Very simple pipe to display CHPID status.
do i = 0 to 255
'PIPE var i | spec 1-* d2x 1-2 right | var j | cp q chpid ' j '| console'
end
But weird output - some redundant output removed to shorten results. I get
the same results with z/VM supplied Pipes and Marist Pipes.
qchpid
*HCPQPA846E I
Is there a way (in PIPEs, of course) to generate random passwords. (6-8
random valid characters)
Frank M. Ramaekers Jr.
Systems Programmer
MCP, MCP+I, MCSE & RHCE
American Income Life Insurance Co.
Phone: (254)761-6649
1200 Wooded Acres Dr.
Fax: (254)741-5777
Waco, Texas 76701
Another attempt at reducing entropy or time travel. It is a rite of
passage; everyone has tried it.
Make that
pipe literal|dup *|take 256|spec /QUERY CHPID/ 1 w1 d2x nw|cp|console
This also gets you rid of the loop.
You need to understand exactly why your pipeline was doomed from the
outset.
On Tue, Jul 20, 2010 at 3:04 PM, Mark Pace wrote:
> Very simple pipe to display CHPID status.
>
> do i = 0 to 255
>
> 'PIPE var i | spec 1-* d2x 1-2 right | var j | cp q chpid ' j '| console'
>
> end
>
>
> But weird output - some redundant output removed to shorten results. I get
> the same resu
On Tue, Jul 20, 2010 at 3:18 PM, Frank M. Ramaekers
wrote:
> Is there a way (in PIPEs, of course) to generate random passwords. (6-8
> random valid characters)
Something like this?
PIPE (END \) random 36 |substr 4.1|take 8|join *|x: xlate 1-*| cons
\literal 0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ
another way to skin the...?
'Pipe XRange 00-FF ',
'| Deblock Fixed 1 ',
'| Spec /QUERY CHPID/ 1 1.1 c2x nw...
On Tue, Jul 20, 2010 at 9:04 AM, Mark Pace wrote:
> Very simple pipe to display CHPID status.
>
> do i = 0 to 255
>
> 'PIPE var i | spec 1-*
'PIPE(end ?)|',
'RANDOM |',
'SPECS 1 1 |',
'L: LOOKUP 1 1 DETAILS |',
How's this, Frank?
pipe random | take 3 | spec 1-* c2x | console
The output will be eight random characters, you could of course chop
them up into shorter strings
DJ
On 07/20/2010 08:18 AM, Frank M. Ramaekers wrote:
Is there a way (in PIPEs, of course) to generate random passwords. (6-8
r
That looks great...no way to randomize 6 - 8 characters?
Frank M. Ramaekers Jr.
-Original Message-
From: CMSTSO Pipelines Discussion List [mailto:cms-pipeli...@vm.marist.edu] On
Behalf Of Rob van der Heij
Sent: Tuesday, July 20, 2010 8:43 AM
To: CMS-PIPELINES@VM.MARIST.EDU
Subject:
On Tue, 20 Jul 2010 09:04:33 -0400, Mark Pace wrote:
> 'PIPE var i | spec 1-* d2x 1-2 right | var j | cp q chpid ' j '| console'
The value of J is being passed to the CP stage as an input record. Most
of the values aren't valid command names and so don't give any output.
When you get to BA, BE,
Depends on how you use the resulting string. If you're just eyeballing it,
"randomly" select the first 6, 7, or 8 characters. If you're running in an
EXEC, perhaps:
'PIPE ... | TAKE' random(6,8) '| ...'
Mark Wheeler
UnitedHealth Group
> Date: Tue, 20 Jul 2010 09:35:47 -0500
> From: frama
Pipe random | take 4 | drop 1 | spec 1-* c2x | cons
Regards,
Richard Schuh
> -Original Message-
> From: CMSTSO Pipelines Discussion List
> [mailto:cms-pipeli...@vm.marist.edu] On Behalf Of Frank M. Ramaekers
> Sent: Tuesday, July 20, 2010 7:34 AM
> To: CMS-PIPELINES@VM.MARIST.EDU
>
Thanks everyone for your replies. I don't quite understand why the CP stage
works the way you have explained it, but I'll certainly remember that it
does.
On Tue, Jul 20, 2010 at 10:00 AM, Glenn Knickerbocker wrote:
> On Tue, 20 Jul 2010 09:04:33 -0400, Mark Pace wrote:
>
> > 'PIPE var i | spec
Hokay how do I feed this to a list of users. (Rather than a single
use PIPE.)
I guess I'm trying to say: How do I generate one of these for each item in a
stream?
Frank M. Ramaekers Jr.
-Original Message-
From: CMSTSO Pipelines Discussion List [mailto:cms-pipeli...@vm
Well, the default seed is the hardware TOD, so there will appear to be a
pattern on the first one.
Since I'm running at a different time of day at the moment:
RANDYEXEC A1 V 130 Trunc=130 Size=7 Line=0 Col=1 Alt=
|...+1+2+3+4+5+..
Something like this (although many other ways too):
/* MYREXX EXEC */
/* Create a stem with userids */
... your logic here...
'PIPE STEM USERIDS. | ADDPW | STEM USERIDS_AND_PWS.'
where ADDPW REXX looks:
/* ADDPW REXX - add a random password to each input record */
Hmmmdoesn't seem quite so random:
pipe random | take 3 | spec 1-* c2x | console
5AA27BD9
7BDAB76A
B769F1DD
Ready; T=0.01/0.01 09:32:00
pipe random | take 3 | sp
Of course I really meant
pipe literal|dup *|take 256|spec /QUERY CHPID/ 1 number from 0 d2x
nw|cp|console
Oh well, can't win them all.
On 20 July 2010 15:21, John P. Hartmann wrote:
> Another attempt at reducing entropy or time travel. It is a rite of
> passage; everyone has tried it.
>
> Mak
Should that be:
do i = 0 to 255
'PIPE var i | spec /Q CHPID/ 1 1-* d2x Nw right | cp '| console'
end
Now you are feeding the strings 00, 01, etc into the CP command as primary
input. The CP stage will first execute the command passed as argument and
then what is presented in its primary input.
This works:
pipe literal|dup *|take 256| SPEC RECNO 1 |spec /QUERY CHPID/ 1 w1 d2x
nw.2 RIGHT|CP|console
Frank M. Ramaekers Jr.
-Original Message-
From: CMSTSO Pipelines Discussion List
[mailto:cms-pipeli...@vm.marist.edu] On Behalf Of John P. Hartmann
Sent: Tuesday, Ju
> Is there a way (in PIPEs, of course) to generate random passwords. (6-8
> random valid characters)
Yes, use the "Time of Day" as seed and do a CRC of it and compute
valid password characters from it. Hope this idea is sufficient for you
or do you need a working example?
Ciao.Mike
This works better John:
Pipe literal|duplicate 255|spec /QUERY CHPID/ 1 recno d2x nw.2 Ri|
CP|cons
2010/7/20 John P. Hartmann
> Another attempt at reducing entropy or time travel. It is a rite of
> passage; everyone has tried it.
>
> Make that
>
> pipe literal|dup *|take 256|spec /QUERY CHPI
On Tue, Jul 20, 2010 at 4:33 PM, Frank M. Ramaekers
wrote:
> Hmmmdoesn't seem quite so random:
>
> pipe random | take 3 | spec 1-* c2x | console
> 5AA27BD9
> 7BDAB76A
> B769F1DD
> Ready; T=0.01/0.01 09:32:00
But you're using something different than what I suggested. There's
not enough entrop
This does not work:
HCPQPA026E Operand missing or invalid
HCPQPA026E Operand missing or invalid
HCPQPA026E Operand missing or invalid
:
:
pipe literal|dup *|take 256|spec /QUERY CHPID/ 1 w1 d2x nw|console
QUERY CHPID
QUERY CHPID
I haven't figured out what I did wrong yet, But your Pipe is a mystery to
me. As I read this
Create a null record, repeat it infinitely, take 256 of those null records,
and create a Query CHPID command from the null record. Where does the CHIPD
number get created here?
I'm still very much a nov
Mark Wheeler wrote:
> 'PIPE ... | TAKE' random(6,8) '| ...'
That will skew the distribution towards the shorter passwords. To
distribute them more evenly, allow a blank in the last positions with
the same likelihood as any character:
(end \) random 36
| take 6
| f: fanin
| not cho
26 matches
Mail list logo