/freebsd/contrib/file/magic/Magdir/ |
H A D | finger | 4 # fingerprint: file(1) magic for fingerprint data 10 0 string FP1 libfprint fingerprint data V1 14 0 string FP2 libfprint fingerprint data V2
|
/freebsd/usr.sbin/pkg/ |
H A D | pkg.c | 87 struct fingerprint { struct 91 STAILQ_ENTRY(fingerprint) next; argument 96 STAILQ_HEAD(fingerprint_list, fingerprint); 343 static struct fingerprint * 349 struct fingerprint *f; in parse_fingerprint() 362 if (strcasecmp(key, "fingerprint") == 0) { in parse_fingerprint() 379 f = calloc(1, sizeof(struct fingerprint)); in parse_fingerprint() 389 struct fingerprint *fingerprint, *tmp; in free_fingerprint_list() local 391 STAILQ_FOREACH_SAFE(fingerprint, lis in free_fingerprint_list() 726 struct fingerprint *fingerprint; verify_signature() local [all...] |
/freebsd/sys/security/mac_veriexec/ |
H A D | veriexec_fingerprint.c | 141 struct thread *td, off_t file_size, unsigned char *fingerprint) in evaluate_fingerprint() argument 168 (ip->ops->final)(fingerprint, ctx); in evaluate_fingerprint() 172 printf("%02x", fingerprint[offset]); in evaluate_fingerprint() 198 return memcmp(ip->fingerprint, digest, ip->ops->digest_len); in fingerprintcmp() 216 unsigned char *fingerprint) in mac_veriexec_fingerprint_check_vnode() argument 236 error = evaluate_fingerprint(vp, ip, td, file_size, fingerprint); in mac_veriexec_fingerprint_check_vnode() 240 if (fingerprintcmp(ip, fingerprint) != 0) in mac_veriexec_fingerprint_check_vnode()
|
H A D | veriexec_metadata.c | 170 #define FPB(i) (ip->fingerprint[i]) in mac_veriexec_print_db_dev_list() 563 ip->fingerprint[i]); in mac_veriexec_metadata_fetch_fingerprint_status() 636 unsigned long gen, unsigned char fingerprint[MAXFINGERPRINTLEN], in mac_veriexec_metadata_add_file() 680 memcpy(ip->fingerprint, fingerprint, in mac_veriexec_metadata_add_file() 737 memcpy(ip->fingerprint, fingerprint, fpops->digest_len); in mac_veriexec_metadata_add_file() 754 printf("%02x", fingerprint[offset]); in mac_veriexec_metadata_add_file()
|
H A D | mac_veriexec_internal.h | 56 unsigned char fingerprint[MAXFINGERPRINTLEN]; member 94 off_t file_size, unsigned char *fingerprint);
|
H A D | mac_veriexec.h | 80 unsigned char fingerprint[MAXFINGERPRINTLEN]; member 178 unsigned long gen, unsigned char fingerprint[MAXFINGERPRINTLEN],
|
H A D | mac_veriexec.c | 809 unsigned char fingerprint[MAXFINGERPRINTLEN]; member 991 memcpy(result32.fingerprint, ip->fingerprint, in mac_veriexec_syscall() 1005 memcpy(result.fingerprint, ip->fingerprint, in mac_veriexec_syscall()
|
/freebsd/crypto/openssh/ |
H A D | README.dns | 12 To create a DNS resource record (RR) containing a fingerprint of the 21 In the example above, ssh-keygen will print the fingerprint in a 26 To publish the fingerprint using the DNS you must add the generated RR 38 Upon connection the client will try to look up the fingerprint RR 39 using DNS. If the fingerprint received from the DNS server matches
|
/freebsd/sys/netinet/libalias/ |
H A D | alias_pptp.c | 80 fingerprint(struct libalias *la, struct alias_data *ah) in fingerprint() function 133 .fingerprint = &fingerprint, 140 .fingerprint = &fingerprint, 152 .fingerprint = &fingerprintgre, 159 .fingerprint = &fingerprintgre,
|
H A D | alias_dummy.c | 63 fingerprint(struct libalias *la, struct alias_data *ah) in fingerprint() function 106 .fingerprint = &fingerprint,
|
H A D | alias_irc.c | 96 fingerprint(struct libalias *la, struct alias_data *ah) in fingerprint() function 122 .fingerprint = &fingerprint,
|
H A D | alias_skinny.c | 60 fingerprint(struct libalias *la, struct alias_data *ah) in fingerprint() function 82 .fingerprint = &fingerprint,
|
/freebsd/contrib/dma/ |
H A D | crypto.c | 84 unsigned char fingerprint[EVP_MAX_MD_SIZE] = {0}; in verify_server_fingerprint() local 86 if(!X509_digest(cert, EVP_sha256(), fingerprint, &fingerprint_len)) { in verify_server_fingerprint() 96 if(memcmp(fingerprint, config.fingerprint, SHA256_DIGEST_LENGTH) != 0) { in verify_server_fingerprint() 204 if(config.fingerprint != NULL && verify_server_fingerprint(cert)) { in smtp_init_crypto()
