|
Since you are setting up offsets into a space, you should check the contents of the space just to be certain. Create the space and populate it with typical data then use command DMPOBJ or DMPSYSOBJ to print out the space contents. Even if you think that you know where your data starts, check the printout to make sure. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Richard Jackson mailto:richardjackson@richardjackson.net http://www.richardjacksonltd.com Voice: 1 303 808 8058 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ > -----Original Message----- > From: owner-rpg400-l@midrange.com [mailto:owner-rpg400-l@midrange.com]On > Behalf Of Rajeev_Asthana@noida.tcs.co.in > Sent: Wednesday, July 26, 2000 5:51 AM > To: rpg400-l@midrange.com > Subject: How to know the start of key values for list APIs keyed > interface > > > > > Hi All, > > I'm using List Job api to retrieve all active jobs through keyed > interface using > pointer to the user space. > What is the value of the start position of key related values > that I should add > to the pointer to get the key informations? > (I'm also referring list spool file example in System API > Programming to get > some help). > > ................ > DO QUSNBRLE 20 > > et LSTPTR2 to the first variable length record for this e > > Z-ADD 5 X > EVAL LSTPTR2 = %ADDR(ARR(X)) 22 > DO QUSNBRFR00 23 > > rocess the data based on key type > > QUSKFFFR00 CASEQ 201 FILNAM 24 > QUSKFFFR00 CASEQ 211 PAGES > QUSKFFFR00 CASEQ 216 AGE > CAS ERROR > END > > ............... > > > Similar to the above example, what should be added to X for List Job API? > > Thanks. > Rajeev. > > ------------------------------------------------------------------ > ------------------- > "This email message and files transmitted with it are > confidential, proprietary > and legally privileged. If the message that is received is an > error, or if there > is any mistransmission, the originator must be notified > immediately as the > unauthorized use, dissemination, publication, transfer or any > other use of the > message by unauthorized person is strictly forbidden by law and > prohibited. If > anybody commits violation then he would be legally liable and > punishable under > the relevant law. The intended recipient can be rest > assured that the > confidentiality and privilege is not waived or lost by any such > mistransmission. > > Internet communications are not secure unless it is protected > by using strong > cryptography. TCS does not accept any responsibility whatsoever > for changes in > the nature of modifications, additions, deletions made to the > message once it is > sent. > > TCS reserves the right to monitor all e-mail > communications through its > network." > ------------------------------------------------------------------ > ------------------- > > Tata Consultancy Services > www.tcs.com > > > > +--- > | This is the RPG/400 Mailing List! > | To submit a new message, send your mail to RPG400-L@midrange.com. > | To subscribe to this list send email to RPG400-L-SUB@midrange.com. > | To unsubscribe from this list send email to RPG400-L-UNSUB@midrange.com. > | Questions should be directed to the list owner/operator: > david@midrange.com > +--- +--- | This is the RPG/400 Mailing List! | To submit a new message, send your mail to RPG400-L@midrange.com. | To subscribe to this list send email to RPG400-L-SUB@midrange.com. | To unsubscribe from this list send email to RPG400-L-UNSUB@midrange.com. | Questions should be directed to the list owner/operator: david@midrange.com +---
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.