Changes to samples

This section summarizes the changes to sample programs, sample resource definitions, sample service routines, and sample files across supported CICS® releases. Use this information to plan the impact of upgrading from one release to another.

If you are upgrading from an end-of-service release, you can find information about the changes that are relevant to those releases in Summary of changes from end-of-service releases.

Table 1. Changes to sample programs by release of CICS TS
Name 5.6 6.1 6.2 CICS TS 6.3
DFH$DB2T CHANGED: The TYPE within JOURNALMODEL is now specified as a CHAR(5) attribute.      
DFH$FORA CHANGED: Resources are now alphabetically ordered.      
DFH$FORC CHANGED: Resources are now alphabetically ordered and resource attributes that are COBOL reserved words are prefixed with RDO- .      
DFH$FORP CHANGED: Resources are now alphabetically ordered. Compiled version now supplied.      
DFH$MOLS   CHANGED: UNLOAD supports DFHRMI fields in its output.    
DFH$UMOD     CHANGED: DFHDTCV and DFHDTSVC removed as they are no longer eligible to reside in the LPA/ELPA.  
DFHNJIVP        
DFH0QRCP NEW: Associated with transaction QRCP. This sample program demonstrates how to obtain and calculate the QR TCB CPU / Dispatch ratio and display a message when the ratio is less than a specified percentage.      
DFH0STEP        
DFHSIT6$       CHANGED: The following SIT values are added:
  • HTTPUSERAGENTHDR=NO
  • HTTPSERVERHDR=NO
  • CWAKEY=CICS
  • CMDSEC=ALWAYS
  • RESSEC=ALWAYS
  • GMTRAN=(CESL,DISCONNECT)
Table 2. Changes to sample files by release of CICS TS
File name 5.6 6.1 6.2 CICS TS 6.3
/samples/cicstags/cicstags.yaml   NEW: Example of CICS region tagging file.    
/security/ciphers/defaultciphers.xml   NEW: Example default cipher suite specification file. CHANGED: Cipher suites that use NULL, Triple DES (3DES) and RC4 encryption are removed from the file, including:
  • 003B - TLS_RSA_WITH_NULL_SHA256
  • C001 - TLS_ECDH_ECDSA_WITH_NULL_SHA
  • C002 - TLS_ECDH_ECDSA_WITH_RC4_128_SHA
  • C003 - TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
  • C006 - TLS_ECDHE_ECDSA_WITH_NULL_SHA
  • C007 - TLS_ECDHE_ECDSA_WITH_RC4_128_SHA
  • C008 - TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
  • C010 - TLS_ECDHE_RSA_WITH_NULL_SHA
  • C011 - TLS_ECDHE_RSA_WITH_RC4_128_SHA
  • C012 - TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
  • C00B - TLS_ECDH_RSA_WITH_NULL_SHA
  • C00C - TLS_ECDH_RSA_WITH_RC4_128_SHA
  • C00D - TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA

If you have your own unchanged copy of defaultciphers.xml in USSCONFIG/security/ciphers from a previous release, it is recommended that you copy the new version from USSHOME/security/ciphers to USSCONFIG/security/ciphers.

CHANGED: Cipher suites removed from the file, including:
  • 35/0035 - TLS_RSA_WITH_AES_256_CBC_SHA
  • 38/0038 - TLS_DHE_DSS_WITH_AES_256_CBC_SHA
  • 39/0039 - TLS_DHE_RSA_WITH_AES_256_CBC_SHA
  • 2F/002F - TLS_RSA_WITH_AES_128_CBC_SHA
  • 32/0032 - TLS_DHE_DSS_WITH_AES_128_CBC_SHA
  • 33/0033 - TLS_DHE_RSA_WITH_AES_128_CBC_SHA

If you have your own unchanged copy of defaultciphers.xml in USSCONFIG/security/ciphers from a previous release, it is recommended that you copy the new version from USSHOME/security/ciphers to USSCONFIG/security/ciphers. The order of the remaining ciphers in defaultciphers.xml has changed. When KEYRING is set, CICS tries to read the defaultciphers.xml from USSCONFIG. If it is not found, then it tries it from USSHOME. If it also fails, then error message DFHSO0176E is generated and CICS fails to start.

/security/ciphers/allvalidciphers.xml   NEW: Example list of all valid ciphers.