XYGATE Compliance PRO (XSW) Reference Manual
XYGATE
®
 Compliance PRO
™
 Reference Manual    
Glossary 
XYPRO Technology Corporation  260  Proprietary and Confidential 
EMS Templates and Macros 
The EMS Message Format Templates allow the output from ALERTS and program 
messages written to EMS to be tokenized and organized as desired by the customer. 
The following three files are supplied at installation to allow for this customization: 
EMSBUILD  A macro to build the template file based on the system templates 
and the EMSTEMP file. 
EMSDDL  A DDL layout for the EMS message. 
EMSTEMP  The TEMPLATE layout for the XYGATESW messages. 
HASHING 
Hashing is an algorithm used to determine whether or not Guardian or OSS files have 
been modified. The algorithm is applied to the contents of a file and a hash value is 
produced. The following Hashing algorithms listed below are currently supported: 
•  MD5 (Message-Digest algorithm 5) represents something like a digital fingerprint 
so that you can be sure a file is exactly the same whether it is stored here, there, 
or anywhere. It is a very effective way to ensure a digital signature and file 
integrity. 
•  SHA-1 (Secure Hash Algorithm) is most commonly used from the SHA series of 
cryptographic hash functions. SHA-1 represents something like a digital fingerprint 
so that you can be sure a file is exactly the same whether it is stored here, there, or 
anywhere. It is a very effective way to ensure a digital signature and file integrity. 
HOST CONNECTION 
The host connection is made via TCP/IP (IPV4 or IPV6 or DNS name) through a 
LISTNER and a PORT to a NonStop server where the XSW host component has been 
installed. Additional NonStop servers can be configured to be accessed from a single 
host connection via EXPAND. 
INTEGRITY CHECK 
An integrity check creates a baseline of values for a category. Each time a collection is 
downloaded, the values are checked. If discrepancies are determined they are 
flagged; new items, changed values, or missing items. 
INTEGRITY CHECK HASHING 
A Hashing integrity check creates a baseline of values for a category. Each time a 
collection is downloaded and has the option of hashing selected, the values are 
checked. If discrepancies are determined, they are flagged as new items, changed 
values or missing items for example. 










