Sponsored Content
Full Discussion: Rebuilding bash source
Top Forums UNIX for Advanced & Expert Users Rebuilding bash source Post 303006763 by Neo on Tuesday 7th of November 2017 12:28:42 PM
Old 11-07-2017
You can perform cryptographic hash functions on files to baseline and confirm file integrity.
This User Gave Thanks to Neo For This Post:
 

9 More Discussions You Might Find Interesting

1. UNIX for Advanced & Expert Users

Rebuilding Kernel

Dear all, After succesful installation of UNIX SCO WARE 7.0, while booting the system it is displaying as follows: The kernel will be rebuilt to incorporate recent configaration changes Press Enter when ready OR Press Escape to Stop. While pressing Enter, message is coming again and again... (2 Replies)
Discussion started by: konda
2 Replies

2. UNIX for Dummies Questions & Answers

rebuilding sun solaris kernel

How would I rebuild the sun solaris kernel to include my new Oracle paramters? (3 Replies)
Discussion started by: jigarlakhani
3 Replies

3. Shell Programming and Scripting

Bash Source Code

Can somebody give me the link to get the source code of BASH? (1 Reply)
Discussion started by: bhargava
1 Replies

4. Linux

Modifying/Rebuilding non-source PRM?

I can't find a source rpm for a particular tool that I'm trying to modify. I can only get a hold of the noarch and tar.bz2. Can I modify either one of these and re-package them as a noarch.rpm? (2 Replies)
Discussion started by: eur0dad
2 Replies

5. HP-UX

bash...Not found through where(compiling source file)

Hi i have compiled and installed bash 3.2 on my hp-ux parisc its in path /usr/local/pkg/bash/bin/bash .....When im search for this bash (through whereis bash) im not findind but other which i hve done in same procedure( gettext,m4) ..Im able to find through whereis search option can any1... (3 Replies)
Discussion started by: vasanthan
3 Replies

6. Shell Programming and Scripting

bash shell: 'exec', 'eval', 'source' - looking for help to understand

Hi, experts. Whould anybody clear explay me difference and usage of these 3 commands (particulary in bash) : exec eval source I've tryed to read the manual pages but did not get much. Also could not get something useful from Google search - just so much and so not exactly, that is... (3 Replies)
Discussion started by: alex_5161
3 Replies

7. UNIX Desktop Questions & Answers

Help needed tracing source of bash error

Issue resolved: The 'culprit file' was .bash_aliases. It had the naughty  (ASCII for the octal string Bash was detecting and returning an error about). I cleaned it up in Pico (see my post to the thread on favorite editors if you want background on why I use Pico/Nano), re-sourced it via... (0 Replies)
Discussion started by: SilversleevesX
0 Replies

8. AIX

Rebuilding a HMC

Hi Guru's, I'm trying to rebuild a very old HMC 7315-C02 the hard disk has gone so needs replacing. I've managed to find an old IDE hard disk lying around but its obvious that it's had windows running on it as the HMC install disks won't recognise the format. I'm trying to install HMC V6 R1.2... (3 Replies)
Discussion started by: elcounto
3 Replies

9. UNIX for Dummies Questions & Answers

Rebuilding computer tomorrow at work

I'm rebuilding my primary computer at work tomorrow. Currently, it has Windows 7. I would like to replace the main system with either Linux or Unix, although I would like to be able to run a fully operational Windows as a VM within that. Any recommendations on which Linux or Unix to go with? I'm... (6 Replies)
Discussion started by: Sean_
6 Replies
libgcrypt(3)							C Library Functions						      libgcrypt(3)

NAME
libgcrypt - libgcrypt is a general purpose cryptographic library based on the code from GnuPG. DESCRIPTION
libgcrypt is a general purpose cryptographic library based on the code from GnuPG. It provides functions for all cryptograhic building blocks: symmetric ciphers (AES, DES, Blowfish, Twofish, Arcfour), hash algorithms (MD4, MD5, RIPE-MD160, SHA-1, TIGER-192), MACs (HMAC for all hash algorithms), public key algorithms (RSA, ElGamal, DSA), large integer functions, random numbers and a lot of supporting functions. ATTRIBUTES
See attributes(5) for descriptions of the following attributes: +-----------------------------+-----------------------------+ | ATTRIBUTE TYPE | ATTRIBUTE VALUE | +-----------------------------+-----------------------------+ |Availability |SUNWlibgcrypt | +-----------------------------+-----------------------------+ |Interface stability |Volatile | +-----------------------------+-----------------------------+ FILES
The following files are used by this application: /usr/lib/libgcrypt.so cryptographic library SEE ALSO
libgcrypt-config(1), dumpsexp(1), attributes(5), gnome-interfaces(5) NOTES
Sun does not guarantee the stability of these interfaces and does not recommend their use. API documentation for these interfaces is pro- vided by the GNU community for those who wish to develop using these interfaces. However, you can visit the following URL for more informa- tion: http://www.gnupg.org/documentation/manuals/gcrypt/. Written by Jeff Cai, Sun Microsystems Inc., 2008. SunOS 5.11 28 Jul 2008 libgcrypt(3)
All times are GMT -4. The time now is 09:06 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy