Changing the Value for Variable Length Request - Call-Level Interface Version 2

Teradata Call-Level Interface Version 2 Reference for Workstation-Attached Systems

Product
Call-Level Interface Version 2
Release Number
16.10
Published
May 2017
Language
English (United States)
Last Update
2018-05-01
dita:mapPath
ggf1488824663364.ditamap
dita:ditavalPath
Audience_PDF_include.ditaval
dita:id
B035-2418
lifecycle
previous
Product Category
Teradata Tools and Utilities

If the value provided is not appropriate for the application, perform the following steps before calling DBCHCL for the Connect, Run Startup, or Initiate Request function:

  1. Set Change-options to 'Y'.
  2. Change the value for Variable Length Request as follows.
    If the length information is to... Then change the value for Variable Length Request to...
    precede immediately the data to which it applies Y
    be supplied separately from the data to which it applies N

    For example, to do a request, the application program must supply to DBCHCL both the length and the address of the request.

    If Variable Length Request is set to this value... Then the address supplied in the appropriate pointer field points to...
    Y a two-byte (in binary) area that precedes the text of the request.

    The length of the request text is not supplied in Request Length.

    The length provided preceding the text measures only the length of the request text, and does not include the two bytes of its own length.

    N the beginning of the text of the request.

    The length of the request text is supplied in the appropriate DBCAREA, Request Length field.

The Variable Length Request setting affects only the request string. The logon string, run string, and input data string always have the length supplied separately from the string.

The fragments of the string must be in the following order, if applicable:
two-byte length information

   followed by n-byte indicator information

      followed by bytes containing the
         text or value information

In situations in which only two fragments apply, they must be in the order shown above. In all cases, the pointer to the string must contain the address of the first fragment that is supplied.