|
Hello Kenneth, You can find an example here: http://code.midrange.com/index.php?id=9890675f09 Two things are worth mentioning regarding the processing of the list entries: - The offset to the path name structure is calculated from the beginning of the user space, as opposed to the beginning of the list entry. - The offset to the next list entry is calculated based on the following variables: API header list entry size + size of fixed part of Path name structure + Path name length. Best regards, Carsten Flensburg ----- Original Message ----- From: "Graap, Kenneth" <keg@xxxxxxxxxxxxx> To: "Midrange" <midrange-l@xxxxxxxxxxxx> Sent: Thursday, June 01, 2006 6:28 PM Subject: QSYLATLO
Has anyone written a process that uses the QSYLATLO API to list IFS
objects secured via an *AUTL?
Kenneth **************************************** Kenneth E. Graap IBM Certified Specialist iSeries Multiple System Administrator NW Natural (Gas Services) keg@xxxxxxxxxxxxx Phone: 503-226-4211 x5537 FAX: 503-721-2518 **************************************** -- This is the Midrange Systems Technical Discussion (MIDRANGE-L) mailing
list
To post a message email: MIDRANGE-L@xxxxxxxxxxxx To subscribe, unsubscribe, or change list options, visit: http://lists.midrange.com/mailman/listinfo/midrange-l or email: MIDRANGE-L-request@xxxxxxxxxxxx Before posting, please take a moment to review the archives at http://archive.midrange.com/midrange-l.
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.