============================================== -----Original Message----- From: "Tribble, Robert" <[EMAIL PROTECTED]> Sent: 7/6/2006 9:44 AM To: "IBM-MAIN@BAMA.UA.EDU" <IBM-MAIN@BAMA.UA.EDU> Subject: Re: hardware compression
Here is a rexx: /* REXX */ CVT = STORAGE(10,4) /* CVT ADDRESS IN MEMORY */ SCVT = STORAGE(D2X(200+C2D(CVT)),4) /* ADDRESS OF SCVT */ CCVT = STORAGE(D2X(184+C2D(SCVT)),4) /* ADDRESS OF CCVT */ IF CCVT = '00000000'X THEN DO say 'Cryptography Not Installed' EXIT(0) END ELSE DO CCVTFL = STORAGE(D2X(36+C2D(CCVT)),1) /* CCVTSFG1 STATUS BYTE */ IF BITAND(CCVTFL,'80'X) <> '80'X THEN DO say 'Cryptography is Installed', 'but is Inactive' EXIT(0) END ELSE DO say 'Cryptography is Active' CCVTAS = STORAGE(D2X(42+C2D(CCVT)),2) /* CCVTASID ASID OF ICSF */ say 'ASID of ICSF/MVS Address Space is' c2x(ccvtas) '('c2d(ccvtas)')' EXIT(0) END END ============================================== Greetings, Your example is describing the ICSF (Cryptographic Services), not compression. The OP was asking about hardware compression availability. Also, the publicly documented crypto instructions (KM, KMC, KMAC, etc.) may be available even though the CCVT pointer is NULL. The only way to know for sure is to try KM (with the query function code in R0) and catch the potential S0C1-01 abend. Jeffrey D. Smith Farsight Systems Corporation 24 BURLINGTON DR LONGMONT, CO 80501 303-774-9381 direct 303-709-8153 cell 303-484-6170 fax ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html