Since you'd need to store the password in cleartext (if this script is even possible), it's better just to remove the password that is probably in your ssl key than to leave a password in clear text. Back up encrypted.key
Then point to the unencrypted.key, or move it to encrypted.key (or what is appropriate to your installation). This will effectively make it so you don't have to put in the password on launch, which is what you want anyway. Protecting a key, then putting the password in the script to launch it is a bit backwards anyway.
Is the goal that you don't want to actually type it each time?
Hi,
I want to append password into /etc/shadow file using a shell script.
My below script does add the users to both /etc/passwd and /etc/shadow but how can I add the hordcoded passwords to /etc/shadow file can some one help me ?
# To add the groups into /etc/group file
for a_user... (5 Replies)
Hi, I am a nbee to Unix, I have used following script to check my tomcat is running or not and restart if it down. but actually it restart my tomcat each time running even my tomcat still running fine:
Script that can run a check and perform an action if the check fails
... (1 Reply)
Hi
I have the following issue
i am going to ask from the user the password
The password can have $ anywhere that is first last or in between but i have to append \ before the $ sign in the password can anyone please help
For example
o/p in the console will be like the... (3 Replies)
Hello forum,
I need help with a script for displaying the number of instances/times a particular line appears in a tab-delimited file and append that number to the end of the line.
Example text file:
aaa bbb ccc ddd
ggg hhh kkk nnn
aaa bbb ccc ddd
aaa bbb ccc ddd
ppp qqq nnn sss
ggg... (1 Reply)
Hi
When I do on console a stop, the script prompts for password
> stop_idm_suite.sh
Suite system password:Here experct of the shell script stop_idm_suite.sh
DoIt()
{
# prompt System password
echo ""
${BMC_JAVA_HOME}/java -Didm.suite.home=${BMC_IDM_SUITE_HOME} -classpath... (1 Reply)
Hi,
I need a script to kill the process Ids for the user ABC.
I prepared the following script after that while logging with user therough script i am not sure how to pass the user name and password.Can ou modify the script and help me out.
#!/bin/bash
for filesize in $(ls -ltr | grep... (4 Replies)
Hi,
After running 'nessus' tool to find the Vulnerability in server
OS - RHEL 5
we got "
Web Server Allows Password Auto-Completion (PCI-DSS variant)"
link for description provided by tools - report
Nessus Plugins | Tenable Network Security
I have checked - Their is only... (1 Reply)
I have a shell script which sqoops data from one place to hive and it does in 2 groups list. If one group is completed it waits for the second to get completed then goto to orc load, but it it fails it kills the other groups and sends a fail email. What I was looking for is if 1 group fails, it... (1 Reply)
Discussion started by: Kunalcurious
1 Replies
LEARN ABOUT BSD
encrypt
CRYPT(3) Library Functions Manual CRYPT(3)NAME
crypt, setkey, encrypt - DES encryption
SYNOPSIS
char *crypt(key, salt)
char *key, *salt;
setkey(key)
char *key;
encrypt(block, edflag)
char *block;
DESCRIPTION
Crypt is the password encryption routine. It is based on the NBS Data Encryption Standard, with variations intended (among other things)
to frustrate use of hardware implementations of the DES for key search.
The first argument to crypt is normally a user's typed password. The second is a 2-character string chosen from the set [a-zA-Z0-9./].
The salt string is used to perturb the DES algorithm in one of 4096 different ways, after which the password is used as the key to encrypt
repeatedly a constant string. The returned value points to the encrypted password, in the same alphabet as the salt. The first two char-
acters are the salt itself.
The other entries provide (rather primitive) access to the actual DES algorithm. The argument of setkey is a character array of length 64
containing only the characters with numerical value 0 and 1. If this string is divided into groups of 8, the low-order bit in each group
is ignored, leading to a 56-bit key which is set into the machine.
The argument to the encrypt entry is likewise a character array of length 64 containing 0's and 1's. The argument array is modified in
place to a similar array representing the bits of the argument after having been subjected to the DES algorithm using the key set by
setkey. The edflag flag is ignored; the argument can only be encrypted.
SEE ALSO passwd(1), passwd(5), login(1), getpass(3)BUGS
The return value points to static data whose content is overwritten by each call.
7th Edition August 12, 1986 CRYPT(3)