On Tue, 23 Sep 2008 18:34:20 +0300, Itschak Mugzach <[EMAIL PROTECTED]> wrote:
>The idea is to start at address 16H (CVT) and use variables defines as USAGE >POINTER to travel on the control blocks chain to the TCB. The is a good >sample here, as they already mapped the DSECTs to Cobol for you. See below: > http://coding.derkeiler.com/Archive/Cobol/comp.lang.cobol/2003-10/0077.html Sorry, Itschak, that's a good example, but it covers only the case of the program running in batch. It does not handle CICS transactions, IMS transactions, etc. "COBOL program" is too imprecise as a description. Where the program runs is perhaps more important to the original question. -- Walt Farrell, CISSP IBM STSM, z/OS Security Design ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html