Sponsored Content
Top Forums Shell Programming and Scripting Need assistance with an IF statement to compare a list of SHA keys between two repositories. Post 303035771 by Chubler_XL on Sunday 2nd of June 2019 07:26:58 PM
Old 06-02-2019
Assuming you already have the two file locally (you will need to fetch FileA from the web server using something like wget).
Also that the SHA keys are a string of 64 hex digits (0-9 a-f) which are separated from other text in file by one or more white space characters.

You could collect the keys using grep like this:

Code:
$ grep -Eow '[0-9a-f]{64}' FileA > KeylistA
$ grep -Eow '[0-9a-f]{64}' FileB > KeylistB

Grep can then output any key(s) in KeylistA not in KeyListB like this.
Code:
$ grep -vf KeylistB KeylistA || echo "Files Match"

This User Gave Thanks to Chubler_XL For This Post:
 

10 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

Very urgent :- How to compare string using if statement

Hi How can i compare a string using if statement in a script? For eg: I have filename="abc.sh" if ;then { ....... ....... } fi but this doesnot work .. How will i execute this ?? Thanks in advance (1 Reply)
Discussion started by: jisha
1 Replies

2. Shell Programming and Scripting

AWK statement formatting assistance

I am writing a script that ssh's out to our various servers and extracts diskspace info to generate into a report. With the mix of servers linux/solairs 8-10/AIX the easiest way is to use df -k (though I much rather prefer df -h). I have pasted the relevant code: dfdata=`ssh -q -o... (1 Reply)
Discussion started by: rkruck
1 Replies

3. Shell Programming and Scripting

Compare files column to column based on keys

Here is my situation. I need to compare two tab separated files (diff is not useful since there could be known difference between files). I have found similar posts , but not fully matching.I was thinking of writing a shell script using cut and grep and while loop but after going thru posts it... (2 Replies)
Discussion started by: blackjack101
2 Replies

4. Shell Programming and Scripting

awk if statement to evaluate string and compare

I have the following simplified code that I am planning on putting into a larger shell script. I have been butchering it to try and make work amongst google searches and reading awk documentation. amixer sset Master toggle | awk '{ if ( /^ Front Left/ { print $7 } == // ) print "MUTED" }'I... (2 Replies)
Discussion started by: jelloir
2 Replies

5. Debian

Repositories in sources.list

I'm just interested to know how your sources.list look like. I got some repositories witch give some errors and I would like to clean it up. and when I do apt-get update I get few lines showing errors like 404 , this is how my list look like: # deb cdrom:/ squeeze main # deb cdrom:/... (0 Replies)
Discussion started by: zdorian
0 Replies

6. Linux

Convert MD5 password to SHA-512?

Hi, Is it possible to convert MD5 passwords to SHA-512? I'm about to migrate an old slackware server to Debian, then I noticed that they don't use same encryption method. I'm aware that I can change the encryption method in Debian to MD5, but as far as I understand SHA-512 is more secure,... (2 Replies)
Discussion started by: urandom
2 Replies

7. Shell Programming and Scripting

Compare strings with space in if statement

DEV> vi test_if_statement.sh "test_if_statement.sh" 9 lines, 205 characters proc_out="Normal completion" proc_out_comp="Normal completion" echo 'proc_out:'$proc_out echo 'proc_out_comp:'$proc_out_comp if then echo 'match' else echo 'no_match' fi ~ ~ ~ ~ ~ ~ ~ ~ ~ (4 Replies)
Discussion started by: cartrider
4 Replies

8. UNIX and Linux Applications

How to make ldappasswd use {SHA} instead of {SSHA} for users passwords in openldap?

Is it possible to use {SHA} with ldappasswd? I didn't find responsible option in manual page and doc (1 Reply)
Discussion started by: urello
1 Replies

9. AIX

SHA-256-Base 64 Encryption

Hello Guys, I was trying to have an SHA256 encryption which further be encrypted into base 64 using AIX unix command shasum -a 256. What I found in this is my output is different than a website: "online-convertcom" Actually conversion from website is exactly matching my requirements but... (4 Replies)
Discussion started by: Krunal Patel
4 Replies

10. UNIX for Beginners Questions & Answers

If statement to compare two strings

Hi, I am trying to do the following to see if "ip" is already present in a file. if ; then echo "hi" else echo "hello" fi I am seeing errors on the if statement. Can someone please correct the syntax for me? Thanks (2 Replies)
Discussion started by: waince
2 Replies
WA_KEYRING(1)							      WebAuth							     WA_KEYRING(1)

NAME
wa_keyring - WebAuth keyring manipulation tool SYNOPSIS
wa_keyring [--hv] -f file command [arg ...] wa_keyring -f keyring add valid-after wa_keyring -f keyring gc oldest-valid-after-to-keep wa_keyring -f keyring list wa_keyring -f keyring remove id DESCRIPTION
wa_keyring is a command line tool to manage WebAuth key ring files, which contain the private AES keys used by mod_webauth and mod_webkdc. It supports the following individual commands: add valid-after Adds a new key to the key ring. valid-after uses the format: nnnn[s|m|h|d|w] to indicate a time relative to the current time. The units for the time are specified by appending a single letter. That letter can be any of s, m, h, d, or w, which correspond to seconds, minutes, hours, days, and weeks respectively. For example: 10d is 10 days from the current time, and -60d is 60 days before the current time. gc oldest-valid-after-to-keep Garbage collects (removes) old keys on the key ring. Any keys with a valid-after date older then the specified time will be removed from the key ring. The format for oldest-valid-after-to-keep is the same as valid-after from the add command. Note that this means that times given to the gc command should generally be negative, to remove keys that have expired in the past. list Lists all the keys in the key ring. By default, a brief listing is used, but a verbose listing can be requested with the -v option. The following fields are present in a short listing: id The index/position of the key in the key ring. Created The date the key was created. Valid after The date at which the key becomes valid (in other words, the point at which the WebAuth server will start using it to encrypt and decrypt new data). Fingerprint The MD5 digest of the key data. Used to compare keys in two key rings. The following fields are present in the long listing: Key-Id The index/position of the key in the key ring. Created The date the key was created. Valid-After The date at which the key becomes valid (in other words, the point at which the WebAuth server will start using it to encrypt and decrypt new data). Key-Type The type of key. Currently, AES is the only supported key type. Key-Size Length in bytes of the key. Fingerprint The MD5 digest of the key data. Used to compare keys in two key rings. remove id Remove the key with ID id from the key ring. EXAMPLES
Add a key to the keyring valid as of the current time: wa_keyring -f keyring add 0d Add a key to the keyring that will be valid three days from now: wa_keyring -f keyring add 3d Remove keys from the key ring that became invalid more than 90 days ago: wa_keyring -f keyring gc -90d Remove the first key in the keyring. wa_keyring -f keyring remove 0 Display a verbose listing of all of the keys in the key ring: wa_keyring -f keyring -v list Note that a WebAuth server will normally manage its keyring file by itself, and wa_keyring is normally only used for debugging purposes. However, if you are setting up a load-balanced pool of servers that need to all share the same keys, turn off automatic keyring handling by putting the line: WebAuthKeyringAutoUpdate off to your Apache configuration, running a script periodically from cron on one server that does something like: wa_keyring -f keyring gc -90d wa_keyring -f keyring add 2d and then copying (in a secure manner!) the new keyring file to all of the other servers. AUTHOR
Roland Schemers <schemers@stanford.edu> 4.1.1 2012-04-25 WA_KEYRING(1)
All times are GMT -4. The time now is 08:49 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy