On 10/15/2010 09:27 AM, Paul Gilmartin wrote:
On Thu, 14 Oct 2010 19:54:44 -0500, John McKown wrote:

The SPFCOPY that I remember simply used a "magic" SVC to set the APF on
before calling IEBCOPY and back off afterwards.

I've heard of this.  And that the "magic SVC" did extensive checkinf
of control blocks to verify that it was properly called by ISPF.
Bot that it was possible, in principle, to fool it.

But why?  couldn't it just perform the equivalent of

     address TSO 'CALL *(IEBCOPY)'

... and let TSO handle the integrity?

...
-- gil

It used to be the case that since ISPF didn't run authorized that it was impossible to directly invoke authorized utilities from within ISPF dialogs - hence the IEBCOPY kludge.
--
Joel C. Ewing, Fort Smith, AR        [email protected]

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to