Possibly, cgiparse may be what you want to use -- mentioned below, from a REXX FAQ I found at http://www.erroneousbee.demon.co.uk/Computers/rexxfaq.html :
Using Rexx as CGI programs with the Web Server. Rexx can be used to create CGI programs that access MVS based resources for Web browser based users. All the Rexx program is doing is to write a dynamic html page to the POSIX sysout stream. This can be done using the Rexx say command. The BonusPak supplies two shell commands; cgiutils for writing http headers (for passing html versions and cookies to the browser, etc), and cgiparse for reading environment variables, including forms data. For the GET CGI method, the CGI parameters are available in environment variable QUERY_STRING. Environment variables are available in the Rexx stemmed variable __environment. and the parms can be extracted with the parse command. Note that use of interpret to extract parms is insecure. A user may manage to pass raw rexx commands into the CGI exec. For pre OS/390 V1 R3 systems, the Rexx say command wraps at 80 characters. Use SYSCALL "write .." instead. Some browsers convert special characters to an escaped notation. Access to Classic MVS resources can be done by using Rexx function shcmd to trap the output from commands run under TSO. Commands can be run under TSO using the tsocmd shell command. Both shcmd and tsocmd are available from the IBM Kingston ftp site. Also, here's an IBM reference I found where cgiparse is discussed: http://www-306.ibm.com/software/webservers/httpservers/doc/v51/wpglhmst.pdf Regards, Scott Barry SBBWorks, Inc. _________________________ I develop web sites for a hobby using PHP and HTML. We have a web server on our mainframe so I was tasked to do some web development. My REXX EXEC is named MYFORM.REXX and is recursively called through the FORM action. Is there a was to make this REXX EXEC be able to "SEE" the variables that are passed back to it via the FORM? This is easy using PHP so surely REXX has a way to do it also /* REXX */ 'cgiutils -status 200 -ct text/x-ssi-html' ADDRESS ISPEXEC "ISPEXEC VGET (SECRET)" SAY '<HTML>' SAY '<HEAD>' SAY '<TITLE>MY FORM</TITLE>' SAY '</HEAD>' SAY '<BODY>' SAY '<H1>MY FORM</H1>' SAY " VAR: " var "<BR>" SAY "<FORM METHOD='POST' ACTION='myform.rexx"'>" SAY "<INPUT TYPE='INPUT' NAME='VNAME' VALUE='VNAMEVAL'>" SAY "<INPUT TYPE='HIDDEN' NAME='var' VALUE='red'>" SAY "<INPUT TYPE='SUBMIT' VALUE='CLICK HERE TO SUBMIT'>" SAY "</FORM>" SAY '</BODY>' SAY '</HTML>' Charlie ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [log in to unmask] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html

