cics ts for z/os 4.2: application programming reference · vi cics ts for z/os 4.2: application pr...

986
CICS Transaction Server for z/OS Version 4 Release 2 Application Programming Reference SC34-7159-02 IBM

Upload: others

Post on 13-Jul-2020

6 views

Category:

Documents


0 download

TRANSCRIPT

  • CICS Transaction Server for z/OSVersion 4 Release 2

    Application Programming Reference

    SC34-7159-02

    IBM

  • CICS Transaction Server for z/OSVersion 4 Release 2

    Application Programming Reference

    SC34-7159-02

    IBM

  • NoteBefore using this information and the product it supports, read the information in “Notices” on page 925.

    This edition applies to Version 4 Release 2 of CICS Transaction Server for z/OS (product number 5655-S97) and toall subsequent releases and modifications until otherwise indicated in new editions.

    © Copyright IBM Corporation 1989, 2014.US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contractwith IBM Corp.

  • Contents

    What this manual is about . . . . . . viiWho should read this manual . . . . . . . . viiWhat you need to know to understand this manual viiHow to use this manual . . . . . . . . . . viiWhat this manual does not cover . . . . . . . vii

    Notes on terminology . . . . . . . . ix

    Changes in CICS Transaction Server forz/OS, Version 4 Release 2 . . . . . . . xi

    About the CICS API commands . . . . 1CICS API command format . . . . . . . . . 1CICS command syntax notation . . . . . . . . 2CICS command argument values . . . . . . . 4CICS command restrictions . . . . . . . . . 9LENGTH options in CICS commands . . . . . 10NOHANDLE option . . . . . . . . . . . 10RESP and RESP2 options . . . . . . . . . . 10Translated code for CICS commands . . . . . . 11

    COBOL translation output . . . . . . . . 11C translation output . . . . . . . . . . 12PL/I translation output . . . . . . . . . 12Assembler translation output . . . . . . . 13

    CICS-value data areas (cvdas) . . . . . . . . 17CICS threadsafe commands in the API . . . . . 17Threadsafe commands . . . . . . . . . . . 18

    CICS API commands. . . . . . . . . 23CICS command summary . . . . . . . . . 24ABEND . . . . . . . . . . . . . . . 32ACQUIRE . . . . . . . . . . . . . . . 34ADD SUBEVENT . . . . . . . . . . . . 37ADDRESS . . . . . . . . . . . . . . . 39ADDRESS SET . . . . . . . . . . . . . 41ALLOCATE (APPC) . . . . . . . . . . . 42ALLOCATE (LUTYPE6.1). . . . . . . . . . 46ALLOCATE (MRO). . . . . . . . . . . . 48ASKTIME . . . . . . . . . . . . . . . 50ASSIGN . . . . . . . . . . . . . . . 51BIF DEEDIT . . . . . . . . . . . . . . 66BIF DIGEST . . . . . . . . . . . . . . 68BUILD ATTACH (LUTYPE6.1) . . . . . . . . 70BUILD ATTACH (MRO) . . . . . . . . . . 73CANCEL . . . . . . . . . . . . . . . 76CANCEL (BTS) . . . . . . . . . . . . . 78CHANGE PHRASE. . . . . . . . . . . . 81CHANGE PASSWORD . . . . . . . . . . 83CHANGE TASK . . . . . . . . . . . . . 85CHECK ACQPROCESS . . . . . . . . . . 86CHECK ACTIVITY . . . . . . . . . . . . 88CHECK TIMER . . . . . . . . . . . . . 91CONNECT PROCESS . . . . . . . . . . . 93CONVERSE (default) . . . . . . . . . . . 96

    CONVERSE (APPC) . . . . . . . . . . . 97CONVERSE (LUTYPE2/LUTYPE3) . . . . . . 98CONVERSE (LUTYPE4) . . . . . . . . . . 99CONVERSE (LUTYPE6.1) . . . . . . . . . 100CONVERSE (SCS) . . . . . . . . . . . . 101CONVERSE (3270 logical) . . . . . . . . . 102CONVERSE (3600-3601) . . . . . . . . . . 103CONVERSE (3600-3614) . . . . . . . . . . 104CONVERSE (3650 interpreter) . . . . . . . . 105CONVERSE (3650-3270) . . . . . . . . . . 106CONVERSE (3650-3653) . . . . . . . . . . 107CONVERSE (3650-3680) . . . . . . . . . . 108CONVERSE (3767) . . . . . . . . . . . 109CONVERSE (3770). . . . . . . . . . . . 110CONVERSE (3790 full-function or inquiry) . . . 111CONVERSE (3790 3270-display) . . . . . . . 112CONVERSE: z/OS Communications Server options 113CONVERSE (non-z/OS Communications Serverdefault) . . . . . . . . . . . . . . . 118CONVERSE (MRO) . . . . . . . . . . . 119CONVERSE (2260) . . . . . . . . . . . 120CONVERSE: non-z/OS Communications Serveroptions . . . . . . . . . . . . . . . 121CONVERTTIME . . . . . . . . . . . . 126DEFINE ACTIVITY . . . . . . . . . . . 128DEFINE COMPOSITE EVENT. . . . . . . . 131DEFINE COUNTER and DEFINE DCOUNTER . . 133DEFINE INPUT EVENT . . . . . . . . . . 137DEFINE PROCESS . . . . . . . . . . . 138DEFINE TIMER . . . . . . . . . . . . 141DELAY . . . . . . . . . . . . . . . 144DELETE . . . . . . . . . . . . . . . 147DELETE ACTIVITY . . . . . . . . . . . 155DELETE CONTAINER (BTS) . . . . . . . . 157DELETE CONTAINER (CHANNEL) . . . . . 159DELETE COUNTER and DELETE DCOUNTER 160DELETE EVENT . . . . . . . . . . . . 162DELETE TIMER . . . . . . . . . . . . 163DELETEQ TD . . . . . . . . . . . . . 164DELETEQ TS . . . . . . . . . . . . . 166DEQ . . . . . . . . . . . . . . . . 168DOCUMENT CREATE . . . . . . . . . . 170DOCUMENT DELETE . . . . . . . . . . 174DOCUMENT INSERT . . . . . . . . . . 175DOCUMENT RETRIEVE . . . . . . . . . 179DOCUMENT SET . . . . . . . . . . . . 181DUMP TRANSACTION . . . . . . . . . . 184ENDBR . . . . . . . . . . . . . . . 189ENDBROWSE ACTIVITY . . . . . . . . . 192ENDBROWSE CONTAINER . . . . . . . . 193ENDBROWSE EVENT . . . . . . . . . . 194ENDBROWSE PROCESS . . . . . . . . . 195ENQ . . . . . . . . . . . . . . . . 196ENTER TRACENUM . . . . . . . . . . . 199EXTRACT ATTACH (LUTYPE6.1) . . . . . . 201EXTRACT ATTACH (MRO) . . . . . . . . 205

    © Copyright IBM Corp. 1989, 2014 iii

    ||

  • EXTRACT ATTRIBUTES (APPC) . . . . . . . 209EXTRACT ATTRIBUTES (MRO) . . . . . . . 211EXTRACT CERTIFICATE . . . . . . . . . 213EXTRACT LOGONMSG. . . . . . . . . . 216EXTRACT PROCESS . . . . . . . . . . . 218EXTRACT TCPIP . . . . . . . . . . . . 220EXTRACT TCT . . . . . . . . . . . . . 224EXTRACT WEB . . . . . . . . . . . . 225FORCE TIMER . . . . . . . . . . . . . 230FORMATTIME . . . . . . . . . . . . . 231FREE . . . . . . . . . . . . . . . . 236FREE (APPC) . . . . . . . . . . . . . 237FREE (LUTYPE6.1) . . . . . . . . . . . 239FREE (MRO) . . . . . . . . . . . . . 240FREEMAIN . . . . . . . . . . . . . . 242GDS ALLOCATE . . . . . . . . . . . . 245GDS ASSIGN . . . . . . . . . . . . . 248GDS CONNECT PROCESS . . . . . . . . . 249GDS EXTRACT ATTRIBUTES . . . . . . . . 252GDS EXTRACT PROCESS . . . . . . . . . 254GDS FREE . . . . . . . . . . . . . . 256GDS ISSUE ABEND . . . . . . . . . . . 258GDS ISSUE CONFIRMATION . . . . . . . . 260GDS ISSUE ERROR . . . . . . . . . . . 262GDS ISSUE PREPARE . . . . . . . . . . 264GDS ISSUE SIGNAL . . . . . . . . . . . 266GDS RECEIVE . . . . . . . . . . . . . 268GDS SEND . . . . . . . . . . . . . . 271GDS WAIT . . . . . . . . . . . . . . 274GET CONTAINER (BTS) . . . . . . . . . 276GET CONTAINER (CHANNEL) . . . . . . . 279GET COUNTER and GET DCOUNTER . . . . 283GETMAIN . . . . . . . . . . . . . . 288GETNEXT ACTIVITY . . . . . . . . . . 292GETNEXT CONTAINER . . . . . . . . . 294GETNEXT EVENT . . . . . . . . . . . 295GETNEXT PROCESS . . . . . . . . . . . 297HANDLE ABEND. . . . . . . . . . . . 298HANDLE AID . . . . . . . . . . . . . 300HANDLE CONDITION . . . . . . . . . . 302IGNORE CONDITION . . . . . . . . . . 304INQUIRE ACTIVITYID . . . . . . . . . . 305INQUIRE CONTAINER . . . . . . . . . . 308INQUIRE EVENT . . . . . . . . . . . . 310INQUIRE PROCESS . . . . . . . . . . . 312INQUIRE TIMER . . . . . . . . . . . . 313INVOKE SERVICE . . . . . . . . . . . 315INVOKE WEBSERVICE . . . . . . . . . . 320ISSUE ABEND . . . . . . . . . . . . . 321ISSUE ABORT . . . . . . . . . . . . . 323ISSUE ADD . . . . . . . . . . . . . . 325ISSUE CONFIRMATION . . . . . . . . . 327ISSUE COPY (3270 logical) . . . . . . . . . 329ISSUE DISCONNECT (default) . . . . . . . 330ISSUE DISCONNECT (LUTYPE6.1) . . . . . . 332ISSUE END . . . . . . . . . . . . . . 333ISSUE ENDFILE . . . . . . . . . . . . 335ISSUE ENDOUTPUT . . . . . . . . . . . 336ISSUE EODS . . . . . . . . . . . . . 337ISSUE ERASE . . . . . . . . . . . . . 338ISSUE ERASEAUP . . . . . . . . . . . 340

