Sponsored Content
Full Discussion: Rebuilding bash source
Top Forums UNIX for Advanced & Expert Users Rebuilding bash source Post 303006763 by Neo on Tuesday 7th of November 2017 12:28:42 PM
Old 11-07-2017
You can perform cryptographic hash functions on files to baseline and confirm file integrity.
This User Gave Thanks to Neo For This Post:
 

9 More Discussions You Might Find Interesting

1. UNIX for Advanced & Expert Users

Rebuilding Kernel

Dear all, After succesful installation of UNIX SCO WARE 7.0, while booting the system it is displaying as follows: The kernel will be rebuilt to incorporate recent configaration changes Press Enter when ready OR Press Escape to Stop. While pressing Enter, message is coming again and again... (2 Replies)
Discussion started by: konda
2 Replies

2. UNIX for Dummies Questions & Answers

rebuilding sun solaris kernel

How would I rebuild the sun solaris kernel to include my new Oracle paramters? (3 Replies)
Discussion started by: jigarlakhani
3 Replies

3. Shell Programming and Scripting

Bash Source Code

Can somebody give me the link to get the source code of BASH? (1 Reply)
Discussion started by: bhargava
1 Replies

4. Linux

Modifying/Rebuilding non-source PRM?

I can't find a source rpm for a particular tool that I'm trying to modify. I can only get a hold of the noarch and tar.bz2. Can I modify either one of these and re-package them as a noarch.rpm? (2 Replies)
Discussion started by: eur0dad
2 Replies

5. HP-UX

bash...Not found through where(compiling source file)

Hi i have compiled and installed bash 3.2 on my hp-ux parisc its in path /usr/local/pkg/bash/bin/bash .....When im search for this bash (through whereis bash) im not findind but other which i hve done in same procedure( gettext,m4) ..Im able to find through whereis search option can any1... (3 Replies)
Discussion started by: vasanthan
3 Replies

6. Shell Programming and Scripting

bash shell: 'exec', 'eval', 'source' - looking for help to understand

Hi, experts. Whould anybody clear explay me difference and usage of these 3 commands (particulary in bash) : exec eval source I've tryed to read the manual pages but did not get much. Also could not get something useful from Google search - just so much and so not exactly, that is... (3 Replies)
Discussion started by: alex_5161
3 Replies

7. UNIX Desktop Questions & Answers

Help needed tracing source of bash error

Issue resolved: The 'culprit file' was .bash_aliases. It had the naughty  (ASCII for the octal string Bash was detecting and returning an error about). I cleaned it up in Pico (see my post to the thread on favorite editors if you want background on why I use Pico/Nano), re-sourced it via... (0 Replies)
Discussion started by: SilversleevesX
0 Replies

8. AIX

Rebuilding a HMC

Hi Guru's, I'm trying to rebuild a very old HMC 7315-C02 the hard disk has gone so needs replacing. I've managed to find an old IDE hard disk lying around but its obvious that it's had windows running on it as the HMC install disks won't recognise the format. I'm trying to install HMC V6 R1.2... (3 Replies)
Discussion started by: elcounto
3 Replies

9. UNIX for Dummies Questions & Answers

Rebuilding computer tomorrow at work

I'm rebuilding my primary computer at work tomorrow. Currently, it has Windows 7. I would like to replace the main system with either Linux or Unix, although I would like to be able to run a fully operational Windows as a VM within that. Any recommendations on which Linux or Unix to go with? I'm... (6 Replies)
Discussion started by: Sean_
6 Replies
gss_verify_mic(3)					     Library Functions Manual						 gss_verify_mic(3)

NAME
gss_verify_mic() - check a cryptographic message integrity code (MIC) against a message to verify its integrity SYNOPSIS
DESCRIPTION
The routine verifies that a cryptographic MIC, contained in the token_buffer parameter, fits the supplied message. The application receiv- ing the message can use the qop_state parameter to check the strength of protection. Input Parameters context_handle Specifies the context on which the message arrived. message_buffer Specifies the message to be verified. token_buffer Specifies the token to be associated with the message. Output Parameters qop_state Returns the quality of protection gained from message integrity code (MIC). Specify NULL if not required. minor_status Returns a status code from the security mechanism. STATUS CODES
The following status codes can be returned: The routine was completed successfully. The token failed consistency checks. The MIC was incorrect. The token was valid, and contained a correct MIC for the message, but it had already been processed. The token was valid, and contained a correct MIC for the message, but it is too old. The token was valid, and contained a correct MIC for the message, but has been verified out of sequence. A later token has already been received. The token was valid, and contained a correct MIC for the message, but has been verified out of sequence. An earlier expected token has not yet been received. The context has already expired. The routine failed. Check the minor_status parameter for details. The context identified in the context_handle parameter was not valid. AUTHOR
was developed by Sun Microsystems, Inc. SEE ALSO
gss_get_mic(3), gss_wrap(3). The manpages for DCE-GSSAPI are included with the DCE-CoreTools product. To see those manpages add to gss_verify_mic(3)
All times are GMT -4. The time now is 10:01 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy