/freebsd/contrib/file/magic/Magdir/ |
H A D | finger | 4 # fingerprint: file(1) magic for fingerprint data 10 0 string FP1 libfprint fingerprint data V1 14 0 string FP2 libfprint fingerprint data V2
|
/freebsd/usr.sbin/pkg/ |
H A D | pkg.c | 77 struct fingerprint { struct 278 static struct fingerprint * 284 struct fingerprint *f; in parse_fingerprint() 324 struct fingerprint *fingerprint, *tmp; in free_fingerprint_list() local 327 free(fingerprint->name); in free_fingerprint_list() 328 free(fingerprint); in free_fingerprint_list() 333 static struct fingerprint * 338 struct fingerprint *f; in load_fingerprint() 371 struct fingerprint *finger; in load_fingerprints() 663 struct fingerprint *fingerprint; in verify_signature() local [all …]
|
/freebsd/sys/security/mac_veriexec/ |
H A D | veriexec_fingerprint.c | 141 struct thread *td, off_t file_size, unsigned char *fingerprint) in evaluate_fingerprint() argument 168 (ip->ops->final)(fingerprint, ctx); in evaluate_fingerprint() 172 printf("%02x", fingerprint[offset]); in evaluate_fingerprint() 198 return memcmp(ip->fingerprint, digest, ip->ops->digest_len); in fingerprintcmp() 216 unsigned char *fingerprint) in mac_veriexec_fingerprint_check_vnode() argument 236 error = evaluate_fingerprint(vp, ip, td, file_size, fingerprint); in mac_veriexec_fingerprint_check_vnode() 240 if (fingerprintcmp(ip, fingerprint) != 0) in mac_veriexec_fingerprint_check_vnode()
|
H A D | veriexec_metadata.c | 170 #define FPB(i) (ip->fingerprint[i]) in mac_veriexec_print_db_dev_list() 563 ip->fingerprint[i]); in mac_veriexec_metadata_fetch_fingerprint_status() 636 unsigned long gen, unsigned char fingerprint[MAXFINGERPRINTLEN], in mac_veriexec_metadata_add_file() 680 memcpy(ip->fingerprint, fingerprint, in mac_veriexec_metadata_add_file() 737 memcpy(ip->fingerprint, fingerprint, fpops->digest_len); in mac_veriexec_metadata_add_file() 754 printf("%02x", fingerprint[offset]); in mac_veriexec_metadata_add_file()
|
H A D | mac_veriexec_internal.h | 56 unsigned char fingerprint[MAXFINGERPRINTLEN]; member 94 off_t file_size, unsigned char *fingerprint);
|
H A D | mac_veriexec.h | 80 unsigned char fingerprint[MAXFINGERPRINTLEN]; member 178 unsigned long gen, unsigned char fingerprint[MAXFINGERPRINTLEN],
|
H A D | mac_veriexec.c | 810 unsigned char fingerprint[MAXFINGERPRINTLEN]; member 992 memcpy(result32.fingerprint, ip->fingerprint, in mac_veriexec_syscall() 1006 memcpy(result.fingerprint, ip->fingerprint, in mac_veriexec_syscall()
|
/freebsd/crypto/openssh/ |
H A D | README.dns | 12 To create a DNS resource record (RR) containing a fingerprint of the 21 In the example above, ssh-keygen will print the fingerprint in a 26 To publish the fingerprint using the DNS you must add the generated RR 38 Upon connection the client will try to look up the fingerprint RR 39 using DNS. If the fingerprint received from the DNS server matches
|
/freebsd/contrib/dma/ |
H A D | conf.c | 225 unsigned char *fingerprint = malloc(SHA256_DIGEST_LENGTH); in parse_conf() local 226 if (fingerprint == NULL) { in parse_conf() 231 if(sscanf(data + 2 * i, "%02hhx", &fingerprint[i]) != 1) { in parse_conf() 236 config.fingerprint = fingerprint; in parse_conf()
|
H A D | crypto.c | 84 unsigned char fingerprint[EVP_MAX_MD_SIZE] = {0}; in verify_server_fingerprint() local 86 if(!X509_digest(cert, EVP_sha256(), fingerprint, &fingerprint_len)) { in verify_server_fingerprint() 96 if(memcmp(fingerprint, config.fingerprint, SHA256_DIGEST_LENGTH) != 0) { in verify_server_fingerprint() 204 if(config.fingerprint != NULL && verify_server_fingerprint(cert)) { in smtp_init_crypto()
|
/freebsd/sys/netinet/libalias/ |
H A D | alias_pptp.c | 80 fingerprint(struct libalias *la, struct alias_data *ah) in fingerprint() function 133 .fingerprint = &fingerprint, 140 .fingerprint = &fingerprint, 152 .fingerprint = &fingerprintgre, 159 .fingerprint = &fingerprintgre,
|
H A D | alias_dummy.c | 63 fingerprint(struct libalias *la, struct alias_data *ah) in fingerprint() function 106 .fingerprint = &fingerprint,
|
H A D | alias_irc.c | 96 fingerprint(struct libalias *la, struct alias_data *ah) in fingerprint() function 122 .fingerprint = &fingerprint,
|
H A D | alias_skinny.c | 60 fingerprint(struct libalias *la, struct alias_data *ah) in fingerprint() function 82 .fingerprint = &fingerprint,
|
/freebsd/usr.sbin/certctl/ |
H A D | certctl.sh | 116 certhash=$(openssl x509 -sha1 -in "$1" -noout -fingerprint) 118 otherhash=$(openssl x509 -sha1 -in "$otherfile" -noout -fingerprint) 125 otherhash=$(openssl x509 -sha1 -in "$otherfile" -noout -fingerprint) 274 certhash=$(openssl x509 -sha1 -in "$UTFILE" -noout -fingerprint) 276 untrustedhash=$(openssl x509 -sha1 -in "$UNTRUSTEDFILE" -noout -fingerprint)
|
/freebsd/sys/dev/veriexec/ |
H A D | veriexec_ioctl.h | 43 unsigned char fingerprint[32]; member 50 unsigned char fingerprint[MAXFINGERPRINTLEN]; member
|
/freebsd/crypto/openssl/apps/ |
H A D | storeutl.c | 83 unsigned char *fingerprint = NULL; in storeutl_main() local 203 && fingerprint != NULL)) { in storeutl_main() 209 if (fingerprint != NULL) { in storeutl_main() 217 if ((fingerprint = OPENSSL_hexstr2buf(opt_arg(), &tmplen)) in storeutl_main() 292 fingerprint, in storeutl_main() 325 OPENSSL_free(fingerprint); in storeutl_main()
|
H A D | crl.c | 93 int ret = 1, num = 0, badsig = 0, fingerprint = 0, crlnumber = 0; in crl_main() local 189 fingerprint = ++num; in crl_main() 347 if (fingerprint == i) { in crl_main()
|
/freebsd/crypto/openssl/doc/man1/ |
H A D | openssl-storeutl.pod.in | 28 [B<-fingerprint> I<arg>] 114 =item B<-fingerprint> I<arg> 116 Search for an object having the given fingerprint. 120 The digest that was used to compute the fingerprint given with B<-fingerprint>.
|
H A D | openssl-rehash.pod.in | 69 full SHA-1 fingerprint. A warning will be displayed if a duplicate 85 $OPENSSL x509 -hash -fingerprint -noout -in FILENAME 86 $OPENSSL crl -hash -fingerprint -noout -in FILENAME 89 file on the first line, and the fingerprint on the second,
|
H A D | openssl-crl.pod.in | 26 [B<-fingerprint>] 102 =item B<-fingerprint> 104 Output the fingerprint of the CRL.
|
/freebsd/contrib/wpa/src/common/ |
H A D | sae_pk.c | 371 os_memset(tmp->fingerprint, 0, sizeof(tmp->fingerprint)); in sae_pk_set_password() 390 pos = &tmp->fingerprint[tmp->sec]; in sae_pk_set_password() 413 tmp->fingerprint_bytes = pos - tmp->fingerprint; in sae_pk_set_password() 415 tmp->fingerprint, tmp->fingerprint_bytes); in sae_pk_set_password() 758 res = os_memcmp_const(hash, tmp->fingerprint, tmp->fingerprint_bytes); in sae_pk_valid_fingerprint() 762 tmp->fingerprint, tmp->fingerprint_bytes); in sae_pk_valid_fingerprint()
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | OSSL_STORE_SEARCH.pod | 71 and serial number pair, a key fingerprint, and an alias (for example a friendly 116 This criterion supports a search by exact match of key fingerprint. 117 The key fingerprint in itself is a string of bytes and its length, as 118 well as the algorithm that was used to compute the fingerprint. 123 and the actual fingerprint and its length can be retrieved with
|
/freebsd/contrib/unbound/dnscrypt/ |
H A D | dnscrypt.c | 626 dnsc_key_to_fingerprint(char fingerprint[80U], const uint8_t * const key) in dnsc_key_to_fingerprint() 634 snprintf(&fingerprint[fingerprint_pos], in dnsc_key_to_fingerprint() 641 fingerprint[fingerprint_pos + 4U] = ':'; in dnsc_key_to_fingerprint() 811 char fingerprint[80]; in dnsc_parse_keys() local 826 dnsc_key_to_fingerprint(fingerprint, current_keypair->crypt_publickey); in dnsc_parse_keys() 827 verbose(VERB_OPS, "Crypt public key fingerprint for %s: %s", head->str, fingerprint); in dnsc_parse_keys() 843 dnsc_key_to_fingerprint(fingerprint, in dnsc_parse_keys() 846 head->str, fingerprint); in dnsc_parse_keys()
|
/freebsd/share/keys/pkg/trusted/ |
H A D | pkg.freebsd.org.2013102301 | 3 fingerprint: "b0170035af3acc5f3f3ae1859dc717101b4e6c1d0a794ad554928ca0cbb2f438"
|