/freebsd-9.3-release/ |
H A D | Makefile.inc1 | 86 SUBDIR+=secure 547 cd ${.CURDIR}/secure/lib; ${LIB32WMAKE} DIRPRFX=secure/lib/ ${_t} 578 cd ${.CURDIR}/secure/lib; ${LIB32IMAKE} ${.TARGET:S/32$//} 1391 _secure_lib_libcrypto= secure/lib/libcrypto 1392 _secure_lib_libssl= secure/lib/libssl 1393 lib/libradius__L secure/lib/libssl__L: secure/lib/libcrypto__L 1395 _secure_lib_libssh= secure/lib/libssh 1396 secure/li [all...] |
/freebsd-9.3-release/contrib/less/ |
H A D | command.c | 36 extern int secure; 248 if (secure) 271 if (secure) 281 if (secure) 1488 if (secure) 1506 if (secure) 1682 if (secure) 1724 if (secure)
|
H A D | filename.c | 51 extern int secure; 416 if (secure) 630 if (secure) 850 if (!use_lessopen || secure) 957 if (secure)
|
H A D | decode.c | 37 extern int secure; 654 if (secure)
|
H A D | ch.c | 129 extern int secure; 288 if (!secure && logfile >= 0 && n > 0)
|
H A D | configure | 1290 --with-secure Compile in secure mode 5138 # Compile in secure mode? 5140 # Check whether --with-secure was given. 6192 # Create a (secure) tmp directory for tmp files.
|
/freebsd-9.3-release/libexec/ypxfr/ |
H A D | ypxfr_main.c | 175 int secure = 0; local 372 secure++; 503 if (secure) { 510 yp_error("failed to add secure flag to database");
|
/freebsd-9.3-release/crypto/heimdal/lib/auth/sia/ |
H A D | sia.c | 125 int secure; local 204 secure = KRB_VERIFY_SECURE; 206 secure = KRB_VERIFY_NOT_SECURE; 209 entity->password, secure, NULL);
|
/freebsd-9.3-release/contrib/bind9/lib/dns/ |
H A D | zone.c | 380 dns_zone_t *secure; member in struct:dns_zone 946 zone->secure = NULL; 1106 if (zone->secure != NULL) 1844 result = zone_load(zone->secure, DNS_ZONELOADFLAG_THAW); 3812 * 'secure' zone. We now need information about the status of the 3852 * If this is a inline_raw zone the secure version is also locked. 3870 INSIST(LOCKED_ZONE(zone->secure)); 4220 if (zone->secure->db == NULL) 4612 dns_zone_t *secure = NULL; local 4652 secure 8174 isc_boolean_t secure; local 8959 dns_zone_t *secure = NULL; local 11415 dns_zone_t *raw = NULL, *secure = NULL; local 13402 dns_zone_t *secure = NULL; local 13422 dns_zone_t *secure = NULL; local 13670 dns_zone_t *secure = NULL; local 13936 dns_zone_t *secure = NULL; local 16702 dns_zone_t *secure = NULL; local [all...] |
H A D | acl.c | 505 isc_boolean_t secure; local 511 /* Negated entries are always secure. */ 512 secure = * (isc_boolean_t *)data[ISC_IS6(family)]; 513 if (!secure) {
|
H A D | ncache.c | 53 isc_boolean_t optout, isc_boolean_t secure, 122 isc_boolean_t optout, isc_boolean_t secure, 261 if (!secure && trust > dns_trust_answer) 120 addoptout(dns_message_t *message, dns_db_t *cache, dns_dbnode_t *node, dns_rdatatype_t covers, isc_stdtime_t now, dns_ttl_t maxttl, isc_boolean_t optout, isc_boolean_t secure, dns_rdataset_t *addedrdataset) argument
|
H A D | rbtdb.c | 388 dns_db_secure_t secure; member in struct:rbtdb_version 1115 version->secure = rbtdb->current_version->secure; 2028 version->secure = dns_db_insecure; 2051 version->secure = dns_db_secure; 2053 version->secure = dns_db_insecure; 2352 * Update the zone's secure status. 3431 dns_db_secure_t secure) 3444 isc_boolean_t need_sig = ISC_TF(secure == dns_db_secure); 3719 if ((search.rbtversion->secure 3428 find_closest_nsec(rbtdb_search_t *search, dns_dbnode_t **nodep, dns_name_t *foundname, dns_rdataset_t *rdataset, dns_rdataset_t *sigrdataset, dns_rbt_t *tree, dns_db_secure_t secure) argument 7167 isc_boolean_t secure; local [all...] |
