Sponsored Content
Top Forums Shell Programming and Scripting Gpg (GnuPG) encryption and decryption Post 303011599 by frank_rizzo on Saturday 20th of January 2018 11:28:26 AM
Old 01-20-2018
The passphrase is required because you're using the sign option which signs the file with your key.
 

10 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

File Encryption and Decryption in UNIX.

Hello guys ! I have used "crypt <first> second" command to encrypt "first" to "second" file. i have assign a key for that of course. Now when i try to look content of "seocnd" file through "cat second" command, the file is encrypted and cannot be read which is according to plan. But when... (3 Replies)
Discussion started by: abidmalik
3 Replies

2. Shell Programming and Scripting

GnuPG (gpg command)

I've been blessed with the task of writing functions that will be used to encrypt / decrypt data files using the Gnupg (gpg command) software on our Solaris 9. This was just installed last friday and I've got no documentation other than what I've found on the web. I was successful in writing... (4 Replies)
Discussion started by: BCarlson
4 Replies

3. Solaris

PGP encryption/decryption solaris 9

Hi Someone is going to send me a file that they have encrypted by PGP encryption on windows pc to my solaris 9 server. They will give me the pgp key to decrypt the file. How can I do this on solaris 9 Is there a tool installed by default to decrypt or do I need to install something to... (0 Replies)
Discussion started by: frustrated1
0 Replies

4. Solaris

Public keys for GPG Encryption

HI, I'm trying to encrypt a file and i'll FTP it to a external server.When i encrypt it using the command gpg -e -r 'recipient name' <filename> its asking me for public keys.Is there a way to encrypt without having to give the public keys? or if i need to give public keys i... (1 Reply)
Discussion started by: James777
1 Replies

5. UNIX for Dummies Questions & Answers

Identify a file for encryption or decryption

Dear Members, Can we find if a particular file is encrypted or decrypted. I need a command by which i should be able to identify if a file is encrypted or decrypted. How can we do this? (1 Reply)
Discussion started by: sandeep_1105
1 Replies

6. Shell Programming and Scripting

Need help on File Encryption using gpg

Folks, Is there anyone to help on GPG file encryptions here. I got a public key from third party. I imported the key in server. I want to encrypt the public key. But without being signed , the key cannot be encrypted. When I try to sign the key using lsign command, I am getting the below... (1 Reply)
Discussion started by: dinesh1985
1 Replies

7. Solaris

GPG encryption utility in Solaris 10

Hi All, I am working on Solaris 10 OS on X4170M2 server. I have some .gpg encrypted files and i want to decrypt them but i dont know how to install the binary of gpg. Here is the binary in system : root@ecmstest # ls -larth total 1273904 -rw-r--r-- 1 root root 3.5M Oct 14 ... (1 Reply)
Discussion started by: Deepa Jain
1 Replies

8. Shell Programming and Scripting

String encryption and decryption

Hello All, There are so many questions on this and I didn't find any concluded answer. I want to encrypt a string in the script, actually this is a password. I tried using openssl (I am a newbie to openssl), but it is generating a long one which we can't remember. I want to encrypt the... (5 Replies)
Discussion started by: karumudi7
5 Replies

9. Ubuntu

help regarding encryption and decryption of files on linux

we are to develope a project on linux whose aim is to automatically encrypt files after logoff and to decrypt them using password after log in this is to be made by chging source code of linux ........... can any one help me on this???? (1 Reply)
Discussion started by: vyom
1 Replies

10. UNIX for Advanced & Expert Users

GPG encryption error ...

Hi. I'm hitting issues using gpg to encrypt a text file on Linux. gpg -c --passphrase 123 --cipher-algo AES256 test gpg: cancelled by user gpg: error creating passphrase: Operation cancelled gpg: symmetric encryption of `test' failed: Operation cancelled In this case the file test just... (3 Replies)
Discussion started by: user052009
3 Replies
TWADMIN(8)						      System Manager's Manual							TWADMIN(8)

NAME
twadmin - Tripwire administrative and utility tool SYNOPSIS
twadmin { -m F | --create-cfgfile } options... configfile.txt twadmin { -m f | --print-cfgfile } [ options... ] twadmin { -m P | --create-polfile } [ options... ] policyfile.txt twadmin { -m p | --print-polfile } [ options... ] twadmin { -m R | --remove-encryption } [ options... ] file1 [ file2... ] twadmin { -m E | --encrypt } [ options... ] file1 [ file2... ] twadmin { -m e | --examine } [ options... ] file1 [ file2... ] twadmin { -m G | --generate-keys } options... DESCRIPTION
The twadmin utility is used to perform certain administrative functions related to Tripwire files and configuration options. Specifically, twadmin allows encoding, decoding, signing, and verification of Tripwire files, and provides a means to generate and change local and site keys. Creating a configuration file (--create-cfgfile) This command mode designates an existing text file as the new configuration file for Tripwire. The plain text configuration file must be specified on the command line. Using the site key, the new configuration file is encoded and saved. Printing a configuration file (--print-cfgfile) This command mode prints the specified encoded and signed configuration file in clear-text form to standard output. Replacing a policy file (--create-polfile) This command mode designates an existing text file as the new policy file for Tripwire. The plain text policy file must be specified on the command line. Using the site key, the new policy file is encoded and saved. Printing a policy file (--print-polfile) This command mode prints the specified encoded and signed policy file in clear-text form to standard output. Removing encryption from a file (--remove-encryption) This command mode allows the user to remove signing from signed configuration, policy, database, or report files. Multiple files may be specified on the command line. The user will need to enter the appropriate local or site keyfile, or both if a combination of files is to be verified. Even with the cryptographic signing removed, these files will be in a binary encoded (non-human-readable) form. Encrypting a file (--encrypt) This command mode allows the user to sign configuration, policy, database files, or reports. Multiple files may be specified on the com- mand line. The files will be signed using either the site or local key, as appropriate for the type of file. To automate the process, the passphrase for the key files can be included on the command line. Examining the signing status of a file (--examine) This command allows the user to examine the listed files and print a report of their signing status. This report displays the filename, file type, whether or not a file is signed, and what key (if any) is used to sign it. Generating keys (--generate-keys) This command mode generates site and/or local key files with names specified by the user. OPTIONS
Creating a configuration file: -m F --create-cfgfile -v --verbose -s --silent, --quiet -c cfgfile --cfgfile cfgfile -S sitekey --site-keyfile sitekey -Q passphrase --site-passphrase passphrase -e --no-encryption configfile.txt -m F, --create-cfgfile Mode selector. -v, --verbose Verbose output mode. Mutually exclusive with (-s). -s, --silent, --quiet Silent output mode. Mutually exclusive with (-v). -c cfgfile, --cfgfile cfgfile Specify the destination of the encoded (and optionally signed) configuration file. -S sitekey, --site-keyfile sitekey Use the specified site key file to encode and sign the new configuration file. Exactly one of (-S) or (-e) must be specified. -Q passphrase, --site-passphrase passphrase Specifies passphrase to be used with site key for configuration file encoding and signing. Valid only in conjunction with (-S). -e, --no-encryption Do not sign the configuration file being stored. The configuration file will still be compressed, and will not be human-readable. Mutually exclusive with (-Q) and (-S). configfile.txt Specifies the text configuration file that will become the new configuration file. __________________________________________________________________________________________________________________________________________________ Printing a configuration file: -m f --print-cfgfile -v --verbose -s --silent, --quiet -c cfgfile --cfgfile cfgfile -m f, --print-cfgfile Mode selector. -v, --verbose Verbose output mode. Mutually exclusive with (-s). -s, --silent, --quiet Silent output mode. Mutually exclusive with (-v). -c cfgfile, --cfgfile cfgfile Print the specified configuration file. __________________________________________________________________________________________________________________________________________________ Creating a policy file: -m P --create-polfile -v --verbose -s --silent, --quiet -c cfgfile --cfgfile cfgfile -p polfile --polfile polfile -S sitekey --site-keyfile sitekey -Q passphrase --site-passphrase passphrase -e --no-encryption policyfile.txt -m P, --create-polfile Mode selector. -v, --verbose Verbose output mode. Mutually exclusive with (-s). -s, --silent, --quiet Silent output mode. Mutually exclusive with (-v). -c cfgfile, --cfgfile cfgfile Use the specified configuration file. -p polfile, --polfile polfile Specify the destination of the encoded (and optionally signed) policy file. -S sitekey, --site-keyfile sitekey Use the specified site key file. Mutually exclusive with (-e). -Q passphrase, --site-passphrase passphrase Specifies passphrase to be used with site key for policy signing. Mutually exclusive with (-e). -e, --no-encryption Do not sign the policy file being stored. The policy file will still be compressed, and will not be human-readable. Mutually ex- clusive with (-Q) and (-S). policyfile.txt Specifies the text policy file that will become the new policy file. __________________________________________________________________________________________________________________________________________________ Printing a policy file: -m p --print-polfile -v --verbose -s --silent, --quiet -c cfgfile --cfgfile cfgfile -p polfile --polfile polfile -S sitekey --site-keyfile sitekey -m p, --print-polfile Mode selector. -v, --verbose Verbose output mode. Mutually exclusive with (-s). -s, --silent, --quiet Silent output mode. Mutually exclusive with (-v). -c cfgfile, --cfgfile cfgfile Use the specified configuration file. -p polfile, --polfile polfile Print the specified policy file. -S sitekey, --site-keyfile sitekey Use the specified site key file. __________________________________________________________________________________________________________________________________________________ Removing encryption from a file: -m R --remove-encryption -v --verbose -s --silent, --quiet -c cfgfile --cfgfile cfgfile -L localkey --local-keyfile localkey -S sitekey --site-keyfile sitekey -P passphrase --local-passphrase passphrase -Q passphrase --site-passphrase passphrase file1 [ file2... ] -m R, --remove-encryption Mode selector. -v, --verbose Verbose output mode. Mutually exclusive with (-s). -s, --silent, --quiet Silent output mode. Mutually exclusive with (-v). -c cfgfile, --cfgfile cfgfile Use the specified configuration file. -L localkey, --local-keyfile localkey Specify the local keyfile to use to verify database files and reports. -S sitekey, --site-keyfile sitekey Specify the site keyfile to use to verify configuration and policy files. -P passphrase, --local-passphrase passphrase Specify the passphrase to use when verifying with the old local keyfile. -Q passphrase, --site-passphrase passphrase Specify the passphrase to use when verifying with the old site keyfile. file1 [ file2... ] List of files from which signing is to be removed. __________________________________________________________________________________________________________________________________________________ Encrypting a file: -m E --encrypt -v --verbose -s --silent, --quiet -c cfgfile --cfgfile cfgfile -L localkey --local-keyfile localkey -S sitekey --site-keyfile sitekey -P passphrase --local-passphrase passphrase -Q passphrase --site-passphrase passphrase file1 [ file2... ] -m E, --encrypt Mode selector. -v, --verbose Verbose output mode. Mutually exclusive with (-s). -s, --silent, --quiet Silent output mode. Mutually exclusive with (-v). -c cfgfile, --cfgfile cfgfile Use the specified configuration file. -L localkey, --local-keyfile localkey Specify the local keyfile to use to sign database files and reports. -S sitekey, --site-keyfile sitekey Specify the site keyfile to use to sign configuration and policy files. -P passphrase, --local-passphrase passphrase Specify the passphrase to use when signing with the local keyfile. -Q passphrase, --site-passphrase passphrase Specify the passphrase to use when signing with the site keyfile. file1 [ file2... ] List of files to sign using the new key(s). __________________________________________________________________________________________________________________________________________________ Examining the encryption status of a file: -m e --examine -v --verbose -s --silent, --quiet -c cfgfile --cfgfile cfgfile -L localkey --local-keyfile localkey -S sitekey --site-keyfile sitekey file1 [ file2... ] -m e, --examine Mode selector. -v, --verbose Verbose output mode. Mutually exclusive with (-s). -s, --silent, --quiet Silent output mode. Mutually exclusive with (-v). -c cfgfile, --cfgfile cfgfile Use the specified configuration file. -L localkey, --local-keyfile localkey Specifies the key to use as a local key. -S sitekey, --site-keyfile sitekey Specifies the key to use as a site key. file1 [ file2... ] List of files to examine. __________________________________________________________________________________________________________________________________________________ Generating keys: -m G --generate-keys -v --verbose -s --silent, --quiet -L localkey --local-keyfile localkey -S sitekey --site-keyfile sitekey -P passphrase --local-passphrase passphrase -Q passphrase --site-passphrase passphrase -m G, --generate-keys Mode selector. -v, --verbose Verbose output mode. Mutually exclusive with (-s). -s, --silent, --quiet Silent output mode. Mutually exclusive with (-v). -L localkey, --local-keyfile localkey Generate the local key into the specified file. At least one of (-L) or (-S) must be specified. -S sitekey, --site-keyfile sitekey Generate the site key into the specified file. At least one of (-S) or (-L) must be specified. -P passphrase, --local-passphrase passphrase Specify local passphrase to be used when generating the local key. -Q passphrase, --site-passphrase passphrase Specify site passphrase to be used when generating the site key. VERSION INFORMATION
This man page describes twadmin version 2.3.1. AUTHORS
Tripwire, Inc. COPYING PERMISSIONS
Permission is granted to make and distribute verbatim copies of this man page provided the copyright notice and this permission notice are preserved on all copies. Permission is granted to copy and distribute modified versions of this man page under the conditions for verbatim copying, provided that the entire resulting derived work is distributed under the terms of a permission notice identical to this one. Permission is granted to copy and distribute translations of this man page into another language, under the above conditions for modified versions, except that this permission notice may be stated in a translation approved by Tripwire, Inc. Copyright 2000 Tripwire, Inc. Tripwire is a registered trademark of Tripwire, Inc. in the United States and other countries. All rights re- served. SEE ALSO
twintro(8), tripwire(8), twprint(8), siggen(8), twconfig(4), twpolicy(4), twfiles(5) 1 July 2000 TWADMIN(8)
All times are GMT -4. The time now is 02:37 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy