Information and procedures for end users.
This section describes the most frequently used functions of the 
 direct access library system. It is intended for programming, operating, and data processing personnel who use 
General Information
, the program management and security system, is designed to support the central storage, fast retrieval, easy maintenance, and control of all source programs, object programs, job control language, and card-image files.
 library can reside on any DASD supported by z/OS or VSE. The unique storage techniques and direct-access methods that are used for dynamic space allocation minimize the reorganization of the <PANVLT> library. Internal compression techniques remove all non-essential data fields such as blanks, sequence numbers, identification fields, and COBOL keywords.
Versions of 
 are available for operation in a z/OS environment and under VSE.
Both versions support the 
 library on any DASD supported by the specific operating system. Both versions support an operation in a shared DASD environment. In both versions, the commands to use the 
 system are functionally similar. Input/output files that are used by z/OS or VSE programs are compatible and version independent. Both the z/OS and VSE versions can process the 
 library (CKD only) and protection files without modification, if the library is created under z/OS (due to data being created differently).
: z/OS can read VSE created protection files if the proper DCB information is provided.
This document presents the functions and uses of PAN#1, including requirements and options of PAN#1 commands and parameters, operating considerations, and examples of the use of PAN#1 in typical user situations. See the System Management section for use of the management control functions of PAN#2 through PAN#8, and for more detailed technical design and operating characteristics of the 
 program management and security system.
Command Notation
The following conventions are used throughout this document for illustrative purposes.
{ }
Mandatory choice of one of these entries.
[ ]
Optional entry or choice of one of these entries.
All capital letters indicate a keyword or a name or field used in a program example.
lower case
Lower case letters represent variable information in command syntax.
The extensive capabilities of 
 provide you with more benefits than those available in standard source management control systems. 
 provides an environment of security, manageability, and control of the data processing program library.
Central Library
By maintaining a central library for programs, job control streams, and data files, 
  • Eliminates the need for separately located storage.
  • Stores all source programs, object programs, and production job control streams in a single central location.
  • Minimizes the necessity to reorganize or condense the library.
  • Removes non-essential data such as blanks, sequence numbers, COBOL keywords, and identification fields.
By protecting production programs and data files against change or deletion, 
  • Restricts modification of stored members that are in production (PROD) status.
  • Copies production members to create test versions.
  • Replaces original production version after testing.
  • Eliminates accidental or unauthorized alteration of production programs, job control streams, or data files.
  • Reserves the DELETE option for management use only.
  • Protects any member from change or deletion by means of the Integrity LOCK Facility.
Retrieval and Access Restriction
By restricting retrieval and access to confidential data files, 
  • Allows you to put confidential source programs or card-image files into a security controlled library.
  • Restricts the control code to retrieve confidential files to management.
By providing complete backup of all programs, job control streams, and data files, 
  • Recreates the library at any time by using the most recent protection file and the 
     input that has been processed since the creation of that file. (See the Extended Features section.)
  • Eliminates the problems of protecting programs and job control streams against disaster, loss, or accidental destruction.
Card File Elimination
(z/OS only) It is unnecessary to retain any 
 input that was processed prior to the creation of the most recent protection file because 
 eliminates card files of programs, job control streams, and data files. 
  • Allows you to dispose of all source program decks, object program decks, production job control decks, and stored card files once adequate backup is developed.
  • Eliminates problems associated with card files.
 can furnish a history of all prior versions of programs, job control streams, and data files. It also:
  • Copies deleted members to a protection file before physically removing them from the library, thereby recovering additional DASD space.
  • Optionally match-merges or merges deleted members with a previously created protection file.
  • Optionally reinstates a prior version of a source program or object code to the library.
Inter-Library Transfer
 provides for the transfer of programs, job control streams, and data files between libraries using the TRANSFER command. The TRANSFER command:
  • Replaces any prior version of the same member stored in the receiving library with the incoming member. (As long as the member is not in PROD status.)
  • Minimizes the possibility of remote sites using obsolete or unauthorized versions of program job control streams or data files.
  • Operates independently of the operating system (for example, the z/OS version can read and process a protection file produced by the VSE version).
Using the 
 central library file makes possible a systematic and highly efficient procedure for the storage, modification, and retrieval of programs, job control streams, and stored data files. 
 lets you:
  • Add a source program to the library, modify, retrieve, compile, link edit, and execute it in a single job.
  • Job stream second generation programs in the library onto tape or disk with appropriate JCL.
  • Retrieve any segment of any program and combine it with other program segments or programs to form a new program.
  • Store and retrieve test data.
  • Retrieve, modify, and combine any number of programs and JCL to form a job stream on either tape or disk for compiling, link editing, and so on.
Report Information
All functions performed successfully or unsuccessfully are reported on an output print file when 
 programs are processed. Special 
 reporting techniques include producing:
  • A library directory listing on request.
  • Special directory listings by selecting the desired member characteristics, status, or activity.
  • A protection file directory listing on request.
