SENTRY User’s Guide
Appendix 1 - 1
Fitzgerald & Long
APPENDIX 1
SENTRY INTERNAL SUBROUTINES
NOTICE
The subroutines documented in this appendix are provided as a convenience to the user on
a "USE AT YOUR OWN RISK" basis. If you wish to use these programs and need
assistance we are willing to help. However, because we cannot prevent misuse or
"accidents" which might cause data corruption we must remind you that you are fully
responsible!
Be careful . . . . practice safe computing.
All subroutines are catalogued globally as "*SENTRY...". We recommend the following example
of BASIC syntax as the preferred technique for calling the SENTRY Subroutines
SENTRY.USER.ITEM.CONTROL="*SENTRY.USER.ITEM.CONTROL"
CALL @SENTRY.USER.ITEM.CONTROL
Subroutine: SENTRY.ENCRYPT
This subroutine is used to encrypt and decrypt data strings based on a user defined encryption key.
Sample:
CALL @SENTRY.ENCRYPT(DATA.STRING, RETURN.STRING,
ENCRYPTION.KEY)
Parameters:
DATA.STRING
(Input)
This can be any data string of any length including already encrypted data.
RETURN.STRING
(Output)
Summary of Contents for Sentry
Page 4: ......
Page 18: ......
Page 21: ...SENTRY User s Guide Section 1 3 Fitzgerald Long ...
Page 29: ...SENTRY User s Guide Section 1 11 Fitzgerald Long ...
Page 30: ......
Page 60: ...Section 2 30 SENTRY User s Guide Fitzgerald Long ...
Page 102: ......
Page 109: ...SENTRY User s Guide Appendix 1 7 Fitzgerald Long ...
Page 110: ......
Page 113: ...SENTRY User s Guide Appendix 2 3 Fitzgerald Long ...