BEA TUXEDO Reference Manual Section 5 - File Formats and Data Descriptions

Total Page:16

File Type:pdf, Size:1020Kb

BEA TUXEDO Reference Manual Section 5 - File Formats and Data Descriptions BEA TUXEDO Reference Manual Section 5 - File Formats and Data Descriptions BEA TUXEDO Release 6.5 Document Edition 6.5 February 1999 Copyright Copyright © 1999 BEA Systems, Inc. All Rights Reserved. Restricted Rights Legend This software and documentation is subject to and made available only pursuant to the terms of the BEA Systems License Agreement and may be used or copied only in accordance with the terms of that agreement. It is against the law to copy the software except as specifically allowed in the agreement. This document may not, in whole or in part, be copied photocopied, reproduced, translated, or reduced to any electronic medium or machine readable form without prior consent, in writing, from BEA Systems, Inc. Use, duplication or disclosure by the U.S. Government is subject to restrictions set forth in the BEA Systems License Agreement and in subparagraph (c)(1) of the Commercial Computer Software-Restricted Rights Clause at FAR 52.227-19; subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013, subparagraph (d) of the Commercial Computer Software--Licensing clause at NASA FAR supplement 16-52.227-86; or their equivalent. Information in this document is subject to change without notice and does not represent a commitment on the part of BEA Systems. THE SOFTWARE AND DOCUMENTATION ARE PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND INCLUDING WITHOUT LIMITATION, ANY WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. FURTHER, BEA Systems DOES NOT WARRANT, GUARANTEE, OR MAKE ANY REPRESENTATIONS REGARDING THE USE, OR THE RESULTS OF THE USE, OF THE SOFTWARE OR WRITTEN MATERIAL IN TERMS OF CORRECTNESS, ACCURACY, RELIABILITY, OR OTHERWISE. Trademarks or Service Marks BEA, BEA Builder, BEA Connect, BEA Jolt, BEA Manager, and BEA MessageQ are trademarks of BEA Systems, Inc. BEA ObjectBroker is a registered trademark of BEA Systems, Inc. TUXEDO is a registered trademark in the United States and other countries. All other company names may be trademarks of the respective companies with which they are associated. BEA TUXEDO Reference Manual Document Edition Date Software Version 6.5 February 1999 BEA TUXEDO Release 6.5 Contents Section 5 - File Formats and Data Descriptions intro(5) ....................................................................................................2 ACL_MIB(5) ..........................................................................................3 T_ACLGROUP CLASS DEFINITION..................................................5 T_ACLPERM CLASS DEFINITION ....................................................7 T_ACLPRINCIPAL CLASS DEFINITION ..........................................9 APPQ_MIB(5) ......................................................................................13 T_APPQ Class Definition.....................................................................16 T_APPQMSG Class Definition ............................................................21 T_APPQSPACE Class Definition ........................................................26 T_APPQTRANS Class Definition........................................................32 AUTHSVR (5) ......................................................................................39 SECURITY USER_AUTH...................................................................40 SECURITY ACL or MANDATORY_ACL.........................................42 compilation(5) .......................................................................................44 DMADM (5) .........................................................................................52 dmconfig(5)...........................................................................................53 EVENTS(5)...........................................................................................71 EVENT_MIB(5) ...................................................................................77 T_EVENT_CLIENT CLASS DEFINITION........................................78 T_EVENT_COMMAND CLASS DEFINITION.................................80 T_EVENT_QUEUE CLASS DEFINITION ........................................82 T_EVENT_SERVICE CLASS DEFINITION .....................................86 T_EVENT_USERLOG CLASS DEFINITION....................................88 Ferror (5) ...............................................................................................90 field_tables(5) .......................................................................................92 BEA TUXEDO Reference Manual iii GWADM(5) ......................................................................................... 95 GWTDOMAIN(5)................................................................................ 97 GWTUX2TE (5) .................................................................................. 98 langinfo(5).......................................................................................... 106 MIB(5)................................................................................................ 110 Usage.................................................................................................. 119 T_CLASS CLASS DEFINITION..................................................... 131 T_CLASSATT CLASS DEFINITION .............................................. 133 nl_types(5).......................................................................................... 140 servopts(5).......................................................................................... 141 TM_MIB(5)........................................................................................ 145 T_BRIDGE CLASS ........................................................................... 148 T_CLIENT CLASS............................................................................ 153 T_CONN CLASS............................................................................... 161 T_DEVICE CLASS ........................................................................... 164 T_DOMAIN CLASS.......................................................................... 167 T_GROUP CLASS ............................................................................ 181 T_MACHINE CLASS ....................................................................... 188 T_MSG CLASS ................................................................................. 203 T_NETGROUP CLASS..................................................................... 206 T_NETMAP CLASS.......................................................................... 208 T_QUEUE CLASS ............................................................................ 211 T_ROUTING CLASS ........................................................................ 215 T_SERVER CLASS........................................................................... 219 T_SERVICE CLASS ......................................................................... 232 T_SVCGRP CLASS .......................................................................... 237 T_TLISTEN CLASS.......................................................................... 244 T_TLOG CLASS ............................................................................... 245 T_TRANSACTION CLASS.............................................................. 248 T_ULOG CLASS............................................................................... 252 TMQFORWARD(5) .......................................................................... 264 TMQUEUE(5).................................................................................... 268 TMSYSEVT(5) .................................................................................. 272 tmtrace(5) ........................................................................................... 273 TMUSREVT(5).................................................................................. 279 iv BEA TUXEDO Reference Manual tperrno(5) ............................................................................................280 tpurcode(5) ..........................................................................................283 tuxenv(5) .............................................................................................284 tuxtypes(5) ..........................................................................................290 typesw(5).............................................................................................293 ubbconfig(5)........................................................................................294 udfk(5).................................................................................................327 viewfile(5)...........................................................................................329 WS_MIB(5) ........................................................................................336 T_WSH Class Definition ....................................................................338 T_WSL Class Definition.....................................................................343 WSL(5)................................................................................................356 BEA TUXEDO Reference Manual v vi BEA TUXEDO Reference Manual Section 5 - File Formats and Data Descriptions BEA TUXEDO Reference Manual 1 intro(5) intro(5) Name intro-introduction to tables and files Description This section describes the format of miscellaneous tables and files. The page named compilation(5) summarizes information about header files, libraries and environment
Recommended publications
  • Sequence Listings Webinar Suzannah K. Sundby Carl Oppedahl
    Suzannah K. Sundby Canady + Lortz LLP Sequence Listings Webinar January 9, 2018 – Updated Version Carl Oppedahl Oppedahl Patent Law Firm LLC DISCLAIMER These materials and views expressed today reflect only the personal views of the author and do not necessarily represent the views of other members and clients of the author’s organizations. These materials are public information and have been prepared solely for educational purposes to contribute to the understanding of U.S. intellectual property law. While every attempt was made to ensure that these materials are accurate, errors or omissions may be contained therein, for which any liability is disclaimed. These materials and views are not a source of legal advice and do not establish any form of attorney-client relationship with the authors and their law firms. Why are some sequence errors not identified by Checker? Is “SEQ ID NO” required before sequences in Specifications? Do you recommend using the PatentIn Software? How do you correct sequence listing errors in PCTs? What about the new WIPO ST.26 Standard? Is Checker worthwhile? How can I easily edit sequence listings generated by others? Can I use other software to generate sequence listings? How do I file sequence listings using EFS-Web and ePCT? How long does it take the USPTO to review and approve? Any risk TYFNIL of using certain sequence descriptors? Help! IT locked down my computer… what do I do? Any sequence listing tips? Why Practitioners Should Know and Do Usually lack of time to send to outside vendors Last minute changes to applications (apps) containing sequences (seqs) Particularly, changes to claims Not hostage to staff/vendors, overtime, etc.
