Sponsored Content
Top Forums UNIX for Advanced & Expert Users encrypting file system using AES 256 bit Post 89610 by jimmynath on Monday 14th of November 2005 03:26:06 PM
Old 11-14-2005
encrypting file system using AES 256 bit

Experts,

I am trying to encrypt my filesystem using the AES 256 bit type of encryption. I am using FreeBSD 5.4 and need to encrypt one of the mounted points. Does anybody have any good idea of how to do it?

Is there any documentation about encrypting the disk partition as this method is more safer I guess. Please advice?

I heard lots of ways to generate passpharse. Does anybody have any good idea.


Thanks in advance

Regards,

Jim
 

8 More Discussions You Might Find Interesting

1. Programming

Writing both 8-bit and 16-bit data to a file

I'm writing both 8-bit and wide 16-bit data to the screen and an output file. I have no problems with writing out to the screen - for example: cout<<8-bit data; wcout<<16-bit data; Similarly, I have used ofstream for 8-bit and wofstream for 16-bit, for example: ofstream out; wofstream wout;... (1 Reply)
Discussion started by: Breen
1 Replies

2. UNIX for Dummies Questions & Answers

unix a 32-bit operating system?

heyfrenz i just need a proper explanation of why is unix a 32-bit operating system??....a proper answer with proper explanation.... (6 Replies)
Discussion started by: silverrock7
6 Replies

3. Linux

Operating system Bit verison

How to check the Linux operating System bit version i.e if the operating system is 32-bit verison or 64-bit verison? There is a file which gives this information, i think it is in /usr/bin or /usr/sbin. I am not sure about this? This Might be a silly question, but it is important. ;) (7 Replies)
Discussion started by: sasiharshav
7 Replies

4. Homework & Coursework Questions

Four-Level multi-paging on x86 system with 64 bit addressing

1. The problem statement, all variables and given/known data: Hi all, I've got a huuuuuuge problem with understanding this new concept of multi-paging. I really tried to research but i could not find anything significant. I've been trying to understand this for 4 days and i cannot. The question... (0 Replies)
Discussion started by: snowboarder
0 Replies

5. Red Hat

How to remove 32/64 bit RPM's from your system

Hi, I have a 64-bit RHEL 5.5. In order to make a particular product work I want to uninstall some rpms which is specific to 64 bit. Wondering if anyone has a way how to remove the 64-bit rpm without disturbing the i386 rpms. What I find when I googled is all are removing forcefully, but... (2 Replies)
Discussion started by: dbashyam
2 Replies

6. Shell Programming and Scripting

Shell Script for encrypting/decrypting text file

Hello, I am a newbie in Shell scripting. At the moment, I have a program written in C++ which gives an output file in text format. I would like to write a shell program which can take that output file and encrypt it and later if needed I want to decrypt it. Could someone please help or... (3 Replies)
Discussion started by: Tanin
3 Replies

7. Cybersecurity

Is ccrypt AES 256 bit crypto secure enough?

Toucan software uses 256bit AES encryption using ccrypt (https://en.wikipedia.org/wiki/Ccrypt) i want to ask if its secure to use this ccrypt encryption for storing .TXT file with my passwords on cloud storage like Google Drive? (7 Replies)
Discussion started by: postcd
7 Replies

8. Programming

Publish and Subscribe to AES-256 Encrypted MQTT Messages to Node-RED from PHP Scripts

Various Node-Red crypto modules do not work with PHP, so to send an encrypted message from a PHP script (in this case from a Ubuntu server) to Node-RED we need our own code. After a few hours of searching, testing various libs, more testing and debugging, I got this PHP to Node-RED code... (0 Replies)
Discussion started by: Neo
0 Replies
shishi_aes_cts(3)						      shishi							 shishi_aes_cts(3)

NAME
shishi_aes_cts - API function SYNOPSIS
#include <shishi.h> int shishi_aes_cts(Shishi * handle, int decryptp, const char * key, size_t keylen, const char iv[16], char * ivout[16], const char * in, size_t inlen, char ** out); ARGUMENTS
Shishi * handle shishi handle as allocated by shishi_init(). int decryptp 0 to indicate encryption, non-0 to indicate decryption. const char * key input character array with key to use. size_t keylen length of input character array with key to use. const char iv[16] char * ivout[16] const char * in input character array of data to encrypt/decrypt. size_t inlen length of input character array of data to encrypt/decrypt. char ** out newly allocated character array with encrypted/decrypted data. DESCRIPTION
Encrypt or decrypt data (depending on decryptp) using AES in CBC-CTS mode. The length of the key, keylen, decide if AES 128 or AES 256 should be used. The out buffer must be deallocated by the caller. RETURN VALUE
Returns SHISHI_OK iff successful. REPORTING BUGS
Report bugs to <bug-shishi@gnu.org>. COPYRIGHT
Copyright (C) 2002-2010 Simon Josefsson. Copying and distribution of this file, with or without modification, are permitted in any medium without royalty provided the copyright notice and this notice are preserved. SEE ALSO
The full documentation for shishi is maintained as a Texinfo manual. If the info and shishi programs are properly installed at your site, the command info shishi should give you access to the complete manual. shishi 1.0.1 shishi_aes_cts(3)
All times are GMT -4. The time now is 07:23 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy