Thunderstone Software Document Search, Retrieval, and Management
Search:
Vortex Manual
 

encrypt - encrypt data

 

SYNOPSIS

<encrypt $data $key>


DESCRIPTION
The encrypt function encrypts each value of $data using the corresponding $key value. There must be one or more values of $data and $key; if fewer values of $key exist than $data, the last $key value is re-used.


DIAGNOSTICS
encrypt returns each value of $data, encrypted Unix style, using key $key.


EXAMPLE

<encrypt $data $pass>
<SQL "insert into secret values(counter, $ret)"> </SQL>


CAVEATS
The encrypt function was added Oct. 25 1996.

The encryption algorithm uses only the first 8 bytes of each key. The returned encrypted data is likely to be binary, but will not contain nul (ASCII zero) values.


SEE ALSO
decrypt, pwencrypt


Copyright © Thunderstone Software     Last updated: Mon Feb 18 10:28:15 EST 2013
 
Home   ::   Products   ::   Solutions   ::   How to Buy   ::   Support   ::   Contact Us   ::   News   ::   About
Copyright © 2013 Thunderstone Software LLC. All rights reserved.