HP SENTRY Uživatelský manuál Strana 103

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 113
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 102
SENTRY Users Guide Appendix 1 - 1
Fitzgerald & Long
APPENDIX 1
SENTRY INTERNAL SUBROUTINES
NOTICE
The subroutines documented in this appendix are provided as a convenience to the user on
a "USE AT YOUR OWN RISK" basis. If you wish to use these programs and need
assistance we are willing to help. However, because we cannot prevent misuse or
"accidents" which might cause data corruption we must remind you that you are fully
responsible!
Be careful . . . . practice safe computing.
All subroutines are catalogued globally as "*SENTRY...". We recommend the following example
of BASIC syntax as the preferred technique for calling the SENTRY Subroutines
SENTRY.USER.ITEM.CONTROL="*SENTRY.USER.ITEM.CONTROL"
CALL @SENTRY.USER.ITEM.CONTROL
Subroutine: SENTRY.ENCRYPT
This subroutine is used to encrypt and decrypt data strings based on a user defined encryption key.
Sample: CALL @SENTRY.ENCRYPT(DATA.STRING, RETURN.STRING,
ENCRYPTION.KEY)
Parameters:
DATA.STRING (Input)
This can be any data string of any length including already encrypted data.
RETURN.STRING (Output)
Zobrazit stránku 102
1 2 ... 98 99 100 101 102 103 104 105 106 107 108 ... 112 113

Komentáře k této Příručce

Žádné komentáře