/netbsd-current/crypto/external/bsd/openssl.old/dist/test/recipes/ |
H A D | 25-test_crl.t | 32 ok(compare1stline([qw{openssl crl -noout -fingerprint -in}, 35 ok(compare1stline([qw{openssl crl -noout -fingerprint -sha256 -in},
|
/netbsd-current/crypto/external/bsd/openssl/dist/test/recipes/ |
H A D | 25-test_crl.t | 32 ok(compare1stline([qw{openssl crl -noout -fingerprint -in}, 35 ok(compare1stline([qw{openssl crl -noout -fingerprint -sha256 -in},
|
/netbsd-current/crypto/external/bsd/openssl.old/dist/apps/ |
H A D | storeutl.c | 46 {"fingerprint", OPT_CRITERION_FINGERPRINT, 's', "Search by public key fingerprint, given in hex"}, 69 unsigned char *fingerprint = NULL; local 194 && fingerprint != NULL)) { 200 if (fingerprint != NULL) { 201 BIO_printf(bio_err, "%s: fingerprint already given.\n", 208 if ((fingerprint = OPENSSL_hexstr2buf(opt_arg(), &tmplen)) 211 "%s: can't parse fingerprint argument.\n", 279 fingerprint, 311 OPENSSL_free(fingerprint); [all...] |
H A D | crl.c | 42 {"fingerprint", OPT_FINGERPRINT, '-', "Print the crl fingerprint"}, 78 int ret = 1, num = 0, badsig = 0, fingerprint = 0, crlnumber = 0; local 162 fingerprint = ++num; 294 if (fingerprint == i) {
|
H A D | x509.c | 90 {"fingerprint", OPT_FINGERPRINT, '-', 91 "Print the certificate fingerprint"}, 174 int fingerprint = 0, reqfile = 0, checkend = 0; local 363 fingerprint = ++num; 773 } else if (fingerprint == i) {
|
/netbsd-current/crypto/external/bsd/openssl/dist/apps/ |
H A D | storeutl.c | 51 {"fingerprint", OPT_CRITERION_FINGERPRINT, 's', "Search by public key fingerprint, given in hex"}, 83 unsigned char *fingerprint = NULL; local 203 && fingerprint != NULL)) { 209 if (fingerprint != NULL) { 210 BIO_printf(bio_err, "%s: fingerprint already given.\n", 217 if ((fingerprint = OPENSSL_hexstr2buf(opt_arg(), &tmplen)) 220 "%s: can't parse fingerprint argument.\n", 292 fingerprint, 325 OPENSSL_free(fingerprint); [all...] |
H A D | crl.c | 58 {"fingerprint", OPT_FINGERPRINT, '-', "Print the crl fingerprint"}, 93 int ret = 1, num = 0, badsig = 0, fingerprint = 0, crlnumber = 0; local 189 fingerprint = ++num; 347 if (fingerprint == i) {
|
H A D | x509.c | 92 {"fingerprint", OPT_FINGERPRINT, '-', "Print the certificate fingerprint"}, 283 int fingerprint = 0, reqfile = 0, checkend = 0; local 497 fingerprint = ++num; 997 } else if (i == fingerprint) {
|
/netbsd-current/sbin/veriexecctl/ |
H A D | veriexecctl_parse.y | 66 | statement path type fingerprint flags eol { 129 fingerprint : STRING { label 135 err(1, "Cannot allocate memory for fingerprint"); 141 warnx("Bad fingerprint `%s' in line %zu", $1, line); 212 * not an integral number of bytes in the fingerprint.
|
/netbsd-current/usr.sbin/syslogd/ |
H A D | tls.h | 121 * check_peer_cert() fills in subject and fingerprint from the peer cert 137 char *fingerprint; /* fingerprint of peer cert */ member in struct:tls_conn_settings
|
H A D | tls.c | 305 "and fingerprint \"%s\"", SSLeay_version(SSLEAY_VERSION), 316 * get fingerprint of cert 337 * and to let the user use "openssl -fingerprint ..." 523 * check if certificate matches given fingerprint 526 match_fingerprint(const X509 *cert, const char *fingerprint) argument 535 cert, fingerprint); 536 if (!fingerprint) 541 q = fingerprint; 550 if (strncmp(certfingerprint, fingerprint, strlen(certfingerprint))) { 629 "from %s due to %s. Subject is \"%s\", fingerprint i [all...] |
/netbsd-current/external/bsd/unbound/dist/dnscrypt/ |
H A D | dnscrypt.c | 621 * Helper function to convert a binary key into a printable fingerprint. 622 * \param[in] fingerprint the buffer in which to write the printable key. 626 dnsc_key_to_fingerprint(char fingerprint[80U], const uint8_t * const key) argument 634 snprintf(&fingerprint[fingerprint_pos], 641 fingerprint[fingerprint_pos + 4U] = ':'; 811 char fingerprint[80]; local 826 dnsc_key_to_fingerprint(fingerprint, current_keypair->crypt_publickey); 827 verbose(VERB_OPS, "Crypt public key fingerprint for %s: %s", head->str, fingerprint); 843 dnsc_key_to_fingerprint(fingerprint, [all...] |
/netbsd-current/crypto/external/bsd/netpgp/dist/src/libverify/ |
H A D | libverify.c | 431 /* calculate the fingerprint, RFC 4880, section 12.2 */ 433 pgpv_calc_fingerprint(pgpv_fingerprint_t *fingerprint, pgpv_pubkey_t *pubkey) argument 444 fingerprint->hashalg = digest_get_alg("sha1"); 445 digest_init(&fphash, (unsigned)fingerprint->hashalg); 451 fingerprint->len = digest_final(fingerprint->v, &fphash); 456 fingerprint->hashalg = digest_get_alg("md5"); 457 digest_init(&fphash, (unsigned)fingerprint->hashalg); 463 fingerprint->len = digest_final(fingerprint 481 fmt_fingerprint(char *s, size_t size, pgpv_fingerprint_t *fingerprint, const char *name) argument [all...] |
H A D | verify.h | 52 /* fingerprint */ 64 pgpv_fingerprint_t fingerprint; /* key fingerprint i.e. digest */ member in struct:pgpv_pubkey_t
|
/netbsd-current/crypto/external/bsd/netpgp/dist/src/lib/ |
H A D | misc.c | 480 * \brief Calculate a public key fingerprint. 481 * \param fp Where to put the calculated fingerprint 482 * \param key The key for which the fingerprint is calculated 509 fp->length = hash.finish(&hash, fp->fingerprint); 511 hexdump(stderr, "v2/v3 fingerprint", fp->fingerprint, fp->length); 536 fp->length = hash.finish(&hash, fp->fingerprint); 538 hexdump(stderr, "md5 fingerprint", fp->fingerprint, fp->length); 552 fp->length = hash.finish(&hash, fp->fingerprint); [all...] |
H A D | packet.h | 254 PGP_PTAG_SS_ISSUER_FINGERPRINT = 0x200 + 33, /* issuer fingerprint */ 688 uint8_t fingerprint[32]; /* max 32 */ member in struct:pgp_ss_issuer_fingerprint 734 uint8_t fingerprint[PGP_FINGERPRINT_SIZE]; member in struct:__anon32 908 uint8_t fingerprint[PGP_FINGERPRINT_SIZE]; member in struct:__anon48 992 pgp_fingerprint_t sigfingerprint; /* pgp signature fingerprint */ 995 pgp_fingerprint_t encfingerprint; /* pgp encryption id fingerprint */
|
H A D | packet-print.c | 467 return pgp_asprintf(buf, "%s %d/%s %s %s %s\nKey fingerprint: %s\n%s", 474 strhexdump(fp, key->sigfingerprint.fingerprint, key->sigfingerprint.length, " "), 502 mj_append_field(keyjson, "fingerprint", "string", 503 strhexdump(fp, key->sigfingerprint.fingerprint, key->sigfingerprint.length, " "), -1); 620 strhexdump(fp, key->sigfingerprint.fingerprint, PGP_FINGERPRINT_SIZE, ""), 696 strhexdump(fp, key->sigfingerprint.fingerprint, PGP_FINGERPRINT_SIZE, ""), 1090 hexdump(stdout, "fingerprint", content->ss_revocation_key.fingerprint, 1105 content->ss_issuer_fingerprint.fingerprint,
|
H A D | packet-parse.c | 1807 if (!limread(pkt.u.ss_issuer_fingerprint.fingerprint, 1829 /* octets 2-21 = fingerprint */ 1830 if (!limread(&pkt.u.ss_revocation_key.fingerprint[0],
|
/netbsd-current/crypto/external/bsd/netpgp/dist/src/netpgpverify/ |
H A D | libverify.c | 73 /* fingerprint */ 85 pgpv_fingerprint_t fingerprint; /* key fingerprint i.e. digest */ member in struct:pgpv_pubkey_t 798 /* calculate the fingerprint, RFC 4880, section 12.2 */ 800 pgpv_calc_fingerprint(pgpv_fingerprint_t *fingerprint, pgpv_pubkey_t *pubkey, const char *hashtype) argument 811 fingerprint->hashalg = digest_get_alg(hashtype); 812 digest_init(&fphash, (unsigned)fingerprint->hashalg); 818 fingerprint->len = digest_final(fingerprint->v, &fphash); 823 fingerprint 848 fmt_fingerprint(obuf_t *obuf, pgpv_fingerprint_t *fingerprint, const char *name) argument [all...] |
/netbsd-current/dist/pf/sbin/pfctl/ |
H A D | pfctl_parser.h | 128 pf_osfp_t fingerprint; member in struct:node_os
|
/netbsd-current/crypto/external/bsd/openssh/dist/ |
H A D | sshconnect.c | 627 confirm(const char *prompt, const char *fingerprint) argument 630 const char *again_fp = "Please type 'yes', 'no' or the fingerprint: "; 636 for (msg = prompt;;msg = fingerprint ? again_fp : again) { 644 else if (strcasecmp(p, "yes") == 0 || (fingerprint != NULL && 645 strcmp(p, fingerprint) == 0)) 1154 logit("Host key fingerprint is %s\n%s", fp, ra); 1205 xextendf(&msg1, "\n", "%s key fingerprint is %s.", 1211 "%s host key fingerprint found in DNS.", 1223 "(yes/no/[fingerprint])? "); 1487 error_fr(r, "fingerprint hos [all...] |
/netbsd-current/external/bsd/libarchive/dist/libarchive/ |
H A D | archive_read_support_format_rar.c | 232 uint64_t fingerprint; member in struct:rar_program_code 3453 prog->fingerprint = crc32(0, bytes, (unsigned int)length) | ((uint64_t)length << 32); 3764 if (filter->prog->fingerprint == 0x1D0E06077D) 3766 if (filter->prog->fingerprint == 0x35AD576887) 3768 if (filter->prog->fingerprint == 0x393CD7E57E) 3770 if (filter->prog->fingerprint == 0x951C2C5DC8) 3772 if (filter->prog->fingerprint == 0xD8BC85E701)
|
/netbsd-current/external/bsd/wpa/dist/hs20/client/ |
H A D | osu_client.c | 224 char *fingerprint; local 229 fingerprint = xml_node_get_text(ctx->xml, cert); 230 if (fingerprint == NULL) 232 if (hexstr2bin(fingerprint, digest1, SHA256_MAC_LEN) < 0) { 235 xml_node_get_text_free(ctx->xml, fingerprint); 238 xml_node_get_text_free(ctx->xml, fingerprint); 254 wpa_printf(MSG_INFO, "Client certificate from EST does not match fingerprint from PPS MO"); 255 write_result(ctx, "Client certificate from EST does not match fingerprint from PPS MO"); 361 wpa_printf(MSG_INFO, "Downloaded certificate fingerprint did not match"); 362 write_result(ctx, "Downloaded certificate fingerprint di [all...] |