Sponsored Content
Full Discussion: Commands for File Security
Top Forums UNIX for Dummies Questions & Answers Commands for File Security Post 17014 by rwb1959 on Sunday 10th of March 2002 02:57:37 AM
Old 03-10-2002
Hi TRUEST,

The link I gave you is the main page.
If you look at...
http://www.gnupg.org/gph/en/manual.html
...you will find more than you need to know
about GPG. As Neo states, "you have a powerful
and free encryption engine available with more
features that you could use." I would recommend reading this "manual" first then downloading and
installing this to do EXACTLY what you are
proposing to do. It is extremely flexable and
relatively easy to build and install.
 

2 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

Reading UNIX commands from file and redirecting output to a file

Hi All I have written the following script: #!/bin/ksh while read cmdline do echo `$cmdline` pid="$cmdline" done<commands.txt =========== commands.txt contains: ps -ef | grep abc | grep xyz |awk '{print $2}; My objective is to store the o/p of the command in a variable and do... (8 Replies)
Discussion started by: rahulparo
8 Replies

2. Shell Programming and Scripting

Need unix commands to delete records from one file if the same record present in another file...

Need unix commands to delete records from one file if the same record present in another file... just like join ... if the record present in both files.. delete from first file or delete the particular record and write the unmatched records to new file.. tried with grep and while... (6 Replies)
Discussion started by: msathees
6 Replies
encrypt(3C)						   Standard C Library Functions 					       encrypt(3C)

NAME
encrypt - encoding function SYNOPSIS
#include <crypt.h> void encrypt(char block[64], int edflag); Standard conforming #include <unistd.h> void encrypt(char block[64], int edflag); DESCRIPTION
The encrypt() function provides (rather primitive) access to the hashing algorithm employed by the crypt(3C) function. The key generated by setkey(3C) is used to encrypt the string block with encrypt(). The block argument to encrypt() is an array of length 64 bytes containing only the bytes with numerical value of 0 and 1. The array is mod- ified in place to a similar array using the key set by setkey(3C). If edflag is 0, the argument is encoded. If edflag is 1, the argument may be decoded (see the USAGE section below); if the argument is not decoded, errno will be set to ENOSYS. RETURN VALUES
The encrypt() function returns no value. ERRORS
The encrypt() function will fail if: ENOSYS The functionality is not supported on this implementation. USAGE
In some environments, decoding may not be implemented. This is related to U.S. Government restrictions on encryption and decryption rou- tines: the DES decryption algorithm cannot be exported outside the U.S.A. Historical practice has been to ship a different version of the encryption library without the decryption feature in the routines supplied. Thus the exported version of encrypt() does encoding but not decoding. Because encrypt() does not return a value, applications wishing to check for errors should set errno to 0, call encrypt(), then test errno and, if it is non-zero, assume an error has occurred. ATTRIBUTES
See attributes(5) for descriptions of the following attributes: +-----------------------------+-----------------------------+ | ATTRIBUTE TYPE | ATTRIBUTE VALUE | +-----------------------------+-----------------------------+ |Interface Stability |Standard | +-----------------------------+-----------------------------+ |MT-Level |Safe | +-----------------------------+-----------------------------+ SEE ALSO
crypt(3C), setkey(3C), attributes(5) SunOS 5.11 2 May 2001 encrypt(3C)
All times are GMT -4. The time now is 04:57 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy