17.07.2015 Views

Download eBook (PDF) - Red Gate Software

Download eBook (PDF) - Red Gate Software

Download eBook (PDF) - Red Gate Software

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Appendix A – Views and Functions Reference)WHEREBorrower_ID = 1;GOListing A-21: Syntax of EncryptByPassphrase.Key_IDThe catalog views that reference a symmetric key, such assys.symmetric_keys and sys.key_encryptions, can have theirresults filtered based off the id of the symmetric key. If the name of thesymmetric key is available, the id can be obtained through this function. Theonly argument for this function is the name of the symmetric key that is beingreferenced.USE HomeLending;GOSELECT Key_ID('MySymKey');GOListing A-22: Syntax of Key_ID.Key_GUIDThe built-in cryptographic functions that reference a symmetric key, such asDecryptByKey, require the globally unique identifier of the symmetric key asa parameter. If the name of the symmetric key is available, the globally uniqueidentifier can be obtained through this function. The only argument for thisfunction is the name of the symmetric key that is being referenced.USE HomeLending;GOSELECT Key_GUID('MySymKey');GOListing A-23: Syntax of Key_GUID.218

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!