Re: Rmm extended dataset

2012-07-09 Thread Victor Zhang
Hello Mike,
Is the field XVMDMVID or XVVOLCNT existing for multi-volume tape dataset?
I found some entries in rmm extended dataset has neither filed.

I guess only staring from a specific rmm version , above two filed began to 
show up in RMM CDS.
I want to find a common method to calculate multi-volume tape dataset's volcnt, 
could you help?

Regards
Victor

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: SYNCSORT - Save a data item for use in OUTREC output

2012-07-09 Thread Knutson, Sam
Another source for assistance would be joining Syncsort's user
community. This community is a blog site where you can get product usage
assistance from a wider community. The site to register and log on is
http://community.syncsort.com/  This community consists of public and
private groups of Syncsort product users from many companies and many
countries. Syncsort employees participate in and host many of this
community's groups.  This would seem to be an ideal place to post your
HOWTO type of question and get some quick targeted help.

Best Regards, Sam Knutson

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On
Behalf Of George, William@FTB
Sent: Sunday, July 08, 2012 3:23 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: SYNCSORT - Save a data item for use in OUTREC output

Wayne

It appears the E15 exit will not work for our needs.  And I humbly
apologize as the example I gave was far too simplistic and I left off
some of the requirements that make the E15 exit 'probably' not doable.  
- First of all the E15 requires the creation of another program which is
one thing we do not care to do.  
- Secondly, the data item we would like to save and utilize actually
will only be used within the HEADER record for any OUTFILs that do not
have records in the input file.  That is, if an OUTFIL has zero records
written then the HEADER and TRAILER written for it will have a count of
0.  But... we would like the saved data (a date range) to be plugged
into the Header title area. This date is part of the input record and
works fine for OUTFIL groups with an input record but when the HEADER is
written for the OUTFIL groups when there are zero input records for the
group, this data is not available. 

Thanks
Bill


-Original Message-
From: IBM Mainframe Discussion List on behalf of George, William@FTB
Sent: Sat 7/7/2012 3:15 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: SYNCSORT - Save a data item for use in OUTREC output
 
Thanks, I'll look into this!


-Original Message-
From: IBM Mainframe Discussion List on behalf of Wayne Bickerdike
Sent: Sat 7/7/2012 1:38 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: SYNCSORT - Save a data item for use in OUTREC output
 
Use an E15 exit to read the input file, store the value you need to
preserve and on each successive record just overwrite with the saved
value and pass the record to sort.

I have a few examples of E15 exit code but the SYNCSORT manual should
have some examples of exit code.

Wayne Bickerdike

On Sat, Jul 7, 2012 at 7:40 AM, George, William@FTB
william.geo...@ftb.ca.gov wrote:
 Sorry, the formatting didn't retain how I had originally keyed it.

 -Original Message-
 From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] 
 On Behalf Of George, William@FTB
 Sent: Friday, July 06, 2012 2:36 PM
 To: IBM-MAIN@LISTSERV.UA.EDU
 Subject: SYNCSORT - Save a data item for use in OUTREC output

 Is there a means via SYNCSORT to save a data item found on the 1st 
 input record and then have it placed on all subsequent output records.



 For example.

 1.   Input 1 - 07/06/2012 asfasdlfjl.   (save the date
 07/06/2012 and not output the record)

 2.   Input 2 - poiutkjgfertqe   Output - 07/06/2012
 poiutkjgfertqe...
 That is, place the saved data item (date) someplace in the output 
 record


 3.   Input 3 - (same as #2 and to the end of file)


 Thanks for any insights.
ith the message: INFO IBM-MAIN

This email/fax message is for the sole use of the intended
recipient(s) and may contain confidential and privileged information.
Any unauthorized review, use, disclosure or distribution of this
email/fax is prohibited. If you are not the intended recipient, please
destroy all paper and electronic copies of the original message.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Monitoring - managing zOS, CICS and DB2 metrics and thresholds

2012-07-09 Thread Mark
How much time does it take you to define which metrics in z/OS, CICS and DB2 to 
monitor and set thresholds? Does anyone use different thresholds throughout the 
day?

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


AW: Secure Encryption Keys vs Protected Keys

2012-07-09 Thread David Stokes
Sorry to hear you didn't get the special briefing, John. 

-Ursprüngliche Nachricht-
Von: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] Im Auftrag 
von John Gilmore
Gesendet: Montag, 9. Juli 2012 15:28
An: IBM-MAIN@LISTSERV.UA.EDU
Betreff: Re: Secure Encryption Keys vs Protected Keys

David Stokes wrote

begin extract
CEX otoh is accessed via a queuing mechanism. It is asynchronous and suspends 
the executing work unit until the crypto-operation is complete (along with 
encrypting and decrypting keys etc).
/end extract

In its standard use the word 'asynchronous' and the behavior he describes are 
incompatible.  Did he perhaps mean 'synchronous'
instead?

Or is he using the word 'asynchronous' in a private, arcane sense?  If so, he 
needs to explain that very special sense.

John Gilmore, Ashland, MA 01721 - USA

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: SYNCSORT - Save a data item for use in OUTREC output

2012-07-09 Thread Ken Leidner
As a concept, I would copy the first record to a new dataset (using 
sort) and expand the record by one character - a blank.  In a second 
OUTFIL statement I would expand all of the other records by the same 
1 character - a blank.


Then I would JOIN the two expanded datasets using the added blank as 
the key.  I would tell the JOIN that the records are already 
sorted.  Then in the JOIN's REFORMAT statement you can add the field 
from the one record file to where ever you want in all of the records.


You can decide if the first record record should be in both expanded 
files or not (I would think so).


Ken Leidner kleid...@earthlink.net

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: SYNCSORT - Save a data item for use in OUTREC output

2012-07-09 Thread George, William@FTB
Thanks Sam. I did just this over the weekend!


