11-07-2017
You can perform cryptographic hash functions on files to baseline and confirm file integrity.
This User Gave Thanks to Neo For This Post:
9 More Discussions You Might Find Interesting
1. UNIX for Advanced & Expert Users
Dear all,
After succesful installation of UNIX SCO WARE 7.0, while booting the system it is displaying as follows:
The kernel will be rebuilt to incorporate recent configaration changes
Press Enter when ready OR
Press Escape to Stop.
While pressing Enter, message is coming again and again... (2 Replies)
Discussion started by: konda
2 Replies
2. UNIX for Dummies Questions & Answers
How would I rebuild the sun solaris kernel to include my new Oracle paramters? (3 Replies)
Discussion started by: jigarlakhani
3 Replies
3. Shell Programming and Scripting
Can somebody give me the link to get the source code of BASH? (1 Reply)
Discussion started by: bhargava
1 Replies
4. Linux
I can't find a source rpm for a particular tool that I'm trying to modify. I can only get a hold of the noarch and tar.bz2. Can I modify either one of these and re-package them as a noarch.rpm? (2 Replies)
Discussion started by: eur0dad
2 Replies
5. HP-UX
Hi
i have compiled and installed bash 3.2 on my hp-ux parisc
its in path /usr/local/pkg/bash/bin/bash .....When im search for this bash (through whereis bash) im not findind but other which i hve done in same procedure( gettext,m4) ..Im able to find through whereis search option
can any1... (3 Replies)
Discussion started by: vasanthan
3 Replies
6. Shell Programming and Scripting
Hi, experts.
Whould anybody clear explay me difference and usage of these 3 commands (particulary in bash) :
exec
eval
source
I've tryed to read the manual pages but did not get much.
Also could not get something useful from Google search - just so much and so not exactly, that is... (3 Replies)
Discussion started by: alex_5161
3 Replies
7. UNIX Desktop Questions & Answers
Issue resolved:
The 'culprit file' was .bash_aliases. It had the naughty (ASCII for the octal string Bash was detecting and returning an error about). I cleaned it up in Pico (see my post to the thread on favorite editors if you want background on why I use Pico/Nano), re-sourced it via... (0 Replies)
Discussion started by: SilversleevesX
0 Replies
8. AIX
Hi Guru's,
I'm trying to rebuild a very old HMC 7315-C02 the hard disk has gone so needs replacing. I've managed to find an old IDE hard disk lying around but its obvious that it's had windows running on it as the HMC install disks won't recognise the format. I'm trying to install HMC V6 R1.2... (3 Replies)
Discussion started by: elcounto
3 Replies
9. UNIX for Dummies Questions & Answers
I'm rebuilding my primary computer at work tomorrow. Currently, it has Windows 7. I would like to replace the main system with either Linux or Unix, although I would like to be able to run a fully operational Windows as a VM within that. Any recommendations on which Linux or Unix to go with?
I'm... (6 Replies)
Discussion started by: Sean_
6 Replies
LEARN ABOUT HPUX
gss_get_mic
gss_get_mic(3) Library Functions Manual gss_get_mic(3)
NAME
gss_get_mic() - calculate a cryptographic message integrity code (MIC) for a message and return in a token
SYNOPSIS
DESCRIPTION
The routine generates a cryptographic message integrity code (MIC) for the supplied message and places the MIC in a token for trans-
fer to the peer application. The qop_req parameter allows a choice between several cryptographic algorithms, if supported by the
chosen mechanism.
Input Parameters
context_handle Specifies the context on which the message is sent.
qop_req Specifies the cryptographic algorithm, or quality of protection. To accept the default quality of protection offered
by the chosen mechanism specify
message_buffer Specifies the message to be protected.
Output Parameters
msg_token Buffer to receive the sealed message.
minor_status Returns a status code from the security mechanism.
STATUS CODES
The following status codes can be returned:
The routine was completed successfully.
The context has already expired.
The context is recognized but the associated
credentials have expired.
The context identified in the
context_handle parameter was not valid.
The specified QOP is not supported by the mechanism.
AUTHOR
was developed by Sun Microsystems, Inc.
SEE ALSO
gss_verify_mic(3).
The manpages for DCE-GSSAPI are included with the DCE-CoreTools product. To see those manpages add to
gss_get_mic(3)