HP (Hewlett-Packard) Sentry Printer User Manual


 
SENTRY Users Guide Appendix 1 - 1
Fitzgerald & Long
APPENDIX 1
SENTRY INTERNAL SUBROUTINES
NOTICE
The subroutines documented in this appendix are provided as a convenience to the user on
a "USE AT YOUR OWN RISK" basis. If you wish to use these programs and need
assistance we are willing to help. However, because we cannot prevent misuse or
"accidents" which might cause data corruption we must remind you that you are fully
responsible!
Be careful . . . . practice safe computing.
All subroutines are catalogued globally as "*SENTRY...". We recommend the following example
of BASIC syntax as the preferred technique for calling the SENTRY Subroutines
SENTRY.USER.ITEM.CONTROL="*SENTRY.USER.ITEM.CONTROL"
CALL @SENTRY.USER.ITEM.CONTROL
Subroutine: SENTRY.ENCRYPT
This subroutine is used to encrypt and decrypt data strings based on a user defined encryption key.
Sample: CALL @SENTRY.ENCRYPT(DATA.STRING, RETURN.STRING,
ENCRYPTION.KEY)
Parameters:
DATA.STRING (Input)
This can be any data string of any length including already encrypted data.
RETURN.STRING (Output)