Well, since we all know the answers this is simply a discussion.  But, Yes, 
that Is what I want to do...  or more specifically what I want to discuss.

x = foo( bar) where foo is an assembler function running authorized.  

But I know two ways to do this that do not violate any system integrity rules. 

-----Original Message-----
From: IBM Mainframe Discussion List [mailto:[email protected]] On Behalf Of 
Shmuel Metz (Seymour J.)
Sent: Friday, December 31, 2010 7:29 PM
To: [email protected]
Subject: Re: Authorized Rexx Assembler Function

In <[email protected]>,
on 12/31/2010
   at 02:56 PM, Lindy Mayfield <[email protected]> said:

>That is exactly what I meant by my question.  Rexx assembler function, 
>authorized properly, put into the TSO command IKJTSOxx table, won't run 
>authorized.

If you really mean function, then there is no mechanism, nor should there be. 
IKJTSOxx is for authorized commands, authorized programs and authorized 
services, not for functions. Are you saying that you want to write

     foo=bar(baz)

or

     call bar baz

rather than

     address TSO bar baz

and have baz run authorized?
 
-- 
     Shmuel (Seymour J.) Metz, SysProg and JOAT
     ISO position; see <http://patriot.net/~shmuel/resume/brief.html>
We don't care. We don't have to care, we're Congress.
(S877: The Shut up and Eat Your spam act of 2003)

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
[email protected] with the message: GET IBM-MAIN INFO Search the archives at 
http://bama.ua.edu/archives/ibm-main.html

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to