Program Functions
 system is structured to serve both programmers and programming management. Since user functions, responsibilities, and authorities differ, the functions of the 
 system are likewise separated into several programs; one for programmers and six for programming management.
The following list briefly describes the various 
 programs. The commands that perform the function are enclosed in parentheses.
Pan#1 Programmers Program
The PAN#1 programmers program:
  • Adds members to the library. (ADD)
  • Formats member records. (ADD)
  • Assigns member attributes. (ADD, STATUS, USER, LEVEL, RENAME, FORMAT)
  • Sequence checks members. (ADD)
  • Copies members on the library. (COPY)
  • Retrieves members from the library. (WRITE, SELECT)
  • Inserts data from the SYSIN file into output files. (INSERT)
  • Retrieves portions of members. (SELECT)
  • Modifies members. (UPDATE)
  • Tags members for subsequent deletion by PAN#2. (STATUS)
  • Includes members within other members during retrievals. (INCLUDE)
  • Assigns user comments to members on the library. (COMMENT)
  • Allocates supersets on the library file. (ALLOCATE)
  • Adds subsets to supersets. (ATTACH, COPY)
  • Removes subsets from supersets. (DETACH)
  • Assigns user sequence numbers to a member. (RESEQ)
  • Initiates a transient mode extended feature. (USING)
  • Advances the output print file to the next page. (EJECT)
  • Prints user identification on a separate page. (ID)
  • Specifies auxiliary input from or output to a PDS for z/OS. Specifies auxiliary input from an alternate logical unit for VSE. (OPTION)
  • Inserts records from an existing 
     member into a
     input stream. (I)
  • Restricts modification of a member. (LOCK)
  • Allows modifications of a LOCKed member. (UNLOCK)
  • Supplies a user ID and password to the 
     VSE system for validation. (PASS)
  • Secures confidential members on the library. (USER)
Special functions available only to management:
  • Overrides suppressed PAN#1 functions. (CONTROL)
  • Authorizes access to confidential members. (ACCESS)
Pan#2 Management Program
The PAN#2 management program:
  • Creates a directory list of the entire or selected contents of the library or protection file. (PRINT)
  • Produces a complete and current compressed copy of the entire library file. Produces the copy on tape or disk and gives complete backup protection to the resident library. (DUMP)
  • Replaces all or selected members in a
     library from a tape or disk backup file. (As long as the member is not in PROD status.) (REPLACE)
  • Restores all or selected members to the library from any of the 
     backup files. (Does not overwrite members of the same name currently in the library being restored.) (RESTORE)
  • Removes tagged members to a
     protection file, with or without match-merging an input protection file. (DELETE, OPTION)
  • Creates a protection file for members you want to transfer to another library file, with or without match-merging an input protection file. (TRANSFER, OPTION)
  • Initiates transient mode extended features. (USING)
  • Modifies the library security code. (CONTROL)
  • Transfers a member directly to another 
     library. (TRANSFER, OPTION)
  • Bypasses copying a named member or a range of members from an input protection file. (BYPASS)
  • UNLOCKs a member to allow modification regardless of the user ID it was previously locked with. (UNLOCK)
  • Allows LOCKed member to be reLOCKed to a new user ID. (You must unlock it then lock it with new user ID.) (LOCK)
  • Modifies and reports audit information. (AUDIT)
  • Supplies a user ID and password to the 
     VSE system for validation. (PASS)
Pan#3 Footprinting Utility
The PAN#3 footprinting utility:
  • Displays the current library footprint information, such as current footprint, library cuu, system ID, and option specified in PVOPT. (DSN)
  • Optionally clears the library footprint. (REP)
  • Optionally rewrites out-of-sequence control records on multi-volume 
     libraries. (VOL)
Pan#4 Library Initialization Program
The PAN#4 library initialization program:
  • Formats and labels direct access devices for subsequent use as a
     library. (CLEAR)
  • Specifies selected PAN#1 functions to suppress. These functions remain suppressed for the lifetime of the corresponding library and only a special function of PAN#1 can override them. (PAN#2 must be used to establish a control code to enforce suppression.) (SUPPRESS)
  • Supplies a user ID and password to the 
     VSE system for validation. (PASS)
Pan#6 Analysis Program
The PAN#6 analysis program produces a summarized presentation of the 
 library composition by size, status, language type, and user code. (ANALYSIS)
Pan#7 Cross-Reference Report
The PAN#7 cross-reference report:
  • Lists the location of all 
     ++INCLUDE commands, reports the name of the including library member, the statement number of the ++INCLUDE command within the including member, and the name of the included member. (CROSSREF)
  • Produces a cross-reference list in which the above information appears detailed under the name of the included member. (CROSSREF)
Pan#8 Scan Program
The PAN#8 scan program:
  • Produces a listing of statements within the library that contain the character string you supply. You can scan the entire library or limit it to a:
    • Given language type
    • Given library member
    • Selected range of commands
    • Selected group of columns. (SCAN)
  • Makes changes to the members selected by the scan. (REP)
  • Supplies a user ID and password to the 
     VSE system for validation. (PASS)