-Original Message-
From: IBM Mainframe Discussion List on behalf of Knutson, Sam
Sent: Mon 7/9/2012 5:13 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: SYNCSORT - Save a data item for use in OUTREC output
 
Another source for assistance would be joining Syncsort's user
community. This community is a blog site where you can get product usage
assistance from a wider community. The site to register and log on is
http://community.syncsort.com/  This community consists of public and
private groups of Syncsort product users from many companies and many
countries. Syncsort employees participate in and host many of this
community's groups.  This would seem to be an ideal place to post your
HOWTO type of question and get some quick targeted help.

Best Regards, Sam Knutson

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On
Behalf Of George, William@FTB
Sent: Sunday, July 08, 2012 3:23 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: SYNCSORT - Save a data item for use in OUTREC output

Wayne

It appears the E15 exit will not work for our needs.  And I humbly
apologize as the example I gave was far too simplistic and I left off
some of the requirements that make the E15 exit 'probably' not doable.  
- First of all the E15 requires the creation of another program which is
one thing we do not care to do.  
- Secondly, the data item we would like to save and utilize actually
will only be used within the HEADER record for any OUTFILs that do not
have records in the input file.  That is, if an OUTFIL has zero records
written then the HEADER and TRAILER written for it will have a count of
0.  But... we would like the saved data (a date range) to be plugged
into the Header title area. This date is part of the input record and
works fine for OUTFIL groups with an input record but when the HEADER is
written for the OUTFIL groups when there are zero input records for the
group, this data is not available. 

Thanks
Bill


-Original Message-
From: IBM Mainframe Discussion List on behalf of George, William@FTB
Sent: Sat 7/7/2012 3:15 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: SYNCSORT - Save a data item for use in OUTREC output
 
Thanks, I'll look into this!


-Original Message-
From: IBM Mainframe Discussion List on behalf of Wayne Bickerdike
Sent: Sat 7/7/2012 1:38 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: SYNCSORT - Save a data item for use in OUTREC output
 
Use an E15 exit to read the input file, store the value you need to
preserve and on each successive record just overwrite with the saved
value and pass the record to sort.

I have a few examples of E15 exit code but the SYNCSORT manual should
have some examples of exit code.

Wayne Bickerdike

On Sat, Jul 7, 2012 at 7:40 AM, George, William@FTB
william.geo...@ftb.ca.gov wrote:
 Sorry, the formatting didn't retain how I had originally keyed it.

 -Original Message-
 From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] 
 On Behalf Of George, William@FTB
 Sent: Friday, July 06, 2012 2:36 PM
 To: IBM-MAIN@LISTSERV.UA.EDU
 Subject: SYNCSORT - Save a data item for use in OUTREC output

 Is there a means via SYNCSORT to save a data item found on the 1st 
 input record and then have it placed on all subsequent output records.



 For example.

 1.   Input 1 - 07/06/2012 asfasdlfjl.   (save the date
 07/06/2012 and not output the record)

 2.   Input 2 - poiutkjgfertqe   Output - 07/06/2012
 poiutkjgfertqe...
 That is, place the saved data item (date) someplace in the output 
 record


 3.   Input 3 - (same as #2 and to the end of file)


 Thanks for any insights.
ith the message: INFO IBM-MAIN

This email/fax message is for the sole use of the intended
recipient(s) and may contain confidential and privileged information.
Any unauthorized review, use, disclosure or distribution of this
email/fax is prohibited. If you are not the intended recipient, please
destroy all paper and electronic copies of the original message.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


__
CONFIDENTIALITY NOTICE: This email from the State of California is for the sole 
use of the intended recipient and may contain confidential and privileged 
information. Any unauthorized review or use, including disclosure or 
distribution, is prohibited. If you are not the intended recipient, please 
contact the sender and destroy all copies of this email.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Secure Encryption Keys vs Protected Keys

2012-07-09 Thread Rob Schramm
Greg,

I can't tell.. was that a correction or clarification?

Rob Schramm
Senior Systems Consultant
Imperium Group



On Mon, Jul 9, 2012 at 10:29 AM, Rob Schramm rob.schr...@gmail.com wrote:

 Nope.

 It is correct.  As is your statement.

 The key (no pun intended) is that the protected key scheme is dependent
 on having secure keys to start with.

 Rob Schramm
 Senior Systems Consultant
 Imperium Group



 On Mon, Jul 9, 2012 at 10:21 AM, Tom Ambros thomas_amb...@keybank.comwrote:

 Phil Smith wrote:

 Yes, Protected Key requires ICSF and a CEX.

 Should that not read  Yes, Secure Key requires ICSF and a CEX.?

 Blatant plagiarism follows from my copy of the z196 Tech Guide, Section
 6.2.2 'CPACF Protected key':

 The zEnterprise CPCs support the protected key implementation. Since
 PCIXCC
 deployment, secure keys are processed on the PCI-X and PCIe cards,
 requiring an
 asynchronous operation to move the data and keys from the general purpose
 CP to the
 crypto cards. Clear keys process faster than secure keys because the
 process is done
 synchronously on the CPACF. Protected keys blend the security of Crypto
 Express3
 coprocessors (CEX3C) and the performance characteristics of the CPACF,
 running closer to
 the speed of clear keys.

 An enhancement to CPACF facilitates the continued privacy of cryptographic
 key material
 when used for data encryption. In Crypto Express3 coprocessors, a secure
 key is encrypted
 under a master key, whereas a protected key is encrypted under a wrapping
 key that is
 unique to each LPAR. After the wrapping key is unique to each LPAR, a
 protected key cannot
 be shared with another LPAR. CPACF, using key wrapping, ensures that key
 material is not
 visible to applications or operating systems during encryption operations.

 CPACF code generates the wrapping key and stores it in the protected area
 of hardware
 system area (HSA). The wrapping key is accessible only by firmware. It
 cannot be accessed
 by operating systems or applications. DES/T-DES and AES algorithms were
 implemented in
 CPACF code with support of hardware assist functions. Two variations of
 wrapping key are
 generated, one for DES/T-DES keys and another for AES keys.

 Note that CPACF generates the wrapping key and the use of the term
 'protected key' in this context.  Thus my confusion, I am not entirely
 sure that the CEX hardware is required in this case.  I see the
 distinction that is drawn between 'secure key' and 'protected key' and I
 believe it is significant.


