What is i_step =1 or 2 and what is e_t_range used in Cmod for customer exit

Hi All,
What do we go for I_step =1 or 2. And what is e_t_range is it a table or structure ? Can anyone explain me about it.
What happens if we use i_step = 1 and 2?
Thanks
Pooja

hi Pooja,
I_STEP = 0. This step is not called during report execution but when a report variable is used in other instances such as InfoPackages and authorizations.
I_STEP = 1 - Called prior to processing of variable pop-up and for each u201Ccustomer exitu201D variables. Can be used to fill variable with default values. Function module EXIT_SAPLRRS0_001 is called with I_STEP = 1 in function module RRS_VAR_VALUES_EXIT_BEFORE.
I_STEP = 2 - Called after the processing of the variable pop-up. Only for those variables that are not marked as u201Cready for inputu201D or are set to u201Cmandatory variable entryu201D. . Function module EXIT_SAPLRRS0_001 is called with I_STEP = 2 in function module RRS_VAR_VALUES_EXIT_AFTER
I_STEP = 3 - Called after all variable processing and gets called only once and not per variable. Here you can validate the user entries. Function module EXIT_SAPLRRS0_001 is called with I_STEP = 3 in function module RRS_VAR_VALUES_EXIT_CHECK.
E_T_RANGE: Its an Strcuture to export final values after all the calculations made in the exit.
Let me know if you still need some more explanation.
Regards,
Shiva.

Similar Messages

  • Hi, what can i use location service for find my lost macbookAir

    hi, what can i use location service for find my lost macbookAir

    If you're an iCloud user and had "Find my Mac" enabled in the System Preferences, then you can go to www.icloud.com, sign in and click Find my iPhone.

  • I just created an iCloud email and I want to use that email for my iTunes account as well. I need help suiting the old apple I'd because I do not remember anything associated with that email and I don't know the security questions

    I just created an iCloud email and I want to use that email for my iTunes account as well. I need help switching the old apple ID because I do not remember anything associated with that email and I don't know the security questions or the login for that old email.

    You cannot do that.  The AppleID you used to create the iCloud account is an active primary email address.  The email address you created with the iCloud account is also an active primary email address (all Apple domain email address automatically become AppleIDs as well).  You cannot replace the primary email address on one active AppleID with the primary email address on another, active AppleID.
    You can use your iCloud email/AppleID with iTunes, but it will be a separate account, so all your previous purchases remain tied to the other AppleID you have.
    I don't understand your statement that you could not remeber your old AppleID password, as you would have had to use it to create the iCloud account in the first place (the first step of creating the iCloud account required you to login with your existing AppleID and password)?

  • What standards are used by Microsoft for developing Windows Server and other products

    Where can I obtain or solicit information regarding Microsoft software development process compliance with national/international standards? I need to create regulatory documentation, and knowing which ISO, IEC, ANSI, etc. standards that Microsoft uses to
    develop specific applications (including but not limited to Windows Server 2012 Standard) would be most useful.
    My efforts to obtain this information (live chat, calls to different support numbers and tweeting) have been fruitless.
    Any help would be much appreciated.

    As to the 'broken' link.  The editor in the forums has a nasty habit.  If one concludes a sentence with an URL and puts a period after the URL to designate the end of the sentence, the forum editor includes the period as part of the URL. 
    Delete the period and the link will work.
    What do you mean by 'standards' for software development?  If you mean something like ISO/IEC 12207, I think you are going to have to search Microsoft web sites and then see if you can strike up a conversation with authors of articles you find. 
    I am not aware of any specific publication of conformance to such standards within Microsoft.  Even though I worked for them for 12 years in a non-engineering role, I tended to take an interest in this sort of thing based on interests developed in previous
    roles.
    Here is a link (http://www.microsoft.com/security/sdl/resources/publications.aspx) and here (http://www.microsoft.com/security/sdl/default.aspx) that
    covers their Secure Development Lifecycle.  To a great extent, Microsoft 'wrote the book' on how to do secure development (http://www.barnesandnoble.com/w/the-security-development-lifecycle-michael-howard/1110830298?ean=9780735622142). 
    It may appear dated, as it was published about eight years ago, but it became the textbook for some college courses on secure development.
    . : | : . : | : . tim

  • HT5035 When I try to purchase something on iTunes using store credit, it says that the store credit is temporarily unavailable and iTunes can't use store credit for my purchase at this time. What do I do?