    ISSUE ERROR . . . . . . . . . . . . . 342ISSUE LOAD . . . . . . . . . . . . . 344ISSUE NOTE . . . . . . . . . . . . . 345ISSUE PASS . . . . . . . . . . . . . . 347ISSUE PREPARE . . . . . . . . . . . . 349ISSUE PRINT . . . . . . . . . . . . . 351ISSUE QUERY . . . . . . . . . . . . . 352ISSUE RECEIVE . . . . . . . . . . . . 354ISSUE REPLACE . . . . . . . . . . . . 356ISSUE RESET . . . . . . . . . . . . . 359ISSUE SEND . . . . . . . . . . . . . 360ISSUE SIGNAL (APPC) . . . . . . . . . . 363ISSUE SIGNAL (LUTYPE6.1) . . . . . . . . 365ISSUE WAIT. . . . . . . . . . . . . . 366JOURNAL . . . . . . . . . . . . . . 368LINK . . . . . . . . . . . . . . . . 369LINK ACQPROCESS . . . . . . . . . . . 377LINK ACTIVITY . . . . . . . . . . . . 380LOAD . . . . . . . . . . . . . . . . 384MONITOR . . . . . . . . . . . . . . 387MOVE CONTAINER (BTS) . . . . . . . . . 390MOVE CONTAINER (CHANNEL) . . . . . . 393POINT . . . . . . . . . . . . . . . 396POP HANDLE . . . . . . . . . . . . . 397POST . . . . . . . . . . . . . . . . 398PURGE MESSAGE . . . . . . . . . . . 402PUSH HANDLE . . . . . . . . . . . . 403PUT CONTAINER (BTS) . . . . . . . . . 404PUT CONTAINER (CHANNEL) . . . . . . . 407QUERY COUNTER and QUERY DCOUNTER . . 411QUERY SECURITY . . . . . . . . . . . 414READ . . . . . . . . . . . . . . . . 418READNEXT . . . . . . . . . . . . . . 430READPREV . . . . . . . . . . . . . . 441READQ TD . . . . . . . . . . . . . . 451READQ TS . . . . . . . . . . . . . . 455RECEIVE (z/OS Communications Server default) 459RECEIVE (APPC) . . . . . . . . . . . . 460RECEIVE (LUTYPE2/LUTYPE3) . . . . . . . 461RECEIVE (LUTYPE4). . . . . . . . . . . 462RECEIVE (LUTYPE6.1) . . . . . . . . . . 463RECEIVE (3270 logical) . . . . . . . . . . 464RECEIVE (3600 pipeline) . . . . . . . . . 465RECEIVE (3600-3601) . . . . . . . . . . . 466RECEIVE (3600-3614) . . . . . . . . . . . 467RECEIVE (3650) . . . . . . . . . . . . 468RECEIVE (3767) . . . . . . . . . . . . 469RECEIVE (3770) . . . . . . . . . . . . 470RECEIVE (3790 full-function or inquiry) . . . . 471RECEIVE: z/OS Communications Server options 472RECEIVE (non-z/OS Communications Serverdefault) . . . . . . . . . . . . . . . 476RECEIVE (MRO) . . . . . . . . . . . . 477RECEIVE (2260) . . . . . . . . . . . . 478RECEIVE (2980) . . . . . . . . . . . . 479RECEIVE (3790 3270-display) . . . . . . . . 482RECEIVE: non-z/OSCommunications Serveroptions . . . . . . . . . . . . . . . 483RECEIVE MAP . . . . . . . . . . . . . 487RECEIVE MAP MAPPINGDEV . . . . . . . 491RECEIVE PARTN . . . . . . . . . . . . 494

    iv CICS TS for z/OS 4.2: Application Programming Reference

  • RELEASE. . . . . . . . . . . . . . . 497REMOVE SUBEVENT . . . . . . . . . . 499RESET ACQPROCESS . . . . . . . . . . 500RESET ACTIVITY . . . . . . . . . . . . 502RESETBR. . . . . . . . . . . . . . . 504RESUME . . . . . . . . . . . . . . . 509RETRIEVE . . . . . . . . . . . . . . 511RETRIEVE REATTACH EVENT . . . . . . . 515RETRIEVE SUBEVENT . . . . . . . . . . 517RETURN . . . . . . . . . . . . . . . 519REWIND COUNTER and REWIND DCOUNTER 523REWRITE . . . . . . . . . . . . . . 526ROUTE . . . . . . . . . . . . . . . 531RUN . . . . . . . . . . . . . . . . 535SEND (z/OS Communications Server default) . . 540SEND (APPC) . . . . . . . . . . . . . 541SEND (LUTYPE2/LUTYPE3) . . . . . . . . 542SEND (LUTYPE4) . . . . . . . . . . . . 543SEND (LUTYPE6.1) . . . . . . . . . . . 544SEND (SCS) . . . . . . . . . . . . . . 545SEND (3270 logical) . . . . . . . . . . . 546SEND (3600 pipeline). . . . . . . . . . . 547SEND (3600-3601) . . . . . . . . . . . . 548SEND (3600-3614) . . . . . . . . . . . . 549SEND (3650 interpreter) . . . . . . . . . . 550SEND (3650-3270) . . . . . . . . . . . . 551SEND (3650-3653) . . . . . . . . . . . . 552SEND (3650-3680) . . . . . . . . . . . . 553SEND (3767). . . . . . . . . . . . . . 554SEND (3770). . . . . . . . . . . . . . 555SEND (3790 full-function or inquiry) . . . . . 556SEND (3790 SCS) . . . . . . . . . . . . 557SEND (3790 3270-display) . . . . . . . . . 558SEND (3790 3270-printer) . . . . . . . . . 559SEND: z/OS Communications Server options . . 560SEND (non-z/OS Communications Server default) 564SEND (MRO) . . . . . . . . . . . . . 565SEND (2260). . . . . . . . . . . . . . 566SEND (2980). . . . . . . . . . . . . . 567SEND: non-z/OS Communications Server options 568SEND CONTROL . . . . . . . . . . . . 572SEND MAP . . . . . . . . . . . . . . 577SEND MAP MAPPINGDEV . . . . . . . . 585SEND PAGE. . . . . . . . . . . . . . 588SEND PARTNSET . . . . . . . . . . . . 592SEND TEXT . . . . . . . . . . . . . . 593SEND TEXT MAPPED . . . . . . . . . . 600SEND TEXT NOEDIT . . . . . . . . . . 602SIGNAL EVENT . . . . . . . . . . . . 606SIGNOFF. . . . . . . . . . . . . . . 608SIGNON . . . . . . . . . . . . . . . 609SOAPFAULT ADD . . . . . . . . . . . 613SOAPFAULT CREATE . . . . . . . . . . 616SOAPFAULT DELETE . . . . . . . . . . 620SPOOLCLOSE . . . . . . . . . . . . . 621SPOOLOPEN INPUT. . . . . . . . . . . 623SPOOLOPEN OUTPUT . . . . . . . . . . 626SPOOLREAD . . . . . . . . . . . . . 631SPOOLWRITE . . . . . . . . . . . . . 634START . . . . . . . . . . . . . . . 637START ATTACH . . . . . . . . . . . . 647

    START BREXIT . . . . . . . . . . . . . 649START CHANNEL . . . . . . . . . . . 652STARTBR. . . . . . . . . . . . . . . 657STARTBROWSE ACTIVITY. . . . . . . . . 664STARTBROWSE CONTAINER. . . . . . . . 666STARTBROWSE EVENT. . . . . . . . . . 668STARTBROWSE PROCESS . . . . . . . . . 670SUSPEND . . . . . . . . . . . . . . 672SUSPEND (BTS) . . . . . . . . . . . . 673SYNCPOINT . . . . . . . . . . . . . 675SYNCPOINT ROLLBACK . . . . . . . . . 676TEST EVENT . . . . . . . . . . . . . 678TRANSFORM DATATOXML . . . . . . . . 679TRANSFORM XMLTODATA . . . . . . . . 682UNLOCK . . . . . . . . . . . . . . 686UPDATE COUNTER and UPDATE DCOUNTER 690VERIFY PASSWORD . . . . . . . . . . . 693VERIFY PHRASE . . . . . . . . . . . . 696WAIT CONVID (APPC) . . . . . . . . . . 699WAIT EVENT . . . . . . . . . . . . . 701WAIT EXTERNAL. . . . . . . . . . . . 703WAIT JOURNALNAME . . . . . . . . . . 706WAIT JOURNALNUM . . . . . . . . . . 708WAIT SIGNAL . . . . . . . . . . . . . 709WAIT TERMINAL. . . . . . . . . . . . 710WAITCICS . . . . . . . . . . . . . . 712WEB CLOSE . . . . . . . . . . . . . 714WEB CONVERSE . . . . . . . . . . . . 717WEB ENDBROWSE FORMFIELD . . . . . . 731WEB ENDBROWSE HTTPHEADER . . . . . . 732WEB ENDBROWSE QUERYPARM . . . . . . 733WEB EXTRACT . . . . . . . . . . . . 734WEB OPEN . . . . . . . . . . . . . . 739WEB PARSE URL . . . . . . . . . . . . 745WEB READ FORMFIELD . . . . . . . . . 748WEB READ HTTPHEADER . . . . . . . . 751WEB READ QUERYPARM . . . . . . . . . 753WEB READNEXT FORMFIELD . . . . . . . 755WEB READNEXT HTTPHEADER . . . . . . 757WEB READNEXT QUERYPARM . . . . . . . 759WEB RECEIVE (Server) . . . . . . . . . . 761WEB RECEIVE (Client) . . . . . . . . . . 768WEB RETRIEVE . . . . . . . . . . . . 775WEB SEND (Server) . . . . . . . . . . . 777WEB SEND (Client) . . . . . . . . . . . 785WEB STARTBROWSE FORMFIELD . . . . . . 796WEB STARTBROWSE HTTPHEADER . . . . . 798WEB STARTBROWSE QUERYPARM . . . . . 799WEB WRITE HTTPHEADER . . . . . . . . 801WRITE . . . . . . . . . . . . . . . 804WRITE JOURNALNAME . . . . . . . . . 811WRITE JOURNALNUM . . . . . . . . . . 815WRITE OPERATOR . . . . . . . . . . . 816WRITEQ TD. . . . . . . . . . . . . . 819WRITEQ TS . . . . . . . . . . . . . . 821WSACONTEXT BUILD . . . . . . . . . . 826WSACONTEXT DELETE . . . . . . . . . 831WSACONTEXT GET . . . . . . . . . . . 832WSAEPR CREATE . . . . . . . . . . . 837XCTL . . . . . . . . . . . . . . . . 840

    Contents v

    ||

  • Appendix A. EXEC interface block 843EIB fields. . . . . . . . . . . . . . . 843

    Appendix B. Codes returned byASSIGN . . . . . . . . . . . . . . 863ASSIGN TERMCODE . . . . . . . . . . 863ASSIGN FCI. . . . . . . . . . . . . . 864

    Appendix C. National language codes 865

    Appendix D. Terminal control . . . . 867Commands and options for terminals and logicalunits . . . . . . . . . . . . . . . . 867Teletypewriter programming . . . . . . . . 869Display device operations . . . . . . . . . 870

    Print displayed information (ISSUE PRINT) . . 870Copy displayed information (ISSUE COPY) . . 871Erase all unprotected fields (ISSUE ERASEAUP) 871Handle input without data (RECEIVE) . . . . 872

    Appendix E. SAA Resource Recovery 873

    Appendix F. Common ProgrammingInterface Communications (CPICommunications) . . . . . . . . . 875

    Appendix G. Exception conditions forLINK command . . . . . . . . . . 877

    Appendix H. BMS-related constants 881Magnetic slot reader (MSR) control value constants,DFHMSRCA . . . . . . . . . . . . . 884

    MSR control byte values. . . . . . . . . . 884Attention identifier constants, DFHAID . . . . 885

    Appendix I. BMS macros . . . . . . 887Map set, map, and field definition . . . . . . 887Partition set definition . . . . . . . . . . 888

    Field groups. . . . . . . . . . . . . 888DFHMDF . . . . . . . . . . . . . . 890DFHMDI . . . . . . . . . . . . . . . 902DFHMSD. . . . . . . . . . . . . . . 911DFHPDI . . . . . . . . . . . . . . . 922DFHPSD . . . . . . . . . . . . . . . 924

    Notices . . . . . . . . . . . . . . 925Trademarks . . . . . . . . . . . . . . 926

    Bibliography. . . . . . . . . . . . 927CICS books for CICS Transaction Server for z/OS 927CICSPlex SM books for CICS Transaction Serverfor z/OS . . . . . . . . . . . . . . . 928Other CICS publications . . . . . . . . . . 929Other IBM publications . . . . . . . . . . 930

    Accessibility . . . . . . . . . . . . 931

    Index . . . . . . . . . . . . . . . 933

    vi CICS TS for z/OS 4.2: Application Programming Reference

  • What this manual is about

    This manual documents intended Programming Interfaces that allow the customerto write programs to obtain the services of Version 4 Release 2.

    This manual describes the CICS® Transaction Server for z/OS®, Version 4 Release 2EXEC application programming interface. It contains reference information neededto prepare COBOL, C, PL/I, and assembler-language application programs, usingEXEC CICS commands, to be executed under CICS. Guidance information is in theCICS Application Programming Guide. For information about debugging CICSapplications, see the CICS Problem Determination Guide.

    Who should read this manualThe manual is intended primarily for use by application programmers, but willalso be useful to system programmers and systems analysts.

    What you need to know to understand this manualWe assume that you have some experience in writing programs in COBOL, C,PL/I, or S370 assembler language. The CICS Application Programming Primer andthe CICS Application Programming Guide will help you to design and write CICSapplications using the commands described in this manual.

    How to use this manualThis manual is for reference. Each of the commands has a standard format, asfollows:v The syntax of the commandv A description of what the command doesv An alphabetical list of the options and their functionsv An alphabetical list of conditions, and their causes, that can occur during

    execution of a command.

    What this manual does not coverThe EXEC CICS commands for system programming; that is COLLECT, CREATE,DISABLE, ENABLE, INQUIRE, PERFORM, RESYNC, and SET are not covered inthis book. You will find them in the CICS System Programming Reference.

    The EXEC CICS FEPI commands available for use with the CICS Front EndProgramming Interface feature are not discussed in this book, but in the CICS FrontEnd Programming Interface User's Guide.

    The CICS C++ OO programming interface is not described in this book. It isdefined in the CICS C++ OO Class Libraries manual.

    The CICS Java™ programming interface is not described here, it is defined inJavadoc HTML provided in the CICS Information Center.

    © Copyright IBM Corp. 1989, 2014 vii

  • viii CICS TS for z/OS 4.2: Application Programming Reference

  • Notes on terminologyv CICS refers to IBM® CICS Transaction Server for z/OS, Version 4 Release 2v VTAM® refers to IBM ACF/VTAMv IMS™ refers to IBM IMSv TCAM refers to the DCB interface of ACF/TCAM.

    © Copyright IBM Corp. 1989, 2014 ix

  • x CICS TS for z/OS 4.2: Application Programming Reference

  • Changes in CICS Transaction Server for z/OS, Version 4Release 2

    For information about changes that have been made in this release, please refer toWhat's New in the information center, or the following publications:v CICS Transaction Server for z/OS What's Newv CICS Transaction Server for z/OS Upgrading from CICS TS Version 4.1v CICS Transaction Server for z/OS Upgrading from CICS TS Version 3.2v CICS Transaction Server for z/OS Upgrading from CICS TS Version 3.1

    Any technical changes that are made to the text after release are indicated by avertical bar (|) to the left of each new or changed line of information.

    © Copyright IBM Corp. 1989, 2014 xi

  • xii CICS TS for z/OS 4.2: Application Programming Reference

  • About the CICS API commands

    General information which applies to all the CICS API commands.

    CICS API command formatThe general format of a CICS command is EXECUTE CICS (or EXEC CICS)followed by the name of the required command, and possibly by one or moreoptions.

    The command format is as follows:

    where:

    commanddescribes the operation required (for example, READ).

    option describes any of the many optional facilities available with each function.Some options are followed by an argument in parentheses. You can writeoptions (including those that require arguments) in any order.

    arg (short for argument) is a value such as “data-value” or “name”. A“data-value” can be a constant, this means that an argument that sendsdata to CICS is generally a “data-value”. An argument that receives datafrom CICS must be a “data-area”.

    Some arguments described as “data-area” can both send and receive data.In these cases, you must ensure that the “data-area” is not in protectedstorage.

    An example of a CICS command is as follows:

    You must add the appropriate end-of-command delimiter; see “CICS commandsyntax notation” on page 2.

    Note: If you want to add comments against CICS commands, you can do this, inassembler only, by using a period or a comma as a delimiter after the lastargument. For example:EXEC CICS ADDRESS EIB(MYUEIB), @F1A

    If a period or a comma is used with an EXEC CICS command, the following linemust begin between column 2 and column 16, with the continuation character incolumn 72. The following line cannot start after column 17. If there is no comma or

    EXEC CICS command option(arg)....

    EXEC CICS READFILE(’FILEA’)INTO(FILEA)RIDFLD(KEYNUM)UPDATE

    © Copyright IBM Corp. 1989, 2014 1

    |||

    |

    |||

  • period added, the following line must begin at or after column 2 and end bycolumn 71, with the continuation character in column 72.

    CICS command syntax notationIn CICS documentation, CICS commands are presented in a standard way. Youinterpret the syntax by following the arrows from left to right.

    The “EXEC CICS” that always precedes each command's keyword is not included;nor is the “END-EXEC” statement used in COBOL or the semicolon (;) used inPL/I and C that you must code at the end of each CICS command. In the Clanguage, a null character can be used as an end-of-string marker, but CICS doesnot recognize this; you must therefore never have a comma or period followed bya space (X'40') in the middle of a coding line.

    The conventions are:

    Symbol Action

    ►► ABC

    ►◄A set of alternatives—one of which you must code.

    ►► ▼ ABC

    ►◄

    A set of alternatives—one of which you must code. Youmay code more than one of them, in any sequence.

    ►►ABC

    ►◄A set of alternatives—one of which you may code.

    ►► ▼

    ABC

    ►◄

    A set of alternatives — any number (including none) ofwhich you may code once, in any sequence.

    ►►A

    B►◄

    Alternatives where A is the default.

    2 CICS TS for z/OS 4.2: Application Programming Reference

    ||

  • Symbol Action

    ►► Name ►◄

    Name:

    AB

    Use with the named section in place of its name.

    Punctuation and uppercasecharacters

    Code exactly as shown.

    Lowercase characters Code your own text, as appropriate (for example, name).

    About the CICS API commands 3

  • CICS command argument valuesThe data associated with a command option is called its argument. Each type ofargument can contain different data types; some arguments return informationfrom CICS to the program and others are set by the program.

    Options in a CICS command can take the following argument values:v data-valuev data-areav cvda (CICS-value data area)v ptr-valuev ptr-refv namev filenamev systemnamev labelv hhmmss

    Data areas and data values

    Data areas and data values are the basic argument types. The difference betweenthem is the direction in which information flows when a task executes a command.A data-value is always, and exclusively a sender; it conveys data to CICS that CICSuses to process the command. A data-area is a receiver; CICS uses it to returninformation to the caller. Note that a data-area can also be a sender, for examplewhen the data to be conveyed to CICS is variable length (as in FROM), or where afield is used both for input and output.

    COBOL argument values

    The argument values can be replaced as follows:v data-value can be replaced by any COBOL data name of the correct data type for

    the argument, or by a constant that can be converted to the correct type for theargument. The following table shows how to define the correct data type:

    Data type COBOL definition

    Halfword binary PIC S9(4) COMP

    Fullword binary PIC S9(8) COMP

    Doubleword unsigned binary PIC 9(18) COMP

    Character string PIC X(n) where n is the number of bytes

    UTF-8 character string PIC X(n) where n is the number of bytes

    v data-area can be replaced by any COBOL data name of the correct data type forthe argument. The following table shows how to define the correct data type:

    Data type COBOL definition

    Halfword binary PIC S9(4) COMP

    Fullword binary PIC S9(8) COMP

    Doubleword unsigned binary PIC 9(18) COMP

    Character string PIC X(n) where n is the number of bytes

    4 CICS TS for z/OS 4.2: Application Programming Reference

    ||

  • Data type COBOL definition

    UTF-8 character string PIC X(n) where n is the number of bytes

    Where the data type is unspecified, data-area can refer to an elementary or groupitem.

    v cvda is described in “CICS-value data areas (cvdas)” on page 17.v ptr-value can be replaced by a pointer variable or ADDRESS special register.v ptr-ref can be replaced by a pointer variable or ADDRESS special register.v name can be replaced by either of the following values:

    – A character string specified as an alphanumeric literal. If this is shorter thanthe required length, it is padded with blanks.

    – A COBOL data area with a length equal to the required length for the name.The value in data-area is the name to be used by the argument. If data-area isshorter than the required length, the excess characters are undefined, whichmight lead to unpredictable results.

    filename, as used in FILE(filename), specifies the name of the file. The name mustcontain 1–8 characters from the range A–Z, 0–9, $, @, and #.systemname, as used in SYSID(systemname), specifies the name of the system towhich the request is directed. The name must contain 1–4 characters from therange A–Z, 0–9, $, @, and #.

    v label can be replaced by any COBOL paragraph name or a section name.v hhmmss can be replaced by a decimal constant or by a data name of the form

    PIC S9(7) COMP-3. The value must be of the form 0HHMMSS+ where:

    HH Represents hours from 00 through 99.

    MM Represents minutes from 00 through 59.

    SS Represents seconds from 00 through 59.

    In COBOL, there is no need to code the LENGTH option unless you want theprogram to read or write data of a length that is different from that of thereferenced variable.

    C argument values

    The argument values can be replaced as follows:v data-value can be replaced by any C expression that can be converted to the

    correct data type for the argument. The following table shows how to define thecorrect data type:

    Data type C definition

    Halfword binary short int

    Fullword binary long int

    Doubleword binary char[8]

    Character string char[n] where n is the number of bytes

    UTF-8 character string char[n] where n is the number of bytes

    data-value includes data-area as a subset.v data-area can be replaced by any C data reference that has the correct data type

    for the argument. The following table shows how to define the correct data type:

    About the CICS API commands 5

    ||

    ||

  • Data type C definition

    Halfword binary short int

    Fullword binary long int

    Doubleword binary char[8]

    Character string char[n] where n is the number of bytes

    UTF-8 character string char[n] where n is the number of bytes

    If the data type is unspecified, data-area can refer to a scalar data type, array, orstructure. The reference must be to contiguous storage.

    v cvda is described in “CICS-value data areas (cvdas)” on page 17.v ptr-value (which includes ptr-ref as a subset) can be replaced by any C expression

    that can be converted to an address.v ptr-ref can be replaced by any C pointer type reference.v name can be replaced by either of the following values:

    – A character string in double quotation marks (that is, a literal constant).– A C expression or reference whose value can be converted to a character

    array with a length equal to the maximum length allowed for the name. Thevalue of the character array is the name to be used by the argument.

    filename, as used in FILE(filename), specifies the name of the file. The name musthave 1–8 characters from the range A–Z, 0–9, $, @, and #.systemname, as used in SYSID(systemname), specifies the name of the system towhich the request is directed. The name must have 1–4 characters from therange A–Z, 0–9, $, @, and #.

    v label is not supported in the C language.v hhmmss can be replaced by an integer constant; otherwise the application is

    responsible for ensuring that the value passed to CICS is in packed decimalformat. The language does not provide a packed decimal type.