 Thomas Ambros
 Operating Systems and Connectivity Engineering
 518-436-6433

 This communication may contain privileged and/or confidential
 information. It is intended solely for the use of the addressee. If you are
 not the intended recipient, you are strictly prohibited from disclosing,
 copying, distributing or using any of this information. If you received
 this communication in error, please contact the sender immediately and
 destroy the material in its entirety, whether electronic or hard copy. This
 communication may contain nonpublic personal information about consumers
 subject to the restrictions of the Gramm-Leach-Bliley Act. You may not
 directly or indirectly reuse or redisclose such information for any purpose
 other than to provide the services for which you are receiving the
 information.

 127 Public Square, Cleveland, OH 44114
 If you prefer not to receive future e-mail offers for products or
 services from Key
 send an e-mail to mailto:dnereque...@key.com with 'No Promotional
 E-mails' in the
 SUBJECT line.

 --
 For IBM-MAIN subscribe / signoff / archive access instructions,
 send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN




--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Online 3270 manual? [was: RE: PCOMM copy-paste (quite another issue)]

2012-07-09 Thread Farley, Peter x23353
Sorry for the late reply, but can you point to an online copy of the -9 edition 
of that manual?  Bitsavers has only the -0 and -5 editions, and I can't seem to 
find it anywhere on the IBM sites either.  Lots of references to it, but no 
actual copies.

The replacement manual for the -10 edition, GA23-0060-0, which bitsavers does 
have, seems to have only pages E1 and E2.  At least, there is no figure E2 
present.

TIA for any info/url you can provide.

Peter

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Shmuel Metz (Seymour J.)
Sent: Thursday, July 05, 2012 7:13 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: PCOMM copy-paste (quite another issue)

In 5949005395636248.wa.alanaltmarkus.ibm@listserv.ua.edu, on
07/05/2012
   at 09:19 AM, Alan Altmark alan_altm...@us.ibm.com said:

Fidelity in copy/paste requires that both applications know what
they're doing with the clipboard.

Of course.

Default locale for Western Windows assumes code page 1252.  But not
even DOS code page 437 has all of the APL characters in it, 

No; see, e.g. GA27-2749-9, IBM  3270 Information Display Station,
Figure E-2 on p. E-4.

--


This message and any attachments are intended only for the use of the addressee 
and may contain information that is privileged and confidential. If the reader 
of the message is not the intended recipient or an authorized representative of 
the intended recipient, you are hereby notified that any dissemination of this 
communication is strictly prohibited. If you have received this communication 
in error, please notify us immediately by e-mail and delete the message and any 
attachments from your system.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


AW: Secure Encryption Keys vs Protected Keys

2012-07-09 Thread David Stokes
Well, to quote from POP (for one PCKMO option)
(should be Perform Cryptographic Key Management Operation, btw)

The 8-byte cryptographic key, K, in byte offsets 0-7 of
he parameter block is encrypted using the DEA
wrapping key. (See the section Protection of Crypto-
graphic Key on page 7-339 for the encryption algo-
rithm.) The result is placed back in byte offsets 0-7 of
he parameter block. The contents of the DEA wrap-
ping-key verification-pattern register are placed in
byte offsets 8-31 of the parameter block.

So going to 7-339 it says things like

Each time a clear reset is performed, a new set of
wrapping keys and their associated verification pat-
terns are generated. The contents of the two wrap-
ping-key registers are kept internal to the model so
that no program, including the operating system, can
directly observe their clear value.

I.e, they're just generated in the hardware.

Apparently. 

(I'm reading this stuff for the first time, out of curiosity mostly. It usually 
takes about ten times nowadays before true enlightenment dawns).

David Stokes
INTERCHIP AG
Munich



-Ursprüngliche Nachricht-
Von: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] Im Auftrag 
von Rob Schramm
Gesendet: Montag, 9. Juli 2012 18:13
An: IBM-MAIN@LISTSERV.UA.EDU
Betreff: Re: Secure Encryption Keys vs Protected Keys

How is the key generated?

Rob Schramm
Senior Systems Consultant
Imperium Group



On Mon, Jul 9, 2012 at 12:07 PM, David Stokes sto...@interchip.de wrote:

 Well, you can encrypt a protected key with PCKMO (Perform cryptographic
 management operation) instruction, as appears to be done in some of the
 white paper tests, so I'm not convinced CEX is absolutely required.
 However, I see little sense, as I said before, in doing such a thing. It
 would somewhat void the point of having protected (i.e. secure) keys in the
 first place.

 I didn't feel the point important enough to comment on before.

 -Ursprüngliche Nachricht-
 Von: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] Im
 Auftrag von Tom Ambros
 Gesendet: Montag, 9. Juli 2012 16:22
 An: IBM-MAIN@LISTSERV.UA.EDU
 Betreff: Re: Secure Encryption Keys vs Protected Keys

 Phil Smith wrote:

 Yes, Protected Key requires ICSF and a CEX.

 Should that not read  Yes, Secure Key requires ICSF and a CEX.?

 Blatant plagiarism follows from my copy of the z196 Tech Guide, Section
 6.2.2 'CPACF Protected key':

 The zEnterprise CPCs support the protected key implementation. Since
 PCIXCC
 deployment, secure keys are processed on the PCI-X and PCIe cards,
 requiring an
 asynchronous operation to move the data and keys from the general purpose
 CP to the
 crypto cards. Clear keys process faster than secure keys because the
 process is done
 synchronously on the CPACF. Protected keys blend the security of Crypto
 Express3
 coprocessors (CEX3C) and the performance characteristics of the CPACF,
 running closer to
 the speed of clear keys.

 An enhancement to CPACF facilitates the continued privacy of cryptographic
 key material
 when used for data encryption. In Crypto Express3 coprocessors, a secure
 key is encrypted
 under a master key, whereas a protected key is encrypted under a wrapping
 key that is
 unique to each LPAR. After the wrapping key is unique to each LPAR, a
 protected key cannot
 be shared with another LPAR. CPACF, using key wrapping, ensures that key
 material is not
 visible to applications or operating systems during encryption operations.

 CPACF code generates the wrapping key and stores it in the protected area
 of hardware
 system area (HSA). The wrapping key is accessible only by firmware. It
 cannot be accessed
 by operating systems or applications. DES/T-DES and AES algorithms were
 implemented in
 CPACF code with support of hardware assist functions. Two variations of
 wrapping key are
 generated, one for DES/T-DES keys and another for AES keys.

 Note that CPACF generates the wrapping key and the use of the term
 'protected key' in this context.  Thus my confusion, I am not entirely
 sure that the CEX hardware is required in this case.  I see the
 distinction that is drawn between 'secure key' and 'protected key' and I
 believe it is significant.


 Thomas Ambros
 Operating Systems and Connectivity Engineering
 518-436-6433

 This communication may contain privileged and/or confidential information.
 It is intended solely for the use of the addressee. If you are not the
 intended recipient, you are strictly prohibited from disclosing, copying,
 distributing or using any of this information. If you received this
 communication in error, please contact the sender immediately and destroy
 the material in its entirety, whether electronic or hard copy. This
 communication may contain nonpublic personal information about consumers
 subject to the restrictions of the Gramm-Leach-Bliley Act. You may not
 directly or indirectly reuse or redisclose such information for any purpose
 other than to 

Re: Secure Encryption Keys vs Protected Keys

2012-07-09 Thread Rob Schramm
Not that key.  The key that will be stored under the wrapping key.

Rob Schramm
Senior Systems Consultant
Imperium Group



On Mon, Jul 9, 2012 at 12:38 PM, David Stokes sto...@interchip.de wrote:

 Well, to quote from POP (for one PCKMO option)
 (should be Perform Cryptographic Key Management Operation, btw)

 The 8-byte cryptographic key, K, in byte offsets 0-7 of
 he parameter block is encrypted using the DEA
 wrapping key. (See the section Protection of Crypto-
 graphic Key on page 7-339 for the encryption algo-
 rithm.) The result is placed back in byte offsets 0-7 of
 he parameter block. The contents of the DEA wrap-
 ping-key verification-pattern register are placed in
 byte offsets 8-31 of the parameter block.

 So going to 7-339 it says things like

 Each time a clear reset is performed, a new set of
 wrapping keys and their associated verification pat-
 terns are generated. The contents of the two wrap-
 ping-key registers are kept internal to the model so
 that no program, including the operating system, can
 directly observe their clear value.

 I.e, they're just generated in the hardware.

 Apparently.

 (I'm reading this stuff for the first time, out of curiosity mostly. It
 usually takes about ten times nowadays before true enlightenment dawns).

 David Stokes
 INTERCHIP AG
 Munich



 -Ursprüngliche Nachricht-
 Von: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] Im
 Auftrag von Rob Schramm
 Gesendet: Montag, 9. Juli 2012 18:13
 An: IBM-MAIN@LISTSERV.UA.EDU
 Betreff: Re: Secure Encryption Keys vs Protected Keys

 How is the key generated?

 Rob Schramm
 Senior Systems Consultant
 Imperium Group



 On Mon, Jul 9, 2012 at 12:07 PM, David Stokes sto...@interchip.de wrote:

  Well, you can encrypt a protected key with PCKMO (Perform cryptographic
  management operation) instruction, as appears to be done in some of the
  white paper tests, so I'm not convinced CEX is absolutely required.
  However, I see little sense, as I said before, in doing such a thing. It
  would somewhat void the point of having protected (i.e. secure) keys in
 the
  first place.
 
  I didn't feel the point important enough to comment on before.
 
  -Ursprüngliche Nachricht-
  Von: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] Im
  Auftrag von Tom Ambros
  Gesendet: Montag, 9. Juli 2012 16:22
  An: IBM-MAIN@LISTSERV.UA.EDU
  Betreff: Re: Secure Encryption Keys vs Protected Keys
 
  Phil Smith wrote:
 
  Yes, Protected Key requires ICSF and a CEX.
 
  Should that not read  Yes, Secure Key requires ICSF and a CEX.?
 
  Blatant plagiarism follows from my copy of the z196 Tech Guide, Section
  6.2.2 'CPACF Protected key':
 
  The zEnterprise CPCs support the protected key implementation. Since
  PCIXCC
  deployment, secure keys are processed on the PCI-X and PCIe cards,
  requiring an
  asynchronous operation to move the data and keys from the general purpose
  CP to the
  crypto cards. Clear keys process faster than secure keys because the
  process is done
  synchronously on the CPACF. Protected keys blend the security of Crypto
  Express3
  coprocessors (CEX3C) and the performance characteristics of the CPACF,
  running closer to
  the speed of clear keys.
 
  An enhancement to CPACF facilitates the continued privacy of
 cryptographic
  key material
  when used for data encryption. In Crypto Express3 coprocessors, a secure
  key is encrypted
  under a master key, whereas a protected key is encrypted under a wrapping
  key that is
  unique to each LPAR. After the wrapping key is unique to each LPAR, a
  protected key cannot
  be shared with another LPAR. CPACF, using key wrapping, ensures that key
  material is not
  visible to applications or operating systems during encryption
 operations.
 
  CPACF code generates the wrapping key and stores it in the protected area
  of hardware
  system area (HSA). The wrapping key is accessible only by firmware. It
  cannot be accessed
  by operating systems or applications. DES/T-DES and AES algorithms were
  implemented in
  CPACF code with support of hardware assist functions. Two variations of
  wrapping key are
  generated, one for DES/T-DES keys and another for AES keys.
 
  Note that CPACF generates the wrapping key and the use of the term
  'protected key' in this context.  Thus my confusion, I am not entirely
  sure that the CEX hardware is required in this case.  I see the
  distinction that is drawn between 'secure key' and 'protected key' and I
  believe it is significant.
 
 
  Thomas Ambros
  Operating Systems and Connectivity Engineering
  518-436-6433
 
  This communication may contain privileged and/or confidential
 information.
  It is intended solely for the use of the addressee. If you are not the
  intended recipient, you are strictly prohibited from disclosing, copying,
  distributing or using any of this information. If you received this
  communication in error, please contact the sender immediately and 

AW: Secure Encryption Keys vs Protected Keys

2012-07-09 Thread David Stokes
If I understand correctly what you are asking, that key comes from your 
program, which is why it is not an ultimately secure way of doing things. 
Although if you are holding the protected key in storage for a communication 
session it does reduce the exposure, of course. There's a little document I 
found 

TechDocID: WP100647  
www.ibm.com/support/techdocs

which says (amongst other things) re CPACF protected key

Alternatively, if no CEX3C is available, an application could use a clear key 
as the source for a protected key without using ICSF.  In this case, the 
application is responsible for creating or loading a clear key value and then 
using the new PCKMO instruction (new on z10 GA3 - Nov. 2009 or later microcode) 
to wrap the key under the appropriate wrapping key. 
 
Since the wrapping key is unique to each LPAR, a protected key cannot be shared 
with another LPAR.  Either the original secure key or the clear key value, not 
the protected key, would be shared or stored.  The underlying secure key or 
clear key would need to be retrieved and wrapped with the wrapping key within 
each LPAR.

David Stokes
INTERCHIP AG
Munich
 

-Ursprüngliche Nachricht-
Von: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] Im Auftrag 
von Rob Schramm
Gesendet: Montag, 9. Juli 2012 19:07
An: IBM-MAIN@LISTSERV.UA.EDU
Betreff: Re: Secure Encryption Keys vs Protected Keys

Not that key.  The key that will be stored under the wrapping key.

Rob Schramm
Senior Systems Consultant
Imperium Group



On Mon, Jul 9, 2012 at 12:38 PM, David Stokes sto...@interchip.de wrote:

 Well, to quote from POP (for one PCKMO option) (should be Perform 
 Cryptographic Key Management Operation, btw)

 The 8-byte cryptographic key, K, in byte offsets 0-7 of he parameter 
 block is encrypted using the DEA wrapping key. (See the section 
 Protection of Crypto- graphic Key on page 7-339 for the encryption 
 algo-
 rithm.) The result is placed back in byte offsets 0-7 of he parameter 
 block. The contents of the DEA wrap- ping-key verification-pattern 
 register are placed in byte offsets 8-31 of the parameter block.

 So going to 7-339 it says things like

 Each time a clear reset is performed, a new set of wrapping keys and 
 their associated verification pat- terns are generated. The contents 
 of the two wrap- ping-key registers are kept internal to the model so 
 that no program, including the operating system, can directly observe 
 their clear value.

 I.e, they're just generated in the hardware.

 Apparently.

 (I'm reading this stuff for the first time, out of curiosity mostly. 
 It usually takes about ten times nowadays before true enlightenment dawns).

 David Stokes
 INTERCHIP AG
 Munich



 -Ursprüngliche Nachricht-
 Von: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] 
 Im Auftrag von Rob Schramm
 Gesendet: Montag, 9. Juli 2012 18:13
 An: IBM-MAIN@LISTSERV.UA.EDU
 Betreff: Re: Secure Encryption Keys vs Protected Keys

 How is the key generated?

 Rob Schramm
 Senior Systems Consultant
 Imperium Group



 On Mon, Jul 9, 2012 at 12:07 PM, David Stokes sto...@interchip.de wrote:

  Well, you can encrypt a protected key with PCKMO (Perform 
  cryptographic management operation) instruction, as appears to be 
  done in some of the white paper tests, so I'm not convinced CEX is 
  absolutely required.
  However, I see little sense, as I said before, in doing such a 
  thing. It would somewhat void the point of having protected (i.e. 
  secure) keys in
 the
  first place.
 
  I didn't feel the point important enough to comment on before.
 
  -Ursprüngliche Nachricht-
  Von: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] 
  Im Auftrag von Tom Ambros
  Gesendet: Montag, 9. Juli 2012 16:22
  An: IBM-MAIN@LISTSERV.UA.EDU
  Betreff: Re: Secure Encryption Keys vs Protected Keys
 
  Phil Smith wrote:
 
  Yes, Protected Key requires ICSF and a CEX.
 
  Should that not read  Yes, Secure Key requires ICSF and a CEX.?
 
  Blatant plagiarism follows from my copy of the z196 Tech Guide, 
  Section
  6.2.2 'CPACF Protected key':
 
  The zEnterprise CPCs support the protected key implementation. 
  Since PCIXCC deployment, secure keys are processed on the PCI-X and 
  PCIe cards, requiring an asynchronous operation to move the data and 
  keys from the general purpose CP to the crypto cards. Clear keys 
  process faster than secure keys because the process is done 
  synchronously on the CPACF. Protected keys blend the security of 
  Crypto
  Express3
  coprocessors (CEX3C) and the performance characteristics of the 
  CPACF, running closer to the speed of clear keys.
 
  An enhancement to CPACF facilitates the continued privacy of
 cryptographic
  key material
  when used for data encryption. In Crypto Express3 coprocessors, a 
  secure key is encrypted under a master key, whereas a protected key 
  is encrypted under a wrapping key that is unique to each LPAR. After 
  the 

Re: Secure Encryption Keys vs Protected Keys

2012-07-09 Thread Rob Schramm
Yep.

By using ICSF plus CEX, and using protected key.. you get more of the
performance characteristics of CPACF but retain the more secure nature of
secure key.

Yes the exposure is less.. but it will always be suspect.  Ultimately, the
protected key is dependent on the source key material being secure or
not secure... I don't see a category for sort of secure VBG.

And yet.. less exposure is always a better idea.