    I'm trying to make a purchase using the $10 store credit that I have, but a notification box comes up saying, "Store credit temporarily unavailable. We cannot use store credit for this purchase at this time. Do you want to pay for this item with your other pay method on file?" Why is it saying this? How can I purchase this item with my store credit?

    I was finally able to download itunes on my laptop, this is really a pain in the butt, not I want to purchase a song and it's asking for a credit card and I have $18.71 credit on my account.  Why can't I just purchase a song using the credit that has already been put on my account.???????

  • What should I use to scan for Trojans or Keyloggers?

    I've heard conflicting conversations about not using anti-virus or that OS X has built in protection, but I wanted to know what the best way to check for Trojans or Keyloggers is so I can give my computer a looking-over before backing it up.
    I'm using OS X 10.6.8

    Conversations?  There have been a few of those.
    I'm not aware of a tool that's particularly reliable about detecting malware, nor one that might (for instance) catch hardware keyloggers.
    The usual questions around your situation apply; I don't know how you use the system, nor what exposures or risks you might have or might face.  For instance, how sensitive is your information, who has had access, and what are the circumstances associated with the access, and what's been loaded onto the system? 
    If you're incautious or blasé about your computing practices and fond of downloading from torrents or acquiring cracked software or downloads from sketchy sites, then the anti-malwaretools generally won't save you.
    In general: just back it up, back it up regularly, and keep various copies of the backups offline or remote, or both.  Backups and caution are among the best available anti-malware tools.
    If you're fond of installing random stuff and particularly of entering your administrative password when prompted — that password is the proverbial keys to the security kingdom, to your address book, etc — or if your login passwords have been compromised (or have kids around that install all sorts of Free Stuff! and Free Games!), then change all your passwords, and install Little Snitch or equivalent, or implement and use network perimeter monitoring.  These monitoring tools catch (unexpected) outbound network connections, such as that Facebook watering hole attack.
    Better still: upgrade to 10.7 or 10.8 as your hardware permits, as 10.6 is rather old and lacking some of the newer capabilities here, such as Gatekeeper.  Disable the Java web start plug-in to disable Java (and don't install Java after you upgrade to 10.7 or 10.8), and remove Adobe Flash Player, and disable the "open safe attachments" setting.  And if you're (necessarily, or otherwise) paranoid, install Little Snitch or network perimeter monitoring.
    If you feel obligated to use a malware scanner (the hit rates on the malware-scanning tools are far from great, and the implementations of most aren't that much different from the malware itself in terms of how the scanning software can insinuate itself into the system and can sometimes then trigger issues with stability and operations), then ClamAV is the usual recommendation around the forums.  OS X Server includes that, and there are various discussions around getting ClamAV going on OS X client.
    Once your operating system software has been compromised, the usual path is a wipe and reinstall, or a wipe and install of a backup prior to the breach, followed by steps to prevent a reoccurance.  Decontamination of a system is difficult, at best.  If your hardware has been compromised, you're in deep sneakers. 
    If you want to be or need to be paranoid due to the information involved or folks that have had unfettered access to your system hardware, then check for dongles or other unexpected external devices, and start replacing your equipment. The "better grade" keyloggers can be stored in USB devices, and can be mounted within your hardware.  The better-grade gear can be difficult to locate, short of disassembly.  Also check your local network, as it's feasible to monitor traffic there, whether within a modem, or within a device added to your network.
    Again, how paranoid you wanr or need be here depends highly on what you've been up to, and who might be after you, and a whole host of other details...

  • What Resolution to use from Istock for Youtube?

    I'm trying to make my first movie which will be uploaded to Youtube. I will shoot my video in 1080. I am assuming (not always smart) that I should use the standard 4:30 aspect ratio. I want to use include some stock video footage...probably from istock. I have four options with increasing file sizes and costs. Small Web 320X180; big Web 640X360, HD720 1280X720 or HD1080 1920X1080. For use on YouTube does it make a difference? I have no clue what I should use, but obviously I would not buy the largest and most expensive. The video will basically be B-roll and I will do a voice over. Thanks for any assistance.

    This is the iOS forum, so for iPads and iPhones.
    iPad2 & iPhone4s can edit in 1080,
    iPhone 4 and iPod Touch can only edit in 720.
    There is no 4:30 ration that I have heard of.
    All HD formats are 16:9 ratio; thought there is a some odd or letter boxed cinema sizes.
    There is no 4:3 HD format.
    4:3 was a standard for early SD television, but is not an HD standard or even a format sorry.
    You tube can accept various frame sizes.
    You should start by thinking what size you want to deliver, and edit up to that frame size.
    Stock footage should be up to that size too.
    I'm wondering why you want to put B-roll on you tube? And why is there stock footage in your B-roll?
    If you want answers specifically for iMovie for Mac you should as Apple to move this question to the mac forum.

  • What is the use of services for object icon (attachment) in customer master

    Hello,
    What is the use of the icon in customer master i.e. service for object(attchment)
    Any idea In which table those attachemnts stores,
    In SAP i can see only temp. structure table SGOS_ATTA when i look for table information, so i dont know where to look for these files although i tried great selection of tables which either were empty
    Thnks,
    Ahamad S

    Please search the forum or Google with the same text so that you will find many times this has been discussed.  Please go through the forum rules which you can see to your right screen and adhere to that.  Being an old member, no need to stress this.
    G. Lakshmipathi

  • What Tcode is used to see which custome wt copied from which model wt

    Hello All
    What is the Tcode to see which custome wage type was copied from which model wage type?
    Thanks

    hi,
        You can use Tcode sm30 and table name - "V_T52DZ".
    Hope this helps.
    Thanks,
    TS

  • What driver to use with Plays for Sure Zen touch

    Hi, I've upgraded my zen touch to 2.0.05 in the past.
    Now I'm using a new computer and I need to install drivers for the Zen Touch.
    The drivers on the CD do not recognise my Zen Touch, the latest drivers only support zen touch with firmware below 2.00.00, and to my knowledge, Microsoft has discontinued the use of Plays for Sure devices.
    Further more the bundle update for Plays for Sure device only works if it can detect the Zen Touch in the first place, which it cannot.
    So does anyone have a working driver for Zen Touch firmware 2.00.00 and above, thanks.

    actually I do have the mtp drivers installed, but the interface is not as good as the Nomad Explorer. But when I try to install the real drivers for Explorer, it tells me that the Zen is undetectable, even though it clearly is plugged in and seen by the computer.

  • Using single repository for Customer and Vendor

    Hi All
    Has anyone worked in scenario where a single repository was used to store both Customer and Vendor records? The source and Target systems are SAP ECC and MDM will have both Basic as well as contextual data.
    I would like to know the likely challenges. Anyone who has worked on similar grounds can please share his viewpoints.
    thanks
    Ravi

    Hi Ravi,
    As you want to manage both Cutomer and Vendor data in MDM you need to consider the following points:
    - If you are seeing the Customer and Vendor master as a combiantion satisfying some common criteria,then you can go about using the SAP delieverd Business partner rep which is designed keeping the ECC customer and Vendor details to an extent.You can unarchieve the BP rep in MDM and have a look at its data modelling if it serves your purpose.
    - As of MDM 5.5 we do not have provision of holding two master records in a single rep as we can use only 1 main table.So if you want to fit in your customer and vendor masters in one rep you will have to accomodate the combined fields under a single rep with proper data modelling.
    - You need to store your two masters in two separate rep and perform data modelling in such a way that your one rep hold those common fields which you wish to use for finding duplicates as mentioned in your above req and then store this information with the complete rest in a dfferent rep.So its a 2 rep concept as possible with teh current MDM version.
    - I am not very sure of this method but i think we have a provision of calling and linking data from two rep and display them as one to work upon them through EP.
    Hope It Helped
    Thanks & Regards
    Simona Pinto

  • I lost my ipod a while back and i can't use my email for anything apple

    It did not have Find my Iphone on it just in case you were wondering. It was an ipod touch and it got stolen. How do i get it so erase or something so i can use my email for my new ipod.

    Change the password for the email account and for all other accounts used on the iPod.
    That is all you can do besides reporting it to the police. Apple will do nothing
    Reporting a lost or stolen Apple product

  • I must and I mean must use version 19 for my banking software. I had it set not to upgrade and now i have a newer version. I cannot use another browser.

    I have to use version 19 for my banking software. IE and others won't work. I had computer set to not upgrade firefox and i happened anyway. I MUST GO BACK TO 19

    Oops, I see you said IE doesn't work with your bank. Well, if you don't mind closing Firefox 30 while you bank, you could use the Portable Edition of Firefox 19 for your banking. As Tyler describes, it has security holes in it, so you should limit use to trusted sites.
    http://sourceforge.net/projects/portableapps/files/Mozilla%20Firefox%2C%20Portable%20Ed./Mozilla%20Firefox%2C%20Portable%20Edition%2019.0.2/

  • I downloaded FF4 a week ago and I think I used it only for that night. Ever since I just can not open it as it refuses to load. Prior to this I used the 3.6 edition without any problem. Presently I am using other browsers. What can I do to get it running?

