9 More Discussions You Might Find Interesting
1. UNIX for Advanced & Expert Users
Hi,
we have private and public key, encrypt file using public and want to decrypt using private key. can you please advise below commands are correct or other remedy if unix have?
encrypt -a arcfour -k publickey.asc -i TESTFILE.csv -o TESTFILE00.csv
decrypt -a arcfour -k privatekey.asc... (2 Replies)
Discussion started by: rizwan.shaukat
2 Replies
2. UNIX for Dummies Questions & Answers
Hi,
What tool is used to generate public and private keys for SCP?
Do you have an example script that generates these keys, puts them in files and then another example script that references them from SCP?
Thanks, (9 Replies)
Discussion started by: Astrocloud
9 Replies
3. Virtualization and Cloud Computing
Hi all,
Private, Public and Hybrid Clouds
I'm now testing OpenStack;
Home OpenStack Open Source Cloud Computing Software
-Infrastructure as a Service (IaaS)
-Platform as a Service (PaaS)
-Software as a Service (SaaS)
It is an Open Source software.
I'm interested to know whether... (0 Replies)
Discussion started by: satimis
0 Replies
4. Shell Programming and Scripting
hi guys , i have few files i have to do sftp, the public and private key work like a magic , no problem at all
the syntax is as below
sftp -0 identityfile=~/ure/blsl/loc2/.ssh/id_rsa_ssh1 ssh1@remote >log_dir/file.timestamp<<end
lcd folder
cd folder
put *
quit
end
================
my... (3 Replies)
Discussion started by: rockymayavia
3 Replies
5. Shell Programming and Scripting
Hi All,
I have a query....say on server A, I have generated the Private and Public keys and shared the public key with server B.
Now i can surelyconnect(without password) from server A to server B.....
but can i similarly connect from server B to server A as well
Regards (1 Reply)
Discussion started by: Arpit Narula
1 Replies
6. What is on Your Mind?
What is extent of influence of C language? How essential is it in today's computer and IT technology? Do you think that the inventor of C language deserves more recognition than he appreciates now? (1 Reply)
Discussion started by: Anna Hussie
1 Replies
7. IP Networking
Hi,
We have a ftp server which is running on public ip and out side of firewall.
Users out side of our network and users of our local network both using the same public ip and doing upload and downloading.
Last few days we are facing bandwidth problem as internal network users increased.
... (1 Reply)
Discussion started by: abduljabbar_11
1 Replies
8. UNIX for Dummies Questions & Answers
Hello,
I have an issue with an outside party trying to deliver a file to our server via SFTP.
I have setup the .ssh directory under the home directory for the user account that is being used and setup the authorized_keys file with correct permissons etc for .ssh directory and file.
We... (2 Replies)
Discussion started by: richo king
2 Replies
9. UNIX for Advanced & Expert Users
Firstly, i apologise if i have posted in a wrong section of the forum. Please let me know which is the correct section my post should go to.
I have to SCP a file from one server(server A) to another (server B). I read around that a secure way is to use public and private keys.
Assuming my... (2 Replies)
Discussion started by: new2ss
2 Replies
tpmtoken_import(1) General Commands Manual tpmtoken_import(1)
TPM Management - tpmtoken_import
NAME
tpmtoken_import - import an X.509 certficate and/or an RSA key pair into the user's TPM PKCS#11 data store
SYNOPSIS
tpmtoken_import [ OPTION ] FILE
DESCRIPTION
tpmtoken_import imports a PEM formatted representation of an X.509 certificate and/or an RSA key contained in FILE.
Importing an X.509 certificate creates an X.509 Public Key Certificate PKCS#11 object and also an RSA Public Key PKCS#11 object using the
RSA public key contained in the certificate. The certificate's key must be an RSA key in order for the certificate to be successfully
processed by this command.
Importing an RSA key creates an RSA Public Key and an RSA Private Key PKCS#11 object. In order to associate the RSA PKCS#11 objects with
an X.509 Public Key Certificate PKCS#11 object, the RSA PKCS#11 objects must have a subject name and key identifier associated with them.
This can be accomplished by supplying the corresponding X.509 certificate as an optional command parameter.
The input can contain PEM formatted representations of both an X.509 certificate and an RSA key. If both representations are present then
an X.509 Public Key Certificate PKCS#11 object, an RSA Public Key PKCS#11 object and an RSA Private Key PKCS#11 object are created.
-h, --help
Display command usage info.
-v, --version
Display command version info.
-l, --log [none|error|info|debug]
Set logging level.
-i, --idfile FILE
Use FILE as the PEM formatted X.509 certificate input used to obtain the subject and id attributes
-k, --token STRING
Use STRING to identify the label of the PKCS#11 token to be used
-n, --name STRING
Use STRING as the label for the imported object(s)
-p, --public
Import the object(s) as a public object
-t, --type key|cert
Import only the specified object type
-y, --yes
Assume an answer of yes for any confirmation prompts that would normally be asked
SEE ALSO
tpmtoken_init(1), tpmtoken_setpasswd(1), tpmtoken_objects(1), tpmtoken_protect(1)
REPORTING BUGS
Report bugs to <trousers-users@lists.sourceforge.net>
TPM Management 2005-04-25 tpmtoken_import(1)