>I'm trying to write some authorized code that has a requirement to invoke
>unauthorized user exits.

Use SYNCH. Assume all data received from the exit is untrusted and insure the 
caller verifies it. Caller can save addresses on behalf of the exit.

Bob Shannon
Rocket Software


----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to