    [Show full text]
  • Dell Inspiron 7391 Setup and Specifications
    Inspiron 7391 2n1 Setup and Specifications Regulatory Model: P113G Regulatory Type: P113G001 Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use of your product. CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem. WARNING: A WARNING indicates a potential for property damage, personal injury, or death. © 2018 - 2019 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be trademarks of their respective owners. 2019 - 07 Rev. A00 Contents 1 Set up your Inspiron 7391 2n1.........................................................................................................4 2 Views of Inspiron 7391 2n1............................................................................................................ 6 Right........................................................................................................................................................................................6 Left.......................................................................................................................................................................................... 6 Base......................................................................................................................................................................................... 7 Display....................................................................................................................................................................................
    [Show full text]
  • INT 09H (9) Keyboard
    INT 09h (9) Keyboard The keyboard generates an INT 9 every time a key is pushed or released. Notes: This is a hardware interrupt (IRQ 1) activated by the make or break of every keystroke. The default INT 9 handler in the ROM reads the make and break scan codes from the keyboard and converts them into actions or key codes as follows: ş For ASCII keys, when a make code is encountered, the ASCII code and the scan code for the key are placed in the 32-byte keyboard buffer, which is located at 0:41Eh. The ASCII code and scan code are placed in the buffer at the location addressed by the Keyboard Buffer Tail Pointer (0:041Ch). The Keyboard Buffer Tail Pointer is then incremented by 2, and if it points past the end of the buffer, it is adjusted so that it points to the beginning of the buffer. ş If Ctrl, Alt, or Shift has been pressed, the Shift Status (0:0417h) and Extended Shift Status (0:0418h) bytes are updated. ş If the Ctrl-Alt-Del combination has been pressed, the Reset Flag (0:0472h) is set to 1234h and control is given to the power-on self test (POST). Because the Reset Flag is 1234h, the POST routine bypasses the memory test. ş If the Pause key sequence has been entered, this interrupt enters an indefinite loop. The loop is broken as soon as a valid ASCII keystroke is entered. (The PC Convertible issues an INT 15h, Service 41h (Wait on External Event), to execute its pause loop.) ş If the Print Screen key sequence is entered, an INT 05h (Print Screen) is executed.
    [Show full text]
  • Networking Telnet
    IBM i Version 7.2 Networking Telnet IBM Note Before using this information and the product it supports, read the information in “Notices” on page 99. This edition applies to IBM i 7.2 (product number 5770-SS1) and to all subsequent releases and modifications until otherwise indicated in new editions. This version does not run on all reduced instruction set computer (RISC) models nor does it run on CISC models. This document may contain references to Licensed Internal Code. Licensed Internal Code is Machine Code and is licensed to you under the terms of the IBM License Agreement for Machine Code. © Copyright International Business Machines Corporation 1998, 2013. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Telnet................................................................................................................... 1 What's new for IBM i 7.2..............................................................................................................................1 PDF file for Telnet........................................................................................................................................ 1 Telnet scenarios...........................................................................................................................................2 Telnet scenario: Telnet server configuration.........................................................................................2 Telnet scenario: Cascaded Telnet
    [Show full text]
  • Security in Ordinary Operating Systems
    39 C H A P T E R 4 Security in Ordinary Operating Systems In considering the requirements of a secure operating system,it is worth considering how far ordinary operating systems are from achieving these requirements. In this chapter, we examine the UNIX and Windows operating systems and show why they are fundamentally not secure operating systems. We first examine the history these systems, briefly describe their protection systems, then we show, using the requirements of a secure operating system defined in Chapter 2, why ordinary operating systems are inherently insecure. Finally, we examine common vulnerabilities in these systems to show the need for secure operating systems and the types of threats that they will have to overcome. 4.1 SYSTEM HISTORIES 4.1.1 UNIX HISTORY UNIX is a multiuser operating system developed by Dennis Ritchie and Ken Thompson at AT&T Bell Labs [266]. UNIX started as a small project to build an operating system to play a game on an available PDP-7 computer. However, UNIX grew over the next 10 to 15 years into a system with considerable mindshare, such that a variety of commercial UNIX efforts were launched. The lack of coherence in these efforts may have limited the market penetration of UNIX, but many vendors, even Microsoft, had their own versions. UNIX remains a significant operating system today, embodied in many systems, such as Linux, Sun Solaris, IBM AIX, the various BSD systems, etc. Recall from Chapter 3 that Bell Labs was a member of the Multics consortium. However, Bell Labs dropped out of the Multics project in 1969, primarily due to delays in the project.
