Sponsored Content
Full Discussion: Rebuilding bash source
Top Forums UNIX for Advanced & Expert Users Rebuilding bash source Post 303006763 by Neo on Tuesday 7th of November 2017 12:28:42 PM
Old 11-07-2017
You can perform cryptographic hash functions on files to baseline and confirm file integrity.
This User Gave Thanks to Neo For This Post:
 

9 More Discussions You Might Find Interesting

1. UNIX for Advanced & Expert Users

Rebuilding Kernel

Dear all, After succesful installation of UNIX SCO WARE 7.0, while booting the system it is displaying as follows: The kernel will be rebuilt to incorporate recent configaration changes Press Enter when ready OR Press Escape to Stop. While pressing Enter, message is coming again and again... (2 Replies)
Discussion started by: konda
2 Replies

2. UNIX for Dummies Questions & Answers

rebuilding sun solaris kernel

How would I rebuild the sun solaris kernel to include my new Oracle paramters? (3 Replies)
Discussion started by: jigarlakhani
3 Replies

3. Shell Programming and Scripting

Bash Source Code

Can somebody give me the link to get the source code of BASH? (1 Reply)
Discussion started by: bhargava
1 Replies

4. Linux

Modifying/Rebuilding non-source PRM?

I can't find a source rpm for a particular tool that I'm trying to modify. I can only get a hold of the noarch and tar.bz2. Can I modify either one of these and re-package them as a noarch.rpm? (2 Replies)
Discussion started by: eur0dad
2 Replies

5. HP-UX

bash...Not found through where(compiling source file)

Hi i have compiled and installed bash 3.2 on my hp-ux parisc its in path /usr/local/pkg/bash/bin/bash .....When im search for this bash (through whereis bash) im not findind but other which i hve done in same procedure( gettext,m4) ..Im able to find through whereis search option can any1... (3 Replies)
Discussion started by: vasanthan
3 Replies

6. Shell Programming and Scripting

bash shell: 'exec', 'eval', 'source' - looking for help to understand

Hi, experts. Whould anybody clear explay me difference and usage of these 3 commands (particulary in bash) : exec eval source I've tryed to read the manual pages but did not get much. Also could not get something useful from Google search - just so much and so not exactly, that is... (3 Replies)
Discussion started by: alex_5161
3 Replies

7. UNIX Desktop Questions & Answers

Help needed tracing source of bash error

Issue resolved: The 'culprit file' was .bash_aliases. It had the naughty  (ASCII for the octal string Bash was detecting and returning an error about). I cleaned it up in Pico (see my post to the thread on favorite editors if you want background on why I use Pico/Nano), re-sourced it via... (0 Replies)
Discussion started by: SilversleevesX
0 Replies

8. AIX

Rebuilding a HMC

Hi Guru's, I'm trying to rebuild a very old HMC 7315-C02 the hard disk has gone so needs replacing. I've managed to find an old IDE hard disk lying around but its obvious that it's had windows running on it as the HMC install disks won't recognise the format. I'm trying to install HMC V6 R1.2... (3 Replies)
Discussion started by: elcounto
3 Replies

9. UNIX for Dummies Questions & Answers

Rebuilding computer tomorrow at work

I'm rebuilding my primary computer at work tomorrow. Currently, it has Windows 7. I would like to replace the main system with either Linux or Unix, although I would like to be able to run a fully operational Windows as a VM within that. Any recommendations on which Linux or Unix to go with? I'm... (6 Replies)
Discussion started by: Sean_
6 Replies
gss_get_mic(3)						     Library Functions Manual						    gss_get_mic(3)

NAME
gss_get_mic() - calculate a cryptographic message integrity code (MIC) for a message and return in a token SYNOPSIS
DESCRIPTION The routine generates a cryptographic message integrity code (MIC) for the supplied message and places the MIC in a token for trans- fer to the peer application. The qop_req parameter allows a choice between several cryptographic algorithms, if supported by the chosen mechanism. Input Parameters context_handle Specifies the context on which the message is sent. qop_req Specifies the cryptographic algorithm, or quality of protection. To accept the default quality of protection offered by the chosen mechanism specify message_buffer Specifies the message to be protected. Output Parameters msg_token Buffer to receive the sealed message. minor_status Returns a status code from the security mechanism. STATUS CODES
The following status codes can be returned: The routine was completed successfully. The context has already expired. The context is recognized but the associated credentials have expired. The context identified in the context_handle parameter was not valid. The specified QOP is not supported by the mechanism. AUTHOR
was developed by Sun Microsystems, Inc. SEE ALSO
gss_verify_mic(3). The manpages for DCE-GSSAPI are included with the DCE-CoreTools product. To see those manpages add to gss_get_mic(3)
All times are GMT -4. The time now is 09:30 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy