08-07-2010
Thank you so much, it works perfectly now. I was surfing in internet and thought the problem was > /dev/tty, but it's not, the problem was the []. Thanks again. I'm using the ok=false to set a loop, this small example is inside a greater loop.
9 More Discussions You Might Find Interesting
1. Solaris
Hi, Anyone can help
My solaris 8 system has the following
/dev/null , /dev/tty and /dev/console
All permission are lrwxrwxrwx
Can this be change to a non-world write ??
any impact ?? (12 Replies)
Discussion started by: civic2005
12 Replies
2. Programming
hello all,
Being root, I would like to log user activity (also multiple root activity), i don't really like
history file based logging, lets assume that users have access to their .profile.
I would like to write a monitoring daemon in C that would capture /dev/ttys,
so I need to do a... (0 Replies)
Discussion started by: wayward
0 Replies
3. Linux
I'm hoping someone can help me out here.
I'm having a problem on my Red Hat Enterprise 5 Server where my tty devices "tty" are being set to read only permissions.
I need them to be set to 777 in order to write to the serial printers through a custome application.
I have gone through many... (2 Replies)
Discussion started by: Netwrkengeer
2 Replies
4. OS X (Apple)
Hi all,
we are just confused about a strange problem on one server in production (XServer, running OSXS 10.5.6). It works normal for month. Since two day everthing seems to be fine also with one exception.
When we connect trough ssh we won't get a tty session. For testing purposes, we enabled... (2 Replies)
Discussion started by: Frank.Knobloch
2 Replies
5. Programming
Since the existence of /dev/tty is not guaranteed, what happens when an attempt is made to open /dev/tty and there's no controlling terminal?
Will it fail, or open /dev/null instead? Or do something else?
So is checking for NULL in the code below a safe way of checking whether opening... (2 Replies)
Discussion started by: gencon
2 Replies
6. Programming
Hello everybody:
I have a child process which reads a password from /dev/tty, as far as I know file descriptors for the child process can be seen by using lsof, so I want to connect to such device in order to send the password through a pipe, how could I do that? (2 Replies)
Discussion started by: edgarvm
2 Replies
7. UNIX for Dummies Questions & Answers
what can I use to find the last modified time of a /dev/tty ? (4 Replies)
Discussion started by: l flipboi l
4 Replies
8. UNIX for Dummies Questions & Answers
hi,
From the below script:
##########################################pwd_auth.sh########################################################################################
#Author: Pandeeswaran Bhoopathy
#Written on:26th Jan 2012 2:00PM
#This script describes the feature of stty and illustrates... (3 Replies)
Discussion started by: pandeesh
3 Replies
9. Shell Programming and Scripting
Suppose another person wrote the following one-line shell script:
echo $RANDOM > /dev/tty
QUESTION #1: How can the random number, which is output to the terminal by this script, be captured in a variable?
QUESTION #2: How can this be done in a cron job?
Specific code, whether in ksh or... (1 Reply)
Discussion started by: Paul R
1 Replies
LEARN ABOUT REDHAT
losetup
LOSETUP(8) MAINTENANCE COMMANDS LOSETUP(8)
NAME
losetup - set up and control loop devices
SYNOPSIS
losetup [ -e encryption ] [ -o offset ] loop_device file
losetup [ -d ] loop_device
DESCRIPTION
losetup is used to associate loop devices with regular files or block devices, to detach loop devices and to query the status of a loop
device. If only the loop_device argument is given, the status of the corresponding loop device is shown.
OPTIONS
-d detach the file or device associated with the specified loop device.
-e encryption
enable data encryption. The following keywords are recognized:
NONE use no encryption (default).
XOR use a simple XOR encryption.
DES use DES encryption. DES encryption is only available if the optional DES package has been added to the kernel. DES encryption
uses an additional start value that is used to protect passwords against dictionary attacks.
-o offset
the data start is moved offset bytes into the specified file or device.
RETURN VALUE
losetup returns 0 on success, nonzero on failure. When losetup displays the status of a loop device, it returns 1 if the device is not con-
figured and 2 if an error occurred which prevented losetup from determining the status of the device.
FILES
/dev/loop0,/dev/loop1,... loop devices (major=7)
EXAMPLE
If you are using the loadable module you must have the module loaded first with the command
# insmod loop.o
The following commands can be used as an example of using the loop device.
dd if=/dev/zero of=/file bs=1k count=100
losetup -e des /dev/loop0 /file
Password:
Init (up to 16 hex digits):
mkfs -t ext2 /dev/loop0 100
mount -t ext2 /dev/loop0 /mnt
...
umount /dev/loop0
losetup -d /dev/loop0
If you are using the loadable module you may remove the module with the command
# rmmod loop
RESTRICTION
DES encryption is painfully slow. On the other hand, XOR is terribly weak.
AUTHORS
Original version: Theodore Ts'o <tytso@athena.mit.edu>
Original DES by: Eric Young <eay@psych.psy.uq.oz.au>
Linux Nov 24 1993 LOSETUP(8)