Searched refs:fingerprint (Results 1 - 23 of 23) sorted by relevance

/netbsd-current/crypto/external/bsd/openssl.old/dist/test/recipes/
H A D25-test_crl.t32 ok(compare1stline([qw{openssl crl -noout -fingerprint -in},
35 ok(compare1stline([qw{openssl crl -noout -fingerprint -sha256 -in},
/netbsd-current/crypto/external/bsd/openssl/dist/test/recipes/
H A D25-test_crl.t32 ok(compare1stline([qw{openssl crl -noout -fingerprint -in},
35 ok(compare1stline([qw{openssl crl -noout -fingerprint -sha256 -in},
/netbsd-current/crypto/external/bsd/openssl.old/dist/apps/
H A Dstoreutl.c46 {"fingerprint", OPT_CRITERION_FINGERPRINT, 's', "Search by public key fingerprint, given in hex"},
69 unsigned char *fingerprint = NULL; local
194 && fingerprint != NULL)) {
200 if (fingerprint != NULL) {
201 BIO_printf(bio_err, "%s: fingerprint already given.\n",
208 if ((fingerprint = OPENSSL_hexstr2buf(opt_arg(), &tmplen))
211 "%s: can't parse fingerprint argument.\n",
279 fingerprint,
311 OPENSSL_free(fingerprint);
[all...]
H A Dcrl.c42 {"fingerprint", OPT_FINGERPRINT, '-', "Print the crl fingerprint"},
78 int ret = 1, num = 0, badsig = 0, fingerprint = 0, crlnumber = 0; local
162 fingerprint = ++num;
294 if (fingerprint == i) {
H A Dx509.c90 {"fingerprint", OPT_FINGERPRINT, '-',
91 "Print the certificate fingerprint"},
174 int fingerprint = 0, reqfile = 0, checkend = 0; local
363 fingerprint = ++num;
773 } else if (fingerprint == i) {
/netbsd-current/crypto/external/bsd/openssl/dist/apps/
H A Dstoreutl.c51 {"fingerprint", OPT_CRITERION_FINGERPRINT, 's', "Search by public key fingerprint, given in hex"},
83 unsigned char *fingerprint = NULL; local
203 && fingerprint != NULL)) {
209 if (fingerprint != NULL) {
210 BIO_printf(bio_err, "%s: fingerprint already given.\n",
217 if ((fingerprint = OPENSSL_hexstr2buf(opt_arg(), &tmplen))
220 "%s: can't parse fingerprint argument.\n",
292 fingerprint,
325 OPENSSL_free(fingerprint);
[all...]
H A Dcrl.c58 {"fingerprint", OPT_FINGERPRINT, '-', "Print the crl fingerprint"},
93 int ret = 1, num = 0, badsig = 0, fingerprint = 0, crlnumber = 0; local
189 fingerprint = ++num;
347 if (fingerprint == i) {
H A Dx509.c92 {"fingerprint", OPT_FINGERPRINT, '-', "Print the certificate fingerprint"},
283 int fingerprint = 0, reqfile = 0, checkend = 0; local
497 fingerprint = ++num;
997 } else if (i == fingerprint) {
/netbsd-current/sbin/veriexecctl/
H A Dveriexecctl_parse.y66 | statement path type fingerprint flags eol {
129 fingerprint : STRING { label
135 err(1, "Cannot allocate memory for fingerprint");
141 warnx("Bad fingerprint `%s' in line %zu", $1, line);
212 * not an integral number of bytes in the fingerprint.
/netbsd-current/usr.sbin/syslogd/
H A Dtls.h121 * check_peer_cert() fills in subject and fingerprint from the peer cert
137 char *fingerprint; /* fingerprint of peer cert */ member in struct:tls_conn_settings
H A Dtls.c305 "and fingerprint \"%s\"", SSLeay_version(SSLEAY_VERSION),
316 * get fingerprint of cert
337 * and to let the user use "openssl -fingerprint ..."
