File Management - IBM

File Management - IBM File Management - IBM

as400bks.rochester.ibm.com
from as400bks.rochester.ibm.com More from this publisher
30.06.2013 Views

Table 27. Get Attributes (continued) Offset Data Type Length Contents File Type 325 Character 1 X.25 call type (decimal). Display, ICF 0 Incoming Switched Virtual Circuit (SVC) 1 Outgoing SVC 2 Not X.25 SVC Other Reserved. Note: The following information is available only for when your program was started as a result of a received program start request. Also, not all of the information will be available if the area to receive it is too small. 326 Character 64 Transaction program name. Name of the program specified to be started as a result of the received program start request, even if a routing list caused a different program to be started. ICF 390 Binary 1 Length of the protected LUWID field. The valid values are 0 through 26. ICF 391 Binary 1 Length of the qualified LU-NAME. The valid values are 0 through 17. ICF 392 Character 17 Network qualified protected LU-NAME in the form: netid.luname. This field is blank if there is no network qualified protected LU-NAME. ICF 409 Character 6 Protected LUWID instance number. ICF 415 Binary 2 Protected LUWID sequence number. ICF Note: The following information is available only when a protected conversation is started on the remote system. That is, when a conversation is started with a SYNCLVL of *COMMIT. Also, not all of the information will be available if the area to receive it is too small. 417 Binary 1 Length of the unprotected LUWID field. The valid values are 0 through 26. ICF 418 Binary 1 Length of the qualified LU-NAME. The valid values are 0 through 17. ICF 419 Character 17 Network qualified unprotected LU-NAME in the form: netid.luname. This field is blank if there is no network qualified unprotected LU-NAME. ICF 436 Character 6 Unprotected LUWID instance number. ICF 442 Note: Binary 2 Unprotected LUWID sequence number. ICF Type 1 Controllers available at V2R2 which support such things as windows and continued cursor progression. Type 2 Controllers available at V2R3. These support all of the V2R2 functions as well as menu bars, continued-entry fields, edit masks, and simple hotspots. Type 3 Controllers available at V3R1. These support all of the V2R2 and V2R3 functions. They also support text in the bottom border of windows. 196 File Management V4R5

Appendix B. Double-byte character set support This appendix contains information that you need if you use double-byte characters. This includes the following topics: v Double-byte character set (DBCS) fundamentals v Processing double-byte characters v Device file support v Display support v Copying files that contain double-byte characters v Writing application programs that process double-byte characters v DBCS font tables v DBCS sort tables v DBCS conversion dictionaries v Using DBCS conversion DBCS printer and spooling support information can be found in the Printer Device Programming book. Double-byte character set fundamentals Some languages, such as Chinese, Japanese, and Korean, have a writing scheme that uses many different characters that cannot be represented with single-byte codes. To create coded character sets for such languages, the system uses two bytes to represent each character. Characters that are encoded in two-byte code are called double-byte characters. Figure 17 on page 198 shows alphanumeric characters coded in a single-byte code scheme and double-byte characters coded in a double-byte code scheme. You can use double-byte characters as well as single-byte characters in one application. For instance, you may want to store double-byte data and single-byte data in your database, create your display screens with double-byte text and fields, or print reports with double-byte characters. © Copyright IBM Corp. 1998, 2000 197

Table 27. Get Attributes (continued)<br />

Offset Data Type Length Contents <strong>File</strong> Type<br />

325 Character 1 X.25 call type (decimal).<br />

Display, ICF<br />

0 Incoming Switched Virtual Circuit (SVC)<br />

1 Outgoing SVC<br />

2 Not X.25 SVC<br />

Other Reserved.<br />

Note: The following information is available only for when your program was started as a result of a received program start<br />

request. Also, not all of the information will be available if the area to receive it is too small.<br />

326 Character 64 Transaction program name. Name of the program specified to<br />

be started as a result of the received program start request,<br />

even if a routing list caused a different program to be started.<br />

ICF<br />

390 Binary 1 Length of the protected LUWID field. The valid values are 0<br />

through 26.<br />

ICF<br />

391 Binary 1 Length of the qualified LU-NAME. The valid values are 0<br />

through 17.<br />

ICF<br />

392 Character 17 Network qualified protected LU-NAME in the form:<br />

netid.luname. This field is blank if there is no network<br />

qualified protected LU-NAME.<br />

ICF<br />

409 Character 6 Protected LUWID instance number. ICF<br />

415 Binary 2 Protected LUWID sequence number. ICF<br />

Note: The following information is available only when a protected conversation is started on the remote system. That is, when a<br />

conversation is started with a SYNCLVL of *COMMIT. Also, not all of the information will be available if the area to receive it is too<br />

small.<br />

417 Binary 1 Length of the unprotected LUWID field. The valid values are<br />

0 through 26.<br />

ICF<br />

418 Binary 1 Length of the qualified LU-NAME. The valid values are 0<br />

through 17.<br />

ICF<br />

419 Character 17 Network qualified unprotected LU-NAME in the form:<br />

netid.luname. This field is blank if there is no network<br />

qualified unprotected LU-NAME.<br />

ICF<br />

436 Character 6 Unprotected LUWID instance number. ICF<br />

442<br />

Note:<br />

Binary 2 Unprotected LUWID sequence number. ICF<br />

Type 1 Controllers available at V2R2 which support such things as windows and continued cursor progression.<br />

Type 2 Controllers available at V2R3. These support all of the V2R2 functions as well as menu bars, continued-entry fields, edit<br />

masks, and simple hotspots.<br />

Type 3 Controllers available at V3R1. These support all of the V2R2 and V2R3 functions. They also support text in the bottom<br />

border of windows.<br />

196 <strong>File</strong> <strong>Management</strong> V4R5

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!