Let me guess: you want to encrypt something and don't want to have to
modify application programs. 

My question is how you would control who is authorized to use your hook?
And, of course, how do you plan to manage the keys and the changing
thereof. 

-----Original Message-----
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On
Behalf Of Rob Schramm
Sent: Sunday, October 05, 2008 4:50 PM
To: [email protected]
Subject: Re: VSAM I/O

Ulrich,

I want to modify it before the original caller sees it.  Additionally,
if 
they update or write a new record.. I am looking to modify what gets 
written.

I had considered the VSAM special processing exit, but I don't think it 
will do what I want. 

I had haven't contacted IBM yet.  I thought I would digest suggestions 
from IBM-Main before continuing down this path.

I am not looking for performance or security, just to be able to look at

it .. then decide to modify it or not. 

Thanks,
Rob

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

NOTICE: This electronic mail message and any files transmitted with it are 
intended
exclusively for the individual or entity to which it is addressed. The message, 
together with any attachment, may contain confidential and/or privileged 
information.
Any unauthorized review, use, printing, saving, copying, disclosure or 
distribution 
is strictly prohibited. If you have received this message in error, please 
immediately advise the sender by reply email and delete all copies.

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to