z/OS Cryptographic Services ICSF Application Programmer's Guide
Previous topic | Next topic | Contents | Index | Contact z/OS | Library | PDF


Parameters

z/OS Cryptographic Services ICSF Application Programmer's Guide
SA22-7522-16

return_code
Direction: OutputType: Integer

The return code specifies the general result of the callable service. Appendix A. ICSF and TSS Return and Reason Codes lists the return codes.

reason_code
Direction: OutputType: Integer

The reason code specifies the result of the callable service that is returned to the application program. Each return code has different reason codes assigned to it that indicate specific processing problems. Appendix A. ICSF and TSS Return and Reason Codes lists the reason codes.

exit_data_length
Direction: IgnoredType: Integer

This field is ignored. It is recommended to specify 0 for this parameter.

exit_data
Direction: IgnoredType: String

This field is ignored.

rule_array_count
Direction: InputType: Integer

The number of keywords you are supplying in rule_array. Value must be 0 or 1.

rule_array
Direction: InputType: String

Keywords that provide control information to the callable service. The keywords must be 8 bytes of contiguous storage with the keyword left-justified in its 8-byte location and padded on the right with blanks.

Table 261. Keywords for ICSF Query Algorithm
KeywordMeaning
ALGORITHM (optional)
AES Advanced Encryption Standard - symmetric key algorithm
DESData Encryption Standard - single length symmetric key algorithm
DSSData Signature Standard - public key cryptography algorithm
ECCElliptic Curve Cryptography. All curve types.
ECC-PRIMElliptic Curve Cryptography using NIST approved PRIME curves
ECC-BPElliptic Curve Cryptography using Brain Pool Curves
HMACFIPS-198 keyed-hash message authentication code algorithm.
RSARivest-Shamir-Adleman - public key cryptography algorithm, all usage types
RSA-SIGRivest-Shamir-Adleman - public key cryptography algorithm, signature usage.
RSA-KMRivest-Shamir-Adleman - public key cryptography algorithm, key management usage.
RSA-GENRivest-Shamir-Adleman - public key cryptography algorithm, key generation.
SHA-1Secure Hash Algorithm 1 - A one way hash algorithm
SHA-2Secure Hash Algorithm 2 - A one way hash algorithm
MDC-2Modification Detection Code 2 - MDC-2 specifies two encipherments per 8 bytes of input text
MDC-4Modification Detection Code 4 - MDC-4 specifies four encipherments per 8 bytes of input text
MD5Message Digest 5 - A one way hash algorithm
RPMD-160RIPE MD-160 - A one way hash algorithm
RNGLRandom number generate long callable service
TDESData Encryption Standard - double and triple length symmetric key algorithm
returned_data_length
Direction: Input/OutputType: Integer

The length of the returned_data parameter. Currently, the value must be large enough to handle the request. Allow additional space for future enhancements. On output, this field will contain the actual length of the data returned.

returned_data
Direction: OutputType: String

This field will contain the table output from the service. Depending on the contents of rule_array, multiple rows may be returned. One row in the table contains:

Table 262. Output for ICSF Query Algorithm
Offset (hex)NameDescription
0 (X'0')AlgorithmAn 8-byte EBCDIC character string containing the name of the cryptographic algorithm. The character string is padded on the right with blanks. Possible values are:
AES
DES (single length DES)
DSS
ECC-PRIM
ECC-BP (Brain Pool)
HMAC
MDC-2
MDC-4
MD5
RNGL
RPMD-160
RSA-GEN
RSA-KM
RSA-SIG
SHA-1
SHA-2
TDES (double and triple length DES)
8 (X'8')SizeAn 8-byte EBCDIC string representing the maximum key, modulus, p value, or hash size. The string is padded with blanks on the right. The size is in bits. This is true for all algorithms except RNGL. For RNGL, the size is in bytes.
16 (X'10')Key SecurityAn 8-byte EBCDIC character string containing the string
CLEAR
SECURE
NA
The string is padded on the right with blanks.
24(X'18')ImplementationAn 8-byte EBCDIC character string containing how the algorithm is implemented. The string is padded on the right with blanks. Possible choices are:
ACC - Cryptographic Accelerator
CCF - CCF
COP - Cryptographic Coprocessor
CPU - CPACF  
SW - Software

The rows are sorted in the following order:

  • Algorithm name - alphabetically A to Z
  • Algorithm size - numerically highest to least
  • Key security - alphabetically A to Z
  • Implementation - alphabetically A to Z
reserved_data_length
Direction: InputType: Integer

The length of the reserved_data parameter. Currently, the value must be 0.

reserved_data
Direction: IgnoredType: String

This field is currently not used.

Go to the previous page Go to the next page




Copyright IBM Corporation 1990, 2014