Data storage key for user-replaceable programs
The storage key of storage used by user-replaceable programs depends on how
the storage is obtained:
vThe communication area passed to the user-replaceable program by its caller is
always in CICS key.
vAny working storage obtained for the user-replaceable program is in the key set
by the TASKDATAKEYof the transaction under which the program is invoked.
vUser-replaceable programs can use EXEC CICS commands to obtain storage, by
issuing:
Explicit EXEC CICS GETMAIN commands
Implicit storage requests as a result of EXEC CICS commands that use the
SET option.
The default storage key for storage obtained by EXEC CICS commands is set by
the TASKDATAKEYof the transaction under which the user program is invoked.
As an example, consider a transaction defined with TASKDATAKEY(USER)that
causes a user-replaceable program to be invoked. In this case, any implicit or
explicit storage acquired by the user program by means of an EXEC CICS
command is, by default, in user-key storage. However, on an EXEC CICS
GETMAIN command, the user program can override the TASKDATAKEYoption
by specifying either CICSDATAKEYor USERDATAKEY.
438 Customization Guide