In a recent note, Veilleux, Jon L said:

> Date:         Fri, 16 Mar 2007 09:31:03 -0400
> Subject:      REXX Question
> 
A more specific subject would be more useful.

> Is there a way, other than using ISPF panels, to enter hidden data
> (passwords) as a response to a prompt from a REXX exec?
> 
Ironicallly, not in TSO Rexx AFAICT, but in:

File that you are currently viewing
   Linkname: CONTENTS "z/OS V1R6.0 Using REXX and z/OS UNIX System Services"
        URL: 
http://publibz.boulder.ibm.com/cgi-bin/bookmgr_OS390/BOOKS/BPXZB651/CCONTENTS

Link that you currently have selected
   Linkname: getpass()
        URL: 
http://publibz.boulder.ibm.com/cgi-bin/bookmgr_OS390/BOOKS/BPXZB651/5.11?DT=20050119125816

Which was a circumvention posted in:

   Linkname: [EMAIL PROTECTED] post from Lindy Mayfield
        URL: http://www2.marist.edu/htbin/wlvtype?MVS-OE.41280

to a similar question with no satisfactory answer that I asked
concerning masking passwords in a shell script in OMVS.

So, you (or I) could "SYSCALL spawn" a z/OS Unix Rexx EXEC that
read a password; echo it; and capture the output.  But is it any
better than ISPF?

Maybe I should PMR the (mis)behavior of "stty -echo" in OMVS.

-- gil
-- 
StorageTek
INFORMATION made POWERFUL

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to