    [Show full text]
  • The AWK Programming Language
    The Programming ~" ·. Language PolyAWK- The Toolbox Language· Auru:o V. AHo BRIAN W.I<ERNIGHAN PETER J. WEINBERGER TheAWK4 Programming~ Language TheAWI(. Programming~ Language ALFRED V. AHo BRIAN w. KERNIGHAN PETER J. WEINBERGER AT& T Bell Laboratories Murray Hill, New Jersey A ADDISON-WESLEY•• PUBLISHING COMPANY Reading, Massachusetts • Menlo Park, California • New York Don Mills, Ontario • Wokingham, England • Amsterdam • Bonn Sydney • Singapore • Tokyo • Madrid • Bogota Santiago • San Juan This book is in the Addison-Wesley Series in Computer Science Michael A. Harrison Consulting Editor Library of Congress Cataloging-in-Publication Data Aho, Alfred V. The AWK programming language. Includes index. I. AWK (Computer program language) I. Kernighan, Brian W. II. Weinberger, Peter J. III. Title. QA76.73.A95A35 1988 005.13'3 87-17566 ISBN 0-201-07981-X This book was typeset in Times Roman and Courier by the authors, using an Autologic APS-5 phototypesetter and a DEC VAX 8550 running the 9th Edition of the UNIX~ operating system. -~- ATs.T Copyright c 1988 by Bell Telephone Laboratories, Incorporated. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopy­ ing, recording, or otherwise, without the prior written permission of the publisher. Printed in the United States of America. Published simultaneously in Canada. UNIX is a registered trademark of AT&T. DEFGHIJ-AL-898 PREFACE Computer users spend a lot of time doing simple, mechanical data manipula­ tion - changing the format of data, checking its validity, finding items with some property, adding up numbers, printing reports, and the like.
    [Show full text]
  • AXEL Platine Terminal Ethernet TCP/IP Models
    AXEL Platine Terminal Ethernet TCP/IP Models User's Guide May 1997 - Ref.: TCPUE105/701-2 The reproduction or the translation of this material, in part or whole, is strictly prohibited. For additional information, please contact: AXEL Zone d'activité d'Orsay-Courtabœuf 16 Avenue du Québec BP 728 91962 LES ULIS Cedex France Tel.: (33) 1 69 28 27 27 Fax: (33) 1 69 28 82 04 The information in this document is subject to change without notice. AXEL assumes no responsibility for any errors that may appear in this document. All trademarks and registered trademarks are the property of their respective holders. © - 1995-1997 - AXEL - All Rights Reserved. 1 - TCP/IP SET-UP ..........................................................................................1 2 - TERMINAL SET-UP ...................................................................................4 2.1 - GENERAL FEATURES.........................................................................5 2.1.1 - Enter Terminal Set-Up Mode ..........................................................5 2.1.2 - Set-Up Screens ..............................................................................6 2.1.3 - Predefined Set-Up..........................................................................6 2.1.4 - Local and Global Parameters .........................................................6 2.1.5 - Exit Set-Up.....................................................................................7 2.2 - SCREEN...............................................................................................8
    [Show full text]
  • IBM VM/370 (Ems) Terminal User's Guide for FORTRAN IV Program Product Program Products