    HH Represents hours from 00 through 99.

    MM Represents minutes from 00 through 59.

    SS Represents seconds from 00 through 59.

    Many commands involve the transfer of data between the application program andCICS.

    In most cases, the LENGTH option must be specified if SET is used; the syntax ofeach command and its associated options show whether or not this rule applies.

    PL/I argument values

    The argument values can be replaced as follows:v data-value can be replaced by any PL/I expression that can be converted to the

    correct data type for the argument. The following table shows how to define thecorrect data type:

    Data type PL/I definition

    Halfword binary FIXED BIN(15)

    Fullword binary FIXED BIN(31)

    Doubleword binary CHAR (8)

    6 CICS TS for z/OS 4.2: Application Programming Reference

    ||

  • Data type PL/I definition

    Character string CHAR(n) where n is the number of bytes

    UTF-8 character string CHAR(n) where n is the number of bytes

    data-value includes data-area as a subset.v data-area can be replaced by any PL/I data reference that has the correct data

    type for the argument. The following table shows how to define the correct datatype:

    Data type PL/I definition

    Halfword binary FIXED BIN(15)

    Fullword binary FIXED BIN(31)

    Doubleword binary CHAR (8)

    Character string CHAR(n) where n is the number of bytes

    UTF-8 character string CHAR(n) where n is the number of bytes

    If the data type is unspecified, data-area can refer to an element, array, orstructure; for example, FROM(P–>STRUCTURE) LENGTH(LNG). The referencemust be to connected storage.The data area must also have the correct PL/I alignment attribute: ALIGNED forbinary items, and UNALIGNED for strings.If you use a varying data string without an explicit length, the data passedbegins with a two-byte length field, and its length is the maximum lengthdeclared for the string. If you explicitly specify a length in the command, thedata passed has this length; that is, the two-byte length field followed by dataup to the length you specified.

    v cvda is described in “CICS-value data areas (cvdas)” on page 17.v ptr-value (which includes ptr-refas a subset) can be replaced by any PL/I

    expression that can be converted to POINTER.v ptr-ref can be replaced by any PL/I reference of type POINTER ALIGNED.v name can be replaced by either of the following values:

    – A character string in single quotation marks (that is, a literal constant).– A PL/I expression or reference whose value can be converted to a character

    string with a length equal to the maximum length allowed for the name. Thevalue of the character string is the name to be used by the argument.

    filename, as used in FILE(filename), specifies the name of the file. The name musthave 1-8 characters from the range A–Z, 0–9, $, @, and #.systemname, as used in SYSID(systemname), specifies the name of the system towhich the request is directed. The name must have 1-4 characters from the rangeA–Z, 0–9, $, @, and #.

    v label can be replaced by any PL/I expression whose value is a label.v hhmmss can be replaced by a decimal constant or an expression that can be

    converted to a FIXED DECIMAL(7,0). The value must be of the form0HHMMSS+ where:

    HH Represents hours from 00 through 99.

    MM Represents minutes from 00 through 59.

    SS Represents seconds from 00 through 59.

    About the CICS API commands 7

    ||

    ||

  • If the UNALIGNED attribute is added to the ENTRY declarations generated by theCICS translator by a DEFAULT DESCRIPTORS statement, data-area orpointer-reference arguments to CICS commands must also be UNALIGNED.Similarly for the ALIGNED attribute, data-area or pointer-reference argumentsmust be ALIGNED.

    Many commands involve the transfer of data between the application program andCICS.

    In most cases, the length of the data to be transferred must be provided by theapplication program. However, if a data area is specified as the source or target, itis not necessary to provide the length explicitly, because the command-languagetranslator generates a default length value of either STG(data-area) orCSTG(data-area), as appropriate.

    Assembler-language argument values

    In general, an argument can be either the address of the data or the data itself (inassembler-language terms, either a relocatable expression or an absoluteexpression).

    A relocatable expression must not contain unmatched brackets (outside quotationmarks) or unmatched quotation marks (apart from length-attribute references). Ifthis rule is obeyed, any expression can be used, including literal constants, such as=AL2(100), forms such as 20(0,R11), and forms that use the macro-replacementfacilities.

    An absolute expression must be a single term that is either a length-attributereference, or a self-defining constant.

    Care must be taken with equated symbols, which should be used only whenreferring to registers (pointer references). If an equated symbol is used for a length,for example, it is treated as the address of the length and an unpredictable erroroccurs.

    The argument values can be replaced as follows:v data-value can be replaced by a relocatable expression that is an

    assembler-language reference to data of the correct type for the argument, or bya constant of the correct type for the argument.

    v data-area can be replaced by a relocatable expression that is anassembler-language reference to data of the correct type for the argument.

    v cvda is described in “CICS-value data areas (cvdas)” on page 17.v ptr-value can be replaced by an absolute expression that is an assembler-language

    reference to a register.v ptr-ref can be replaced by an absolute expression that is an assembler-language

    language reference to a register.v name can be replaced either by a character string in single quotation marks, or

    by an assembler-language language relocatable expression reference to acharacter string. The length is equal to the maximum length allowed for thename. The value of the character string is the name to be used by the argument.filename, as used in FILE(filename), specifies the name of the file. The name musthave 1–8 characters from the range A–Z, 0–9, $, @, and #.

    8 CICS TS for z/OS 4.2: Application Programming Reference

  • systemname, as used in SYSID(systemname), specifies the name of the system towhich the request is directed. The name must have 1–4 characters from therange A–Z, 0–9, $, @, and #.

    v label refers to a destination address to which control is transferred. It can bereplaced by the label of the destination instruction or by the label of an addressconstant for the destination. This constant must not specify a length.You can also use the expression =A(dest) where dest is a relocatable expressiondenoting the destination.For example, the following commands are equivalent:

    v hhmmss can be replaced by a self-defining decimal constant, or anassembler-language reference to a field defined as PL4. The value must be of theform 0HHMMSS+ where:

    HH Represents hours from 00 through 99

    MM Represents minutes from 00 through 59

    SS Represents seconds from 00 through 59.

    Many commands involve the transfer of data between the application program andCICS.

    In most cases, the length of the data to be transferred must be provided by theapplication program. However, if a data area is specified as the source or target, itis not necessary to provide the length explicitly, because the command-languagetranslator generates a default length.

    For example:

    CICS command restrictionsA number of general restrictions apply to all CICS commands that access user data.v The program must be in primary addressing mode when invoking any CICS

    service. The primary address space must be the home address space. Allparameters passed to CICS must reside in the primary address space.

    v If your program uses access registers CICS only preserves access registers 2through 13, because CICS code can use access registers 0, 1, 14 and 15 for z/OSmacro calls.

    HANDLE CONDITION ERROR(DEST)HANDLE CONDITION ERROR(ADCON)HANDLE CONDITION ERROR(=A(DEST))...DEST BR 14ADCON DC A(DEST)

    xxx DC CL8..EXEC CICS ... LENGTH(L’xxx)

    About the CICS API commands 9

  • LENGTH options in CICS commandsIn COBOL, PL/I, and Assembler language, the translator defaults certain lengths, ifthe NOLENGTH translator option is not specified. This means they are optional inprograms that specify data areas. In C, all LENGTH options must be specified.

    When a CICS command offers the LENGTH option, it is expressed as a signedhalfword binary value. This puts a theoretical upper limit of 32 763 bytes onLENGTH. In practice, depending on issues of recoverability, function shipping, andother factors assume a 24 KB limit.

    This advisory 24 KB limit does not apply to the FLENGTH option on CICScommands (except for terminal-related SEND and RECEIVE commands, due toarchitectural limitations). The FLENGTH option is used on commands relating tocontainers and journals, among others.

    For temporary storage, transient data, and file control commands, the data setdefinitions can themselves impose further restrictions.

    NOHANDLE optionUse the NOHANDLE option with any command to specify that you want noaction to be taken for any condition or AID resulting from the execution of thatcommand.

    For further information about the NOHANDLE option, see the CICS ApplicationProgramming Guide.

    Using the C or C++ language implies NOHANDLE on all commands.

    RESP and RESP2 optionsYou can use the RESP option with any command to test whether a condition wasraised during its execution. With some commands, when a condition can be raisedfor more than one reason, you can, if you have already specified RESP, use theRESP2 option to determine exactly why a condition occurred.

    RESP(xxx)“xxx” is a user-defined fullword binary data area. On return from thecommand, it contains a value corresponding to the condition that may havebeen raised, or to a normal return, that is, xxx=DFHRESP(NORMAL). You cantest this value by means of DFHRESP, as follows:

    The above form of DFHRESP applies to both COBOL and PL/I.

    An example of a similar test in C:

    EXEC CICS WRITEQ TS FROM(abc)QUEUE(qname)NOSUSPENDRESP(xxx)RESP2(yyy)

    .

    .IF xxx=DFHRESP(NOSPACE) THEN ...

    10 CICS TS for z/OS 4.2: Application Programming Reference

  • An example of a similar test in assembly language:

    which the translator changes to:

    As the use of RESP implies NOHANDLE, you must be careful when usingRESP with the RECEIVE command, because NOHANDLE overrides theHANDLE AID command as well as the HANDLE CONDITION command,with the result that PF key responses are ignored.

    RESP2(yyy)“yyy” is a user-defined fullword binary data area. On return from thecommand, it contains a value that further qualifies the response to certaincommands. Unlike the RESP values, RESP2 values have no associated symbolicnames and there is no translator built-in function corresponding to DFHRESP,so you must test the fullword binary value itself.

    Translated code for CICS commandsApplication programs can be written in COBOL, C, PL/I, or assembly language,and contain CICS commands. CICS translates these programs and creates anequivalent source program where each command is now translated into a callmacro or statement in the language of the original source program.

    COBOL translation outputEXEC CICS commands are converted to calls to the CICS interface DFHEI1.

    The following example shows how the EXEC statement:is translated to:

    switch (xxx) {case DFHRESP(NORMAL) : break;case DFHRESP(INVREQ) : Invreq_Cond();

    break;default : Errors();

    }

    CLC xxx,DFHRESP(NOSPACE)

    CLC xxx,=F’18’

    EXEC CICS RETURN TRANSID(’fred’)COMMAREA(mycommarea) END-EXEC.

    Move length of mycommarea to dfhb0020Call ’DFHEI1’ using by content

    x’0e08e0000700001000f0f0f0f2f7404040’by content ’fred’ by reference mycommareaby reference dfhb0020 end-call.

    About the CICS API commands 11

  • Copybook DFHEIBLCThis new copybook is a lower case version of the existing DFHEIBLK copybook.

    A difference is that in DFHEIBLK the top level name is

    whereas in DFHEIBLC the top level name is

    This is consistent with the name generated by the translator today, and alsoconforms to the rule that CICS reserved words should start with DFH.

    C translation outputFor a C application program, each command is replaced by reassignmentstatements followed by a dfhexec statement that passes the parameters.

    PL/I translation outputFor a PL/I application program, each command is always replaced by a DOstatement, a declaration of a generated entry name, a CALL statement, and anEND statement. The ENTRY declaration ensures that the appropriate conversionsfor argument values take place.

    If a PL/I on-unit consists of a single EXEC CICS command, the command shouldbe inside a BEGIN block, for example:

    In a similar way, if an EXEC CICS command is associated with a PL/I conditionprefix, the command should be inside a BEGIN block, for example:

    If OPTIONS(MAIN) is specified, the translator modifies the parameter list byinserting the EIB structure pointer as the first parameter. If OPTIONS(MAIN) is notspecified (that is, if the program is to be link-edited to the main module), theparameter list is not modified, and it is the application programmer's responsibilityto address the EIB structure in the link-edited program if access to it is required. Ineither case, where a program commences with a valid PL/I PROCEDUREstatement, the translator inserts the declaration of the EIB structure.

