10 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
Greetings fellow scripters.
I find myself editing multiple files, sometimes with the same bits of information. My bash script, a changelog, and a plist file (OS X). Once I realized this, I thought why not script part of this process (and so it begins). In any case, I've solved several of the... (1 Reply)
Discussion started by: reid
1 Replies
2. Shell Programming and Scripting
hi,
I am using PERL one liner for oracle database connection as :
$PERL -e "use DBI; DBI->connect(qw(DBI:Oracle:SID user passwd));"
is there a way to append select statement to this connection ? i.e. DB connection and select stmt in one line ?
how to do sysdba connection using one lines... (1 Reply)
Discussion started by: talashil
1 Replies
3. Shell Programming and Scripting
Hi all,
I need a Perl one liner which prints a newline into a .txt file, only where the line starts with "/mediawiki-1.19.0/". It should add the newline to the line before.
My problem is, when I try to realize this (with my little knowledge :rolleyes: ) i come to the point where the // are... (4 Replies)
Discussion started by: Mr.Smith
4 Replies
4. UNIX for Dummies Questions & Answers
Not quite a unix question but problem in a perl command. Taking a chance if someone knows about the error
cat 1
a b c d
perl -p -e 's/a/b/g' 1
b b c d
What is the problem here??
perl -p -i -e 's/a/b/g' 1
Can't remove 1: Text file busy, skipping file. (2 Replies)
Discussion started by: analyst
2 Replies
5. Shell Programming and Scripting
hello,
I want to replace awk with a perl one liner in unix.
i use in awk REGEX and FS ( field separator) because
awk syntaxes in different unix os versions have not the same behaviour.
Awk, Nawk and GNU Awk Cheat Sheet - good coders code, great reuse
i have a file named "file" and want... (5 Replies)
Discussion started by: bora99
5 Replies
6. Shell Programming and Scripting
can someone help me translate the following command, from:
/usr/bin/awk "/^$TOFDAYM $TOFDAYD /,0" $LOGFILE
to something like
perl -e .....
basically, i want to use perl to do awk functions within a shell script. i want to do the above awk, using perl.
any suggestions? (9 Replies)
Discussion started by: SkySmart
9 Replies
7. Shell Programming and Scripting
Input_file_1:
ABC1 DEF11
ABC3 DEF7
ABC7 DEF36
Input_file_2:
DEF7 light 23
DEF11 over 2
DEF11 over 1
DEF17 blue 0
Perl one-liner that join two input file based on columns sharing a value (In this example, column 2 in Input_file_1 and column 1 in... (3 Replies)
Discussion started by: perl_beginner
3 Replies
8. Shell Programming and Scripting
Thanks for giving your time and effort to answer questions and helping newbies like me understand awk.
I have a huge file, millions of lines, so perl takes quite a bit of time, I'd like to convert these perl one liners to awk.
Basically I'd like all lines with ISA sandwiched between... (9 Replies)
Discussion started by: verge
9 Replies
9. Shell Programming and Scripting
In a ~4GB file there are lines like,
13.13.4.3 Googe.com - Jan/23/2011:00:00:00 +0000 "URL Google HTTP/1.1" 45 56 208 - "http://www.gogle.com/webhp?hl=en&tab=nw#hl=en&source=hp&biw=1366&bih=667&q=hello&aq=f&aqi=&aql=&oq=&fp=c432485467934a89" ".Net; Fox" -
13.145.3.3 Goge.com -... (3 Replies)
Discussion started by: gameboy87
3 Replies
10. Shell Programming and Scripting
Hi ,
Can anybody explain how this perl one liner works..
It is to test whether the number is prime or not
perl -le 'print "PRIME" if (1 x shift) !~ /^(11+)\1+$/' 19
Thanks in advance
Shihab (2 Replies)
Discussion started by: shihabvk
2 Replies
Crypt::Eksblowfish::Uklblowfish(3pm) User Contributed Perl Documentation Crypt::Eksblowfish::Uklblowfish(3pm)
NAME
Crypt::Eksblowfish::Uklblowfish - Blowfish cipher with unrestricted key length
SYNOPSIS
use Crypt::Eksblowfish::Uklblowfish;
$block_size = Crypt::Eksblowfish::Uklblowfish->blocksize;
$key_size = Crypt::Eksblowfish::Uklblowfish->keysize;
$cipher = Crypt::Eksblowfish::Uklblowfish->new($key);
$block_size = $cipher->blocksize;
$ciphertext = $cipher->encrypt($plaintext);
$plaintext = $cipher->decrypt($ciphertext);
$p_array = $cipher->p_array;
$s_boxes = $cipher->s_boxes;
if($cipher->is_weak) { ...
DESCRIPTION
An object of this type encapsulates a keyed instance of the Blowfish block cipher, ready to encrypt and decrypt. However, if you're
looking for an implementation of Blowfish you most likely want Crypt::Eksblowfish::Blowfish. This class differs from the standard Blowfish
in that it accepts some keys that Blowfish officially does not permit.
Blowfish is a symmetric cipher algorithm designed by Bruce Schneier in 1993. It operates on 64-bit blocks, and takes a variable-length
key. Officially the key can vary from 32 bits (4 octets) to 448 bits (56 octets) in increments of 8 bits (1 octet). In fact the algorithm
can easily operate on a key of any number of octets from 1 (8 bits) to 72 (576 bits). Some implementations don't enforce the official key
length limits, and so for compatibility it is sometimes necessary to handle a Blowfish key of a prohibited length. That is what this class
is for. The "Ukl" in the name stands for "unrestricted key length".
Using a very short key is generally a bad idea because there aren't very many keys of that length and so it's easy for an attacker to try
them all. The official 32-bit minimum for Blowfish was already far too short for serious security at the time that Blowfish was designed.
(A machine to crack 56-bit DES keys by brute force in a few days each was publicly built only five years later.) Do not base your security
on the secrecy of a short key.
Using overlong keys has more interesting effects, which depend on internal features of Blowfish. When the key exceeds 64 octets (512
bits), varying key bits past that length results in subkeys which have predictable relationships. There is also some possibility of
equivalent keys when the keys exceed 64 octets and differ only in the first 8 octets (64 bits). These phenomena have not been extensively
studied in the open literature, so it is difficult to judge the degree of cryptographic weakness that results from them. It is clear that
beyond some length Blowfish keys do not have as much strength as their length would suggest, and it is possible that overlong keys have
specific weaknesses that render them weaker than shorter keys. If choosing a key for security, it is advised to stay within the official
length limit of 56 octets.
In summary: using Blowfish keys of officially-unsupported lengths causes security problems. If you are using Blowfish for security, and
have the choice, use a key of an officially-supported length (and a standard implementation such as Crypt::Eksblowfish::Blowfish). Use
out-of-range key lengths (and this class) only for compatibility or cryptanalytic reasons.
CLASS METHODS
Crypt::Eksblowfish::Uklblowfish->blocksize
Returns 8, indicating the Blowfish block size of 8 octets. This method may be called on either the class or an instance.
Crypt::Eksblowfish::Uklblowfish->keysize
Returns 0, indicating that the key size is variable. This situation is handled specially by "Crypt::CBC".
CONSTRUCTOR
Crypt::Eksblowfish::Uklblowfish->new(KEY)
Performs key setup on a new instance of the Blowfish algorithm, returning the keyed state. The KEY may be any length from 1 octet to
72 octets inclusive.
METHODS
$cipher->blocksize
Returns 8, indicating the Blowfish block size of 8 octets. This method may be called on either the class or an instance.
$cipher->encrypt(PLAINTEXT)
PLAINTEXT must be exactly eight octets. The block is encrypted, and the ciphertext is returned.
$cipher->decrypt(CIPHERTEXT)
CIPHERTEXT must be exactly eight octets. The block is decrypted, and the plaintext is returned.
$cipher->p_array
$cipher->s_boxes
These methods extract the subkeys from the keyed cipher. This is not required in ordinary operation. See the superclass
Crypt::Eksblowfish::Subkeyed for details.
$cipher->is_weak
This method checks whether the cipher has been keyed with a weak key. It may be desired to avoid using weak keys. See the superclass
Crypt::Eksblowfish::Subkeyed for details.
This method does not detect any cryptographic weaknesses that might result from the related-key properties and other features of
overlong keys.
SEE ALSO
Crypt::Eksblowfish::Blowfish
AUTHOR
Eksblowfish guts originally by Solar Designer (solar at openwall.com).
Modifications and Perl interface by Andrew Main (Zefram) <zefram@fysh.org>.
COPYRIGHT
Copyright (C) 2006, 2007, 2008, 2009, 2010 Andrew Main (Zefram) <zefram@fysh.org>
The original Eksblowfish code (in the form of crypt()) from which this module is derived is in the public domain. It may be found at
<http://www.openwall.com/crypt/>.
LICENSE
This module is free software; you can redistribute it and/or modify it under the same terms as Perl itself.
perl v5.14.2 2011-11-15 Crypt::Eksblowfish::Uklblowfish(3pm)