Browse Prior Art Database

Keyword-Dependent Parameter Scanner

IP.com Disclosure Number: IPCOM000119387D
Original Publication Date: 1991-Jan-01
Included in the Prior Art Database: 2005-Apr-01
Document File: 2 page(s) / 86K

Publishing Venue

IBM

Related People

Phillips, M: AUTHOR

Abstract

Disclosed is a generalized IBM System 370* assembler program that will scan for keyword-dependent input parameters, which are typically generated from an external source for syntactic correctness.

This text was extracted from an ASCII text file.
This is the abbreviated version, containing approximately 52% of the total text.

Keyword-Dependent Parameter Scanner

      Disclosed is a generalized IBM System 370* assembler
program that will scan for keyword-dependent input parameters, which
are typically generated from an external source for syntactic
correctness.

      The program has the following features:  a generalized
parameter scanner for keyword-dependent keywords which will scan for
the following types of input; alphanumeric strings (ABCD12);
alphanumeric strings with subscripts (NAME=FRED); quote string
('ABCD');  numeric string (1234) and separator characters (,/).  Also
the user defines the input to be checked, control passed to caller
for each input type which has been defined with definition of input
via a Command Element Descriptor (CED) statement.

      The program operates in the following way.  The input data is
split according to the rules of the Data Facility Product AMS utility
language and stored in a work-area as different types of command
elements (called 'token').  The different types indicate the kind of
data contained in the token (e.g.,
word,numeric,quote-string,separator....).  This data-splitting is
done through all continuations until end-of- command is reached.
These prepared tokens are now compared with the user-defined command
element descriptor chains.  The scanning proceeds either sequentially
or with a user-defined next CED-address to the same or when another
CED-chain is encountered.  The scanning ends if end-of-command is
reached, no next CED-address is specified or if an error occurs.  If
a match is found (i.e., token type = CED type), the value and length
of the token is compared with the values in the CED.  If the values
are not the same or not within a defined range, the scanning proceeds
sequentially; otherwise, the control is passed to a user-defined
exit-routine.  On return from the exit-routine the scanning proceeds
via the user-defined next CED-address. The following is an example of
how the CED chain is specified in a program to scan for input:

      USER=41,FILENAME=FRED
CEDFIRST DS    OF
          CEDF  WDS,TXT='USER',MIN=1,MAX=4,CED=CEDUSER
          CEDF  WDS,TXT='FILENAME',MIN=1,MAX=8,CED=CEDFILE
          CEDF  EOC
          CEDF  ERR,TXT=4
CEDUSER  DS    OH
          CEDF  NUM,MIN=1,MAX=999,EXT=USERCODE,CED=CEDLAST
          CEDF  ERR,TXT=8
CEDFILE  DS    OH
          CEDF  WD,MIN=1,MAX=8,EXT=FILEDS,CED=CEDLAST
          CEDF  ERR,TXT=12
CEDLAST  DS    OH
 ...