×
The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.
Jon,
You can find most of the articles in printed pdf-format in a zip-file (iProDeveloper_Articles.zip) here:
https://spaces.hightail.com/space/00SJA
Cheers,
Carsten
-----Original Message-----
From: MIDRANGE-L <midrange-l-bounces@xxxxxxxxxxxxxxxxxx> On Behalf Of Jon Paris
Sent: 20. september 2019 22:53
To: Midrange Systems Technical Discussion <midrange-l@xxxxxxxxxxxxxxxxxx>
Subject: Re: Regarding Decryption of AES128 encrypted data in RPGLE and query regarding CRC 32
Hmmm - that's good and bad. Good that I now have the link (thank you) and bad because the encryption articles do not seem to be there.
On Sep 20, 2019, at 4:08 PM, Mark Waterbury <mark.s.waterbury@xxxxxxxxxxxxx> wrote:
They are pretty much all here:
https://smex12-5-en-ctp.trendmicro.com:443/wis/clicktime/v1/query?url=
https%3a%2f%2fapimymymy.wordpress.com%2fauthor%2fapimymy%2f&umid=9b7c5
520-c8d0-41ed-939f-fa67de022918&auth=bdbe3990c58ac860d070ebb2aff658185
2d36dfe-304deaa9f90c2fb066d6696f7bc3588563fc68f7
Thanks, Carsten. :)
On Friday, September 20, 2019, 3:55:24 PM EDT, Jon Paris <jon.paris@xxxxxxxxxxxxxx> wrote:
Carsten Flensburg did a series on these APIs for System i Network back in the early 2000s. I have copies of some of them but I believe he has re-hosted some of his pieces - just not sure where. If anyone knows where they have been republished maybe you can post the link here.
This email message (including all attachments) is for the sole use of the intended recipient(s) and may contain confidential and/or privileged information, or may otherwise be protected by work product or other legal rules. If you are not the intended recipient, please contact the sender by reply email and destroy all copies of the original message. Unless otherwise indicated in the body of this email, nothing in this communication is intended to operate as an electronic signature and this transmission cannot be used to form, document, or authenticate a contract. Awaze and/or its affiliates may monitor all incoming and outgoing email communications, including the content of emails and attachments, for security, legal compliance, training, quality assurance and other purposes.
The sender believes that this email and any attachments were free of any virus, worm, Trojan horse, malicious code and/or other contaminants when sent. Email transmissions cannot be guaranteed to be secure or error-free, so this message and its attachments could have been infected, corrupted or made incomplete during transmission. By reading the message and opening any attachments, the recipient accepts full responsibility for any viruses or other defects that may arise, and for taking remedial action relating to such viruses and other defects. Neither Awaze nor any of its affiliated entities is liable for any loss or damage arising in any way from, or for errors or omissions in the contents of, this message or its attachments.
As an Amazon Associate we earn from qualifying purchases.