Mark,

There are several excellent examples in the z/Architecture Principles of 
Operation in Appendix A.

Tom Harper 

Phoenix Software International 

Sent from my iPhone

> On May 29, 2024, at 3:03 PM, Mark 
> <[email protected]> wrote:
> 
> Hello,
> 
> I'm writing an exit where I have to scan through an array of variable length 
> entries in a table where the format is as below (all the entires are readable 
> characters)
> 
> First 2 bytes = total length of array in hex
> then
> 2 bytes for length of first entry in hex
> First Entry in table
> 2 bytes for length of 2nd entry in hex
> 2nd entry in table
> 2 bytes for length of 3rd entry in hex
> 3rd entry in table.
> repeats until end of array.
> 
> I'm thinking a BXLE will work, but getting stuck on exactly how to code it.  
> any help is greatly appriciated.  
> 
> Thanks,
> Mark.
> .


--------------------------------------------------------------------------------
This e-mail message, including any attachments, appended messages and the
information contained therein, is for the sole use of the intended
recipient(s). If you are not an intended recipient or have otherwise
received this email message in error, any use, dissemination, distribution,
review, storage or copying of this e-mail message and the information
contained therein is strictly prohibited. If you are not an intended
recipient, please contact the sender by reply e-mail and destroy all copies
of this email message and do not otherwise utilize or retain this email
message or any or all of the information contained therein. Although this
email message and any attachments or appended messages are believed to be
free of any virus or other defect that might affect any computer system into
which it is received and opened, it is the responsibility of the recipient
to ensure that it is virus free and no responsibility is accepted by the
sender for any loss or damage arising in any way from its opening or use.

Reply via email to