GENERATED: AUG 11,2020 - 2:06PM
BATCH-BOT ENCRYPTION [V10.20.08]

Previous Page

This "CHT Batch Bot", HNDENCRYPT.APP, application runs from the DOS prompt or can be called from another application using Clarion RUN, or CHT HNDSnapCall Class, or from a batch file or windows .VBS script. It accepts several command-line parameters that describe the input file and and output path.

HNDENCRYPT.EXE source code, because it is in Clarion .APP format, is included as a standard part of the CHT toolkit, provided both in .APP format as well as ready-to-run, in .EXE format.

HNDENCRYPT.EXE command-line parameters are as follows:

• •  HELP • • 
--help [OPT]
<9>Pops up a splash help screen.
--silent [OPT]
<9>Suppresses log and help file popups.

• •  ENCRYPT/DECRYPT • • 
--input [REQ]
<9>Path and name of input file.
<9>If the path is omitted, the .EXE path is assumed.
--output [REQ]
<9>Output path only - local to this exe if omitted.
--mode [OPT]
<9>Encode or decode - defaults to encode if omitted.
--key [OPT]
<9>Encrypting password - read from registry if omitted.

The output file name is formatted from the input file with a .hzy extension. For example: test.pdf becomes testpdf.hzy.

The encrypted file is both compressed and encrypted by the operation of this CHT Batch Bot application. This operation is performed in a single pass whether encoding or decoding.


 
PROCEDURE (1):
JumpStartSplashCHTBlue (Procedure Template: Splash)
Count Instance Class Type Methods Header File
(0001) HTellMe HNDWindow HND 215 HNDWINDO.INC
(0002) Toolbar ToolbarClass ABC 6 ABTOOLBA.INC
(0003) ThisWindow WindowManager ABC 39 ABWINDOW.INC
(3) Class Instances Found In JumpStartSplashCHTBlue


 
PROCEDURE (2):
Main (Procedure Template: HandySourceProcedure)
Count Instance Class Type Methods Header File
(0001) HENC HNDEncrypt HNDINET 151 HNDENCRP.INC
(1) Class Instances Found In Main


Copyright © 1996-2020
Gus M. Creces, CHT - Clarion Handy Tools
All Rights Reserved Worldwide

chtlogo001.gif
Classes By Procedure