Appendix 1, Sentry internal subroutines – HP Sentry User Manual

Page 103

Advertising
background image

SENTRY User’s Guide

Appendix 1 - 1



Fitzgerald & Long

APPENDIX 1

SENTRY INTERNAL SUBROUTINES

NOTICE


The subroutines documented in this appendix are provided as a convenience to the user on
a "USE AT YOUR OWN RISK" basis. If you wish to use these programs and need
assistance we are willing to help. However, because we cannot prevent misuse or
"accidents" which might cause data corruption we must remind you that you are fully
responsible!

Be careful . . . . practice safe computing.



All subroutines are catalogued globally as "*SENTRY...". We recommend the following example

of BASIC syntax as the preferred technique for calling the SENTRY Subroutines

SENTRY.USER.ITEM.CONTROL="*SENTRY.USER.ITEM.CONTROL"

CALL @SENTRY.USER.ITEM.CONTROL


Subroutine: SENTRY.ENCRYPT


This subroutine is used to encrypt and decrypt data strings based on a user defined encryption key.


Sample:

CALL @SENTRY.ENCRYPT(DATA.STRING, RETURN.STRING,
ENCRYPTION.KEY)


Parameters:

DATA.STRING (Input)


This can be any data string of any length including already encrypted data.

RETURN.STRING (Output)

Advertising