Data Element list used by SAP ABAP Class CL_HTTP_SERVER_NET (Derived HTTP Server Class for Network Communication)
SAP ABAP Class
CL_HTTP_SERVER_NET (Derived HTTP Server Class for Network Communication) is using
# | Object Type | Object Name | Object Description | Note |
---|---|---|---|---|
![]() |
![]() |
|||
1 | ![]() |
ANSWER | Alternative reply for dialog query | |
2 | ![]() |
BOOLEAN | Boolean Variable (X=True, -=False, Space=Unknown) | |
3 | ![]() |
CHAR1 | Single-Character Flag | |
4 | ![]() |
CHAR4 | Not More Closely Defined Area, Possibly Used for Patchlevels | |
5 | ![]() |
EPP_CONNECTION_COUNTER | Counter for Extended Passport (EPP) | |
6 | ![]() |
EPP_CONNECTION_COUNTER | Counter for Extended Passport (EPP) | |
7 | ![]() |
EPP_CONNECTION_ID | Connection ID of Extended Passport (EPP) | |
8 | ![]() |
EPP_CONNECTION_ID | Connection ID of Extended Passport (EPP) | |
9 | ![]() |
EPP_ROOT_CONTEXT_ID | Root Context ID of Extended Passport (EPP) | |
10 | ![]() |
EPP_ROOT_CONTEXT_ID | Root Context ID of Extended Passport (EPP) | |
11 | ![]() |
EPP_TRANSACTION_ID | Transaction ID in Extended Passport (EPP) | |
12 | ![]() |
EPP_TRANSACTION_ID | Transaction ID in Extended Passport (EPP) | |
13 | ![]() |
HASH160 | Hash Value (160 Bits) | |
14 | ![]() |
HASH160 | Hash Value (160 Bits) | |
15 | ![]() |
HASH512_BASE_64 | Hash or HMAC Value up to 512 Bits(=88 Base64 Encrypt. Chars) | |
16 | ![]() |
HASH512_BASE_64 | Hash or HMAC Value up to 512 Bits(=88 Base64 Encrypt. Chars) | |
17 | ![]() |
HASH512_BASE_64 | Hash or HMAC Value up to 512 Bits(=88 Base64 Encrypt. Chars) | |
18 | ![]() |
HASH512_BASE_64 | Hash or HMAC Value up to 512 Bits(=88 Base64 Encrypt. Chars) | |
19 | ![]() |
HASH512_BASE_64 | Hash or HMAC Value up to 512 Bits(=88 Base64 Encrypt. Chars) | |
20 | ![]() |
ICFACTIVE | 'X': Service is Activated, Otherwise ' ' | |
21 | ![]() |
ICFCHAR1 | Single-Character Flag | |
22 | ![]() |
ICFLOGKEY | Key for ICF Logon Procedure | |
23 | ![]() |
ICFLOGKEY | Key for ICF Logon Procedure | |
24 | ![]() |
ICFPASSWD | Encrypted User Password | |
25 | ![]() |
ICFREDURL | URL to Redirect If Logon Error Occurs in ICF Framework | |
26 | ![]() |
ICF_PAGE_TYPE | Registration of Error Pages, e.g. Application Errors | |
27 | ![]() |
LAISO | 2-Character SAP Language Code | |
28 | ![]() |
LOGORDER | Logon Order for ICF Service | |
29 | ![]() |
LOGORDER | Logon Order for ICF Service | |
30 | ![]() |
LOGORDER | Logon Order for ICF Service | |
31 | ![]() |
NO_SESSION_MANAGEMENT | Usage/Generation of Security Sessions | |
32 | ![]() |
OS_BOOLEAN | Boolean | |
33 | ![]() |
PLG_HOST | Plug-in Host | |
34 | ![]() |
PLG_SRV | Plug-in Service | |
35 | ![]() |
RFCDEST | Logical Destination (Specified in Function Call) | |
36 | ![]() |
RFCDEST | Logical Destination (Specified in Function Call) | |
37 | ![]() |
RFCOPTIONS | Connection options | |
38 | ![]() |
SECURITY_CONTEXT_ID | Security Context ID (Internal Representation of Session ID) | |
39 | ![]() |
SECURITY_CONTEXT_ID | Security Context ID (Internal Representation of Session ID) | |
40 | ![]() |