    I just can't get FF4 to load from either the start button or the desktop.

    Have a look at [[firefox will not start]]

  • What are the different Smartforms available for customer letters

    Hi Gurus,
    what are the standard layout sets available in Smartforms?.. How can I modify them.
    I would like to find out the particular smartform in the domain of QM.
    I am trying to generate a customer letter in smartforms with the sold-to-party details on top and the material he ordered in the body of the letter with other details like the quality process which we used and also I want to generate this form in .pdf and .doc formats for printing and faxing aswell.
    Please help me in this issue.
    Thanks in Advance.
    Kind Regards,
    Praveen

    Hi Praveen,
    for generating a standard type smartform u can find them in TNAPR table entries. but if u wanna have a customised SF then u have to create it.
    for converting SF to PDF
    first convert the smartform output which is in rtf format to otf format using covert_otf FM then use FM convert to PDF and then use Fm API_SEND to send it as a mail..
    the following code can be applied...partly the logic is right and not all the code.
    TABLES: zKTREE_t1,sflight.
    DATA: cparam TYPE ssfctrlop,
    outop TYPE ssfcompop,
    fm_name TYPE rs38l_fnam,
    my_tabix TYPE sy-tabix,
    file_size TYPE i,
    bin_filesize TYPE i.
    DATA: tab_otf_data TYPE ssfcrescl,
    pdf_tab LIKE tline OCCURS 0 WITH HEADER LINE,
    itab LIKE TABLE OF zshail_t1 WITH HEADER LINE,
    otab TYPE TABLE OF sflight WITH HEADER LINE,
    tab_otf_final TYPE itcoo OCCURS 0 WITH HEADER LINE.
    start-of-selection.
    suppressing the dialog box****************************
    outop-tddest = 'LP01'.
    cparam-no_dialog = 'X'.
    cparam-preview = space.
    cparam-getotf = 'X'.
    ****************for the first smartform*******************************
    CALL FUNCTION 'SSF_FUNCTION_MODULE_NAME'
    EXPORTING
    formname = 'ZSHAIL_SMFORM2'
    VARIANT = ' '
    DIRECT_CALL = ' '
    IMPORTING
    fm_name = fm_name
    EXCEPTIONS
    no_form = 1
    no_function_module = 2
    OTHERS = 3
    IF sy-subrc <> 0.
    MESSAGE ID SY-MSGID TYPE SY-MSGTY NUMBER SY-MSGNO
    WITH SY-MSGV1 SY-MSGV2 SY-MSGV3 SY-MSGV4.
    ENDIF.
    SELECT my_id my_income my_name FROM zshail_t1 INTO TABLE itab.
    CALL FUNCTION fm_name
    EXPORTING
    ARCHIVE_INDEX =
    ARCHIVE_INDEX_TAB =
    ARCHIVE_PARAMETERS =
    control_parameters = cparam
    MAIL_APPL_OBJ =
    MAIL_RECIPIENT =
    MAIL_SENDER =
    output_options = outop
    user_settings = space
    IMPORTING
    DOCUMENT_OUTPUT_INFO =
    job_output_info = tab_otf_data
    JOB_OUTPUT_OPTIONS =
    TABLES
    it_tab = itab[]
    EXCEPTIONS
    formatting_error = 1
    internal_error = 2
    send_error = 3
    user_canceled = 4
    OTHERS = 5
    IF sy-subrc <> 0.
    MESSAGE ID SY-MSGID TYPE SY-MSGTY NUMBER SY-MSGNO
    WITH SY-MSGV1 SY-MSGV2 SY-MSGV3 SY-MSGV4.
    ENDIF.
    *********appending the otf data into the final table*********************
    tab_otf_final[] = tab_otf_data-otfdata[].
    **removing the initial and final markers from the OTF data*********
    DELETE tab_otf_data-otfdata WHERE tdprintcom = '//'.