In the case of encrypting things like PINs .. I don't think securing under
protected key without the original key material resting in ICSF under CEX
MK is a good idea. (dang.. I think I fell into a not logic sentence)

Rob Schramm
Senior Systems Consultant
Imperium Group


On Mon, Jul 9, 2012 at 1:38 PM, David Stokes sto...@interchip.de wrote:

 If I understand correctly what you are asking, that key comes from your
 program, which is why it is not an ultimately secure way of doing things.
 Although if you are holding the protected key in storage for a
 communication session it does reduce the exposure, of course. There's a
 little document I found

 TechDocID: WP100647
 www.ibm.com/support/techdocs

 which says (amongst other things) re CPACF protected key

 Alternatively, if no CEX3C is available, an application could use a clear
 key as the source for a protected key without using ICSF.  In this case,
 the application is responsible for creating or loading a clear key value
 and then using the new PCKMO instruction (new on z10 GA3 - Nov. 2009 or
 later microcode) to wrap the key under the appropriate wrapping key.

 Since the wrapping key is unique to each LPAR, a protected key cannot be
 shared with another LPAR.  Either the original secure key or the clear key
 value, not the protected key, would be shared or stored.  The underlying
 secure key or clear key would need to be retrieved and wrapped with the
 wrapping key within each LPAR.

 David Stokes
 INTERCHIP AG
 Munich


 -Ursprüngliche Nachricht-
 Von: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] Im
 Auftrag von Rob Schramm
 Gesendet: Montag, 9. Juli 2012 19:07
 An: IBM-MAIN@LISTSERV.UA.EDU
 Betreff: Re: Secure Encryption Keys vs Protected Keys

 Not that key.  The key that will be stored under the wrapping key.

 Rob Schramm
 Senior Systems Consultant
 Imperium Group



 On Mon, Jul 9, 2012 at 12:38 PM, David Stokes sto...@interchip.de wrote:

  Well, to quote from POP (for one PCKMO option) (should be Perform
  Cryptographic Key Management Operation, btw)
 
  The 8-byte cryptographic key, K, in byte offsets 0-7 of he parameter
  block is encrypted using the DEA wrapping key. (See the section
  Protection of Crypto- graphic Key on page 7-339 for the encryption
  algo-
  rithm.) The result is placed back in byte offsets 0-7 of he parameter
  block. The contents of the DEA wrap- ping-key verification-pattern
  register are placed in byte offsets 8-31 of the parameter block.
 
  So going to 7-339 it says things like
 
  Each time a clear reset is performed, a new set of wrapping keys and
  their associated verification pat- terns are generated. The contents
  of the two wrap- ping-key registers are kept internal to the model so
  that no program, including the operating system, can directly observe
  their clear value.
 
  I.e, they're just generated in the hardware.
 
  Apparently.
 
  (I'm reading this stuff for the first time, out of curiosity mostly.
  It usually takes about ten times nowadays before true enlightenment
 dawns).
 
  David Stokes
  INTERCHIP AG
  Munich
 
 
 
  -Ursprüngliche Nachricht-
  Von: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU]
  Im Auftrag von Rob Schramm
  Gesendet: Montag, 9. Juli 2012 18:13
  An: IBM-MAIN@LISTSERV.UA.EDU
  Betreff: Re: Secure Encryption Keys vs Protected Keys
 
  How is the key generated?
 
  Rob Schramm
  Senior Systems Consultant
  Imperium Group
 
 
 
  On Mon, Jul 9, 2012 at 12:07 PM, David Stokes sto...@interchip.de
 wrote:
 
   Well, you can encrypt a protected key with PCKMO (Perform
   cryptographic management operation) instruction, as appears to be
   done in some of the white paper tests, so I'm not convinced CEX is
 absolutely required.
   However, I see little sense, as I said before, in doing such a
   thing. It would somewhat void the point of having protected (i.e.
   secure) keys in
  the
   first place.
  
   I didn't feel the point important enough to comment on before.
  
   -Ursprüngliche Nachricht-
   Von: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU]
   Im Auftrag von Tom Ambros
   Gesendet: Montag, 9. Juli 2012 16:22
   An: IBM-MAIN@LISTSERV.UA.EDU
   Betreff: Re: Secure Encryption Keys vs Protected Keys
  
   Phil Smith wrote:
  
   Yes, Protected Key requires ICSF and a CEX.
  
   Should that not read  Yes, Secure Key requires ICSF and a CEX.?
  
   Blatant plagiarism follows from my copy of the z196 Tech Guide,
   Section
   6.2.2 'CPACF Protected key':
  
   The zEnterprise CPCs 

Re: . Searching for a cross=reference list of manuals ...

2012-07-09 Thread Mark Yuhas
Thank you for the input.  The IBM site contains some information.  The
site lists 672 titles.  The set I am working with contains over 1800
titles.

And, the Windows solution.  I am at the mercy of our desktop group for a
workstation configuration.  This includes hardware and software.


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: . Searching for a cross=reference list of manuals ...

2012-07-09 Thread Gibney, Dave
I still find IBM's Softcopy Librarian, Shelf Organizer  and Reader sufficient 
and effective.

Dave Gibney
Information Technology Services
Washington State University

 -Original Message-
 From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU]
 On Behalf Of Mark Yuhas
 Sent: Monday, July 09, 2012 12:14 PM
 To: IBM-MAIN@LISTSERV.UA.EDU
 Subject: Re: . Searching for a cross=reference list of manuals ...
 
 Thank you for the input.  The IBM site contains some information.  The
 site lists 672 titles.  The set I am working with contains over 1800
 titles.
 
 And, the Windows solution.  I am at the mercy of our desktop group for a
 workstation configuration.  This includes hardware and software.
 
 
 --
 For IBM-MAIN subscribe / signoff / archive access instructions,
 send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Secure Encryption Keys vs Protected Keys

2012-07-09 Thread Greg Boyd
Effectively, you need both ICSF and a CEX3 to take advantage of Protected Keys.

As was pointed out in another append, you can use the PCKMO instruction to wrap 
a key.  That is, you would take a clear key and wrap it, creating a protected 
key.  And as was also pointed out in that post, I'm not sure why you would do 
that.  Once you bring the key, in the clear, into storage, it could be viewed 
by an attacker.  So you would have to make sure the system is secured (i.e. no 
other apps or users accessing the system) while you're using the PCKMO to wrap 
it. 

