IBM Mainframe Discussion List <[email protected]> wrote on 06/29/2006 
02:37:01 PM:



> How about a faster version using a temporary cheat?  Check first and 
last 
> byte of first argument for key A, fail if not true; check first argument 
 for 
> crossing 2K boundary, fail if true; check first and last byte of second 
> argument for key B, fail if not true; check second argument for crossing 
2K 
> boundary, fail if true; save current key, go to key 0, move the 
> bytes, go back  to 
> original key; end.
 
  That technique creates a "Time of Check to Time of Use"
exposure.  The key of the storage may be changed between your check
and your key 0 move. 

Jim Mulder   z/OS System Test   IBM Corp.  Poughkeepsie,  NY

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to