z/OS Cryptographic Services ICSF Application Programmer's Guide
Previous topic | Next topic | Contents | Index | Contact z/OS | Library | PDF


Parameters

z/OS Cryptographic Services ICSF Application Programmer's Guide
SA22-7522-16

return_code
Direction: OutputType: Integer

The return code specifies the general result of the callable service. Appendix A. ICSF and TSS Return and Reason Codes lists the return codes.

reason_code
Direction: OutputType: Integer

The reason code specifies the result of the callable service that is returned to the application program. Each return code has different reason codes that indicate specific processing problems. Appendix A. ICSF and TSS Return and Reason Codes lists the reason codes.

exit_data_length
Direction: Input/OutputType: Integer

The length of the data that is passed to the installation exit. The length can be from X'00000000' to X'7FFFFFFF' (2 gigabytes). The data is identified in the exit_data parameter.

exit_data
Direction: Input/OutputType: String

The data that is passed to the installation exit.

rule_array_count
Direction: InputType: Integer

The number of keywords you supplied in the rule_array parameter. The value may be 2 or 3.

rule_array
Direction: InputType: String

Keywords that provide control information to the callable service. The following table lists the keywords. Each keyword is left-justified in 8-byte fields and padded on the right with blanks. All keywords must be in contiguous storage.

Table 143. Keywords for HMAC Generate Control Information
KeywordMeaning
Token algorithm (One required)
HMACSpecifies the HMAC algorithm to be used to generate the MAC.
Hash method (One required)
SHA-1Specifies the FIPS-198 HMAC procedure using the SHA-1 hash method, a symmetric key and text to produce a 20-byte (160-bit) MAC.
SHA-224Specifies the FIPS-198 HMAC procedure using the SHA-224 hash method, a symmetric key and text to produce a 28-byte (224-bit) MAC.
SHA-256Specifies the FIPS-198 HMAC procedure using the SHA-256 hash method, a symmetric key and text to produce a 32-byte (256-bit) MAC.
SHA-384Specifies the FIPS-198 HMAC procedure using the SHA-384 hash method, a symmetric key and text to produce a 48-byte (384-bit) MAC.
SHA-512Specifies the FIPS-198 HMAC procedure using the SHA-512 hash method, a symmetric key and text to produce a 64-byte (512-bit) MAC.
Segmenting Control (One optional)
FIRSTFirst call, this is the first segment of data from the application program.
LASTLast call; this is the last data segment.
MIDDLEMiddle call; this is an intermediate data segment.
ONLYOnly call; segmenting is not employed by the application program. This is the default value.
key_identifier_length
Direction: InputType: Integer

The length of the key_identifier parameter. The maximum value is 725.

key_identifier
Direction: Input/OutputType: String

The 64-byte label or internal token of an encrypted HMAC key.

text_length
Direction: InputType: Integer

The length of the text you supply in the text parameter. The maximum length of text is 214783647 bytes. For FIRST and MIDDLE calls, the text_length must be a multiple of 64 for SHA-1, SHA-224 and SHA-256 and a multiple of 128 for SHA-384 and SHA-512 hash methods.

text
Direction: InputType: String

The application-supplied text for which the MAC is generated.

chaining_vector_length
Direction: Input/OutputType: Integer

The length of the chaining_vector in bytes. The value must be 128 bytes.

chaining_vector
Direction: Input/OutputType: String

An 128-byte string that ICSF uses as a system work area. Your application program must not change the data in this string. The chaining vector permits data to be chained from one invocation call to another.

On the first call, initialize this parameter as binary zeros.

mac_length
Direction: Input/OutputType: Integer

The length of the mac parameter in bytes. This parameter is updated to the actual length of the mac parameter on output. The minimum value is 4, and the maximum value is 64.

mac
Direction: OutputType: String

The field in which the callable service returns the MAC value if the segmenting rule is ONLY or LAST.

text_id_in
Direction: InputType: Integer

For CSNBHMG1 only, the ALET of the text for which the MAC is generated.

Go to the previous page Go to the next page




Copyright IBM Corporation 1990, 2014