Session Options
- The values in the following table determine how the
data string length is defined for functions Send
Key (3), Search Presentation Space (6), Copy String to Presentation Space (15), Search Field (30), Copy String
to Field (33), Send File (90), and Receive File (91).
Value Explanation STRLEN An explicit length is passed for all strings. STREOT Lengths are not explicitly coded. Calling (source) data strings are terminated with an EOT character. - The statement in the following table is used to specify
the character that is used as the end-of-text (EOT) delimiter in the
calling (source) data string for EHLLAPI functions Send
Key (3), Search Presentation Space (6), Copy String to Presentation Space (15), Search Field (30), Copy String
to Field (33), Send File (90), and Receive File (91).
Value Explanation EOT=c Allows you to specify the EOT character for string terminators (in STREOT mode). Binary zero is the default. Do not leave a blank after the equal sign. To be valid,
c
must be entered as a 1-byte string literal character with no preceding blanks. The EOT character specified by this statement is used to determine the length of a calling data string only when the STREOT option (see item 1) is in effect. - The values in the following table affect the Search Presentation Space (6) and Search
Field (30) search functions.
Value Explanation SRCHALL The Search Presentation Space (6) function and Search Field (30) function scan the entire host presentation space or field. SRCHFROM The Search Presentation Space (6) function and Search Field (30) function start from a specified PS position (for SRCHFRWD
) or end at a specified PS position (forSRCHBKWD
). - The values in the following table affect the Search Presentation Space (6) and Search
Field (30) search functions. They determine the direction for
the search.
Value Explanation SRCHFRWD The Search Presentation Space (6) function and Search Field (30) function perform in an ascending direction. SRCHBKWD The Search Presentation Space (6) function and Search Field (30) function perform in a descending direction. A search is satisfied if the first character of the requested string starts within the bounds specified for the search. - The values in the following table determine how attribute
bytes are treated for functions Copy Presentation
Space (5), Copy Presentation Space to String (8),
and Copy Field to String (34).
Value Explanation NOATTRB Convert all unknown values to blanks. ATTRB Pass back all codes that do not have an ASCII equivalent as their original values. NULLATTRB Convert all field attributes to null characters. - The values in the following table affect the Pause (18) function.
Value Explanation FPAUSE A full-duration pause lasts for however long you specified in the Pause (18) function. IPAUSE Interruptible pause. After the Start Host Notification (23) function is executed, a host event satisfies a pause. - The values in the following table determine whether
messages generated by file transfer functions Send
File (90) and Receive File (91) are displayed.
Value Explanation NOQUIET SEND and RECEIVE messages are displayed. QUIET SEND and RECEIVE messages are not displayed. - The statements in the following table determine how
long Z and I Emulator for Windows EHLLAPI waits before it automatically issues a Cancel
during execution of file transfer functions Send
File (90) and Receive File (91). To be
valid,
c
must be a capital letter J–N and must not be preceded by a blank.Value Explanation TIMEOUT=0 A Cancel is automatically issued following a 20-second (approximate) delay. TIMEOUT=c A Cancel is automatically issued following a specified delay. A 1-character indicator from the table below tells Z and I Emulator for Windows how many 30-second cycles it should accept before issuing a Cancel itself. - Character
- Value (in minutes)
- 1
- 0.5
- 2
- 1.0
- 3
- 1.5
- 4
- 2.0
- 5
- 2.5
- 6
- 3.0
- 7
- 3.5
- 8
- 4.0
- 9
- 4.5
- J
- 5.0
- K
- 5.5
- L
- 6.0
- M
- 6.5
- N
- 7.0
- The statement in the following table is used to define
the escape character for keystroke mnemonics. This session option
affects functions Send Key (3) and Get
Key (51). The value of
c
must be entered as a 1-byte literal character string with no preceding blanks.Value Explanation ESC=c Specifies the escape character for keystroke mnemonics (@ is the default). Do not leave a blank after the equal sign. A blank is not a valid escape character. - The values in the following table determine whether EHLLAPI automatically
precedes strings sent using the Send Key (3)
function with a reset.
Value Explanation AUTORESET EHLLAPI attempts to reset all inhibited conditions by prefixing all strings of keys sent using the Send Key (3) function with a reset. NORESET Do not AUTORESET. - The values in the following table
affect the manner in which the Connect Presentation Space (1)
command function.
Value Explanation CONLOG Establishes a logical connection between the workstation session and a host session. During Connect, does not jump to the requested presentation space. CONPHYS Establishes a physical connection between the workstation session and a host session. During Connect, jumps to the requested presentation space. - The values in the following table affect the Wait (4) function and Get Key (51)
function. For each value, there are two different effects, one for
each function.
Value Explanation TWAIT For the Wait (4) function, waits up to a minute before timing out on XCLOCK (X []) or XSYSTEM. For the Get Key (51) function, does not return control to your EHLLAPI application program until it has intercepted a key (normal or AID key based on the option specified under the Start Keystroke Intercept (50) function).
LWAIT For the Wait (4) function, waits until XCLOCK (X [])/XSYSTEM clears. This option is not recommended, because control does not return to your application until the host is available. For the Get Key (51) function, does not return control to your EHLLAPI application program until it has intercepted a key (normal or AID key based on the option specified under the Start Keystroke Intercept (50) function).
NWAIT For the Wait (4) function, checks status and returns immediately (no wait). For the Get Key (51) function, returns return code 25 (keystrokes not available) in the fourth parameter if nothing is queued matching the option specified under the Start Keystroke Intercept (50) function.
Note: Use of NWAIT is recommended. - The values in the following table affect Copy Presentation Space (5), Copy Presentation Space to String (8), Copy
String to Presentation Space (15), Copy String
to Field (33), and Copy Field to String (34). Extended attribute
bytes (EAB) include extended character attributes and extended field
attributes.
Value Explanation NOEAB Pass data only, no EABs. EAB Pass the presentation space data with extended attribute bytes. For each character that appears on the screen, 2 bytes of data are passed. Therefore, a buffer twice the size of the presentation space must be preallocated; for example 2 x 1920 = 3840 for a 24-row by 80-column presentation space. Extended attributes for a string of characters may be reported as attributes of the field byte, rather than as attributes of each individual character in the field. In this case, to tell if a particular character or set of characters on a screen is underscored, do a CopyPStoString specifying the position of the field attribute byte (the byte before the field that is displayed on the screen) to get the EAB information that applies to all of the characters in that field.
Note: When using EHLLAPI Copy PS to String, text is copied which should be invisible to the operator. Use the EHLLAPI Set Session Parameters function to set the NODISPLAY option to determine if there is hidden data. This causes EHLLAPI to return nondisplay fields as nulls. Another common procedure for hiding data is to set the foreground and background colors the same (BLACK, for instance) so the text is displayed, but not visible to the human operator. The only way for your application to detect this is to use the EAB and XLATE session parameters and then copying the PS. The foreground/background color of each position is returned and you can determine which characters are invisible. - The values in the following table affect Copy Presentation Space (5), Copy Presentation Space to String (8), Copy
String to Presentation Space (15), Copy String
to Field (33), and Copy Field to String (34).
Value Explanation NOXLATE EABs are not translated. XLATE EABs are translated to the PC color graphics adapter (CGA) format. - The values in the following table affect Copy
Presentation Space (5), Copy Presentation Space
to String (8) and Copy Presentation Space to
Clipboard (35) if NOATTRB and NOEAB are specified.
Value Explanation BLANK Convert all unknown values to X'20'. NOBLANK Convert all unknown values to X'00'. The default value is BLANK. If you want to change the default value to NOBLANK, add the following statement in the PCSWIN.INI file located in the Z and I Emulator for Windows user-class application data directory:[API] NullToBlank=NO
- The values in the following table affect the presentation
space size that is returned by the Query Sessions (10).
Value Explanation CFGSIZE Returns the configured size of the connected presentation space. This option ignores any override of the configured size by the host. NOCFGSIZE Returns the current size of the connected presentation space. - The values in the following table affect Copy
Presentation Space (5), Copy Presentation Space
to String (8), Copy Field to String (34)
and Copy Presentation Space to Clipboard (35).
Value Explanation DISPLAY Copy nondisplay fields in the presentation space to the target buffer area in the same manner as display fields. Current applications function normally. NODISPLAY Do not copy nondisplay fields in the presentation space to the target buffer area. Copy the nondisplay fields to the target buffer as a string of null characters. This allows applications to display the copied buffers in the presentation widow without displaying confidential information, such as passwords. - The values in the following table affect Copy
String to Presentation Space (15), Copy String
to Field (33) and Paste Clipboard to Presentation
Space (36).
Value Explanation NOPUTEAB EAB is not contained in the data string of Copy String to Presentation Space or Copy String to Field. PUTEAB EAB is contained with character data in the data string of Copy String to Presentation Space or Copy String to Field. This option is used for the compatibility with Communication Manager/2. For Communication Manager/2, the data string, which is specified in Copy String to Presentation Space or Copy String to Field, must be contain EAB (or EAD) with character data when EAB (or EAD) is valid in Set Session Parameters. Whereas, for the previous Z and I Emulator for Windows, the data string specified in these functions must consist of character data only even if EAB (or EAD) is valid. But Z and I Emulator for Windows allows that the data string contains EAB (or EAD) by setting PUTEAB to provide the compatibility with Communication Manager/2.
- The values in the following table affect the Send Key (3) function. Keystrokes are not processed
if the keyboard is blocked or in use. The options determine whether
the function tries to resend the keystrokes until a 4-minute timeout
occurs or if the function returns immediately after determining the
keyboard is blocked or in use.
Value Explanation RETRY Continues to attempt to send keystrokes until they are sent or until a 4-minute timeout occurs. NORETRY Returns immediately after determining the keyboard is blocked or in use. - The values in the following table affect Copy
Presentation Space (5), Copy Presentation Space
to String (8), Copy String to Presentation Space (15), Copy String to Field (33), Copy
Field to String (34) Search Field (30), Query Sessions. (10), Copy Presentation
Space to Clipboard (35) and Paste Clipboard
to Presentation Space (36).
Value Explanation EXTEND_PS 5250 emulation supports a presentation space of 24 rows by 80 columns. In some instances, Communication Manager 5250 emulation displays a 25th row. This occurs when either an error message from the host is displayed or when the operator selects the SysReq key. Z and I Emulator for Windows displays 25th row information on row 24, but EHLLAPI normally sees the real 24th row. By EXTEND_PS option, an EHLLAPI application can use the same interface with Communication Manager EHLLAPI and valid presentation space is extended when this condition occurs. NOEXTEND_PS The presentation space is not extended when the above condition occurs. This is the default value. - The values in the following table affect the Connect Presentation Space (1) and Connect
Window Services (101) functions. The options specify whether
an application can or will share the presentation space to which it
is connected with another application. Only one of the following values
can be specified with each Set Session Parameter call.
Value Explanation SUPER_WRITE The application allows other applications that allow sharing and have write access permissions to concurrently connect to the same presentation space. The originating application performs supervisory-type functions but does not create errors for other applications that share the presentation space. WRITE_SUPER The application requires write access and allows only supervisory application to concurrently connect to its presentation space. This is the default value. WRITE_WRITE The application requires write access and allows partner or other applications with predictable behavior to share the presentation space. WRITE_READ The application requires write access and allows other applications that perform read-only functions to share the presentation space. The application is also allowed to copy the presentation space and perform other read-only operations as usual. WRITE_NONE The application has exclusive use of the presentation space. No other applications are allowed to share the presentation space, including supervisory applications. The application is allowed to copy the presentation space and perform read-only operations as usual. READ_WRITE The application requires only read access to monitor the presentation space and allows other applications that perform read or write, or both, functions to share the presentation space. The application is also allowed to copy the presentation space and perform other read-only operations as usual. - The values in the following table allow applications
that have presentation space sharing requirements to limit the sharing
to a partner application (an application that was developed to work
with it).
Value Explanation NOKEY Allows the application to be compatible with existing applications that do not specify the KEY parameter. KEY$nnnnnnnn Uses a keyword to restrict sharing access to the presentation space that it supports. The keyword must be exactly 8 bytes in length.