv1.3",
    "TLSv1.2"
  ],
  "defaultProtocols": [
    "TLSv1.3",
    "TLSv1.2"
  ],
  "supportedCipherSuites": [
    "AES_128_GCM_SHA256",
    "AES_256_GCM_SHA384",
    "CHACHA20_POLY1305_SHA256",
    "ECDHE_ECDSA_WITH_AES_128_GCM_SHA256",
    "ECDHE_ECDSA_WITH_AES_256_GCM_SHA384",
    "ECDHE_RSA_WITH_AES_128_GCM_SHA256",
    "ECDHE_RSA_WITH_AES_256_GCM_SHA384",
    "ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256",
    "ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"
  ],
  "eligibleDefaultCipherSuites": [
    "AES_128_GCM_SHA256",
    "AES_256_GCM_SHA384",
    "CHACHA20_POLY1305_SHA256",
    "ECDHE_ECDSA_WITH_AES_128_GCM_SHA256",
    "ECDHE_ECDSA_WITH_AES_256_GCM_SHA384",
    "ECDHE_RSA_WITH_AES_128_GCM_SHA256",
    "ECDHE_RSA_WITH_AES_256_GCM_SHA384",
    "ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256",
    "ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"
  ],
  "defaultCipherSuites": [
    "AES_128_GCM_SHA256",
    "AES_256_GCM_SHA384",
    "CHACHA20_POLY1305_SHA256",
    "ECDHE_ECDSA_WITH_AES_128_GCM_SHA256",
    "ECDHE_ECDSA_WITH_AES_256_GCM_SHA384",
    "ECDHE_RSA_WITH_AES_128_GCM_SHA256",
    "ECDHE_RSA_WITH_AES_256_GCM_SHA384",
    "ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256",
    "ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"
  ],
  "supportedSignatureAlgorithms": [
    "ECDSA_SHA512",
    "ECDSA_SHA384",
    "ECDSA_SHA256",
    "RSA_PSS_SHA512",
    "RSA_PSS_SHA384",
    "RSA_PSS_SHA256",
    "RSA_SHA512",
    "RSA_SHA384",
    "RSA_SHA256"
  ],
  "defaultSignatureAlgorithms": [
    "ECDSA_SHA512",
    "ECDSA_SHA384",
    "ECDSA_SHA256",
    "RSA_PSS_SHA512",
    "RSA_PSS_SHA384",
    "RSA_PSS_SHA256",
    "RSA_SHA512",
    "RSA_SHA384",
    "RSA_SHA256"
  ],
  "supportedSignatureAlgorithmCertificates": [
    "ECDSA_SHA512",
    "ECDSA_SHA384",
    "ECDSA_SHA256",
    "ECDSA_SHA224",
    "ECDSA_SHA1",
    "RSA_PSS_SHA512",
    "RSA_PSS_SHA384",
    "RSA_PSS_SHA256",
    "RSA_SHA512",
    "RSA_SHA384",
    "RSA_SHA256",
    "RSA_SHA224",
    "RSA_SHA1",
    "RSA_MD5"
  ],
  "defaultSignatureAlgorithmCertificates": [
    "ECDSA_SHA512",
    "ECDSA_SHA384",
    "ECDSA_SHA256",
    "RSA_PSS_SHA512",
    "RSA_PSS_SHA384",
    "RSA_PSS_SHA256",
    "RSA_SHA512",
    "RSA_SHA384",
    "RSA_SHA256"
  ],
  "supportedNamedCurves": [
    "x25519",
    "x448",
    "Secp256r1",
    "Secp384r1",
    "Secp521r1"
  ],
  "defaultNamedCurves": [
    "Secp256r1",
    "Secp384r1",
    "x25519",
    "Secp521r1",
    "x448"
  ],
  "defaultMinimumRSAKeySize": 0,
  "handshakeConnectionCounts": false,
  "secureSessionCaching": true,
  "auditSecureTelnetHandshakes": false
}
More information may be found at:
https://www.ibm.com/support/pages/node/7144245
From: MIDRANGE-L <midrange-l-bounces@xxxxxxxxxxxxxxxxxx> on behalf of Rob Berendt <robertowenberendt@xxxxxxxxx>
Date: Wednesday, March 20, 2024 at 12:32 PM
To: Midrange Systems Technical Discussion <midrange-l@xxxxxxxxxxxxxxxxxx>
Subject: [EXTERNAL] Re: *NETSECURE & cipher names
I suggest you submit an idea that IBM remedy this
https://ibm-power-systems.ideas.ibm.com/ideas
On Wed, Mar 20, 2024 at 12:53 PM Justin Taylor <jtaylor.0ab@xxxxxxxxx>
wrote:
I'm trying to identify clients with old ciphers that need to be updated.
The audit journal gives me the cipher suites they're using, but the names
given don't match the docs (
https://www.ibm.com/docs/en/i/7.5?topic=srsv-transport-layer-security-tls-cipher-specification-list-qsslcsl
).
For example the journal gives:
TLS_RSA_WITH_AES_128_CBC_SHA256 RSA_SHA256
Is there a cross-reference, or some why to translate one to the other?
TIA
As an Amazon Associate we earn from qualifying purchases.