|
H A D | conf.c | 225 unsigned char *fingerprint = malloc(SHA256_DIGEST_LENGTH); in parse_conf() local 226 if (fingerprint == NULL) { in parse_conf() 231 if(sscanf(data + 2 * i, "%02hhx", &fingerprint[i]) != 1) { in parse_conf() 236 config.fingerprint = fingerprint; in parse_conf()
|
/freebsd/usr.sbin/certctl/ |
H A D | certctl.sh | 116 certhash=$(openssl x509 -sha1 -in "$1" -noout -fingerprint) 118 otherhash=$(openssl x509 -sha1 -in "$otherfile" -noout -fingerprint) 125 otherhash=$(openssl x509 -sha1 -in "$otherfile" -noout -fingerprint) 274 certhash=$(openssl x509 -sha1 -in "$UTFILE" -noout -fingerprint) 276 untrustedhash=$(openssl x509 -sha1 -in "$UNTRUSTEDFILE" -noout -fingerprint)
|
/freebsd/crypto/openssl/apps/ |
H A D | storeutl.c | 83 unsigned char *fingerprint = NULL; in storeutl_main() local 203 && fingerprint != NULL)) { in storeutl_main() 209 if (fingerprint != NULL) { in storeutl_main() 217 if ((fingerprint = OPENSSL_hexstr2buf(opt_arg(), &tmplen)) in storeutl_main() 292 fingerprint, in storeutl_main() 325 OPENSSL_free(fingerprint); in storeutl_main()
|
H A D | crl.c | 93 int ret = 1, num = 0, badsig = 0, fingerprint = 0, crlnumber = 0; in crl_main() local 189 fingerprint = ++num; in crl_main() 347 if (fingerprint == i) { in crl_main()
|
/freebsd/sys/dev/veriexec/ |
H A D | veriexec_ioctl.h | 43 unsigned char fingerprint[32]; member 50 unsigned char fingerprint[MAXFINGERPRINTLEN]; member
|
/freebsd/crypto/openssl/doc/man1/ |
H A D | openssl-storeutl.pod.in | 28 [B<-fingerprint> I<arg>] 117 =item B<-fingerprint> I<arg> 119 Search for an object having the given fingerprint. 123 The digest that was used to compute the fingerprint given with B<-fingerprint>.
|
H A D | openssl-rehash.pod.in | 69 full SHA-1 fingerprint. A warning will be displayed if a duplicate 85 $OPENSSL x509 -hash -fingerprint -noout -in FILENAME 86 $OPENSSL crl -hash -fingerprint -noout -in FILENAME 89 file on the first line, and the fingerprint on the second,
|
H A D | openssl-crl.pod.in | 26 [B<-fingerprint>] 105 =item B<-fingerprint> 107 Output the fingerprint of the CRL.
|
/freebsd/contrib/wpa/src/common/ |
H A D | sae_pk.c | 371 os_memset(tmp->fingerprint, 0, sizeof(tmp->fingerprint)); in sae_pk_set_password() 390 pos = &tmp->fingerprint[tmp->sec]; in sae_pk_set_password() 413 tmp->fingerprint_bytes = pos - tmp->fingerprint; in sae_pk_set_password() 415 tmp->fingerprint, tmp->fingerprint_bytes); in sae_pk_set_password() 758 res = os_memcmp_const(hash, tmp->fingerprint, tmp->fingerprint_bytes); in sae_pk_valid_fingerprint() 762 tmp->fingerprint, tmp->fingerprint_bytes); in sae_pk_valid_fingerprint()
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | OSSL_STORE_SEARCH.pod | 71 and serial number pair, a key fingerprint, and an alias (for example a friendly 117 This criterion supports a search by exact match of key fingerprint. 118 The key fingerprint in itself is a string of bytes and its length, as 119 well as the algorithm that was used to compute the fingerprint. 124 and the actual fingerprint and its length can be retrieved with
|
/freebsd/contrib/unbound/dnscrypt/ |
H A D | dnscrypt.c | 626 dnsc_key_to_fingerprint(char fingerprint[80U], const uint8_t * const key) in dnsc_key_to_fingerprint() 634 snprintf(&fingerprint[fingerprint_pos], in dnsc_key_to_fingerprint() 641 fingerprint[fingerprint_pos + 4U] = ':'; in dnsc_key_to_fingerprint() 811 char fingerprint[80]; in dnsc_parse_keys() local 826 dnsc_key_to_fingerprint(fingerprint, current_keypair->crypt_publickey); in dnsc_parse_keys() 827 verbose(VERB_OPS, "Crypt public key fingerprint for %s: %s", head->str, fingerprint); in dnsc_parse_keys() 843 dnsc_key_to_fingerprint(fingerprint, in dnsc_parse_keys() 846 head->str, fingerprint); in dnsc_parse_keys()
|
/freebsd/share/keys/pkg/trusted/ |
H A D | pkg.freebsd.org.2013102301 | 3 fingerprint: "b0170035af3acc5f3f3ae1859dc717101b4e6c1d0a794ad554928ca0cbb2f438"
|