Searched refs:fingerprint (Results 1 - 12 of 12) sorted by relevance

/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/tools/
H A Dc_rehash120 my ($hash, $fprint) = `"$openssl" x509 -hash -fingerprint -noout -in "$fname"`;
128 # Hash matches: if fingerprint matches its a duplicate cert
155 my ($hash, $fprint) = `"$openssl" crl -hash -fingerprint -noout -in '$fname'`;
163 # Hash matches: if fingerprint matches its a duplicate cert
H A Dc_rehash.in120 my ($hash, $fprint) = `"$openssl" x509 -hash -fingerprint -noout -in "$fname"`;
128 # Hash matches: if fingerprint matches its a duplicate cert
155 my ($hash, $fprint) = `"$openssl" crl -hash -fingerprint -noout -in '$fname'`;
163 # Hash matches: if fingerprint matches its a duplicate cert
/netbsd-6-1-5-RELEASE/sbin/veriexecctl/
H A Dveriexecctl_parse.y66 | statement path type fingerprint flags eol {
129 fingerprint : STRING { label
135 err(1, "Cannot allocate memory for fingerprint");
141 warnx("Bad fingerprint `%s' in line %zu", $1, line);
212 * not an integral number of bytes in the fingerprint.
/netbsd-6-1-5-RELEASE/usr.sbin/syslogd/
H A Dtls.h120 * check_peer_cert() fills in subject and fingerprint from the peer cert
136 char *fingerprint; /* fingerprint of peer cert */ member in struct:tls_conn_settings
H A Dtls.c301 "and fingerprint \"%s\"", SSLeay_version(SSLEAY_VERSION),
312 * get fingerprint of cert
333 * and to let the user use "openssl -fingerprint ..."
519 * check if certificate matches given fingerprint
522 match_fingerprint(const X509 *cert, const char *fingerprint) argument
531 cert, fingerprint);
532 if (!fingerprint)
537 q = fingerprint;
546 if (strncmp(certfingerprint, fingerprint, strlen(certfingerprint))) {
625 "from %s due to %s. Subject is \"%s\", fingerprint i
[all...]
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/apps/
H A Dcrl.c87 " -fingerprint - print the crl fingerprint\n",
117 int fingerprint = 0, crlnumber = 0; local
218 else if (strcmp(*argv,"-fingerprint") == 0)
219 fingerprint= ++num;
342 if (fingerprint == i)
H A Dx509.c119 " -fingerprint - print the certificate fingerprint\n",
202 int fingerprint=0; local
434 else if (strcmp(*argv,"-fingerprint") == 0)
435 fingerprint= ++num;
929 else if (fingerprint == i)
/netbsd-6-1-5-RELEASE/crypto/external/bsd/netpgp/dist/src/lib/
H A Dmisc.c456 * \brief Calculate a public key fingerprint.
457 * \param fp Where to put the calculated fingerprint
458 * \param key The key for which the fingerprint is calculated
485 fp->length = hash.finish(&hash, fp->fingerprint);
487 hexdump(stderr, "v2/v3 fingerprint", fp->fingerprint, fp->length);
512 fp->length = hash.finish(&hash, fp->fingerprint);
514 hexdump(stderr, "md5 fingerprint", fp->fingerprint, fp->length);
528 fp->length = hash.finish(&hash, fp->fingerprint);
[all...]
H A Dpacket.h704 uint8_t fingerprint[PGP_FINGERPRINT_SIZE]; member in struct:__anon330
877 uint8_t fingerprint[PGP_FINGERPRINT_SIZE]; member in struct:__anon346
961 pgp_fingerprint_t sigfingerprint; /* pgp signature fingerprint */
964 pgp_fingerprint_t encfingerprint; /* pgp encryption id fingerprint */
H A Dpacket-print.c465 return pgp_asprintf(buf, "%s %d/%s %s %s %s\nKey fingerprint: %s\n%s",
472 strhexdump(fp, key->sigfingerprint.fingerprint, key->sigfingerprint.length, " "),
500 mj_append_field(keyjson, "fingerprint", "string",
501 strhexdump(fp, key->sigfingerprint.fingerprint, key->sigfingerprint.length, " "), -1);
618 strhexdump(fp, key->sigfingerprint.fingerprint, PGP_FINGERPRINT_SIZE, ""),
692 strhexdump(fp, key->sigfingerprint.fingerprint, PGP_FINGERPRINT_SIZE, ""),
1080 hexdump(stdout, "fingerprint", content->ss_revocation_key.fingerprint,
H A Dpacket-parse.c1780 /* octets 2-21 = fingerprint */
1781 if (!limread(&pkt.u.ss_revocation_key.fingerprint[0],
/netbsd-6-1-5-RELEASE/dist/pf/sbin/pfctl/
H A Dpfctl_parser.h128 pf_osfp_t fingerprint; member in struct:node_os

Completed in 280 milliseconds