decryption of .cpt file in unix


 
Thread Tools Search this Thread
Special Forums UNIX Desktop Questions & Answers decryption of .cpt file in unix
# 1  
Old 08-02-2011
decryption of .cpt file in unix

can some one help me how to decrypt a .txt.cpt file in unix
i

Moderator's Comments:
Mod Comment Double post

Last edited by Scott; 08-02-2011 at 02:23 PM.. Reason: Closed
Login or Register to Ask a Question

Previous Thread | Next Thread

10 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

CPT test exam compiling code

Hello all I am new to programming and trying to compile this code #include <asm/unistd.h> #include <sys/mman.h> #include <unistd.h> #include <errno.h> #define MREMAP_MAYMOVE 1 #define MREMAP_FIXED 2 #define __NR_real_mremap __NR_mremap static inline _syscall5( void *,... (2 Replies)
Discussion started by: crustymonkey
2 Replies

2. Shell Programming and Scripting

Formatting File Decryption Output

Below is the out put of the decrypt command. Decrypt Command: /usr/bin/gpg --yes --batch --output file.xml --decrypt file.xml.gpg Output: gpg: encrypted with 2048-bit RSA key, ID 96301328, created 2014-04-29 "XYZ <xyz@abc.com>" gpg: encrypted with 2048-bit ELG-E key, ID ECB614CF,... (5 Replies)
Discussion started by: Ariean
5 Replies

3. Shell Programming and Scripting

PGP decryption in UNIX script

Hi, I have an already running Production script that I need to simulate in QA. The script is trying to decrypt some files using the below command: pgp --decrypt ${GET_DIR}/*.pgp --home-dir /.pgp I am getting the following error: 1080:no private key could be found for decryption Can... (3 Replies)
Discussion started by: Jigsaw16
3 Replies

4. UNIX for Dummies Questions & Answers

decryption of .cpt file

Hi i have the path for encrytion file in unix and i want to decrypt the .cpt file in unix and change the password how can i do that . (3 Replies)
Discussion started by: lily
3 Replies

5. Shell Programming and Scripting

unix Script for decryption

how to decrypt a file using unix Scipts . i am using one code that is working in the manual testing... echo $pass_phrase|gpg --output $filename_DEx --batch --passphrase-fd 0 --decrypt $filename_DEx_enc in the informatica level its not working.. can anybody help me in this? thanks... (1 Reply)
Discussion started by: rajesh_pola
1 Replies

6. Shell Programming and Scripting

decryption issue!

Hi, Something bizarre is happening while decrypting the files. I had a decrypt script which was working smoothly on uname -a Linux ######### 2.6.9-89.ELsmp #1 SMP Mon Apr 20 10:33:05 EDT 2009 x86_64 x86_64 x86_64 GNU/Linux After the front-end application was moved to uname -a Linux... (2 Replies)
Discussion started by: dips_ag
2 Replies

7. Shell Programming and Scripting

Password decryption

Hi, I don't know if I am in a correct category with my question. I want to know what decryption-method is used for this password: (1) The first stadium is (its stored in the settings.xml of my software):... (2 Replies)
Discussion started by: Mogli1977
2 Replies

8. UNIX for Dummies Questions & Answers

Identify a file for encryption or decryption

Dear Members, Can we find if a particular file is encrypted or decrypted. I need a command by which i should be able to identify if a file is encrypted or decrypted. How can we do this? (1 Reply)
Discussion started by: sandeep_1105
1 Replies

9. UNIX for Dummies Questions & Answers

File Encryption and Decryption in UNIX.

Hello guys ! I have used "crypt <first> second" command to encrypt "first" to "second" file. i have assign a key for that of course. Now when i try to look content of "seocnd" file through "cat second" command, the file is encrypted and cannot be read which is according to plan. But when... (3 Replies)
Discussion started by: abidmalik
3 Replies

10. UNIX for Dummies Questions & Answers

Decryption software

whats the most sufficient way to make decryption software? What are the recoomendations for one? (3 Replies)
Discussion started by: Phatress
3 Replies
Login or Register to Ask a Question
Safe::Hole(3pm) 					User Contributed Perl Documentation					   Safe::Hole(3pm)

NAME
Safe::Hole - make a hole to the original main compartment in the Safe compartment SYNOPSIS
use Safe; use Safe::Hole; $cpt = new Safe; $hole = new Safe::Hole {}; sub test { Test->test; } $Testobj = new Test; # $cpt->share('&test'); # alternate as next line $hole->wrap(&test, $cpt, '&test'); # ${$cpt->varglob('Testobj')} = $Testobj; # alternate as next line $hole->wrap($Testobj, $cpt, '$Testobj'); $cpt->reval('test; $Testobj->test;'); print $@ if $@; package Test; sub new { bless {},shift(); } sub test { my $self = shift; $self->test2; } sub test2 { print "Test->test2 called "; } DESCRIPTION
We can call outside defined subroutines from the Safe compartment using share(), or can call methods through the object that is copied into the Safe compartment using varglob(). But that subroutines or methods are executed in the Safe compartment too, so they cannot call another subroutines that are dinamically qualified with the package name such as class methods nor can they compile code that uses opcodes that are forbidden within the compartment. Through Safe::Hole, we can execute outside defined subroutines in the original main compartment from the Safe compartment. Note that if a subroutine called through Safe::Hole::call does a Carp::croak() it will report the error as having occured within Safe::Hole. This can be avoided by including Safe::Hole::User in the @ISA for the package containing the subroutine. Methods new [NAMESPACE] Class method. Backward compatible constructor. NAMESPACE is the alternate root namespace that makes the compartment in which call() method execute the subroutine. Default of NAMESPACE means the current 'main'. This emulates the behaviour of Safe-Hole-0.08 and earlier. new \%arguments Class method. Constructor. The constructor is called with a hash reference providing the constructor arguments. The argument ROOT specifies the alternate root namespace for the object. If the ROOT argument is not specified then Safe::Hole object will attempt restore as much as it can of the environment in which it was constrtucted. This includes the opcode mask, %INC and @INC. If a root namespace is specified then it would not make sense to restore the %INC and @INC from main:: so this is not done. Also if a root namespace is given the opcode mask is not restored either. call $coderef [,@args] Object method. Call the subroutine refered by $coderef in the compartment that is specified with constructor new. @args are passed as the arguments to the called $coderef. Note that the arguments are not currently passed by reference although this may change in a future version. wrap $ref [,$cpt ,$name] Object method. If $ref is a code reference, this method returns the anonymous subroutine reference that calls $ref using call() method of Safe::Hole (see above). If $ref is a class object, this method makes a wrapper class of that object and returns a new object of the wrapper class. Through the wrapper class, all original class methods called using call() method of Safe::Hole. If $cpt as Safe object and $name as subroutine or scalar name specified, this method works like share() method of Safe. When $ref is a code reference $name must like '&subroutine'. When $ref is a object $name must like '$var'. Name $name may not be same as referent of $ref. For example: $hole->wrap(&foo, $cpt, '&bar'); $hole->wrap(sub{...}, $cpt, '&foo'); $hole->wrap($objfoo, $cpt, '$objbar'); root Object method. Return the namespace that is specified with constructor new(). If no namespace was then root() returns 'main'. Warning You MUST NOT share the Safe::Hole object with the Safe compartment. If you do it the Safe compartment is NOT safe. This module provides a means to go from a state where an opcode is denied back to a state where it is not. Reasonable care has been taken to ensure that programs cannot simply manipulate the internals to the Safe::Hole object to reduce the opmask in effect. However there may still be a way that the authors have not considered. In particular it relies on the fact that a Perl program cannot change stuff inside the magic on a Perl variable. If you install a module that allows a Perl program to fiddle inside the magic then this assuption breaks down. One would hope that any system that was running un-trusted code would not have such a module installed. AUTHORS
Sey Nakajima <nakajima@netstock.co.jp> (Initial version) Brian McCauley <nobull@cpan.org> (Maintenance) Todd Rinaldo <toddr@cpan.org> (Maintenance) SEE ALSO
Safe(3). perl v5.14.2 2011-11-15 Safe::Hole(3pm)