05-23-2010
you have to decrypt the file ?! then only you have to add.
9 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
NEED expertise help for this topic!!!
Question 1: Is encryption possible for the shell scriping programing? shadow the scriping file, do think is impossible...
Question2: built a simple program with the simplicity function that allow user change settings by enter corret name and... (3 Replies)
Discussion started by: trynew
3 Replies
2. Shell Programming and Scripting
I am encrypting and ftping files with kshell from aix and I have a problem with the job not waiting long enough before it ftps the files. when I run the script it sends the files over and each time the file has a different length and cannot be decrypted but if I encrypt and the manually send the... (3 Replies)
Discussion started by: tdavis0418
3 Replies
3. UNIX for Dummies Questions & Answers
My dilemma,
I need to send, deemed confidential, information via e-mail (SMTP). This information is sitting as a file on AIX. Typically I can send this data as a e-mail attachment via what we term a "mail filter" using telnet. I now would like to somehow encrypt the data and send it to a e-mail... (1 Reply)
Discussion started by: hugow
1 Replies
4. Programming
Hi,
Any body can please point me to source code for implementing AES encryption in CTR mode i.e RFC 3686 (AES-CTR).I did googling but no good results. (6 Replies)
Discussion started by: Raom
6 Replies
5. UNIX for Dummies Questions & Answers
if I change my password on two different servers, using the same string but the encrypted password in /etc/passwd look different.
If I copy an entry from one /etc/password to the other server. I can still log in to both servers using the same password. Only now both /etc/passwd entries are... (2 Replies)
Discussion started by: C0ppert0p
2 Replies
6. Cybersecurity
Hi all,
I'm looking for secure file encryption tools that use MAC address as encryption key. FYI, I'm using Red Hat Enterprise Linux OS.
For example: when A wants to send file to B
A will encrypt the file with B's computer MAC/IP address as an encryption key
This file can only be decrypted... (2 Replies)
Discussion started by: sergionicosta
2 Replies
7. Shell Programming and Scripting
Using awk or sed command how can i encrypt the characters for a particular column.For every character it should replace the third charter of alphabets.Example replace "A" with "C" and "B" with "D"..like this it should replace for all characters in particular column.
Using below command i am able... (3 Replies)
Discussion started by: katakamvivek
3 Replies
8. UNIX for Beginners Questions & Answers
Hi, we have a brand new Centos 6.8 build, and after some discussion it seems that there is some interest in securing the entire system using whole disk encryption.
What is/are the best option/s, and is this something that can be done after Centos is installed (like for example PGP WDE in Windows... (2 Replies)
Discussion started by: xdawg
2 Replies
9. AIX
Hi guys:
I've been trying to find information about how to encrypt a backup to tape (I'm using a couple of simple commands: tar, find | backup), I didn't find a real example of how to do that, just a couple of white papers and information about the methods that use the backup,... (5 Replies)
Discussion started by: AixExplorer
5 Replies
LEARN ABOUT DEBIAN
shishi_3des
shishi_3des(3) shishi shishi_3des(3)
NAME
shishi_3des - API function
SYNOPSIS
#include <shishi.h>
int shishi_3des(Shishi * handle, int decryptp, const char key[8], const char iv[8], char * ivout[8], const char * in, size_t inlen, char **
out);
ARGUMENTS
Shishi * handle
shishi handle as allocated by shishi_init().
int decryptp
0 to indicate encryption, non-0 to indicate decryption.
const char key[8]
const char iv[8]
char * ivout[8]
const char * in
input character array of data to encrypt/decrypt.
size_t inlen
length of input character array of data to encrypt/decrypt.
char ** out newly allocated character array with encrypted/decrypted data.
DESCRIPTION
Encrypt or decrypt data (depending on decryptp) using 3DES in CBC mode. The out buffer must be deallocated by the caller.
RETURN VALUE
Returns SHISHI_OK iff successful.
REPORTING BUGS
Report bugs to <bug-shishi@gnu.org>.
COPYRIGHT
Copyright (C) 2002-2010 Simon Josefsson.
Copying and distribution of this file, with or without modification, are permitted in any medium without royalty provided the copyright
notice and this notice are preserved.
SEE ALSO
The full documentation for shishi is maintained as a Texinfo manual. If the info and shishi programs are properly installed at your site,
the command
info shishi
should give you access to the complete manual.
shishi 1.0.1 shishi_3des(3)