Hi Everybody,
I have a script that telnet another system. For some reasons, this is should be done by "root", so the root password has been written explicitly in this script, which mean any body read this script will know the root password of the other system. I think the solution is to write... (6 Replies)
Help..
I need to decrypt a file that was encrypted using DES 56 Bit.
I have the encryption key and the block size used but no idea what utility to use..
I then need to encrypt the file using pgp and another key I have.. againt I dont know what utility to use.
I am running solaris 9 ....
... (0 Replies)
Dear Experts,
I am using one script name :volume.sh and its written in bash shell script.
I just want to encrypt the script so that any one else cannot see it.
please tell me the commands how to encrypt the script as well as to decrypt it.
Regards,
SHARY (9 Replies)
Dear All,
I need to decrypt with private key most of the time and this works for RSA. At times I need to decrypt with public key (data is encrypted with private key). This does not seem to work via VB.Net. Is there support for such an activity in Java on Linux or Windows ? Please advise.
... (3 Replies)
Hi, I want to encrypt and decrypt a string(database password) which will be used in my scripts.
encrypt the string while storing in a file and while using it in other scripts
it should decrypt.
i tried below method. As it can decrypt easily, it is not recommended.
encrypt=`perl -e 'print unpack... (5 Replies)
I have script for all oracle prod db. I have hard coded the username / password. I need a mechanism to encode and decode the username / password in a shell script.
Another challenge is I use the username and password in a Select command for oracle DB. How can call the decrypted... (2 Replies)
Hi All,
very good morning all.
I am trying to connect to informatica repository by using shell script.
I have written pmrep connect command in the script file. But i need to provide repository, domain ,username and password to connect. Username and password are hard coded in the script... (8 Replies)
Hello,
I have few files on unix which are payroll related and I need them to encrypt with password so others wouldn't see the data. I use ETL tool and would like to know the unix command that does encryption/decryption to use in the ETL.
Thank you,
Sri (3 Replies)
Discussion started by: eskay
3 Replies
LEARN ABOUT PLAN9
encrypt
ENCRYPT(2) System Calls Manual ENCRYPT(2)NAME
encrypt, decrypt, netcrypt - DES encryption
SYNOPSIS
#include <u.h>
#include <libc.h>
int encrypt(void *key, void *data, int len)
int decrypt(void *key, void *data, int len)
int netcrypt(void *key, void *data)
DESCRIPTION
Encrypt and decrypt perform DES encryption and decryption. Key is an array of DESKEYLEN (defined as 7 in <auth.h>) bytes containing the
encryption key. Data is an array of len bytes; it must be at least 8 bytes long. The bytes are encrypted or decrypted in place.
The DES algorithm encrypts an individual 8 byte block of data. Encrypt uses the following method to encrypt data longer than 8 bytes. The
first 8 bytes are encrypted as usual. The last byte of the encrypted result is prefixed to the next 7 unencrypted bytes to make the next 8
bytes to encrypt. This is repeated until fewer than 7 bytes remain unencrypted. Any remaining unencrypted bytes are encrypted with enough
of the preceding encrypted bytes to make a full 8 byte block. Decrypt uses the inverse algorithm.
Netcrypt performs the same encryption as a SecureNet Key. Data points to an ASCII string of decimal digits with numeric value between 0
and 10000. These digits are copied into an 8 byte buffer with trailing binary zero fill and encrypted as one DES block. The first four
bytes are each formatted as two digit ASCII hexadecimal numbers, and the string is copied into data.
SOURCE
/sys/src/libc/port
DIAGNOSTICS
These routines return 1 if the data was encrypted, and 0 if the encryption fails. Encrypt and decrypt fail if the data passed is less than
8 bytes long. Netcrypt can fail if it is passed invalid data.
SEE ALSO securenet(8)BUGS
The source is not included in public distributions. The implementation is broken in a way that makes it unsuitable for anything but
authentication.
ENCRYPT(2)