You may want to define CSF.CSFSERV.AUTH.CSFOWH.DISABLE CLASS(XFACILIT) This disables SAF checks in ICSF for CSNBOWH (hash/mac) calls, and can improve performance since these calls might be made frequently. Of course, someone may have a reason why these calls should be SAF protected, but that is not typical.
Kirk Wolf Dovetailed Technologies http://dovetail.com On Wed, Nov 18, 2015 at 3:05 PM, Paul Gilmartin < 0000000433f07816-dmarc-requ...@listserv.ua.edu> wrote: > On Wed, 18 Nov 2015 08:51:00 -0500, Kurt Quackenbush wrote: > > >> Still not sure why smp/e is trying to use ICSF when CSF is not > >> active. As per IBM to calculate SHA-1 hash values for GIMUNZIP > >> service routines if SMP/E detects ICSF is not available then SMP/e > >> will automatically use an smp/e java application to calculate SHA-1 > >> hash values as an alternative. > > > >Ah, but ICSF is in fact available and active. You're just not > >authorized to use it. There's a difference. > > > Sophistry! If the user is not authorized, it's de facto unavailable and > should be treated as such. > > >If SMP/E detects CSNBOWH is not installed, or if it is installed but not > >active (CSNBOWH ends with rc=12 reason=0), then SMP/E attempts to use a > >Java method to calculate SHA-1 hash values. > > > Which is what it should do in this case. > > -- gil > > ---------------------------------------------------------------------- > For IBM-MAIN subscribe / signoff / archive access instructions, > send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN > ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN