Name/Token control structures are in key 0 non-fetch-protected storage. So, yes, that means you should not put anything into the 16 bytes of a system-level token that you don't want unauthorized code to be able to view. The same would be true for an address-space-level or task-level token with regard to unauthorized code running within the owning address space.
Peter Relson z/OS Core Technology Design ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [email protected] with the message: INFO IBM-MAIN