SECURITY_CONTEXT_ID | Security Context ID (Internal Representation of Session ID) | |
41 | ![]() |
SECURITY_CONTEXT_ID | Security Context ID (Internal Representation of Session ID) | |
42 | ![]() |
SECURITY_CONTEXT_XSRF_TOKEN | XSRF Token (Base64-Coded 128-Bit Random Value) | |
43 | ![]() |
SECURITY_CONTEXT_XSRF_TOKEN | XSRF Token (Base64-Coded 128-Bit Random Value) | |
44 | ![]() |
SECURITY_CONTEXT_XSRF_TOKEN | XSRF Token (Base64-Coded 128-Bit Random Value) | |
45 | ![]() |
SECURITY_SESSION_AUTHN_METHOD | HTTP Logon Procedure (Storage in Security Context) | |
46 | ![]() |
SECURITY_SESSION_AUTHN_METHOD | HTTP Logon Procedure (Storage in Security Context) | |
47 | ![]() |
SECURITY_SESSION_AUTHN_METHOD | HTTP Logon Procedure (Storage in Security Context) | |
48 | ![]() |
SECURITY_SESSION_ID | Security Session ID (is transmitted by cookie) | |
49 | ![]() |
SOTR_CONC | Key for Logical Object in the OTR | |
50 | ![]() |
SYDEBUG | Internal Data Element | |
51 | ![]() |
SYLANGU | Language Key | |
52 | ![]() |
SYMANDT | Client ID | |
53 | ![]() |
SYMANDT | Client ID | |
54 | ![]() |
SYSUBRC | Return Code | |
55 | ![]() |
SYSUBRC | Return Code | |
56 | ![]() |
SYSUBRC | Return Code | |
57 | ![]() |
SYSUBRC | Return Code | |
58 | ![]() |
SYSUBRC | Return Code | |
59 | ![]() |
SYSUBRC | Return Code | |
60 | ![]() |
SYSUBRC | Return Code | |
61 | ![]() |
SYSUBRC | Return Code | |
62 | ![]() |
SYSUUID_C | UUID in character form | |
63 | ![]() |
SYSUUID_X16 | 16 Byte UUID in 16 Bytes (Raw Format) | |
64 | ![]() |
SYUNAME | User Name | |
65 | ![]() |
SYUNAME | User Name | |
66 | ![]() |
SYUNAME | User Name | |
67 | ![]() |
SYUNAME | User Name | |
68 | ![]() |
TIMESTAMP | UTC Time Stamp in Short Form (YYYYMMDDhhmmss) | |
69 | ![]() |
TIMESTAMP | UTC Time Stamp in Short Form (YYYYMMDDhhmmss) | |
70 | ![]() |
TIMESTAMP | UTC Time Stamp in Short Form (YYYYMMDDhhmmss) | |
71 | ![]() |
TIMESTAMP | UTC Time Stamp in Short Form (YYYYMMDDhhmmss) | |
72 | ![]() |
TIMESTAMP | UTC Time Stamp in Short Form (YYYYMMDDhhmmss) | |
73 | ![]() |
TIMESTAMP | UTC Time Stamp in Short Form (YYYYMMDDhhmmss) | |
74 | ![]() |
TZNTIMESTP | Time Stamp (Date and Time) | |
75 | ![]() |
TZNTIMESTP | Time Stamp (Date and Time) | |
76 | ![]() |
TZNTIMESTP | Time Stamp (Date and Time) | |
77 | ![]() |
TZNTSTMPL | UTC time stamp in long form (YYYYMMDDhhmmss,mmmuuun) | |
78 | ![]() |
TZNTSTMPL | UTC time stamp in long form (YYYYMMDDhhmmss,mmmuuun) | |
79 | ![]() |
TZNTSTMPL | UTC time stamp in long form (YYYYMMDDhhmmss,mmmuuun) | |
80 | ![]() |
TZNTSTMPL | UTC time stamp in long form (YYYYMMDDhhmmss,mmmuuun) | |
81 | ![]() |
USERNAME | User name | |
82 | ![]() |
USERNAME | User name | |
83 | ![]() |
XUBCODE | User password | |
84 | ![]() |
XUBCODE | User password | |
85 | ![]() |
XUBCODE | User password | |
86 | ![]() |
XUBCODE | User password | |
87 | ![]() |
XUBNAME | User Name in User Master Record | |
88 | ![]() |
XUBNAME | User Name in User Master Record | |
89 | ![]() |
XUBNAME | User Name in User Master Record | |
90 | ![]() |
XUPWDSTATE | Status of User Password (Value: -2/-1/0/1/2/3, see doc.) |