And even then, you would have to be sure to use that wrapped key right away.  
There is no point in saving a copy of the wrapped key because there is no 
guarantee that the wrapping key won't have changed before you use it again.  If 
the LPAR is deactivated and activated then the wrapping key will change and 
your wrapped key is no longer usable. 

So the value of protected key is to leverage the security of the CEX3 (for 
storing your application key as a secure key) with the performance of the CPACF.


and responding to John Gilmore's comments, I say that the performance numbers 
are 'ivory tower' because few customers will ever obtain those metrics.  For 
example, the SSL tests are intended to measure the performance of the 
handshake.  I believe the payload in that example was 1 byte of data.  That's 
not a very realistic exercise, but it does effectively demonstrate the value of 
the CEX card on the SSL handshake.  

So the data is valuable and useful.  In the report you can see the expected 
throughput given AES vs TDES or the various blocksizes.  And you can see the 
relative impact of secure key vs clear key vs protected key.

But you must temper your expectations.  Crypto has a cost and it can be 
significant, but I would also suggest that the application design can have a 
significant impact on your performance expectations as well.

Greg Boyd
IBM Advanced Technical Support
Supporting Crypto on System z

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


New Goodies in ISPF z/OS 01.12.00 - missing

2012-07-09 Thread David Speake
We just brought up z/OS 01.12.00 on one LPAR, up from 01.11.00. I immediately 
logged on to ISPF  to see if there were any wonderful NEW goodies.
Intense disappointment. :-(

From the ISPF Status Panel

 ZOS390RL = z/OS   01.12.00
 The z/OS release running on your system.

 ZISPFOS  = ISPF FOR z/OS 01.11.00
 The level of ISPF code that is running as part of z/OS on your
 system. This might or might not match ZOS390RL.  


And
TUTOR ISR5 gave
RXJ67 HELP  z/OS 01.11.00 ISPF -- Tutorial

Select option for information about the desired release or
press ENTER for current release information.

Current Release Changes
1  z/OS 01.11.00 ISPF
/~~~ snip   ~~~/

z/OS V1R12 information center shows
z/OS V1R12.0 ISPF User's Guide Vol I  
SC34-4822-09   === Same as V1R11
z/OS V1R12.0 ISPF User's Guide Vol II
SC34-4823-09   === Same as V1R11
etc


Oh the shame of it all!
Or did I miss something - big time?
I ran SuperC and there were a few differences in the ISP PDSes,
 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: . Searching for a cross=reference list of manuals ...

2012-07-09 Thread Mike Schwab
The page I gave you is for 1 version of z/OS.  Make not include
manuals for additional products.  The third part consisting of the 9th
and 10th character change with each published edition, most manuals
have at least one change with every version of z/OS.  So if the first
8 match the title probably matches except for version differences.

On Mon, Jul 9, 2012 at 2:14 PM, Mark Yuhas mark.yu...@paccar.com wrote:
 Thank you for the input.  The IBM site contains some information.  The
 site lists 672 titles.  The set I am working with contains over 1800
 titles.

 And, the Windows solution.  I am at the mercy of our desktop group for a
 workstation configuration.  This includes hardware and software.
-- 
Mike A Schwab, Springfield IL USA
Where do Forest Rangers go to get away from it all?

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: New Goodies in ISPF z/OS 01.12.00 - missing

2012-07-09 Thread Hank Oerlemans
We did not ship any changes for z/OS 1.12. Now if you had jumped to z/OS 
1.13 ;-)

Hank, ISPF





From:   David Speake david.spe...@bcbssc.com
To: IBM-MAIN@listserv.ua.edu, 
Date:   10/07/2012 08:37 AM
Subject:New Goodies in ISPF z/OS 01.12.00 - missing
Sent by:IBM Mainframe Discussion List IBM-MAIN@listserv.ua.edu



We just brought up z/OS 01.12.00 on one LPAR, up from 01.11.00. I 
immediately logged on to ISPF  to see if there were any wonderful NEW 
goodies.
Intense disappointment. :-(

From the ISPF Status Panel

 ZOS390RL = z/OS   01.12.00
 The z/OS release running on your system.

 ZISPFOS  = ISPF FOR z/OS 01.11.00
 The level of ISPF code that is running as part of z/OS on your
 system. This might or might not match ZOS390RL. 


And
TUTOR ISR5 gave
RXJ67 HELP  z/OS 01.11.00 ISPF -- Tutorial

Select option for information about the desired release or
press ENTER for current release information.

Current Release Changes
1  z/OS 01.11.00 ISPF
/~~~ snip   ~~~/

z/OS V1R12 information center shows
z/OS V1R12.0 ISPF User's Guide Vol I 
SC34-4822-09   === Same as V1R11
z/OS V1R12.0 ISPF User's Guide Vol II
SC34-4823-09   === Same as V1R11
etc


Oh the shame of it all!
Or did I miss something - big time?
I ran SuperC and there were a few differences in the ISP PDSes,
 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN



--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Enabling RRS Error

2012-07-09 Thread Jake anderson
Dear List,

Good Day.

I am trying to Enable RRS facility for a DB2 related stuff. I am using the
below JCL for defining the Logstream :


   DATA TYPE(LOGR)
   DEFINE LOGSTREAM NAME(ATR.PLEX1.MAIN.UR)
  LOWOFFLOAD(60)
  HIGHOFFLOAD(80)
  DASDONLY(YES)
  HLQ(IXGLOGR)
  LS_SIZE(1024)
  LS_DATACLAS(VSAMLS)
  STG_SIZE(1024)
  DEFINE LOGSTREAM NAME(ATR.PLEX1.DELAYED.UR)
  LOWOFFLOAD(60)
  HIGHOFFLOAD(80)
  DASDONLY(YES)
  HLQ(IXGLOGR)
  LS_SIZE(960)
  LS_DATACLAS(VSAMLS)
  STG_SIZE(960)
  DEFINE LOGSTREAM NAME(ATR.PLEX1.ARCHIVE)
  LOWOFFLOAD(0)
  HIGHOFFLOAD(80)
  DASDONLY(YES)
  HLQ(IXGLOGR)
  LS_SIZE(960)
  LS_DATACLAS(VSAMLS)
  AUTODELETE(YES)
  RETPD(2)
  STG_SIZE(2000)
  DEFINE LOGSTREAM NAME(ATR.PLEX1.RM.DATA)
  LOWOFFLOAD(60)
  HIGHOFFLOAD(80)
  DASDONLY(YES)
  HLQ(IXGLOGR)
  LS_SIZE(192)
  LS_DATACLAS(VSAMLS)
  STG_SIZE(192)
  DEFINE LOGSTREAM NAME(ATR.PLEX1.RESTART)
 LOWOFFLOAD(60)
 HIGHOFFLOAD(80)
 DASDONLY(YES)
 HLQ(IXGLOGR)
 LS_SIZE(960)
 LS_DATACLAS(VSAMLS)
 STG_SIZE(960)


Z/OS : 1.13
DB2 : 10.1

But I am ending up with an error :

IXG010E NO SPACE IS AVAILABLE FOR LOGSTREAM
ENTRIES
IXG002E LOGR POLICY PROCESSING ENDED WITH RETCODE=0008
RSNCODE=0823

All the definition starting with IXGLOGR.ATR.** are ACS controlled and they
sit in a dedicated LOGR volume DEVLOG'. I can see DEVLOG volume is still
94 % free and I still Get an error message as NO SPACE IS AVAILABLE FOR
LOGSTREAM ENTRIES.

Reviewing the Log I can see ATR.PLEX1.MAIN.UR and  ATR.PLEX1.DELAYED.UR are
getting defined, but the other consecutive steps are abending with space
issue. Is it something I have to reduce the STG_SIZE for the next LOGSTREAM
? Reducing the STG_SIZE will have any impact on the performance side ?

Please advise me.

Jake

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Enabling RRS Error

2012-07-09 Thread Jake anderson
lizette,

Probably I missed saying that I referred the LOOKAT ibm. LOOKAT explanation
says :

   *IXG010E*   *NO* *SPACE* *IS* *AVAILABLE* *FOR* type *ENTRIES*

*Explanation:* The system logger couple data set defined by the LOGR policy
has no free space for the type of entry you are trying to define.

Here in my case I am not defining the Couple dataset so Just defining the
Logstream to DASD.

   *IXG002E*   *LOGR* *POLICY* *PROCESSING* *ENDED* *WITH* *RETCODE=*
retcode *RSNCODE=*
 rsncode
IXG002E LOGR POLICY PROCESSING ENDED WITH RETCODE=0008 RSNCODE=0823

Jake




Jake

On Tue, Jul 10, 2012 at 9:44 AM, Lizette Koehler stars...@mindspring.comwrote:

 
  Dear List,
 
  Good Day.
 
  I am trying to Enable RRS facility for a DB2 related stuff. I am using
 the
 below JCL for
  defining the Logstream :
 
 
 DATA TYPE(LOGR)
 DEFINE LOGSTREAM NAME(ATR.PLEX1.MAIN.UR)
LOWOFFLOAD(60)
HIGHOFFLOAD(80)
DASDONLY(YES)
HLQ(IXGLOGR)
LS_SIZE(1024)
LS_DATACLAS(VSAMLS)
STG_SIZE(1024)
DEFINE LOGSTREAM NAME(ATR.PLEX1.DELAYED.UR)
LOWOFFLOAD(60)
HIGHOFFLOAD(80)
DASDONLY(YES)
HLQ(IXGLOGR)
LS_SIZE(960)
LS_DATACLAS(VSAMLS)
STG_SIZE(960)
DEFINE LOGSTREAM NAME(ATR.PLEX1.ARCHIVE)
LOWOFFLOAD(0)
HIGHOFFLOAD(80)
DASDONLY(YES)
HLQ(IXGLOGR)
LS_SIZE(960)
LS_DATACLAS(VSAMLS)
AUTODELETE(YES)
RETPD(2)
STG_SIZE(2000)
DEFINE LOGSTREAM NAME(ATR.PLEX1.RM.DATA)
LOWOFFLOAD(60)
HIGHOFFLOAD(80)
DASDONLY(YES)
HLQ(IXGLOGR)
LS_SIZE(192)
LS_DATACLAS(VSAMLS)
STG_SIZE(192)
DEFINE LOGSTREAM NAME(ATR.PLEX1.RESTART)
   LOWOFFLOAD(60)
   HIGHOFFLOAD(80)
   DASDONLY(YES)
   HLQ(IXGLOGR)
   LS_SIZE(960)
   LS_DATACLAS(VSAMLS)
   STG_SIZE(960)
 
 
  Z/OS : 1.13
  DB2 : 10.1
 
  But I am ending up with an error :
 
  IXG010E NO SPACE IS AVAILABLE FOR LOGSTREAM ENTRIES IXG002E LOGR POLICY
  PROCESSING ENDED WITH RETCODE=0008
  RSNCODE=0823
 
  All the definition starting with IXGLOGR.ATR.** are ACS controlled and
 they sit in a
  dedicated LOGR volume DEVLOG'. I can see DEVLOG volume is still
  94 % free and I still Get an error message as NO SPACE IS AVAILABLE FOR
  LOGSTREAM ENTRIES.
 
  Reviewing the Log I can see ATR.PLEX1.MAIN.UR and  ATR.PLEX1.DELAYED.UR
 are
  getting defined, but the other consecutive steps are abending with space
 issue. Is it
  something I have to reduce the STG_SIZE for the next LOGSTREAM ? Reducing
 the
  STG_SIZE will have any impact on the performance side ?
 
  Please advise me.
 
  Jake
 

 Jake,

 Did you even try to look up the error message before posting?  You seem to
 post without doing any research.

 Advise:  Look up the error and see if that tells you what you need to know.

 Lizette

 --
 For IBM-MAIN subscribe / signoff / archive access instructions,
 send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN