Catalog No. 9300: 612001
IDENTIFICATION: Obtain next byte table entry (GCW)
PURPOSE: To get the next byte value and byte table entry corresponding to it.
ACTION: GCW obtains the next byte value from BBUF and uses it to index the byte table. The byte table entry is loaded into the B register, and the negative of the byte value is left in the A and index registers.
PROGRAMMING TECHNIQUES:
CALLING SEQUENCE:
MEMORY
REQUIREMENTS:
SUBRO UTINES
USED:GCW is a relocatable routine assembled as part of PREASM.
BRM GCW
lOa words
None
* II • -1* I
SCIENTIPIC DATA SYST.MSSDS PROGRAM LIBRARY
PROGRAM DESCRIPTION
900 Series: 04201 Catalog No. 9300: 61200 IDENTIFICATION: Get the next byte value from the standard procedures file (GTB)PURPOSE: To extract into the low order bits of the A register the value of the next byte of standard procedure text.
ACTION:
PROGRAMMING TECHNIQUES:
CALLING SEQUENCE:
MEMORY
REQUIREMENTS:
SUBROUTINES USED:
GTB extracts from CHAD the next BSIZ bits of standard procedure text. If fewer than BSIZ bits of data remain in CHAD, GTB calls GBW to obtain the next word of input. If a zero byte is obtained, GTB takes 2BSIZ
as the value of the byte and steps BSIZ and the related mask BMSK. The byte value obtained is then converted to the equivalent user value by taking the corresponding entry from ET AB as the byte value. If the ET AB entry is greater than the mask SVBMS, the size indicator SVBSZ and the mask
SVBMS are increased in size until SVBMS is as large or larger than the byte.
GTB is a relocatable routine assembled as part of PREASM.
BRM GTB
618 cells
GBW
* II • -1* I
SCIENTIPIC DATA SVSTEMSSDS PROGRAM LIBRARY
PROGRAM DESCRIPTION
900Series: 042016 Catalog No. 9300: 612001 IDENTIFICATION: Get the next word of standard procedure text (GBW)
PURPOSE: To place into CHAD the next word of standard procedure test.
ACTION: GBW moves the next word of standard procedure text from the input buffer
PROGRAMMING TECH NIQUES:
CALLING SEQUENCE:
MEMORY
REQUIREMENTS:
SUBROUTINES USED:
to CHAD. If the buffer is empty, GBW first calls the input routine PI
(indirectly through RDPD) to read the next record from the standard procedure fi Ie.
PI is indirectly addressed through cell RDPD. GBW is a relocatable routine assembled as part of PREASM.
BRM GBW
PI
* II • -1* I
SC •• NTIPIC DATA SVST.MSSDS PROGRAM LIBRARY
PROGRAM DESCRIPTION
900 Series: 04201Catalog No. 9300: 6120C IDENTIFICATION: Obtain the next line of encoded text (TEX)
PURPOSE: To store the byte values for the next I ine of standard procedure text into consecutive cells starting at BBUF and to skip the comments on the line.
ACTION:
PROGRAMMING TECHNIQUES:
CALLING SEQUENCE:
MEMORY
REQUIREMENTS:
SUBROUTINES USED:
TEX calls GTB to obtain the byte values from the input file which are then stored in BBUF. Bytes are moved until an end-of-line byte is encountered, at which point TEX calls INC to obtain comment characters until all
comments have been skipped.
TEX is a relocatable routine assembled as part of PREASM.
BRM TEX
238 cells
GTB INC
* Ij
I-1* I
SC.ENT.PIC DATA SYSTEMSSDS PROGRAM LIBRARY PROGRAM DESCRIPTION
IDENTIFICATION: Get comment characters (INC)
900 Series: 042016 Catalog No. 9300: 612001
PURPOSE: To get the next comment character from the standard procedures file.
ACTION: INC sets a flag INCFG to cause GTB to suppress stepping of the byte sizes and masks. INC then saves the current byte size and mask and sets the byte size to 6. GTB is called to obtain the next six bits of encoded text, and the byte size and mask are restored.
PROGRAMMING TECHNIQUES:
CALLING SEQUENCE:
MEMORY
REQUIREMENTS:
SUBROUTINES USED:
INC is a relocatable routine assembled as part of PREASM.
BRM INC
218 cells
GTB
t II • -It I
SCIENTIPIC DATA SVBT.MSSDS PROGRAM LIBRARY
PROGRAM DESCRIPTION
900 Series: 0420Catalog No. 9300: 6120 IDENTIFICATION: Flag bytes to be saved (MRKBYT)
PURPOSE: MRKBYT marks bytes appearing in all lines of procedure sample, including name lines which are saved. The purpose for this flagging is to identify those bytes and on I y those bytes from the standard procedure fi Ie wh i ch are needed to process the user's program. SHRINK, when called, will purge all bytes from the dictionary and byte table which neither appear in the user's program or are marked as being needed. This marking is necessary since the appearance of a byte in the dictionary is unique, but the first reference to the byte may not be the instance that resu I ted in its be i ng needed.
ACTION:
PROGRAMMING TECHNIQUES:
CALLING SEQUENCE:
MEMORY
REQUIREMENTS:
SUBRO UTINES USED:
MRKBYT sets bit
2
of the byte table entry for each byte in the buffer addressed by the contents of the A register.MRKBYT makes use of the fact that bit
2
of the byte table entry is not used.MRKBYT is a relocatable routine assembled as part of PREASM.
Buffer location to A register BRM MRKBYT
148 cells
None
* II • -l* I
SCIENTIFIC DATA SYSTEMS50S PROGRAM LIBRARY
PROGRAM DESCRIPTION
900 Series: 042016 Catalog No. 9300: 612001IDENTIFICATION: Convert numeric strings to binary values (CNVRT)
PURPOSE: To convert numeric items to binary values.
ACTION: CNVRT converts numeric character strings to their binary value by successive multipl i cations of 8 or 10 (dependi ng on the va I ue of the first character).
GTCHR is used to fetch the characters of the string. Results are left in PROD, PROD1, and PROD2. If the leading character is a dot, the number
PROGRAMMING TECHNIQUES:
CALLING SEQUENCE:
MEMORY
REQUIREMENTS:
SUBROUTINES USED:
is converted to floating point by dividing the integer by the appropriate powers of 10 and co I cu lati ng the exponent. The DPDIV routi ne is used to perform the divisions. All floating point fractions so calculated are left ir normal ized form.
CNVRT is a relocatable routine assembled as part of PREASM.
Number of characters in byte to SIZE
Character position of first character to CHAR Memory location of di ctionary word to DLOC BRM CNVRT
1708 cells
GTCHR DPDIV
t 1/ • -1* I
SC.ENTlflIC DATA SYSTEMSSDS PROGRAM LIBRARY
PROGRAM DESCRIPTION
900 Series: 042 Catalog No.9300:
6121 IDENTIFICATION: Extract characters from the packed dictionary (GTCHR)PURPOSE: To get the next character of a dictionary entry to the A register.
ACTION: GTCHR loads the next character from the dictionary entry into the low order bits of the A register. The di ctionary location of the next character as indicated by DLOC and CHAR is established, and SIZE is decremented.
PROGRAMMING TECHNIQUES:
CALLING SEQUENCE:
MEMORY
REQUIREMENTS:
SUBROUTINES USED:
GTCHR is a relocatable routine assembled as part of PREASM.
Character position in word to CHAR Location of dictionary word to DLOC Size of byte in characters to SIZE BRM GTCHR
end of entry normal exit
228 cells
None
t allli-ill'
SCIENTIFIC DATA SYSTEMSSDS PROGRAM LIBRARY
PROGRAM DESCRIPTION
900 Series: 042016 Catalog No. 9300: 612001IDENTIFICATION: Perform double-precision divisions (DPDIV)
PURPOSE: To divide the contents of the A and B registers by the contents of the location addressed by the index register and maintain maximum precision.
ACTION:
PROGRAMMING TECHNIQUES:
CALLING-SEQUENCE:
MEMORY
REQUIREMENTS:
SUBROUTINES USED:
DPDIV divides the contents of the A and B registers by the single precision divisor addressed by the index register. The remainders are then divided and that remainder divided. The resulting quotient is normalized.
DPDIV assumes that both the dividend and divisor are normalized and leaves the results in the same format. DPDIV is a relocatable routine assembled as part of PREASM.
Double-precision dividend to A and B registers Location of di vi sor to X regi ster
BRM DPDIV
368 cells
None
I' ;1
I-\* I
SCIENTIFIC DATA SYSTEMSSDS PROGRAM LIBRARY
PROGRAM DESCRIPTION
900 Series: 042 Catalog No. 9300: 612 IDENTIFICATION: Get characters from the input standard procedure dictionary (GPDC)PURPOSE: To fetch the next dictionary character into the A register and PDCHR.
ACTION: GPDC extracts the next dictionary character from the input buffer into the low order bits of the A register and to PDCHR. If the buffer is empty, GPDC calls PI to read the next record of input from the standard procedures fi Ie. If the record read is not of type 1 (dictionary), GPDC returns through the end-of-dictionary exit.
PROGRAMMING TECHNIQUES:
CALLING SEQUENCE:
MEMORY
REQUIREMENTS:
SUBROUTINES USED:
GPDC is a relocatable routine assembled as part of PREASM.
BRM GPDC
end-of-dictionary return norma I return
368 cells
PI (indirectly addressed through RDPD).
* II • -1* I
SCIENTIFIC DATA SYSTEMSSDS PROGRAM LIBRARY
PROGRAM DESCRIPTION
900 Series: 042016 Cat.alog No. 9300: 612001IDENTIFICATION: Obtain the next record from the standard procedures file (PI)
PURPOSE: To cause the next record to be read from the standard procedures deck and to extract the record type and length.
ACTION:
PROGRAMMING TECH NIQUES:
CALLING SEQUENCE:
MEMORY
REQUIREMENTS:
SUBROUTINES USED:
PI calls RDTP to read the next record of standard procedures. PI extracts the record type and stores it in RT; next it extracts the record length and stores it minus 2 in PIWC for the GPDC routine.
PI is a relocatable routine addressed through cell RDPD and is assembled as part of PR EASM.
BRM PI or BRM *RDPD
138 cells
RDTP