>I'm trying to write some authorized code that has a requirement to invoke >unauthorized user exits.
Use SYNCH. Assume all data received from the exit is untrusted and insure the caller verifies it. Caller can save addresses on behalf of the exit. Bob Shannon Rocket Software ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [email protected] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html

