IBM Mainframe Discussion List <[email protected]> wrote on 06/29/2006 02:37:01 PM:
> How about a faster version using a temporary cheat? Check first and last > byte of first argument for key A, fail if not true; check first argument for > crossing 2K boundary, fail if true; check first and last byte of second > argument for key B, fail if not true; check second argument for crossing 2K > boundary, fail if true; save current key, go to key 0, move the > bytes, go back to > original key; end. That technique creates a "Time of Check to Time of Use" exposure. The key of the storage may be changed between your check and your key 0 move. Jim Mulder z/OS System Test IBM Corp. Poughkeepsie, NY ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html

