Name/Token control structures are in key 0 non-fetch-protected storage.

So, yes, that means you should not put anything into the 16 bytes of a 
system-level token that you don't want unauthorized code to be able to view. 
The same would be true for an address-space-level or task-level token with 
regard to unauthorized code running within the owning address space.

Peter Relson
z/OS Core Technology Design


----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to