H A D | update.c | 784 * after a secure update. 901 isc_boolean_t secure = dns_db_issecure(db); local 924 "secure zone with no NSECs"); 939 if (secure) { 1365 "could not get zone keys for secure dynamic update");
|
H A D | validator.c | 57 * validator_start -> validate -> nsecvalidate (secure wildcard answer) 198 event->secure = ISC_TRUE; 438 * Only extract the dst key if the keyset is secure. 557 * a delegation point we are transitioning from a secure zone to a 560 * If the DS record exists it will be secure. We can continue looking 608 "must be secure failure, no DS" 630 * In either case we are still in a secure zone resume 687 * Only extract the dst key if the keyset is secure. 768 "must be secure failure, no DS " 1609 * There isn't a secure DNSKE [all...] |
/freebsd-9.3-release/etc/ |
H A D | protocols | 92 secure-vmtp 82 SECURE-VMTP # SECURE-VMTP
|
H A D | services | 475 set 257/tcp #secure electronic transaction 476 set 257/udp #secure electronic transaction 1226 asf-secure-rmcp 664/tcp #ASF Secure Remote Management and Control Protocol 1227 asf-secure-rmcp 664/udp #ASF Secure Remote Management and Control Protocol
|
/freebsd-9.3-release/crypto/openssh/contrib/suse/ |
H A D | openssh.spec | 55 rlogin and rsh, and provide secure encrypted communications between 57 arbitrary TCP/IP ports can also be forwarded over the secure channel. 69 rlogin and rsh, and provide secure encrypted communications between 71 arbitrary TCP/IP ports can also be forwarded over the secure channel.
|
/freebsd-9.3-release/crypto/openssh/contrib/redhat/ |
H A D | openssh.spec | 137 rsh, and to provide secure encrypted communications between two 139 arbitrary TCP/IP ports can also be forwarded over the secure channel. 158 the secure shell daemon (sshd). The sshd daemon allows SSH clients to
|
/freebsd-9.3-release/crypto/heimdal/lib/krb5/ |
H A D | krb5.h | 677 krb5_boolean secure; member in struct:krb5_verify_opt
|
/freebsd-9.3-release/contrib/llvm/tools/clang/lib/StaticAnalyzer/Checkers/ |
H A D | CheckSecuritySyntaxOnly.cpp | 475 " format string to be secure (" << numX << " 'X'"; 638 "'random' is not a secure random number generator",
|
/freebsd-9.3-release/contrib/wpa/src/ap/ |
H A D | wpa_auth.c | 1059 wpa_printf(MSG_DEBUG, "WPA: Send EAPOL(version=%d secure=%d mic=%d " 1685 int wpa_ie_len, secure, keyidx, encr = 0; local 1716 secure = 1; 1724 secure = 0; 1803 (secure ? WPA_KEY_INFO_SECURE : 0) | WPA_KEY_INFO_MIC |
|
/freebsd-9.3-release/contrib/wpa/src/rsn_supp/ |
H A D | wpa.c | 444 const u8 *addr, int secure) 454 if (secure) { 443 wpa_supplicant_key_neg_complete(struct wpa_sm *sm, const u8 *addr, int secure) argument
|
/freebsd-9.3-release/contrib/bind9/bin/dnssec/ |
H A D | dnssec-signzone.c | 1006 secure(dns_name_t *name, dns_dbnode_t *node) { function 1475 secure(name, node)) 2216 !secure(nextname, nextnode)) { 2344 !secure(nextname, nextnode)) { 2955 fprintf(stderr, "use pseudorandom data (faster but less secure)\n");
|
/freebsd-9.3-release/release/picobsd/build/ |
H A D | picobsd | 217 for i in lib secure/lib gnu/lib \ 612 secure/usr.bin secure/usr.sbin secure/libexec secure/lib"
|
/freebsd-9.3-release/contrib/bind9/lib/bind9/ |
H A D | check.c | 335 mustbesecure(const cfg_obj_t *secure, isc_symtab_t *symtab, isc_log_t *logctx, argument 348 obj = cfg_tuple_get(secure, "name"); 358 result = nameexist(secure, namebuf, 1, symtab, 359 "dnssec-must-be-secure '%s': already " 962 * Check dnssec-must-be-secure. 965 (void)cfg_map_get(options, "dnssec-must-be-secure", &obj); 1345 { "dnssec-secure-to-insecure", MASTERZONE },
|