From mboxrd@z Thu Jan 1 00:00:00 1970 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on polar.synack.me X-Spam-Level: X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,FREEMAIL_FROM autolearn=unavailable autolearn_force=no version=3.4.4 X-Received: by 10.66.188.37 with SMTP id fx5mr14202pac.45.1378364237503; Wed, 04 Sep 2013 23:57:17 -0700 (PDT) X-Received: by 10.49.27.138 with SMTP id t10mr167qeg.33.1378364236244; Wed, 04 Sep 2013 23:57:16 -0700 (PDT) Path: border1.nntp.dca3.giganews.com!border3.nntp.dca.giganews.com!border1.nntp.dca.giganews.com!nntp.giganews.com!y3no2496514pbx.0!news-out.google.com!z6ni33820pbu.0!nntp.google.com!j7no291395qai.0!postnews.google.com!glegroupsg2000goo.googlegroups.com!not-for-mail Newsgroups: comp.lang.ada Date: Wed, 4 Sep 2013 23:57:16 -0700 (PDT) In-Reply-To: Complaints-To: groups-abuse@google.com Injection-Info: glegroupsg2000goo.googlegroups.com; posting-host=86.173.125.168; posting-account=pmkN8QoAAAAtIhXRUfydb0SCISnwaeyg NNTP-Posting-Host: 86.173.125.168 References: User-Agent: G2/1.0 MIME-Version: 1.0 Message-ID: <00759236-6182-4908-ad4c-d76dfc805027@googlegroups.com> Subject: Re: Calling a File for Encryption from outside of the Main Ada-95 Holding Folder. From: Austin Obyrne Injection-Date: Thu, 05 Sep 2013 06:57:17 +0000 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable X-Original-Bytes: 3443 Xref: number.nntp.dca.giganews.com comp.lang.ada:183302 Date: 2013-09-04T23:57:16-07:00 List-Id: On Thursday, September 5, 2013 4:16:17 AM UTC+1, Dennis Lee Bieber wrote: > On Wed, 4 Sep 2013 04:10:13 -0700 (PDT), Austin Obyrne declaimed the following: I'm going to snip a lot of this and get = to one point... >Up to now I thought a file of plaintext for encryption alw= ays has to go through the AdGide editor for the compiler to 'see' it - True= or false. > The "compiler" NEVER sees the plaintext... The compiler is use= d to "compile" the source code of the encryption /program/ into an executab= le. The executable program is what has to see the plaintext as input, and p= roduce some other file as the encrypted output. The simplest way is probabl= y to use stdin and stdout via command line redirection (a feature of the op= erating system, not of the language/compiler). If the "key" is a compiled i= n constant, this would mean using a command line on the form of: encrypt cypher.txt The next step above would be to use the language featu= res to access the command line arguments. That would let one enter a "key" = on the command line, along with the file names encrypt thisISaK3y plain.txt= cypher.txt Note how none of the above is sensitive to the language -- Pyth= on, Ada, C/++, Java ALL react the same way. You'll forgive if I don't take = the time to actually code an example -- it's going on 2330 hours and I need= to go to work in the morning... -- Wulfraed Dennis Lee Bieber AF6VN wlfrae= d@ix.netcom.com HTTP://wlfraed.home.netcom.com/ Many thanks again Dennis. I think I have solved the problem from a UserGui= de perspective by putting the text file throght the adaGIDE editor - it see= ms to 'ratify' it as being an Ada compatible workpiece and does the trick -= most users won't know anything about Ada so this ritual will be acceptable= to them. It slays me when I have to go through diverse interfaces like command lines= etc - a huge amount of work has gone into the crypto side of things and I'= m afraid I am running out of steam at my age (80 next Christmas). Thanks once more for everything - I think I can say problem solved. Austin.