    01 EIBLK.

    01 dfheiblk.

    ON ERROR BEGIN;EXEC CICS RETURN;END;

    (NOZERODIVIDE): BEGIN;EXEC CICS GETMAINSET(ptr-ref)LENGTH(data-value);END;

    12 CICS TS for z/OS 4.2: Application Programming Reference

  • Assembler translation outputThe invocation of a CICS assembly language application program obeys systemstandards.

    On entry to the application program, registers 1, 15, 14, and 13 contain thefollowing:v Register 1 contains the address of the parameter list; there are at least two

    entries in this list, as follows:– Address of the EIB (EXEC interface block)– Address of the COMMAREA; if no COMMAREA, entry is X'00000000'

    v Register 15 contains the address of the entry pointv Register 14 contains the address of the return pointv Register 13 contains the address of the save area.

    All other registers are undefined.

    DFHECALL macroFor an assembly language application program, each command is replaced by aninvocation of the DFHECALL macro.

    This macro expands to a system-standard call sequence using registers 15, 14, 0,and 1, whose contents are:v Register 15 contains the address of the entry point in the EXEC interface

    program.v Register 14 contains the address of the return point in your application program.v Register 0 is undefined.v Register 1 contains the address of the parameter list.

    The entry point held in register 15 is resolved in the EXEC interface processor(DFHEAI) that must be link-edited with your application program.

    You can specify the exit from the application program by an EXEC CICS RETURNcommand in your source program. Alternatively, you can let the translator-insertedmacro DFHEIRET, which has been inserted before the END statement, do it. Thismacro only restores the registers and returns control to the address in register 14.Note that this can be used to return from a top-level program but is not advisablefrom a lower-level program.

    During assembly, the DFHECALL macro builds an argument list in dynamicstorage, so that the application program is reentrant, and then invokes the EXECinterface program (DFHEIP). DFHEIP also obeys system standards, as describedabove.

    In addition to the invocation of the DFHECALL macro, the translator also insertsthe following macros into your source program:

    DFHEIGBL

    This macro sets globals if you are using EXEC DLI in either a batch or anonline CICS application program. Within DFHEIGBL, if DFHEIDL is set to1, this means that the program contains EXEC DLI commands. If DFHEIDBis set to 1, this means that the program is batch DL/I. If you are not usingDL/I, it is commented and set to 0.

    DFHEIENT

    About the CICS API commands 13

  • This macro is inserted after the first CSECT or START instruction. Itperforms prolog code; that is, it:v Saves registersv Gets an initial allocation of the storage defined by DFHEISTG)v Sets up a base register (default register 3)v Sets up a dynamic storage register (default register 13)v Sets up a register to address the EIB (default register 11)

    DFHEIRET

    This macro performs epilog code; that is, it:v Restores registers

    DFHEIRET RCREG=nn, where nn (any register number other than 13)contains the return code to be placed in register 15 after the registers arerestored.

    v Returns control to the address in register 14.

    DFHEISTG and DFHEIEND

    These macros define dynamic storage; that is, they:v Define the storage required for the parameter listv Define a save area.

    A copybook, DFHEIBLK, containing a DSECT that describes the EIB, is alsoincluded automatically.

    Note that the program must have an END statement because the translator doesnot otherwise insert the default macros.

    The example in Figure 1 shows a simple assembly language application programthat uses the BMS command SEND MAP to send a map to a terminal. The lowerpart of the figure shows the output after program INSTRUCT has been translated.

    Extensions to dynamic storageYou can extend dynamic storage to provide extra storage for user variables bydefining these variables in your source program in a DSECT called DFHEISTG.

    Source program

    INSTRUCT CSECTEXEC CICS SEND MAP(’DFH$AGA’) MAPONLY ERASEEND

    The above source program is translated to:

    DFHEIGBL , INSERTED BY TRANSLATORINSTRUCT CSECT

    DFHEIENT INSERTED BY TRANSLATOR* EXEC CICS SEND MAP(’DFH$AGA’) MAPONLY ERASE

    DFHECALL =X’1804C0000800000000046204000020’,(CHA7,=CL7’DFH$AGA*’),(______RF,DFHEIV00)

    DFHEIRET INSERTED BY TRANSLATORDFHEISTG INSERTED BY TRANSLATORDFHEIEND INSERTED BY TRANSLATOREND

    Figure 1. Translated code for a CICS command

    14 CICS TS for z/OS 4.2: Application Programming Reference

  • The maximum amount of dynamic storage obtainable using the DFHEISTG DSECTis 65 264 bytes. (Note that DFHEISTG is a reserved name.) This storage isinitialized to X'00'. At translation, the translator inserts the DFHEISTG macroimmediately following your DFHEISTG DSECT instruction. In this way the DSECTdescribes dynamic storage needed for the parameter list, for the command-levelinterface, and for any user variables.At link-edit time, use the STORAGE option ofthe CEEXOPT macro to ensure that the DFHEISTG storage is initialized to x'00', forexample, CEEXOPT STORAGE=(,,00). Make sure that your application propagates orinitializes any constants that are defined in the user DFHEISTG area.

    The example in Figure 2 shows a simple assembly language application programthat uses such variables in dynamic storage.

    Multiple base registersThe values provided by the automatic insertion of the DFHEIENT macro might beinadequate for application programs that produce a translated output greater than4095 bytes. You can prevent the translator from automatically inserting its versionof the DFHEIENT macro, and use your own, by specifying the translator optionNOPROLOG.

    For example, by default, the translator sets up only one base register (register 3),or, when the DLI translator option has been specified, the literals produced by the

    Source program

    DFHEISTG DSECTCOPY DFH$AGA INPUT MAP DSECTCOPY DFH$AGB OUTPUT MAP DSECT

    MESSAGE DS CL39INQUIRY CSECT

    EXEC CICS RECEIVE MAP(’DFH$AGA’)MVC NUMBO,KEYIMVC MESSAGE,=CL(L’MESSAGE)’THIS IS A MESSAGE’EXEC CICS SEND MAP(’DFH$AGB’) ERASEEND

    The above source program is translated to:

    DFHEIGBL , INSERTED BY TRANSLATORDFHEISTG DSECT

    DFHEISTG INSERTED BY TRANSLATORCOPY DFH$AGA INPUT MAP DSECTCOPY DFH$AGB OUTPUT MAP DSECT

    MESSAGE DS CL39INQUIRY CSECT

    DFHEIENT INSERTED BY TRANSLATOR* EXEC CICS RECEIVE MAP(’DFH$AGA’)

    DFHECALL =X’1802C0000800000000040900000020’,(CHA7,=CL7’DFH$AGA*’),(______RF,DFH$AGAI)

    MVC NUMBO,KEYIMVC MESSAGE,=CL(L’MESSAGE)’THIS IS A MESSAGE’

    * EXEC CICS SEND MAP(’DFH$AGB’) ERASEDFHECALL =X’1804C000080000000004E204000020’,

    (CHA7,=CL7’DFH$AGB*’),(______RF,DFH$AGBO)DFHEIRET INSERTED BY TRANSLATORDFHEISTG INSERTED BY TRANSLATORDFHEIEND INSERTED BY TRANSLATOREND

    Figure 2. Translated code for user variables

    About the CICS API commands 15

  • translator initializing the DIB could fall outside the range of that single baseregister. You can provide your own DFHEIENT macro with the CODEREGoperand so that you can specify more than one base register. You must code yourown version of the DFHEIENT macro in place of the first CSECT or STARTinstruction in your source program.

    The operands you can use to specify base registers are as follows:v CODEREG - base registers.v DATAREG - dynamic-storage registers.v EIBREG - register to address the EIB.

    For example, the source code shown in Figure 1 on page 14 would become:

    The symbolic register DFHEIPLR is equated to the first DATAREG either explicitlyspecified or obtained by default. Because register 13 points to the save area definedin dynamic storage by DFHEISTG, you use register 13 as the first dynamic-storageregister.

    DFHEIPLR is assumed by the expansion of a CICS command to contain the valueset up by DFHEIENT. You should either dedicate this register or ensure that it isrestored before each CICS command.

    You can also use the DFHEIENT macro to specify that you want to use relativeaddressing instructions in your program. When you use relative addressing, youdo not need to use any base registers to address your program instructions, butyou must use at least one register to address static data in your program. Specifythe following operands on the DFHEIENT macro:v CODEREG=0 to specify that no registers are to be used to address program

    instructions.v STATREG to specify one or more registers to address the static data area in your

    program.v STATIC to specify the address of the start of the static data in your program.

    If you use relative addressing, include a COPY statement for the copybookIEABRC (provided by z/OS) to redefine the assembler mnemonics for branchinstructions to use relative branch instructions. Also, ensure that any LTORGstatements, and instructions that are the target of EXECUTE instructions, appearafter the label specified in the STATIC operand. For example:

    COPY IEABRC Define relative branch mnemonicsRELATIVE DFHEIENT CODEREG=0,STATREG=(8,9),STATIC=MYSTATIC

    ....EX R2,VARMOVE Execute instruction in static area....

    MYSTATIC DS 0D Static data area

    INSTRUCT DFHEIENT CODEREG=(2,3,4),DATAREG=(13,5),EIBREG=6EXEC CICS SENDMAP(’DFH$AGA’)MAPONLY ERASEEND

    16 CICS TS for z/OS 4.2: Application Programming Reference

    |||||

    |||||||

  • MYCONST DC C’constant’ Static data valueVARMOVE MVC WORKA(0),WORKB Executed instruction

    LTORG , Literal pool

    Assembler language programs that are translated with the DLI option have a DLIinitialization call inserted after each CSECT statement. Assembler languageprograms that are larger than 4095 bytes and that do not use the CODEREGoperand of the DFHEIENT macro to establish multiple base registers, must includean LTORG statement to ensure that the literals, generated by either DFHEIENT ora DLI initialization call, fall in the range of the base register.

    In general, an LTORG statement is needed for every CSECT that exceeds 4095bytes in length.

    CICS-value data areas (cvdas)There are options on a number of commands that describe or define a resource.CICS supplies, in CICS-value data areas, the values associated with these options.The options are shown in the syntax of the commands with the term cvda inparentheses.

    You pass a CVDA value in two different ways:v You can assign a CVDA value with the translator routine DFHVALUE. This

    allows you to change a CVDA value in the program as the result of otherrun-time factors.For example:

    v If the required action is always the same, you can declare the value directly.For example:

    You receive a CVDA value by defining a fullword binary data area and thentesting the returned value with the translator routine DFHVALUE. For example:

    The CICS System Programming Reference lists the CVDA values and their numericequivalents.

    CICS threadsafe commands in the APIIf your application program is defined as threadsafe, it can receive control on anopen transaction environment (OTE) TCB.

    MOVE DFHVALUE(NOTPURGEABLE) TO AREA-A.EXEC CICS WAIT EXTERNAL ECBLIST() NUMEVENTS()

    PURGEABILITY(AREA-A)

    EXEC CICS WAITCICS ECBLIST() NUMEVENTS() PURGEABLE

    EXEC CICS CONNECT PROCESS .... STATE(AREA-A)IF AREA-A = DFHVALUE(ALLOCATED) ....IF AREA-A = DFHVALUE(CONFFREE) ....

