z/OS Cryptographic Services ICSF Application Programmer's Guide
Previous topic | Next topic | Contents | Index | Contact z/OS | Library | PDF


Parameters

z/OS Cryptographic Services ICSF Application Programmer's Guide
SA22-7522-16

return_code
Direction: OutputType: Integer

The return code specifies the general result of the callable service. Appendix A. ICSF and TSS Return and Reason Codes lists the return codes.

reason_code
Direction: OutputType: Integer

The reason code specifies the result of the callable service that is returned to the application program. Each return code has different reason codes assigned to it that indicate specific processing problems. Appendix A. ICSF and TSS Return and Reason Codes lists the reason codes.

exit_data_length
Direction: Input/OutputType: Integer

The length of the data that is passed to the installation exit. The length can be from X'00000000' to X'7FFFFFFF' (2 gigabytes). The data is identified in the exit_data parameter.

exit_data
Direction: Input/OutputType: String

The data that is passed to the installation exit.

rule_array_count
Direction: InputType: Integer

The number of keywords you are supplying in the rule_array parameter. The value must be 1 or 2.

rule_array
Direction: InputType: String

Keywords that provide control information to the callable service are listed in Table 155. The optional chaining flag keyword indicates whether calls to this service are chained together logically to overcome buffer size limitations. Each keyword is left-justified in an 8-byte field and padded on the right with blanks. All keywords must be in contiguous storage.

Table 155. Keywords for One-Way Hash Generate Rule Array Control Information
KeywordMeaning
Hash Method (required)
MD5Hash algorithm is MD5 algorithm. Use this hash method for PKCS-1.0 and PKCS-1.1. Length of hash generated is 16 bytes.
MD5-LGHash algorithm is similar to the MD5 algorithm. Use this hash method for PKCS-1.0 and PKCS-1.1. Length of hash generated is 16 bytes. Legacy hash values from release HCR7751 and lower prior to APAR OA33657 will be generated for verification purposes with previously archived hash values.
RPMD-LGHash algorithm is similar to the RIPEMD-160. Length of hash generated is 20 bytes. Legacy hash values from release HCR7751 and lower prior to APAR OA33657 will be generated for verification purposes with previously archived hash values.
SHA-1Hash algorithm is SHA-1 algorithm. Use this hash method for DSS. Length of hash generated is 20 bytes.
SHA-224Hash algorithm is SHA-256 algorithm. Length of hash generated is 28 bytes.
SHA-256Hash algorithm is SHA-256 algorithm. Length of hash generated is 32 bytes.
Chaining Flag (optional)
FIRSTSpecifies this is the first call in a series of chained calls. Intermediate results are stored in the hash field.
LASTSpecifies this is the last call in a series of chained calls.
MIDDLESpecifies this is a middle call in a series of chained calls. Intermediate results are stored in the hash field.
ONLYSpecifies this is the only call and the call is not chained. This is the default.
text_length
Direction: InputType: Integer

The length of the text parameter in bytes.

Note:
If you specify the FIRST or MIDDLE keyword, then the text length must be a multiple of the blocksize of the hash method. For MD5, RPMD-160, SHA-1, SHA-224 and SHA-256, this is a multiple of 64 bytes.

For ONLY and LAST, this service performs the required padding according to the algorithm specified.

text
Direction: InputType: String
The application-supplied text on which this service performs the hash.
chaining_vector_length
Direction: InputType: Integer

The byte length of the chaining_vector parameter. This must be 128 bytes.

chaining_vector
Direction: Input/OutputType: String

This field is a 128-byte work area. Your application must not change the data in this string. The chaining vector permits chaining data from one call to another.

hash_length
Direction: InputType: Integer

The length of the supplied hash field in bytes.

Note:
For SHA-1 and RPMD-160 this must be at least 20 bytes; for MD5 this must be at least 16 bytes. For SHA-224 and SHA-256, the length must be at least 32 bytes long. Even though the length of the SHA-224 hash is less than SHA-256, the extra bytes are used as a work area during the generation of the hash value. The SHA-224 value is left-justified and padded with zeroes.
hash
Direction: Input/OutputType: String

This field contains the hash, left-justified. The processing of the rest of the field depends on the implementation. If you specify the FIRST or MIDDLE keyword, this field contains the intermediate hash value. Your application must not change the data in this field between the sequence of FIRST, MIDDLE, and LAST calls for a specific message.

text_id_in
Direction: InputType: Integer

For CSNBOWH1 only, the ALET for the data space containing the text for which to generate the hash.

Go to the previous page Go to the next page




Copyright IBM Corporation 1990, 2014