    searching for the end-of-page in OTF table************
    READ TABLE tab_otf_final WITH KEY tdprintcom = 'EP'.
    my_tabix = sy-tabix + 1.
    appending the modified OTF table to the final OTF table****
    INSERT LINES OF tab_otf_data-otfdata INTO tab_otf_final INDEX my_tabix.
    finally call the Fm SO_NEW_DOCUMENT_ATT_SEND_API1
    to send as email for this u need to populate the reciepent fields properly 
    g_cont_par-device = 'MAIL'.
    Get BOR-Objects for Recipient, Sender und Applikation
    PERFORM mail_recipient_object CHANGING g_mail_rec_obj.
    PERFORM mail_sender_object CHANGING g_mail_sen_obj.
    PERFORM mail_appl_object CHANGING g_mail_app_obj.
    Calling Smartform
    CALL FUNCTION fm_name
    EXPORTING
    ARCHIVE_INDEX =
    ARCHIVE_INDEX_TAB =
    ARCHIVE_PARAMETERS =
    control_parameters = g_cont_par
    mail_appl_obj = g_mail_app_obj
    mail_recipient = g_mail_rec_obj
    mail_sender = g_mail_sen_obj
    output_options = g_output
    user_settings = ' '
    IMPORTING
    ... rest of function ...
    Here are the Forms:
    *& Form mail_recipient_object
    text
    <--P_G_MAIL_REC_OBJ text
    FORM mail_recipient_object CHANGING p_mail_rec_obj.
    CALL FUNCTION 'CREATE_RECIPIENT_OBJ_PPF'
    EXPORTING
    IP_COUNTRY =
    IP_FAXNO =
    ip_mailaddr = g_mail "g_mail type
    "SO_NAME.
    ip_type_id = g_rectype " 'U'
    IMPORTING
    ep_recipient_id = p_mail_rec_obj
    EP_ADDRESS =
    ET_RECIPIENT =
    EXCEPTIONS
    invalid_recipient = 1
    OTHERS = 2
    IF sy-subrc <> 0.
    MESSAGE ID sy-msgid TYPE sy-msgty NUMBER sy-msgno
    WITH sy-msgv1 sy-msgv2 sy-msgv3 sy-msgv4.
    ENDIF.
    ENDFORM. " mail_recipient_object
    *& Form mail_sender_object
    text
    <--P_G_MAIL_SEN_OBJ text
    FORM mail_sender_object CHANGING p_mail_sen_obj.
    CALL FUNCTION 'CREATE_SENDER_OBJECT_PPF'
    EXPORTING
    ip_sender = sy-uname
    IMPORTING
    ep_sender_id = p_mail_sen_obj
    EXCEPTIONS
    invalid_sender = 1
    OTHERS = 2.
    IF sy-subrc <> 0.
    MESSAGE ID sy-msgid TYPE sy-msgty NUMBER sy-msgno
    WITH sy-msgv1 sy-msgv2 sy-msgv3 sy-msgv4.
    ENDIF.
    ENDFORM. " mail_sender_object
    *& Form mail_appl_object
    text
    <--P_G_MAIL_APP_OBJ text
    FORM mail_appl_object CHANGING p_mail_app_obj.
    SELECT * FROM soud WHERE sapnam LIKE sy-uname AND deleted = ' '.
    ENDSELECT.
    IF sy-subrc NE 0.
    CALL FUNCTION 'SO_USER_AUTOMATIC_INSERT'
    EXPORTING
    sapname = sy-uname
    EXCEPTIONS
    no_insert = 1
    sap_name_exist = 2
    x_error = 3
    OTHERS = 4.
    IF sy-subrc NE 0.
    CLEAR soud.
    ELSE.
    SELECT * FROM soud WHERE sapnam LIKE sy-uname AND deleted = ' '.
    ENDSELECT.
    ENDIF.
    ENDIF.
    CLEAR sofmfol_key.
    sofmfol_key-type = 'FOL'.
    sofmfol_key-year = soud-inbyr.
    sofmfol_key-number = soud-inbno.
    bor_key = sofmfol_key.
    IF NOT bor_key IS INITIAL.
    swc_create_object folder 'SOFMFOL' bor_key.
    IF sy-subrc = 0.
    swc_object_to_persistent folder p_mail_app_obj.
    IF sy-subrc NE 0.
    CLEAR p_mail_app_obj.
    ENDIF.
    ENDIF.
    ELSE.
    CLEAR p_mail_app_obj.
    ENDIF.
    ENDFORM. " mail_appl_object
    Message was edited by:
            Durgaprasad Kare
    Message was edited by:
            Durgaprasad Kare

Maybe you are looking for