GENERATED: JAN 12,2023 - 12:54PM
BATCH-BOT ENCRYPTION [V10.23.01. 27.00]

Previous Page

This "CHT Batch Bot", HNDENCRYPT.APP, application runs from the DOS prompt or can be called from another application using Clarion RUN, or CHT HNDSnapCall Class, or from a batch file or windows .VBS script. It accepts several command-line parameters that describe the input file and and output path.

HNDENCRYPT.EXE source code, because it is in Clarion .APP format, is included as a standard part of the CHT toolkit, provided both in .APP format as well as ready-to-run, in .EXE format.

HNDENCRYPT.EXE command-line parameters are as follows:

• •  HELP • • 
--help [OPT]
<9>Pops up a splash help screen.
--silent [OPT]
<9>Suppresses log and help file popups.

--input [REQ]
<9>Path and name of input file.
<9>If the path is omitted, the .EXE path is assumed.
--output [REQ]
<9>Output path only - local to this exe if omitted.
--mode [OPT]
<9>Encode or decode - defaults to encode if omitted.
--key [OPT]
<9>Encrypting password - read from registry if omitted.

The output file name is formatted from the input file with a .hzy extension. For example: test.pdf becomes testpdf.hzy.

The encrypted file is both compressed and encrypted by the operation of this CHT Batch Bot application. This operation is performed in a single pass whether encoding or decoding.

JumpStartSplashCHTBlue (Procedure Template: Splash)
Count Instance Class Type Methods Header File
(0001) HTellMe HNDWindow HND 205 HNDWINDO.INC
(0002) HWin HNDWindow HND 205 HNDWINDO.INC
(0003) Toolbar ToolbarClass ABC 6 ABTOOLBA.INC
(0004) ThisWindow WindowManager ABC 40 ABWINDOW.INC
(4) Class Instances Found In JumpStartSplashCHTBlue

Main (Procedure Template: HandySourceProcedure)
Count Instance Class Type Methods Header File
(1) Class Instances Found In Main

Copyright © 1996-2023
Gus M. Creces, CHT (Clarion Handy Tools)
All Rights Reserved Worldwide

Classes By Procedure