11-08-2013
I don't care what kind of snippet this is, RudiC is correct. This snippet can't work (even if the variables are defined to reasonable values). You have two invocations of awk with no input specified. Presumably the 1st one will gobble up all of the data remaining in $iname/url.txt after the read in the while loop grabbed the 1st line. Then the 2nd awk will immediately hit end-of-file.
You came here asking for help.
You insulted the person who pointed out that the data you supplied was incomplete (thereby making analysis difficult).
This is a great way to discourage readers in this forum who might consider trying to help solve your problem from posting any other responses.
Last edited by Don Cragun; 11-08-2013 at 02:50 PM..
Reason: Fix typo
9 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Hi,
how can one find that which encryption algorithm the system is using for keeping the user password in the /etc/passwd or /etc/shadow file.
Is it
1: Hashing ( which considers only first 5 letters of password)
2: MD5 (Which allows arbitry length passwords)
Thanks,
~amit (0 Replies)
Discussion started by: amit4g
0 Replies
2. Shell Programming and Scripting
So I have two files that I want to put together via hashes and am having a terrible time with syntax. For example:
File1
A apple
B banana
C citrusFile2
A red
B yellow
C orangeWhat I want to enter on the command line is:
program.pl File1 File2And have the result... (11 Replies)
Discussion started by: silkiechicken
11 Replies
3. AIX
hello Friends ,
How can i identify the hashing algo used by shadow file in aix box >???
Thanks
AVKlinux (1 Reply)
Discussion started by: avklinux
1 Replies
4. UNIX for Dummies Questions & Answers
What command should I use to analyze file hashing of fixed flat files.
How much work does it take for multiple flat files. (3 Replies)
Discussion started by: jbjoat
3 Replies
5. UNIX for Dummies Questions & Answers
I am looking for a utility that does file hashing in unix. ...Please let me know of any good easy to use utility (3 Replies)
Discussion started by: jbjoat
3 Replies
6. Programming
Hi,
I'm looking for linear hashing implementation in C language. Please help.
PS: I have implement this on Ubuntu 10.04 Linux on 64 bit machine. (1 Reply)
Discussion started by: sajjar
1 Replies
7. UNIX for Advanced & Expert Users
I'm collecting some info on the password hashing algorithms in use on various Unix systems. So far I have:
no $ legacy unix crypt
$1$ MD5
$2$ Blowfish on BSD
$2a$ alternate Blowfish on BSD
$md5$ Sun's alternate MD5
$3$ a Microsoft hash
$4$ not used?
$5$ RedHat proposed Sha-256... (2 Replies)
Discussion started by: Perderabo
2 Replies
8. Solaris
Hello,
I'm having an issue with my password hashing. In /etc/shadow all the passwords hashes start with $1$. The security people want me to change it so the password hash starts with $5$ or $6$. So this is what I did to fix this.
I changed CRYPT_DEFAULT for 1 to 6
CRYPT_DEFAULT=6When I create a... (0 Replies)
Discussion started by: bitlord
0 Replies
9. Solaris
Hi,
Our security audit person generated a report for Solaris-10 servers and mentioned this suggestion - "All passwords should be hashed using bcrypt. Solaris 10 supports this blowfish-based hash algorithm with the identifier 2a. To verify this, ensure the password hashes start with $2a$.... (2 Replies)
Discussion started by: solaris_1977
2 Replies
LEARN ABOUT ULTRIX
setjmp
setjmp(3) Library Functions Manual setjmp(3)
Name
setjmp, longjmp - non-local goto
Syntax
#include <setjmp.h>
int setjmp (env)
jmp_buf env;
void longjmp (env, val)
jmp_buf env;
int val;
Description
The and functions help deal with errors and interrupts encountered in a low-level subroutine of a program.
The function saves its stack environment in env (whose type, jmp_buf, is defined in the <setjmp.h> header file) for later use by It returns
the value 0.
The function restores the environment saved by the last call of with the corresponding env argument. After finishes, program execution
continues as if the corresponding call of (which must not itself have returned in the interim) had just returned the value val. The func-
tion cannot cause to return the value 0. If is invoked with a second argument of 0, returns 1. At the time of the second return from all
accessible data have values as of the time is called. However, global variables have the expected values. For example, those as of the
time of the
Examples
#include <setjmp.h>
jmp_buf env;
int i = 0;
main ()
{
void exit();
if(setjmp(env) != 0) {
(void) printf("value of i on 2nd return from setjmp: %d0, i);
exit(0);
}
(void) printf("value of i on 1st return from setjmp: %d0, i);
i = 1;
g();
/*NOTREACHED*/
}
g()
{
longjmp(env, 1);
/*NOTREACHED*/
}
If the a.out resulting from this C language code is run, the output is as follows:
value of i on 1st return from setjmp:0
value of i on 2nd return from setjmp:1
Unexpected behavior occurs if is called without a previous call to or when the last such call was in a function which has since returned.
Restrictions
The values of the registers on the second return from are register values at the time of the first call to not those of the Thus, variables
in a given function can produce unexpected results in the presence of depending on whether they are register or stack variables.
See Also
signal(2).
RISC setjmp(3)