    About the CICS API commands 17

    |||

  • This happens if a program in the task issues a DB2® SQL request that causes CICSto pass control to the CICS DB2 adaptor on an L8 open TCB. Although the task isattached and runs initially on the CICS QR TCB, CICS switches it to an L8 TCB forthe execution of the DB2 request. If you define the application program issuing theSQL request as threadsafe, CICS leaves the task running on the L8 open TCB onreturn from DB2, to avoid a costly TCB switch. For more information, see the CICSDB2 Guide.

    To obtain the maximum performance benefit from OTE, write your CICS DB2application programs in a threadsafe manner to avoid CICS having to switch TCBs.However, be aware that not all EXEC CICS commands are threadsafe, and issuingany of the non-threadsafe commands causes CICS to switch your task back to theQR TCB to ensure serialization. The commands that are threadsafe are indicated inthe command syntax diagrams in this programming reference with the statement:“This command is threadsafe”, and are listed in “Threadsafe commands.”

    For information about writing threadsafe application programs, see the CICSApplication Programming Guide.

    Threadsafe commandsNot all EXEC CICS commands are threadsafe, and issuing any of the nonthreadsafecommands causes CICS to use the QR TCB to ensure serialization.

    See Threadsafe programs in CICS Application Programming for information aboutwriting threadsafe application programs.

    Commands marked with an asterisk (*) are threadsafe if the file to which acommand refers is:v Defined as remote and the command is function shipped over an IPIC

    connection to a remote CICS regionv Defined as either local VSAM or RLS

    If the file is a shared data table, coupling facility data table, or BDAM file, thecommand is not threadsafe.

    Threadsafe commands:

    v ABENDv ADDRESSv ASKTIMEv ASSIGNv BIF DEEDITv BIF DIGESTv CHANGE PASSWORDv CHANGE PHRASEv CHANGE TASKv CONVERTTIMEv DEFINE COUNTER and DEFINE DCOUNTERv DELETE *

    v DELETE CONTAINER (CHANNEL)v DELETE COUNTER and DELETE DCOUNTER

    18 CICS TS for z/OS 4.2: Application Programming Reference

    ||

    ||

    |

    ||

    |

    |

    |

    |

    |

    |

    http://publib.boulder.ibm.com/infocenter/cicsts/v4r2/topic/com.ibm.cics.ts.applicationprogramming.doc/topics/dfhp3_concepts_threadsafe.html

  • v DELETEQ TSv DEQ (This command is threadsafe if it is defined as LOCAL. It is nonthreadsafe if

    it is defined as GLOBAL.)v DOCUMENT CREATEv DOCUMENT DELETEv DOCUMENT INSERTv DOCUMENT RETRIEVEv DOCUMENT SETv ENDBR *

    v ENQ (This command is threadsafe if it is defined as LOCAL. It is nonthreadsafe ifit is defined as GLOBAL.)

    v ENTER TRACENUMv EXEC DLIv EXTRACT CERTIFICATEv EXTRACT TCPIPv EXTRACT WEBv FORMATTIMEv FREEMAINv GET CONTAINER (CHANNEL)v GET COUNTER and GET DCOUNTERv GETMAINv HANDLE ABENDv HANDLE AIDv HANDLE CONDITIONv IGNORE CONDITIONv INVOKE SERVICEv INVOKE WEBSERVICEv LINK (This command is threadsafe when it is used to link to a program in a local

    CICS region or in a remote CICS region over an IPIC connection. It isnonthreadsafe when it is used to link to a program in a remote CICS region overanother type of connection.)

    v LOADv MONITORv MOVE CONTAINER (CHANNEL)v POP HANDLEv PUSH HANDLEv PUT CONTAINER (CHANNEL)v QUERY COUNTER and QUERY DCOUNTERv QUERY SECURITYv READ *

    v READNEXT *

    v READPREV *

    v READQ TSv RELEASEv RESETBR *

    v RETURN

    About the CICS API commands 19

    |

    |

    |

    |

    ||||

    |

    |

  • v REWIND COUNTER and REWIND DCOUNTERv REWRITE *

    v SIGNAL EVENTv SIGNOFFv SIGNONv SOAPFAULT ADDv SOAPFAULT CREATEv SOAPFAULT DELETEv STARTBR *

    v SUSPENDv SYNCPOINT (The Recovery Manager processes this command on an open TCB

    wherever possible to minimize TCB switching.)v SYNCPOINT ROLLBACK (The Recovery Manager processes this command on an

    open TCB wherever possible to minimize TCB switching.)v TRANSFORM DATATOXMLv TRANSFORM XMLTODATAv UNLOCK *

    v UPDATE COUNTER and UPDATE DCOUNTERv VERIFY PASSWORDv VERIFY PHRASEv WAIT EXTERNALv WAIT JOURNALNAMEv WAIT JOURNALNUMv WEB CLOSEv WEB CONVERSEv WEB ENDBROWSE FORMFIELDv WEB ENDBROWSE HTTPHEADERv WEB ENDBROWSE QUERYPARMv WEB EXTRACTv WEB OPENv WEB PARSE URLv WEB READ FORMFIELDv WEB READ HTTPHEADERv WEB READNEXT FORMFIELDv WEB READNEXT HTTPHEADERv WEB READ QUERYPARMv WEB READNEXT QUERYPARMv WEB RECEIVEv WEB RETRIEVEv WEB SENDv WEB STARTBROWSE FORMFIELDv WEB STARTBROWSE HTTPHEADERv WEB STARTBROWSE QUERYPARMv WEB WRITE HTTPHEADERv WRITE *

    20 CICS TS for z/OS 4.2: Application Programming Reference

    |

    |

    |

    ||

    ||

    |

    |

    |

  • v WRITE JOURNALNAMEv WRITE JOURNALNUMv WRITEQ TSv WSACONTEXT BUILDv WSACONTEXT DELETEv WSACONTEXT GETv WSAEPR CREATEv XCTL

    Invoking DL/I by using the applicable language interface, for example the COBOLstatement CALL CBLTDLI, is now threadsafe when used with IMS Version 12 or later.

    About the CICS API commands 21

    ||

  • 22 CICS TS for z/OS 4.2: Application Programming Reference

  • CICS API commands

    CICS provides the following API commands.

    © Copyright IBM Corp. 1989, 2014 23

  • CICS command summaryThe EXEC CICS commands categorized according to the function they perform.

    Abend supportv ABENDv HANDLE ABEND

    APPC basic conversationv GDS ALLOCATEv GDS ASSIGNv GDS CONNECT PROCESSv GDS EXTRACT ATTRIBUTESv GDS EXTRACT PROCESSv GDS FREEv GDS ISSUE ABENDv GDS ISSUE CONFIRMATIONv GDS ISSUE ERRORv GDS ISSUE PREPAREv GDS ISSUE SIGNALv GDS RECEIVEv GDS SENDv GDS WAIT

    APPC mapped conversationv ALLOCATE (APPC)v CONNECT PROCESSv CONVERSE (APPC)v EXTRACT ATTRIBUTES (APPC)v EXTRACT PROCESSv FREE (APPC)v ISSUE ABENDv ISSUE CONFIRMATIONv ISSUE ERRORv ISSUE PREPAREv ISSUE SIGNAL (APPC)v RECEIVE (APPC)v SEND (APPC)v WAIT CONVID (APPC)

    Authenticationv CHANGE PASSWORDv SIGNOFFv SIGNONv VERIFY PASSWORD

    24 CICS TS for z/OS 4.2: Application Programming Reference

  • Batch data interchangev ISSUE ABORTv ISSUE ADDv ISSUE ENDv ISSUE ERASEv ISSUE NOTEv ISSUE QUERYv ISSUE RECEIVEv ISSUE REPLACEv ISSUE SENDv ISSUE WAIT

    BMSv PURGE MESSAGEv RECEIVE MAPv RECEIVE MAP MAPPINGDEVv RECEIVE PARTNv ROUTEv SEND CONTROLv SEND MAPv SEND MAP MAPPINGDEVv SEND PAGEv SEND PARTNSETv SEND TEXTv SEND TEXT MAPPEDv SEND TEXT NOEDIT

    Built-in functionsv BIF DEEDITv BIF DIGEST

    CICS business transaction services (BTS)v ACQUIREv ADD SUBEVENTv CANCELv CHECK ACQPROCESSv CHECK ACTIVITYv CHECK TIMERv DEFINE ACTIVITYv DEFINE COMPOSITE EVENTv DEFINE INPUT EVENTv DEFINE PROCESSv DEFINE TIMERv DELETE ACTIVITYv DELETE CONTAINER (BTS)v DELETE EVENT

    CICS API commands 25

  • v DELETE TIMERv ENDBROWSE ACTIVITYv ENDBROWSE CONTAINERv ENDBROWSE EVENTv ENDBROWSE PROCESSv FORCE TIMERv GET CONTAINER (BTS)v GETNEXT ACTIVITYv GETNEXT CONTAINERv GETNEXT EVENTv GETNEXT PROCESSv INQUIRE ACTIVITYIDv INQUIRE CONTAINERv INQUIRE EVENTv INQUIRE PROCESSv INQUIRE TIMERv LINK ACQPROCESSv LINK ACTIVITYv MOVE CONTAINER (BTS)v PUT CONTAINER (BTS)v REMOVE SUBEVENTv RESET ACQPROCESSv RESET ACTIVITYv RESUMEv RETRIEVE REATTACH EVENTv RETRIEVE SUBEVENTv RUNv STARTBROWSE ACTIVITYv STARTBROWSE CONTAINERv STARTBROWSE EVENTv STARTBROWSE PROCESSv SUSPEND (BTS)v TEST EVENT

    Channel commandsv DELETE CONTAINER (CHANNEL)v GET CONTAINER (CHANNEL)v MOVE CONTAINER (CHANNEL)v PUT CONTAINER (CHANNEL)v START TRANSID (CHANNEL) or START CHANNEL

    Console supportv WRITE OPERATOR

    26 CICS TS for z/OS 4.2: Application Programming Reference

  • Diagnostic servicesv DUMP TRANSACTIONv ENTER TRACENUM

    Document servicesv DOCUMENT CREATEv DOCUMENT DELETEv DOCUMENT INSERTv DOCUMENT RETRIEVEv DOCUMENT SET

    Environment servicesv ADDRESSv ADDRESS SETv ASSIGN

    Event processingv SIGNAL EVENT

    Exception supportv HANDLE CONDITIONv IGNORE CONDITIONv POP HANDLEv PUSH HANDLE

    File control servicesv DELETEv ENDBRv READv READNEXTv READPREVv RESETBRv REWRITEv STARTBRv UNLOCKv WRITE

    Interval control servicesv ASKTIMEv CANCELv DELAYv FORMATTIMEv POSTv RETRIEVEv STARTv WAIT EVENT

    CICS API commands 27

  • Journalingv WAIT JOURNALNAMEv WAIT JOURNALNUMv WRITE JOURNALNAMEv WRITE JOURNALNUM

    Monitoringv MONITOR

    Named counter serverv DEFINE COUNTER and DELETE DCOUNTERv DELETE COUNTER and DELETE DCOUNTERv GET COUNTER and GET DCOUNTERv QUERY COUNTER and QUERY DCOUNTERv REWIND COUNTER and REWIND DCOUNTERv UPDATE COUNTER and UPDATE DCOUNTER

    Program controlv LINKv LOADv RELEASEv RETURNv XCTL

    Scheduling servicesv START ATTACHv START BREXIT

    Security servicesv QUERY SECURITY

    Spool Interface (JES)v SPOOLCLOSEv SPOOLOPEN INPUTv SPOOLOPEN OUTPUTv SPOOLREADv SPOOLWRITE

    Storage controlv FREEMAINv GETMAIN

    Syncpointv SYNCPOINTv SYNCPOINT ROLLBACK

    28 CICS TS for z/OS 4.2: Application Programming Reference

  • Task controlv CHANGE TASKv DEQv ENQv SUSPENDv WAIT EXTERNALv WAITCICS

    TCP/IP servicesv EXTRACT CERTIFICATEv EXTRACT TCPIP

    Temporary storage controlv DELETEQ TSv READQ TSv WRITEQ TS

    Terminal controlv ALLOCATE (LUTYPE6.1)v ALLOCATE (MRO)v BUILD ATTACH (LUTYPE6.1)v BUILD ATTACH (MRO)v CONVERSE (APPC)v CONVERSE (LUTYPE2/LUTYPE3)v CONVERSE (LUTYPE4)v CONVERSE (LUTYPE6.1)v CONVERSE (MRO)v CONVERSE (SCS)v CONVERSE (2260)v CONVERSE (3270 logical)v CONVERSE (3600-3601)v CONVERSE (3600-3614)v CONVERSE (3650 interpreter)v CONVERSE (3650-3270)v CONVERSE (3650-3653)v CONVERSE (3650-3680)v CONVERSE (3767)v CONVERSE (3770)v CONVERSE (3790 full-function or inquiry)v CONVERSE (3790 3270-display)v EXTRACT ATTACH (LUTYPE6.1)v EXTRACT ATTACH (MRO)v EXTRACT ATTRIBUTES (MRO)v EXTRACT LOGONMSGv EXTRACT TCTv FREE (LUTYPE6.1)

    CICS API commands 29

  • v FREEv FREE (MRO)v HANDLE AIDv ISSUE COPY (3270 logical)v ISSUE DISCONNECTv ISSUE ENDFILEv ISSUE ENDOUTPUTv ISSUE EODSv ISSUE ERASEAUPv ISSUE LOADv ISSUE PASSv ISSUE PRINTv ISSUE RESETv ISSUE SIGNAL (LUTYPE6.1)v POINTv RECEIVE (APPC)v RECEIVE (LUTYPE2/LUTYPE3)v RECEIVE (LUTYPE4)v RECEIVE (LUTYPE6.1)v RECEIVE (MRO)v RECEIVE (2260)v RECEIVE (2980)v RECEIVE (3270 logical)v RECEIVE (3600-3601)v RECEIVE (3600-3614)v RECEIVE (3650)v RECEIVE (3767)v RECEIVE (3770)v RECEIVE (3790 full-function or inquiry)v RECEIVE (3790 3270-display)v SEND (APPC)v SEND (LUTYPE2/LUTYPE3)v SEND (LUTYPE4)v SEND (LUTYPE6.1)v SEND (MRO)v SEND (SCS)v SEND (2260)v SEND (2980)v SEND (3270 logical)v SEND (3600 pipeline)v SEND (3600-3601)v SEND (3600-3614)v SEND (3650 interpreter)v SEND (3650-3270)v SEND (3650-3653)

    30 CICS TS for z/OS 4.2: Application Programming Reference

  • v SEND (3650-3680)v SEND (3767)v SEND (3770)v SEND (3790 full-function or inquiry)v SEND (3790 SCS)v SEND (3790 3270-display)v SEND (3790 3270-printer)v WAIT SIGNALv WAIT TERMINAL

    Transient datav DELETEQ TDv READQ TDv WRITEQ TD

    Web supportv CONVERTTIMEv EXTRACT WEBv WEB CLOSEv WEB CONVERSEv WEB ENDBROWSE FORMFIELDv WEB ENDBROWSE HTTPHEADERv WEB EXTRACTv WEB OPENv WEB PARSE URLv WEB READ FORMFIELDv WEB READ HTTPHEADERv WEB READNEXT FORMFIELDv WEB READNEXT HTTPHEADERv WEB RECEIVE (Server and Client versions)v WEB RETRIEVEv WEB SEND (Server and Client versions)v WEB STARTBROWSE FORMFIELDv WEB STARTBROWSE HTTPHEADERv WEB WRITE HTTPHEADER

    Web servicesv INVOKE SERVICEv INVOKE WEBSERVICEv SOAPFAULT ADDv SOAPFAULT CREATEv SOAPFAULT DELETEv TRANSFORM DATATOXMLv TRANSFORM XMLTODATAv WSACONTEXT BUILDv WSACONTEXT DELETEv WSACONTEXT GETv WSAEPR CREATE

    CICS API commands 31

  • ABENDTerminate a task abnormally.

    Description

    The ABEND command terminates a task abnormally.

    CICS releases the main storage associated with the terminated task; optionally, youcan obtain a transaction dump of this storage.

    Invoking the ABEND command causes the current transaction to abend. TheLanguage Environment® is informed that an abend has occurred and the followingmessage is written out to CEEMSG followed by a dump report:CEE3250C The system or user abend XXXX was issued

    XXXX is the transaction dump code specified on the ABCODE option. The LanguageEnvironment attempts to access register addresses to dump out the referencedstorage as part of the dump report written to CEEMSG. If the LanguageEnvironment does not have access to the storage addressed by these registers an0C4 abend can occur. You can eliminate 0C4 abends by setting the LanguageEnvironment runtime option TERMTHDACT to QUIET, MSG, or UAONLY. SeeTERMTHDACT for more information.

    Options

    ABCODE(name) Specifies that main storage related to the terminating task is dumped. TheABCODE is used as a transaction dump code to identify the dump. ABCODEfollows the format rules for DUMPCODE. The “DUMP TRANSACTION” onpage 184 command gives the format rules that apply to DUMPCODE, if theserules are not followed, ABEND does not produce a dump.

    Do not start the name with the letter A, because this is reserved for CICS itself.

    Note: If ABCODE is not used, the effect is the same as NODUMP.

    CANCEL Specifies that exits established by HANDLE ABEND commands are ignored.An ABEND CANCEL command cancels all exits at any level in the task andterminates the task abnormally. If the PL/I STAE execution-time option isspecified, an abnormal termination exit is established by PL/I. This exit isrevoked by the CANCEL option.

    NODUMP Specifies that an abend occurs without causing a dump to be taken. Forprograms link-edited using the Language Environment SCEELKED library,when NODUMP is specified, a dump is never taken, regardless of any settingin the transaction dump table. For programs not link-edited with Language

    ABEND

    ►► ABENDABCODE(name) CANCEL NODUMP

    ►◄

    This command is threadsafe.

    32 CICS TS for z/OS 4.2: Application Programming Reference

    http://www.ibm.com/support/knowledgecenter/SSLTBW_2.1.0/com.ibm.zos.v2r1.ceea300/cltherm.htm

  • Environment, if the transaction dump table already has an entry for the abendcode, or if the abend is in Language Environment run-unit initialization ortermination, the NODUMP option is ignored.

    Examples

    The following example shows how to terminate a task abnormally:EXEC CICS ABEND ABCODE(’BCDE’)

    CICS API commands 33

  • ACQUIREAcquire access to a BTS activity from outside the process that contains it.

    Description

    ACQUIRE enables a program that is executing outside a particular BTS process toaccess an activity within the process. It allows the program to:v Read and write to the activity's data-containersv Issue various commands, such as RUN and LINK, against the activity.1

    An activity that a program gains access to by means of an ACQUIRE command isknown as an acquired activity. A program can acquire only one activity per unit ofwork. The activity remains acquired until the next syncpoint.

    ACQUIRE ACTIVITYID acquires the specified descendant (non-root) activity.

    ACQUIRE PROCESS acquires the root activity of the specified process.

    Note: When a program defines a process, it is automatically given access to theprocess's root activity. (This enables the defining program to access the processcontainers and root activity containers before running the process.) When aprogram gains access to a root activity by means of either a DEFINE PROCESS oran ACQUIRE PROCESS command, the process is known as the acquired process.

    Rules1. A program can acquire only one activity within the same unit of work. The

    activity remains acquired until the next syncpoint. This means, for example,that a program:v Cannot issue both a DEFINE PROCESS and an ACQUIRE PROCESS

    command within the same unit of work.v Cannot issue both an ACQUIRE PROCESS and an ACQUIRE ACTIVITYID

    command within the same unit of work. That is, it can acquire either adescendant activity or a root activity, not one of each.

    2. If a program is executing as an activation of an activity, it cannot:v Acquire an activity in the same process as itself. It cannot, for example, issue

    ACQUIRE PROCESS for the current process.v Use a LINK command to activate the activity that it has acquired.

    3. An acquired activity's process is accessible in the same way as the activity itselfcan access it. Thus, if the acquired activity is a descendant activity:v Its process's containers may be read but not updated.

    1. If the acquired activity is a root activity, against the process.

    ACQUIRE PROCESS

    ►► ACQUIRE PROCESS(data-value) PROCESSTYPE(data-value)ACTIVITYID(data-value)

    ►◄

    Conditions: ACTIVITYBUSY, ACTIVITYERR, INVREQ, IOERR, LOCKED, NOTAUTH, PROCESSBUSY,PROCESSERR

    34 CICS TS for z/OS 4.2: Application Programming Reference

  • v The process may not be the subject of any command—such as RUN, LINK,SUSPEND, RESUME, or RESET—that directly manipulates the process or itsroot activity.

    Conversely, if the acquired activity is a root activity:v Its process's containers may be both read and updated.v The process may be the subject of commands such as RUN, LINK,

    SUSPEND, RESUME, or RESET. The ACQPROCESS keyword on thecommand identifies the subject process as the one the program that issuesthe command has acquired in the current unit of work.

    Options

    ACTIVITYID(data-value)specifies the identifier (1–52 characters) of the descendant activity to beacquired.

    PROCESS(data-value)specifies the name (1–36 characters) of the process whose root activity is to beacquired.

    PROCESSTYPE(data-value)specifies the process-type (1–8 characters) of the process whose root activity isto be acquired.

    Conditions

    107 ACTIVITYBUSYRESP2 values:

    19 The request timed out. It may be that another task using thisactivity-record has been prevented from ending.

    109 ACTIVITYERRRESP2 values:

    8 The activity referred to by the ACTIVITYID option could not be found.

    16 INVREQRESP2 values:

    22 The unit of work that issued the ACQUIRE command has alreadyacquired an activity; a unit of work can acquire only one activity.

    17 IOERRRESP2 values:

    29 The repository file is unavailable.

    30 An input/output error has occurred on the repository file.

    100 LOCKEDThe request cannot be performed because a retained lock exists against therelevant record on the repository file.

    70 NOTAUTHRESP2 values:

    101 The user associated with the issuing task is not authorized to accessthe file associated with the BTS repository data set on which details ofthe process are stored.

    106 PROCESSBUSYRESP2 values:

    CICS API commands 35

  • 13 The request timed out. It may be that another task using thisprocess-record has been prevented from ending.

    108 PROCESSERRRESP2 values:

    5 The process named in the PROCESS option could not be found.

    9 The process-type named in the PROCESSTYPE option could not befound.

    Usage examples

    ACQUIRE ACTIVITYID can be used to implement user-related activities. Forexample, on its first activation an activity might:1. Define an input event to represent a particular user-interaction2. Issue an ASSIGN command to obtain the identifier of its own activity-instance3. Save the input event and activity identifier on a data base4. Return without completing.

