03-10-2009
8 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
NEED expertise help for this topic!!!
Question 1: Is encryption possible for the shell scriping programing? shadow the scriping file, do think is impossible...
Question2: built a simple program with the simplicity function that allow user change settings by enter corret name and... (3 Replies)
Discussion started by: trynew
3 Replies
2. UNIX for Advanced & Expert Users
Experts,
I am trying to encrypt my filesystem using the AES 256 bit type of encryption. I am using FreeBSD 5.4 and need to encrypt one of the mounted points. Does anybody have any good idea of how to do it?
Is there any documentation about encrypting the disk partition as this method is more... (2 Replies)
Discussion started by: jimmynath
2 Replies
3. UNIX for Dummies Questions & Answers
My dilemma,
I need to send, deemed confidential, information via e-mail (SMTP). This information is sitting as a file on AIX. Typically I can send this data as a e-mail attachment via what we term a "mail filter" using telnet. I now would like to somehow encrypt the data and send it to a e-mail... (1 Reply)
Discussion started by: hugow
1 Replies
4. Programming
I am developing a JAVA application that must encrypt its data. On my development machine, I can use a 256 bit key with no problem. A test machine throws an exception complaining about an illegal key length. The test machine is using JRE 1.6u21. Does anyone know where I can get a version of the JRE... (1 Reply)
Discussion started by: ilikecows
1 Replies
5. Programming
Hello everyone,
can any one help me to find out the 3des(triple data encryption standard) algorithm implementation in C..
Thanks in advance (4 Replies)
Discussion started by: andrew.paul
4 Replies
6. Cybersecurity
Hi all,
I'm looking for secure file encryption tools that use MAC address as encryption key. FYI, I'm using Red Hat Enterprise Linux OS.
For example: when A wants to send file to B
A will encrypt the file with B's computer MAC/IP address as an encryption key
This file can only be decrypted... (2 Replies)
Discussion started by: sergionicosta
2 Replies
7. Cybersecurity
Toucan software uses 256bit AES encryption using ccrypt (https://en.wikipedia.org/wiki/Ccrypt)
i want to ask if its secure to use this ccrypt encryption for storing .TXT file with my passwords on cloud storage like Google Drive? (7 Replies)
Discussion started by: postcd
7 Replies
8. Programming
Various Node-Red crypto modules do not work with PHP, so to send an encrypted message from a PHP script (in this case from a Ubuntu server) to Node-RED we need our own code.
After a few hours of searching, testing various libs, more testing and debugging, I got this PHP to Node-RED code... (0 Replies)
Discussion started by: Neo
0 Replies
LEARN ABOUT DEBIAN
shishi_aes_cts
shishi_aes_cts(3) shishi shishi_aes_cts(3)
NAME
shishi_aes_cts - API function
SYNOPSIS
#include <shishi.h>
int shishi_aes_cts(Shishi * handle, int decryptp, const char * key, size_t keylen, const char iv[16], char * ivout[16], const char * in,
size_t inlen, char ** out);
ARGUMENTS
Shishi * handle
shishi handle as allocated by shishi_init().
int decryptp
0 to indicate encryption, non-0 to indicate decryption.
const char * key
input character array with key to use.
size_t keylen
length of input character array with key to use.
const char iv[16]
char * ivout[16]
const char * in
input character array of data to encrypt/decrypt.
size_t inlen
length of input character array of data to encrypt/decrypt.
char ** out newly allocated character array with encrypted/decrypted data.
DESCRIPTION
Encrypt or decrypt data (depending on decryptp) using AES in CBC-CTS mode. The length of the key, keylen, decide if AES 128 or AES 256
should be used. The out buffer must be deallocated by the caller.
RETURN VALUE
Returns SHISHI_OK iff successful.
REPORTING BUGS
Report bugs to <bug-shishi@gnu.org>.
COPYRIGHT
Copyright (C) 2002-2010 Simon Josefsson.
Copying and distribution of this file, with or without modification, are permitted in any medium without royalty provided the copyright
notice and this notice are preserved.
SEE ALSO
The full documentation for shishi is maintained as a Texinfo manual. If the info and shishi programs are properly installed at your site,
the command
info shishi
should give you access to the complete manual.
shishi 1.0.1 shishi_aes_cts(3)