/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/tools/ |
H A D | c_rehash | 120 my ($hash, $fprint) = `"$openssl" x509 -hash -fingerprint -noout -in "$fname"`; 128 # Hash matches: if fingerprint matches its a duplicate cert 155 my ($hash, $fprint) = `"$openssl" crl -hash -fingerprint -noout -in '$fname'`; 163 # Hash matches: if fingerprint matches its a duplicate cert
|
H A D | c_rehash.in | 120 my ($hash, $fprint) = `"$openssl" x509 -hash -fingerprint -noout -in "$fname"`; 128 # Hash matches: if fingerprint matches its a duplicate cert 155 my ($hash, $fprint) = `"$openssl" crl -hash -fingerprint -noout -in '$fname'`; 163 # Hash matches: if fingerprint matches its a duplicate cert
|
/netbsd-6-1-5-RELEASE/sbin/veriexecctl/ |
H A D | veriexecctl_parse.y | 66 | statement path type fingerprint flags eol { 129 fingerprint : STRING { label 135 err(1, "Cannot allocate memory for fingerprint"); 141 warnx("Bad fingerprint `%s' in line %zu", $1, line); 212 * not an integral number of bytes in the fingerprint.
|
/netbsd-6-1-5-RELEASE/usr.sbin/syslogd/ |
H A D | tls.h | 120 * check_peer_cert() fills in subject and fingerprint from the peer cert 136 char *fingerprint; /* fingerprint of peer cert */ member in struct:tls_conn_settings
|
H A D | tls.c | 301 "and fingerprint \"%s\"", SSLeay_version(SSLEAY_VERSION), 312 * get fingerprint of cert 333 * and to let the user use "openssl -fingerprint ..." 519 * check if certificate matches given fingerprint 522 match_fingerprint(const X509 *cert, const char *fingerprint) argument 531 cert, fingerprint); 532 if (!fingerprint) 537 q = fingerprint; 546 if (strncmp(certfingerprint, fingerprint, strlen(certfingerprint))) { 625 "from %s due to %s. Subject is \"%s\", fingerprint i [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/apps/ |
H A D | crl.c | 87 " -fingerprint - print the crl fingerprint\n", 117 int fingerprint = 0, crlnumber = 0; local 218 else if (strcmp(*argv,"-fingerprint") == 0) 219 fingerprint= ++num; 342 if (fingerprint == i)
|
H A D | x509.c | 119 " -fingerprint - print the certificate fingerprint\n", 202 int fingerprint=0; local 434 else if (strcmp(*argv,"-fingerprint") == 0) 435 fingerprint= ++num; 929 else if (fingerprint == i)
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/netpgp/dist/src/lib/ |
H A D | misc.c | 456 * \brief Calculate a public key fingerprint. 457 * \param fp Where to put the calculated fingerprint 458 * \param key The key for which the fingerprint is calculated 485 fp->length = hash.finish(&hash, fp->fingerprint); 487 hexdump(stderr, "v2/v3 fingerprint", fp->fingerprint, fp->length); 512 fp->length = hash.finish(&hash, fp->fingerprint); 514 hexdump(stderr, "md5 fingerprint", fp->fingerprint, fp->length); 528 fp->length = hash.finish(&hash, fp->fingerprint); [all...] |
H A D | packet.h | 704 uint8_t fingerprint[PGP_FINGERPRINT_SIZE]; member in struct:__anon330 877 uint8_t fingerprint[PGP_FINGERPRINT_SIZE]; member in struct:__anon346 961 pgp_fingerprint_t sigfingerprint; /* pgp signature fingerprint */ 964 pgp_fingerprint_t encfingerprint; /* pgp encryption id fingerprint */
|
H A D | packet-print.c | 465 return pgp_asprintf(buf, "%s %d/%s %s %s %s\nKey fingerprint: %s\n%s", 472 strhexdump(fp, key->sigfingerprint.fingerprint, key->sigfingerprint.length, " "), 500 mj_append_field(keyjson, "fingerprint", "string", 501 strhexdump(fp, key->sigfingerprint.fingerprint, key->sigfingerprint.length, " "), -1); 618 strhexdump(fp, key->sigfingerprint.fingerprint, PGP_FINGERPRINT_SIZE, ""), 692 strhexdump(fp, key->sigfingerprint.fingerprint, PGP_FINGERPRINT_SIZE, ""), 1080 hexdump(stdout, "fingerprint", content->ss_revocation_key.fingerprint,
|
H A D | packet-parse.c | 1780 /* octets 2-21 = fingerprint */ 1781 if (!limread(&pkt.u.ss_revocation_key.fingerprint[0],
|
/netbsd-6-1-5-RELEASE/dist/pf/sbin/pfctl/ |
H A D | pfctl_parser.h | 128 pf_osfp_t fingerprint; member in struct:node_os
|