    SC28-6891-1 IBM VM/370 (eMS) Terminal User's Guide for FORTRAN IV Program Product Program Products Program Numbers 5734-F01 5734-F02 5734-F03 5734-LM1 5734-LM3 Page of SC28-6891-0,-1 Revised May 13, 1977 By TNL SN20-922S Second Edition (April 1975) This edition, as amended by technical newsletters SN20-9201 and SN20-9225, applies to Release 1.0 of the IBM Virtual Machine Facility/370 (VM/370) (CMS). This edition is a reprint of SC28-6891-0 incorporating changes released in Technical Newsletters SN28-0609 (dated March 1, 1973) and SN28-0620 (dated January 3, 1974). Changes are listed in the Summary of Amendments, Number 3, on the facing page. Information in this publication is subject to significant change. Any such changes will be published in new editions or technical newsletters. Before using the publication, consult the latest IBM System/360 Bibliography, GC20-0360, or IBM System/370 Bibliography, GC20-0001, and the technical newsletters that amend the particular bibliography, to learn which editions are applicable and current. Requests for copies of IBM publications shou'ld be made to your IBM representative or to the IBM branch office that serves your locality. Forms for readers' comments are provided at the back of this publication. If the forms have been removed, address comments to IBM Corporation, P. O. Box 50020, Programming Publishing, San Jose, California 95150. Comments and suggesti~ns become the property of IBM. © Copyright International Business Machines Corporation 1972 Summary of Amendments Number 1 Date of Publication: March 1, 1973 Form of Publication: TNL SN28-0609 to SC28-6891-0 CP and CMS Command Abbreviations Maintenance: Documentation Only Valid abbreviations have been added to the summary descriptions of significant CP and CMS commands.
    [Show full text]
  • Journal Import Requirements and Technical Guidance
    Journal Import Requirements and Technical Guidance Document Purpose The purpose of this document is to provide technical requirements information regarding the Journal Import process for those involved in the remediation of systems impacted by Workday Release 4 functionality. Prior to Workday Release 4 in July 2017, journal import utilizes the Journal Staging Area (JSA). This document provides information about the design that will be used to replace the JSA process of uploading files into Oracle with the new process for loading files into Workday. The process covers both non-Internal Service Provider (non-ISP) and Internal Service Provider (ISP) Journal Imports. Process Due to the large number of JSA sources, one of the guiding principles for the new Journal Import process has been that the overall process should feel familiar and require minimal training for end-users. In order to accomplish this goal, the design(s) utilizes the existing Managed File Transfer (MFT) source directories; the file formats, while different, utilize a file format that contains a Header (GLH) record and multiple Detail (GLD) records. The formats can be viewed in the template file - ISP and non-ISP journal file layouts. The designers of the process are aware that there are use cases that will require some sources to submit both JSA files to be routed to EBS at the same time that they are submitting Journal Import files to be imported into Workday. This use case is very constrained and will only last for a very short period of time. If you think this may apply to you, the team would like to hear from you.
    [Show full text]
  • The Gold Standard for Patent Brokerage™
    The Gold Standard for Patent Brokerage™ A proven record of success with more than 2500 patents sold. Executive Summary for the Sale of Enterprise Malware Removal & Restoration patent portfolio by Google 29 Assets Total · Full Patent Brokerage · Strategic IP Advisory EXECUTIVE SUMMARY FOR THE SALE OF Enterprise Malware Removal & Restoration Solutions By GOOGLE 29 TOTAL ASSETS EXECUTIVE SUMMARY FOR THE SALE OF Enterprise Malware Removal & Restoration Solutions 12 Families, 13 US Patents & their 16 family members in 8 other Jurisdictions Priority Issue Expiry Bwd/ Fwd Patent Number Patent Title Date Date Date Citations FAMILY 1 Discrete, background determination of the adequacy of Aug 19, Jun 8, Aug 18, US 6748544 10/41 security features of a computer system 1999 2004 2019 FAMILY 2 US 7114184 Oct 27, (This patent has been System and method for restoring computer systems damaged Mar 30, Sep 26, mapped against 2022 15/85 by a malicious computer program 2001 2006 representative (PTA 576) industry offerings) System and method for restoring computer systems damaged Mar 30, Aug 23, EP1374017 by a malicious computer program 2001 2006 System and method for restoring a computer system which has Mar 30, Jul 26, DE60214147 been damaged by a malicious computer program 2001 2007 System and method for restoring a computer system which as Mar 30, ZA 200306411 been damaged by a malicious computer program 2001 System And Method For Restoring Computer Systems Mar 30, Dec 3, IL157542 Damaged By A Malicious Computer Program 2001 2007 System And Method For Restoring Computer Systems Mar 30, IL157542D0 Damaged By A Malicious Computer Program 2001 FAMILY 3 Oct 26, Method and apparatus for multicast delivery of program Aug 25, Jan 4, US 7865723 2028(PTA1 6/17 information 2004 2011 172) Method and apparatus for multicast transmission of program Aug 25, Jan 26, DE102005039361 2/0 information 2004 2017 FAMILY 4 Sep 30, Sep 11, Sep 19, US 8266684 Tokenized resource access 18/35 2008 2012 2030 © 2018 Tangible IP, LLC.
    [Show full text]
  • Lenovo Ideapad 310 Ideapad 310-14ISK Ideapad 310-15ISK Ideapad 310 Touch-15ISK User Guide
    Lenovo ideapad 310 ideapad 310-14ISK ideapad 310-15ISK ideapad 310 Touch-15ISK User Guide lmn ReadRead thethe s safetyafety notice noticess and and important important tip tipss in in the the includedincluded manual manualss before before u usingsing your your computer. computer. Notes • Before using the product, be sure to read Lenovo Safety and General Information Guide first. • The latest electronic compliance and environmental information are available from the Lenovo compliance information Web sites. - To view compliance information go to: http://www.lenovo.com/ compliance - To download environmental information go to: http://www.lenovo.com/ ecodeclaration • Some instructions in this guide may assume that you are using Windows® 10. If you are using another Windows operating system, some operations may be slightly different. If you are using other operating systems, some operations may not apply to you. • The features described in this guide are common to most models. Some features may not be available on your computer or your computer may include features that are not described in this user guide. • The illustrations used in this manual are for Lenovo ideapad 310-14ISK unless otherwise stated. • The illustrations in this manual may differ from the actual product. Please refer to the actual product. Regulatory Notice • For details, refer to Guides & Manuals at http://support.lenovo.com. First Edition (January 2016) © Copyright Lenovo 2016. LIMITED AND RESTRICTED RIGHTS NOTICE: If data or software is delivered pursuant to a General Services Administration “GSA” contract, use, reproduction, or disclosure is subject to restrictions set forth in Contract No. GS-35F-05925. Contents Chapter 1.
    [Show full text]
  • Streampix 5 Tech Support:[email protected]
    Norpix Inc - www.norpix.com StreamPix 5 Tech Support:[email protected] STREAMPIX 5 Copyright Norpix Inc. (C) 2009-2013 StreamPix5 - Copyright Norpix Inc. (C) 2013 (1/187) Norpix Inc - www.norpix.com StreamPix 5 Tech Support:[email protected] Table of Contents About StreamPix 5...................................................................................................................................8 Minimum system requirements................................................................................................................9 Installing StreamPix...............................................................................................................................10 Authorization codes...............................................................................................................................11 StreamPix 5 Basics................................................................................................................................12 Ribbon Interface overview.................................................................................................................12 Faster !..........................................................................................................................................14 Default list of Keyboard Shortcuts.................................................................................................15 The Sequence slider ....................................................................................................................16
    [Show full text]