01-23-2002
sufficient for what purpose? rot13 is sufficient for some purposes. PGP is better for others.
9 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Hello guys !
I have used "crypt <first> second" command to encrypt "first" to "second" file. i have assign a key for that of course.
Now when i try to look content of "seocnd" file through "cat second" command, the file is encrypted and cannot be read which is according to plan.
But when... (3 Replies)
Discussion started by: abidmalik
3 Replies
2. UNIX for Advanced & Expert Users
A client application is encrypting a text using private key and sends through socket.
My application(server written in c/c++,unix) receives the chiper-text through socket.
I have client's digital certificate.
now, how do I decrypt(may be using openssl library) this ciper-text using client's... (1 Reply)
Discussion started by: johnbach
1 Replies
3. Shell Programming and Scripting
Hi,
I don't know if I am in a correct category with my question.
I want to know what decryption-method is used for this password:
(1) The first stadium is (its stored in the settings.xml of my software):... (2 Replies)
Discussion started by: Mogli1977
2 Replies
4. Shell Programming and Scripting
Hi,
Something bizarre is happening while decrypting the files. I had a decrypt script which was working smoothly on
uname -a
Linux ######### 2.6.9-89.ELsmp #1 SMP Mon Apr 20 10:33:05 EDT 2009 x86_64 x86_64 x86_64 GNU/Linux
After the front-end application was moved to
uname -a
Linux... (2 Replies)
Discussion started by: dips_ag
2 Replies
5. Shell Programming and Scripting
how to decrypt a file using unix Scipts .
i am using one code that is working in the manual testing...
echo $pass_phrase|gpg --output $filename_DEx --batch --passphrase-fd 0 --decrypt $filename_DEx_enc
in the informatica level its not working..
can anybody help me in this?
thanks... (1 Reply)
Discussion started by: rajesh_pola
1 Replies
6. Programming
Hi ,
I need some help as I dont know where to start. I need to create a unix decryption application.
The information I have been given is this so far:
the specification of the encryption process is:
NET 2 Cryptography classes.
RijndaelManaged encryption algorithm
... (13 Replies)
Discussion started by: caciing_help
13 Replies
7. UNIX for Dummies Questions & Answers
Hi i have the path for encrytion file in unix and i want to decrypt the .cpt file in unix and change the password
how can i do that . (3 Replies)
Discussion started by: lily
3 Replies
8. Shell Programming and Scripting
Hello All,
There are so many questions on this and I didn't find any concluded answer.
I want to encrypt a string in the script, actually this is a password. I tried using openssl (I am a newbie to openssl), but it is generating a long one which we can't remember.
I want to encrypt the... (5 Replies)
Discussion started by: karumudi7
5 Replies
9. HP-UX
I am pulling a file from sfdc to HP-UX servers. But in HP-UX servers, the file data shows encrypted. Can anyone tell me how to decrypt them? The file data is like-
... (1 Reply)
Discussion started by: saga20
1 Replies
LEARN ABOUT MOJAVE
crypt::openssl::random5.18
Random(3) User Contributed Perl Documentation Random(3)
NAME
Crypt::OpenSSL::RSA - RSA encoding and decoding, using the openSSL libraries
Crypt::OpenSSL::Random - Routines for accessing the OpenSSL pseudo-random number generator
SYNOPSIS
use Crypt::OpenSSL::Random;
Crypt::OpenSSL::Random::random_seed($good_random_data);
Crypt::OpenSSL::Random::random_egd("/tmp/entropy");
Crypt::OpenSSL::Random::random_status() or
die "Unable to sufficiently seed the random number generator".
my $ten_good_random_bytes = Crypt::OpenSSL::Random::random_bytes(10);
my $ten_ok_random_bytes = Crypt::OpenSSL::Random::random_pseudo_bytes(10);
DESCRIPTION
Crypt::OpenSSL::Random provides the ability to seed and query the OpenSSL library's pseudo-random number generator
EXPORT
None by default.
Static Methods
random_bytes
This function, returns a specified number of cryptographically strong pseudo-random bytes from the PRNG. If the PRNG has not been
seeded with enough randomness to ensure an unpredictable byte sequence, then a false value is returned.
random_pseudo_bytes
This function, is similar to c<random_bytes>, but the resulting sequence of bytes are not necessarily unpredictable. They can be used
for non-cryptographic purposes and for certain purposes in cryptographic protocols, but usually not for key generation etc.
random_seed
This function seeds the PRNG with a supplied string of bytes. It returns true if the PRNG has sufficient seeding. Note: calling this
function with non-random bytes is of limited value at best!
random_egd
This function seeds the PRNG with data from the specified entropy gathering daemon. Returns the number of bytes read from the daemon
on succes, or -1 if not enough bytes were read, or if the connection to the daemon failed.
random_status
This function returns true if the PRNG has sufficient seeding.
BUGS
Because of the internal workings of OpenSSL's random library, the pseudo-random number generator (PRNG) accessed by Crypt::OpenSSL::Random
will be different than the one accessed by any other perl module. Hence, to use a module such as Crypt::OpenSSL::Random, you will need to
seed the PRNG used there from one used here. This class is still advantageous, however, as it centralizes other methods, such as
random_egd, in one place.
AUTHOR
Ian Robertson, iroberts@cpan.com
SEE ALSO
perl(1), rand(3), RAND_add(3), RAND_egd(3), RAND_bytes(3).
POD ERRORS
Hey! The above document had some coding errors, which are explained below:
Around line 62:
'=item' outside of any '=over'
Around line 93:
You forgot a '=back' before '=head1'
perl v5.18.2 2007-05-20 Random(3)