==============================================
-----Original Message-----
From: "Tribble, Robert" <[EMAIL PROTECTED]>
Sent: 7/6/2006 9:44 AM
To: "IBM-MAIN@BAMA.UA.EDU" <IBM-MAIN@BAMA.UA.EDU>
Subject: Re: hardware compression

Here is a rexx:
/* REXX */                                                             
CVT  = STORAGE(10,4)                   /* CVT ADDRESS IN MEMORY */     
SCVT   = STORAGE(D2X(200+C2D(CVT)),4)  /* ADDRESS OF SCVT       */     
CCVT   = STORAGE(D2X(184+C2D(SCVT)),4) /* ADDRESS OF CCVT       */     
IF CCVT = '00000000'X THEN DO                                          
                      say 'Cryptography Not Installed'                 
                      EXIT(0)                                          
                      END                                              
                      ELSE DO                                          
CCVTFL = STORAGE(D2X(36+C2D(CCVT)),1)  /* CCVTSFG1 STATUS BYTE  */     
IF BITAND(CCVTFL,'80'X) <> '80'X THEN DO                               
                                say  'Cryptography is Installed',      
                                'but is Inactive'                      
                                EXIT(0)                                
                                END                                    
                                ELSE DO                                
                                say  'Cryptography is Active'          
CCVTAS = STORAGE(D2X(42+C2D(CCVT)),2)  /* CCVTASID ASID OF ICSF */     
 say 'ASID of ICSF/MVS Address Space is' c2x(ccvtas) '('c2d(ccvtas)')' 
                                EXIT(0)                                
                                 END                                   
 END                                                                   
==============================================
Greetings,


Your example is describing the ICSF (Cryptographic Services), not
compression. The OP was asking about hardware compression
availability.

Also, the publicly documented crypto instructions (KM, KMC, KMAC, etc.)
may be available even though the CCVT pointer is NULL. The only way to
know for sure is to try KM (with the query function code in R0) and
catch the potential S0C1-01 abend.


Jeffrey D. Smith
Farsight Systems Corporation
24 BURLINGTON DR
LONGMONT, CO 80501
303-774-9381 direct
303-709-8153 cell
303-484-6170 fax

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to