    Later, when a user is ready to process the work represented by the activity, he orshe starts a transaction. This transaction, which executes outside the BTS process:1. Retrieves the input event and activity identifier from the data base2. Uses the ACQUIRE ACTIVITYID command to acquire access to the activity3. Places the information required to complete the activity in an input

    data-container, and runs the activity. The INPUTEVENT option of the RUNcommand tells the activity why it is being activated.

    ACQUIRE PROCESS can be used to implement client/server processing. Forexample, a client program might use the DEFINE PROCESS and RUN commandsto create and run a server process, which carries out some work, defines one ormore input events, and returns without completing. The client issues a syncpointor returns. To run the same server process again, the client uses the ACQUIREPROCESS and RUN commands.

    36 CICS TS for z/OS 4.2: Application Programming Reference

  • ADD SUBEVENTAdd a sub-event to a BTS composite event.

    Description

    ADD SUBEVENT adds a sub-event to a BTS composite event. The sub-event:v Must be an atomic (not a composite) eventv Cannot be a system eventv Must not currently be part of a composite eventv Cannot, if the predicate of the composite event uses the AND Boolean operator,

    be an input event.

    Adding a sub-event causes the composite's predicate to be re-evaluated.

    Options

    EVENT(data-value)specifies the name (1–16 characters) of the composite event. This mustpreviously have been defined to the current activity, using the DEFINECOMPOSITE EVENT command.

    SUBEVENT(data-value)specifies the name (1–16 characters) of the atomic event to be added to thecomposite event as a sub-event. The sub-event must previously have beendefined to the current activity, using one of the following commands:v DEFINE ACTIVITYv DEFINE INPUT EVENTv DEFINE TIMER

    It:v Must not currently be part of a composite eventv Cannot, if the predicate of the composite event uses the AND Boolean

    operator, be an input event.

    Conditions

    111 EVENTERRRESP2 values:

    4 The event specified on the EVENT option is not recognized by BTS.

    5 The sub-event specified on the SUBEVENT option is not recognized by. BTS.

    16 INVREQRESP2 values:

    1 The command was issued outside the scope of an activity.

    ADD SUBEVENT

    ►► ADD SUBEVENT(data-value) EVENT(data-value) ►◄

    Conditions: EVENTERR, INVREQ

    CICS API commands 37

  • 2 The event specified on the EVENT option is invalid—it is not acomposite event.

    3 The sub-event specified on the SUBEVENT option is invalid.Specifying any of the following as a sub-event produces this error:v A composite eventv A system eventv A sub-event of another composite eventv A sub-event of this composite event—that is, an atomic event that

    has already been added to this composite eventv An input event, if the composite uses the AND Boolean operator.

    38 CICS TS for z/OS 4.2: Application Programming Reference

  • ADDRESSObtain access to CICS storage areas.

    Note for dynamic transaction routing: Using ADDRESS with CWA could createinter-transaction affinities that adversely affect the use of dynamic transactionrouting. See the CICS Application Programming Guide for more information abouttransaction affinities.

    Description

    ADDRESS accesses the following areas:v The access control environment element (ACEE)v The communication area available to the invoked program (COMMAREA)v The common work area (CWA)v The EXEC interface block (EIB)v The terminal control table user area (TCTUA)v The transaction work area (TWA)

    In assembler language, no more than four options may be specified in oneADDRESS command.

    Options

    ACEE(ptr-ref) returns a pointer to the access control environment element, the control blockthat is generated by an external security manager (ESM) when the user signson. If the user is not signed on, the address of the CICS DFLTUSER's ACEE isreturned. If an ACEE does not exist, CICS sets the pointer reference to the nullvalue, X'FF000000'.

    For information on how to map the ACEE data area, see the mapping macroIHAACEE supplied in SYS1.MACLIB.

    Note: Take care when addressing an ACEE in a server program invoked by adistributed program link. The ACEE address returned depends on the linksecurity and may not be the same as the address of the user signed on at thelocal system.

    COMMAREA(ptr-ref) returns a pointer reference, set to the address of the communication area(COMMAREA) available to the currently executing program. COMMAREA isused to pass information between application programs. If the COMMAREAdoes not exist, the pointer reference is set to the null value, X'FF000000'.

    ADDRESS

    ►► ADDRESSACEE(ptr-ref) COMMAREA(ptr-ref) CWA(ptr-ref) EIB(ptr-ref)

    ►TCTUA(ptr-ref) TWA(ptr-ref)

    ►◄

    This command is threadsafe.

    CICS API commands 39

  • In C, you must use ADDRESS COMMAREA to get the address of thecommunication area, because this is not passed as an argument to a C mainfunction.

    CWA(ptr-ref) returns a pointer reference, set to the address of the common work area(CWA). This area makes information available to applications running in asingle CICS system. If a CWA does not exist, CICS sets the pointer reference tothe null value, X'FF000000'.

    EIB(ptr-ref) returns a pointer reference set to the address of the EXEC interface block (EIB).You must use this option to get addressability to the EIB in applicationroutines other than the first invoked by CICS (where addressability to the EIBis provided automatically). If the application program is translated withSYSEIB in the XOPTS parameter list, this option returns the address of thesystem EIB.

    If TASKDATALOC(ANY) is defined on the transaction definition, the addressof the data may be above or below the 16MB line.

    If TASKDATALOC(BELOW) is defined on the transaction definition, and thedata resides above the 16MB line, the data is copied below the 16MB line, andthe address of this copy is returned.

    C functions must use ADDRESS EIB to get the address of the EXEC interfaceblock, because this address is not passed as an argument to a C main function.You must code an ADDRESS EIB statement at the beginning of eachapplication if you want access to the EIB, or if you are using a command thatincludes the RESP or RESP2 option.

    TCTUA(ptr-ref) returns a pointer reference, set to the address of the terminal control table userarea (TCTUA) for the principal facility, not that for any alternate facility thatmay have been allocated. This area is used for passing information betweenapplication programs, but only if the same terminal is associated with theapplication programs involved. If a TCTUA does not exist, the pointerreference is set to the null value, X'FF000000'.

    TWA(ptr-ref) returns a pointer reference, set to the address of the transaction work area(TWA). This area is used for passing information between applicationprograms, but only if they are in the same task. If a TWA does not exist, thepointer reference is set to the null value, X'FF000000'.

    If TASKDATALOC(ANY) is defined on the transaction definition, the addressof the data may be above or below the 16MB line.

    If TASKDATALOC(BELOW) is defined on the transaction definition, and thedata resides above the 16MB line, the data is copied below the 16MB line, andthe address of this copy is returned.

    40 CICS TS for z/OS 4.2: Application Programming Reference

  • ADDRESS SETSet the address of a structure or pointer.

    Description

    The value from the USING option is used to set the reference in the SET option.

    Options

    SET(data-area/ptr-ref) sets a pointer reference.

    USING(ptr-ref/data-area) supplies a pointer value.

    COBOL example of ADDRESS SET

    To set the address of a structure to a known pointer value:

    To set a pointer variable to the address of a structure:

    ADDRESS SET

    ►► ADDRESS SET(data-area) USING(ptr-ref)SET(ptr-ref) USING(data-area)

    ►◄

    EXEC CICS ADDRESS SET(address of struc)USING(ptr)

    EXEC CICS ADDRESS SET(ptr)USING(address of struc01)

    CICS API commands 41

  • ALLOCATE (APPC)Allocate a session to a remote APPC logical unit for use by an APPC mappedconversation.

    Description

    ALLOCATE makes one of the sessions associated with the named system availableto the application program, and optionally selects a set of session-processingoptions.

    CICS returns, in EIBRSRCE in the EIB, the 4-byte CONVID (conversation identifier)that the application program uses in all subsequent commands that relate to theconversation.

    If a session to the requested APPC LU is not available, the application issuspended until a session does become available. In such a case, the suspension ofthe application can be prevented by specifying either the NOQUEUE or theNOSUSPEND option. NOSUSPEND is still supported as an equivalent forNOQUEUE, but NOQUEUE is the preferred keyword.

    A session is immediately available for allocation only if it is all of the following:v A contention winnerv Already boundv Not already allocated

    CICS attempts to satisfy a request for a session by choosing among sessions in thefollowing order of preference:1. Contention winner that is bound and not already allocated (CICS allocates it).

    This is a session that is immediately available.2. Contention winner that is unbound (CICS binds it and allocates it).3. Contention loser that is bound and not already allocated (CICS bids for it).4. Contention loser that is unbound (CICS binds it and bids for it).

    The action taken by CICS if no session is immediately available depends onwhether you specify NOQUEUE (or the equivalent NOSUSPEND option), and alsoon whether your application has executed a HANDLE command for the SYSBUSYcondition. In these situations, CICS does not bid for sessions or bind additionalsessions. It looks for a session that is immediately available (that is, a contentionwinner that is bound and not already allocated), and if one is not available, theSYSBUSY condition is returned. The possible combinations are shown below:

    ALLOCATE (APPC)

    ►► ALLOCATE SYSID(systemname)PROFILE(name)

    PARTNER(name)NOQUEUE STATE(cvda)

    ►◄

    Conditions: CBIDERR, INVREQ, NETNAMEIDERR, PARTNERIDERR, SYSBUSY, SYSIDERR

    42 CICS TS for z/OS 4.2: Application Programming Reference

  • HANDLE for SYSBUSY condition issued The command is not queued and control is returned immediately to the labelspecified in the HANDLE command, whether or not you have specifiedNOQUEUE.

    No HANDLE issued for SYSBUSY condition If you have specified NOQUEUE (or NOSUSPEND), the request is not queuedand control is returned immediately to your application program. TheSYSBUSY code (X'D3') is set in the EIBRCODE field of the EXEC interfaceblock. You should test this field immediately after issuing the ALLOCATEcommand.

    The HANDLE for SYSBUSY condition therefore has the same effect as theNOQUEUE option, except for where control is returned in the application. If theHANDLE command is used, control is returned to the label, and if it is not used,control is returned to the instruction following the ALLOCATE command.

    If you have omitted the NOQUEUE option, and you have not issued a HANDLEcommand for the SYSBUSY option, then if no session is immediately available,CICS queues the request (and your application waits) until a session is available.The request is allocated a session either when a winner session has becomeavailable, or when CICS has successfully bid for a loser session. Omit theNOQUEUE option when you want all winner or loser sessions to be considered forallocation to the request. You can use the QUEUELIMIT and MAXQTIMEattributes of the CONNECTION resource definitions to limit the length of thequeue of requests, and the time that requests spend on the queue. Managingallocate queues in the CICS Intercommunication Guide has more information aboutallocate queues. The DTIMOUT value specified on the transaction definition can beused to limit the wait time for individual requests.

    Options

    NOQUEUE overrides the default action when a SYSBUSY condition arises. This indicatesthat a session is not immediately available. The default action is to suspendapplication execution until a session is available. NOQUEUE inhibits thiswaiting; control returns immediately to the application program instructionfollowing the command.

    Note, however, that if a HANDLE CONDITION for SYSBUSY is active whenthe command is executed, this also overrides the default action, and control ispassed to the user label supplied in the HANDLE CONDITION. This takesprecedence over the NOQUEUE option but is, of course, negated by eitherNOHANDLE or RESP.

    If an APPC ALLOCATE request is issued against a single session connectionfrom the contention loser end, the NOQUEUE option always causes SYSBUSYto be returned rather tha