523 * check if certificate matches given fingerprint
526 match_fingerprint(const X509 *cert, const char *fingerprint) argument
535 cert, fingerprint);
536 if (!fingerprint)
541 q = fingerprint;
550 if (strncmp(certfingerprint, fingerprint, strlen(certfingerprint))) {
629 "from %s due to %s. Subject is \"%s\", fingerprint i
[all...]
/netbsd-current/external/bsd/unbound/dist/dnscrypt/
H A Ddnscrypt.c621 * Helper function to convert a binary key into a printable fingerprint.
622 * \param[in] fingerprint the buffer in which to write the printable key.
626 dnsc_key_to_fingerprint(char fingerprint[80U], const uint8_t * const key) argument
634 snprintf(&fingerprint[fingerprint_pos],
641 fingerprint[fingerprint_pos + 4U] = ':';
811 char fingerprint[80]; local
826 dnsc_key_to_fingerprint(fingerprint, current_keypair->crypt_publickey);
827 verbose(VERB_OPS, "Crypt public key fingerprint for %s: %s", head->str, fingerprint);
843 dnsc_key_to_fingerprint(fingerprint,
[all...]
/netbsd-current/crypto/external/bsd/netpgp/dist/src/libverify/
H A Dlibverify.c431 /* calculate the fingerprint, RFC 4880, section 12.2 */
433 pgpv_calc_fingerprint(pgpv_fingerprint_t *fingerprint, pgpv_pubkey_t *pubkey) argument
444 fingerprint->hashalg = digest_get_alg("sha1");
445 digest_init(&fphash, (unsigned)fingerprint->hashalg);
451 fingerprint->len = digest_final(fingerprint->v, &fphash);
456 fingerprint->hashalg = digest_get_alg("md5");
457 digest_init(&fphash, (unsigned)fingerprint->hashalg);
463 fingerprint->len = digest_final(fingerprint
481 fmt_fingerprint(char *s, size_t size, pgpv_fingerprint_t *fingerprint, const char *name) argument
[all...]
H A Dverify.h52 /* fingerprint */
64 pgpv_fingerprint_t fingerprint; /* key fingerprint i.e. digest */ member in struct:pgpv_pubkey_t
/netbsd-current/crypto/external/bsd/netpgp/dist/src/lib/
H A Dmisc.c480 * \brief Calculate a public key fingerprint.
481 * \param fp Where to put the calculated fingerprint
482 * \param key The key for which the fingerprint is calculated
509 fp->length = hash.finish(&hash, fp->fingerprint);
511 hexdump(stderr, "v2/v3 fingerprint", fp->fingerprint, fp->length);
536 fp->length = hash.finish(&hash, fp->fingerprint);
538 hexdump(stderr, "md5 fingerprint", fp->fingerprint, fp->length);
552 fp->length = hash.finish(&hash, fp->fingerprint);
[all...]
H A Dpacket.h254 PGP_PTAG_SS_ISSUER_FINGERPRINT = 0x200 + 33, /* issuer fingerprint */
688 uint8_t fingerprint[32]; /* max 32 */ member in struct:pgp_ss_issuer_fingerprint
734 uint8_t fingerprint[PGP_FINGERPRINT_SIZE]; member in struct:__anon32
908 uint8_t fingerprint[PGP_FINGERPRINT_SIZE]; member in struct:__anon48
992 pgp_fingerprint_t sigfingerprint; /* pgp signature fingerprint */
995 pgp_fingerprint_t encfingerprint; /* pgp encryption id fingerprint */
H A Dpacket-print.c467 return pgp_asprintf(buf, "%s %d/%s %s %s %s\nKey fingerprint: %s\n%s",
474 strhexdump(fp, key->sigfingerprint.fingerprint, key->sigfingerprint.length, " "),
502 mj_append_field(keyjson, "fingerprint", "string",
503 strhexdump(fp, key->sigfingerprint.fingerprint, key->sigfingerprint.length, " "), -1);
620 strhexdump(fp, key->sigfingerprint.fingerprint, PGP_FINGERPRINT_SIZE, ""),
696 strhexdump(fp, key->sigfingerprint.fingerprint, PGP_FINGERPRINT_SIZE, ""),
1090 hexdump(stdout, "fingerprint", content->ss_revocation_key.fingerprint,
1105 content->ss_issuer_fingerprint.fingerprint,
H A Dpacket-parse.c1807 if (!limread(pkt.u.ss_issuer_fingerprint.fingerprint,
1829 /* octets 2-21 = fingerprint */
1830 if (!limread(&pkt.u.ss_revocation_key.fingerprint[0],
/netbsd-current/crypto/external/bsd/netpgp/dist/src/netpgpverify/
H A Dlibverify.c73 /* fingerprint */
85 pgpv_fingerprint_t fingerprint; /* key fingerprint i.e. digest */ member in struct:pgpv_pubkey_t
798 /* calculate the fingerprint, RFC 4880, section 12.2 */
800 pgpv_calc_fingerprint(pgpv_fingerprint_t *fingerprint, pgpv_pubkey_t *pubkey, const char *hashtype) argument
811 fingerprint->hashalg = digest_get_alg(hashtype);
812 digest_init(&fphash, (unsigned)fingerprint->hashalg);
818 fingerprint->len = digest_final(fingerprint->v, &fphash);
823 fingerprint
848 fmt_fingerprint(obuf_t *obuf, pgpv_fingerprint_t *fingerprint, const char *name) argument
[all...]
/netbsd-current/dist/pf/sbin/pfctl/
H A Dpfctl_parser.h128 pf_osfp_t fingerprint; member in struct:node_os
/netbsd-current/crypto/external/bsd/openssh/dist/
H A Dsshconnect.c627 confirm(const char *prompt, const char *fingerprint) argument
630 const char *again_fp = "Please type 'yes', 'no' or the fingerprint: ";
636 for (msg = prompt;;msg = fingerprint ? again_fp : again) {
644 else if (strcasecmp(p, "yes") == 0 || (fingerprint != NULL &&
645 strcmp(p, fingerprint) == 0))
1154 logit("Host key fingerprint is %s\n%s", fp, ra);
1205 xextendf(&msg1, "\n", "%s key fingerprint is %s.",
1211 "%s host key fingerprint found in DNS.",
1223 "(yes/no/[fingerprint])? ");
1487 error_fr(r, "fingerprint hos
[all...]
/netbsd-current/external/bsd/libarchive/dist/libarchive/
H A Darchive_read_support_format_rar.c232 uint64_t fingerprint; member in struct:rar_program_code
3453 prog->fingerprint = crc32(0, bytes, (unsigned int)length) | ((uint64_t)length << 32);
3764 if (filter->prog->fingerprint == 0x1D0E06077D)
3766 if (filter->prog->fingerprint == 0x35AD576887)
3768 if (filter->prog->fingerprint == 0x393CD7E57E)
3770 if (filter->prog->fingerprint == 0x951C2C5DC8)
3772 if (filter->prog->fingerprint == 0xD8BC85E701)
/netbsd-current/external/bsd/wpa/dist/hs20/client/
H A Dosu_client.c224 char *fingerprint; local
229 fingerprint = xml_node_get_text(ctx->xml, cert);
230 if (fingerprint == NULL)
232 if (hexstr2bin(fingerprint, digest1, SHA256_MAC_LEN) < 0) {
235 xml_node_get_text_free(ctx->xml, fingerprint);
238 xml_node_get_text_free(ctx->xml, fingerprint);
254 wpa_printf(MSG_INFO, "Client certificate from EST does not match fingerprint from PPS MO");
255 write_result(ctx, "Client certificate from EST does not match fingerprint from PPS MO");
361 wpa_printf(MSG_INFO, "Downloaded certificate fingerprint did not match");
362 write_result(ctx, "Downloaded certificate fingerprint di
[all...]

Completed in 543 milliseconds