In a recent note, Veilleux, Jon L said:
> Date: Fri, 16 Mar 2007 09:31:03 -0400
> Subject: REXX Question
>
A more specific subject would be more useful.
> Is there a way, other than using ISPF panels, to enter hidden data
> (passwords) as a response to a prompt from a REXX exec?
>
Ironicallly, not in TSO Rexx AFAICT, but in:
File that you are currently viewing
Linkname: CONTENTS "z/OS V1R6.0 Using REXX and z/OS UNIX System Services"
URL:
http://publibz.boulder.ibm.com/cgi-bin/bookmgr_OS390/BOOKS/BPXZB651/CCONTENTS
Link that you currently have selected
Linkname: getpass()
URL:
http://publibz.boulder.ibm.com/cgi-bin/bookmgr_OS390/BOOKS/BPXZB651/5.11?DT=20050119125816
Which was a circumvention posted in:
Linkname: [EMAIL PROTECTED] post from Lindy Mayfield
URL: http://www2.marist.edu/htbin/wlvtype?MVS-OE.41280
to a similar question with no satisfactory answer that I asked
concerning masking passwords in a shell script in OMVS.
So, you (or I) could "SYSCALL spawn" a z/OS Unix Rexx EXEC that
read a password; echo it; and capture the output. But is it any
better than ISPF?
Maybe I should PMR the (mis)behavior of "stty -echo" in OMVS.
-- gil
--
StorageTek
INFORMATION made POWERFUL
----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html