× The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.



From: Dan Bale <dbale@samsa.com>

> Is anyone using Leif's MIFHASH MI program?  Or the example he provides in
> Chapter 13?
>
> The MIFHASH program's parameters *appear* to be:
>   1) Input File Name
>   2) Input File's Library
>   3) Output File Name
>   4) Output File's Library
>   5) Returned File name & 40-byte hash value
> There appears to be no parameter for a member name, although there is a
> reference to a member name in the program.  Also, what is the Output file
> used for?  Is it encrypted?
>

MIFHASH is one of a number of programs developed in chapter 13, that
all use the same generic calling program and command.
The outfile is not used, instead the result is sent as a message.
The program is only a framework. For it to be useful, you should
adapt it to do exactly what you want. I'll help you with this,
if you don't have the time, but you got to specify how you want
to use it.




As an Amazon Associate we earn from qualifying purchases.

This thread ...

Follow-Ups:
Replies:

Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.