Hi
Someone is going to send me a file that they have encrypted by PGP encryption on windows pc to my solaris 9 server.
They will give me the pgp key to decrypt the file.
How can I do this on solaris 9
Is there a tool installed by default to decrypt or do I need to install something to... (0 Replies)
HI,
I'm trying to encrypt a file and i'll FTP it to a external server.When i encrypt it using the command
gpg -e -r 'recipient name' <filename>
its asking me for public keys.Is there a way to encrypt without having to give the public keys?
or if i need to give public keys
i... (1 Reply)
is there patches enable passwords of greater than 8 characters with only md5 encryption (rather than the older crypt) for solaris 8.
I am migrating a number of solaris 8 domains to branded zones. (1 Reply)
Folks,
Is there anyone to help on GPG file encryptions here.
I got a public key from third party. I imported the key in server.
I want to encrypt the public key. But without being signed , the key cannot be encrypted.
When I try to sign the key using lsign command,
I am getting the below... (1 Reply)
Hi all,
I'm looking for secure file encryption tools that use MAC address as encryption key. FYI, I'm using Red Hat Enterprise Linux OS.
For example: when A wants to send file to B
A will encrypt the file with B's computer MAC/IP address as an encryption key
This file can only be decrypted... (2 Replies)
Hi. I'm hitting issues using gpg to encrypt a text file on Linux.
gpg -c --passphrase 123 --cipher-algo AES256 test
gpg: cancelled by user
gpg: error creating passphrase: Operation cancelled
gpg: symmetric encryption of `test' failed: Operation cancelled
In this case the file test just... (3 Replies)
Hi,
I did some NIS migration tests recently.
The target is to migrate the NIS server from Solaris 8 to Redhat Linux 6.5.
And, I found there are encryption issues while Linux NIS using MD5 hashing password for authentication whereas Solaris 8 clients using DES encryption.
It causes issues... (3 Replies)
Hi Friends,
There are some 7 years script in out linux server. I am trying to understand them since Linux Server changed(A).
Below line in one of the encrypting script. Here scenario is encrypting bank files in our (A) server and doing Secure Copy to Server (B).
GPG -v --batch --yes --armor... (1 Reply)
Discussion started by: johnsnow
1 Replies
LEARN ABOUT CENTOS
gpg-preset-passphrase
GPG-PRESET-PASSPHRASE(1) GNU Privacy Guard GPG-PRESET-PASSPHRASE(1)NAME
gpg-preset-passphrase - Put a passphrase into gpg-agent's cache
SYNOPSIS
gpg-preset-passphrase [options] [command] cache-id
DESCRIPTION
The gpg-preset-passphrase is a utility to seed the internal cache of a running gpg-agent with passphrases. It is mainly useful for unat-
tended machines, where the usual pinentry tool may not be used and the passphrases for the to be used keys are given at machine startup.
Passphrases set with this utility don't expire unless the --forget option is used to explicitly clear them from the cache --- or gpg-agent
is either restarted or reloaded (by sending a SIGHUP to it). It is necessary to allow this passphrase presetting by starting gpg-agent
with the --allow-preset-passphrase.
gpg-preset-passphrase is invoked this way:
gpg-preset-passphrase [options] [command] cacheid
cacheid is either a 40 character keygrip of hexadecimal characters identifying the key for which the passphrase should be set or cleared.
The keygrip is listed along with the key when running the command: gpgsm --dump-secret-keys. Alternatively an arbitrary string may be used
to identify a passphrase; it is suggested that such a string is prefixed with the name of the application (e.g foo:12346).
One of the following command options must be given:
--preset
Preset a passphrase. This is what you usually will use. gpg-preset-passphrase will then read the passphrase from stdin.
--forget
Flush the passphrase for the given cache ID from the cache.
The following additional options may be used:
-v
--verbose
Output additional information while running.
-P string
--passphrase string
Instead of reading the passphrase from stdin, use the supplied string as passphrase. Note that this makes the passphrase visible
for other users.
SEE ALSO gpg(1), gpgsm(1), gpg-agent(1), scdaemon(1)
The full documentation for this tool is maintained as a Texinfo manual. If GnuPG and the info program are properly installed at your site,
the command
info gnupg
should give you access to the complete manual including a menu structure and an index.
GnuPG 2.0.22 2014-06-10 GPG-PRESET-PASSPHRASE(1)