01-04-2015
To answer your question: pgp is installed. But it is not configured. Each user has to create key sets, for example. So if someone wants to encrypt data they cannot do it now.
10 More Discussions You Might Find Interesting
1. HP-UX
Hi,
I need to check whether webserver is installed in my UNIX box or not
Can some one please help me (command?)
Thanks (4 Replies)
Discussion started by: vivek_damodaran
4 Replies
2. Ubuntu
I need list of 3rd party softwares installed in a Unix server (eg: Fedora / RedHat). I know if they are system supported format (like rpm format for fedora/redhat, pkg format for debian/ubuntu etc) we can list them by system specific commands ($ rpm -qa). But how to list the softwares installed... (3 Replies)
Discussion started by: uday123
3 Replies
3. UNIX for Advanced & Expert Users
hey ,
Anyone knows command to find when Linux OS is installed?
Date and time? (2 Replies)
Discussion started by: crackthehit007
2 Replies
4. Solaris
Hi All
I want to confirm the installation of Sun Studio installation on my UNIX development server.
Please suggest how to get that.
Cheers,
Ankur (4 Replies)
Discussion started by: sharmaankur85
4 Replies
5. UNIX for Dummies Questions & Answers
I am using red hat linux server. I need to know what softwares installed on that server.
What command can i use to get this list?
Any help is highly appreciated. (2 Replies)
Discussion started by: govindts
2 Replies
6. Red Hat
Hello all
I installed apache in CentOS 5.5 ,after searching the web for tips on configuration
I did the fallowing stuff to unable connecting the http server from outside.
In /etc/httpd/conf/httpd.conf I changed the Listen value to 0.0.0.8011
Then checked with then check with: netstat -anp and I... (2 Replies)
Discussion started by: umen
2 Replies
7. Homework & Coursework Questions
Hi my name is Manju.
->I have configure the two way authentication on my linux server.
->Now I am able to apply two way authenticator on particuler user.
->Now I want to map this linux server to my AD server.
->Kindly tell me how to map AD(Active Directory) with this linux server.
... (2 Replies)
Discussion started by: manjusharma128
2 Replies
8. Solaris
I need to know information regarding the softwares/applications that are installed on my Solaris server and also its end of life or support information.
Can some one help me how to get these details please...
Thanks (3 Replies)
Discussion started by: ssk250
3 Replies
9. UNIX for Beginners Questions & Answers
I would like to use Xming to connect a server and managed to get it to work. I am now trying to get it to connect to a different server but i am not sure which X Window system is installed. I tried it through putty and i get the following error/warning:
/usr/java/jdk1.7.0_67/bin> jvisualvm... (5 Replies)
Discussion started by: ziggy25
5 Replies
10. UNIX for Beginners Questions & Answers
Hello everyone from Tenerife, Canary Islands.
How can i see in Debian or similar operating system the installed drivers or controllers ?
Best Regards
https://image.ibb.co/kC5C87/winkho2.gif (1 Reply)
Discussion started by: JohnFissburyn
1 Replies
LEARN ABOUT ULTRIX
setkey
crypt(3) Library Functions Manual crypt(3)
Name
crypt, crypt16, setkey, encrypt - DES encryption
Syntax
char *crypt(key, salt)
char *key, *salt;
char *crypt16(key, salt)
char *key, *salt;
void setkey(key)
char *key;
Description
The subroutine is the password encryption routine. It is based on the NBS Data Encryption Standard, with variations intended to frustrate
use of hardware implementations of the DES for key search.
The first argument to is normally a user's typed password. The second is a 2-character string chosen from the set [a-zA-Z0-9./]. The salt
string is used to perturb the DES algorithm in one of 4096 different ways, after which the password is used as the key to encrypt repeat-
edly a constant string. The returned value points to the encrypted password, in the same alphabet as the salt. The first two characters
are the salt itself.
The subroutine is identical to the function except that it will accept a password up to sixteen characters in length. It generates a longer
encrypted password for use with enhanced security features.
The other entries provide primitive access to the actual DES algorithm. The argument of is a character array of length 64 containing only
the characters with numerical value 0 and 1. If this string is divided into groups of 8, the low-order bit in each group is ignored, lead-
ing to a 56-bit key which is set into the machine.
The argument to the entry is likewise a character array of length 64 containing 0s and 1s. The argument array is modified in place to a
similar array representing the bits of the argument after having been subjected to the DES algorithm using the key set by If edflag is 0,
the argument is encrypted; if non-zero, it is decrypted.
Restrictions
The return values from and point to static data areas whose content is overwritten by each call.
Environment
Default Environment
In the default environment on systems that do not have the optional encryption software installed the function expects exactly one argu-
ment, the data to be encrypted. The edflag argument is not supplied and there is no way to decrypt data. If the optional encryption soft-
ware is installed the function behaves as it does in the POSIX environment. The syntax for the default environment follows:
void encrypt(block)
char *block;
POSIX Environment
In the POSIX environment the encrypt function always expects two arguments. The function will set errno to ENOSYS and return if edflag is
non-zero and the optional encryption software is not present. The syntax for the POSIX environment follows:
void encrypt(block, edflag)
char *block;
int edflag;
In all cases the function will set errno to ENOSYS and return if the optional encryption software is not present.
See Also
login(1), passwd(1), yppasswd(1yp), getpass(3), auth(5), passwd(5), passwd(5yp)
ULTRIX Security Guide for Users and Programmers
crypt(3)