Searched refs:secure (Results 26 - 50 of 52) sorted by relevance

123

/freebsd-9.3-release/
H A DMakefile.inc186 SUBDIR+=secure
547 cd ${.CURDIR}/secure/lib; ${LIB32WMAKE} DIRPRFX=secure/lib/ ${_t}
578 cd ${.CURDIR}/secure/lib; ${LIB32IMAKE} ${.TARGET:S/32$//}
1391 _secure_lib_libcrypto= secure/lib/libcrypto
1392 _secure_lib_libssl= secure/lib/libssl
1393 lib/libradius__L secure/lib/libssl__L: secure/lib/libcrypto__L
1395 _secure_lib_libssh= secure/lib/libssh
1396 secure/li
[all...]
/freebsd-9.3-release/contrib/less/
H A Dcommand.c36 extern int secure;
248 if (secure)
271 if (secure)
281 if (secure)
1488 if (secure)
1506 if (secure)
1682 if (secure)
1724 if (secure)
H A Dfilename.c51 extern int secure;
416 if (secure)
630 if (secure)
850 if (!use_lessopen || secure)
957 if (secure)
H A Ddecode.c37 extern int secure;
654 if (secure)
H A Dch.c129 extern int secure;
288 if (!secure && logfile >= 0 && n > 0)
H A Dconfigure1290 --with-secure Compile in secure mode
5138 # Compile in secure mode?
5140 # Check whether --with-secure was given.
6192 # Create a (secure) tmp directory for tmp files.
/freebsd-9.3-release/libexec/ypxfr/
H A Dypxfr_main.c175 int secure = 0; local
372 secure++;
503 if (secure) {
510 yp_error("failed to add secure flag to database");
/freebsd-9.3-release/crypto/heimdal/lib/auth/sia/
H A Dsia.c125 int secure; local
204 secure = KRB_VERIFY_SECURE;
206 secure = KRB_VERIFY_NOT_SECURE;
209 entity->password, secure, NULL);
/freebsd-9.3-release/contrib/bind9/lib/dns/
H A Dzone.c380 dns_zone_t *secure; member in struct:dns_zone
946 zone->secure = NULL;
1106 if (zone->secure != NULL)
1844 result = zone_load(zone->secure, DNS_ZONELOADFLAG_THAW);
3812 * 'secure' zone. We now need information about the status of the
3852 * If this is a inline_raw zone the secure version is also locked.
3870 INSIST(LOCKED_ZONE(zone->secure));
4220 if (zone->secure->db == NULL)
4612 dns_zone_t *secure = NULL; local
4652 secure
8174 isc_boolean_t secure; local
8959 dns_zone_t *secure = NULL; local
11415 dns_zone_t *raw = NULL, *secure = NULL; local
13402 dns_zone_t *secure = NULL; local
13422 dns_zone_t *secure = NULL; local
13670 dns_zone_t *secure = NULL; local
13936 dns_zone_t *secure = NULL; local
16702 dns_zone_t *secure = NULL; local
[all...]
H A Dacl.c505 isc_boolean_t secure; local
511 /* Negated entries are always secure. */
512 secure = * (isc_boolean_t *)data[ISC_IS6(family)];
513 if (!secure) {
H A Dncache.c53 isc_boolean_t optout, isc_boolean_t secure,
122 isc_boolean_t optout, isc_boolean_t secure,
261 if (!secure && trust > dns_trust_answer)
120 addoptout(dns_message_t *message, dns_db_t *cache, dns_dbnode_t *node, dns_rdatatype_t covers, isc_stdtime_t now, dns_ttl_t maxttl, isc_boolean_t optout, isc_boolean_t secure, dns_rdataset_t *addedrdataset) argument
H A Drbtdb.c388 dns_db_secure_t secure; member in struct:rbtdb_version
1115 version->secure = rbtdb->current_version->secure;
2028 version->secure = dns_db_insecure;
2051 version->secure = dns_db_secure;
2053 version->secure = dns_db_insecure;
2352 * Update the zone's secure status.
3431 dns_db_secure_t secure)
3444 isc_boolean_t need_sig = ISC_TF(secure == dns_db_secure);
3719 if ((search.rbtversion->secure
3428 find_closest_nsec(rbtdb_search_t *search, dns_dbnode_t **nodep, dns_name_t *foundname, dns_rdataset_t *rdataset, dns_rdataset_t *sigrdataset, dns_rbt_t *tree, dns_db_secure_t secure) argument
7167 isc_boolean_t secure; local
[all...]
H A Dupdate.c784 * after a secure update.
901 isc_boolean_t secure = dns_db_issecure(db); local
924 "secure zone with no NSECs");
939 if (secure) {
1365 "could not get zone keys for secure dynamic update");
H A Dvalidator.c57 * validator_start -> validate -> nsecvalidate (secure wildcard answer)
198 event->secure = ISC_TRUE;
438 * Only extract the dst key if the keyset is secure.
557 * a delegation point we are transitioning from a secure zone to a
560 * If the DS record exists it will be secure. We can continue looking
608 "must be secure failure, no DS"
630 * In either case we are still in a secure zone resume
687 * Only extract the dst key if the keyset is secure.
768 "must be secure failure, no DS "
1609 * There isn't a secure DNSKE
[all...]
/freebsd-9.3-release/etc/
H A Dprotocols92 secure-vmtp 82 SECURE-VMTP # SECURE-VMTP
H A Dservices475 set 257/tcp #secure electronic transaction
476 set 257/udp #secure electronic transaction
1226 asf-secure-rmcp 664/tcp #ASF Secure Remote Management and Control Protocol
1227 asf-secure-rmcp 664/udp #ASF Secure Remote Management and Control Protocol
/freebsd-9.3-release/crypto/openssh/contrib/suse/
H A Dopenssh.spec55 rlogin and rsh, and provide secure encrypted communications between
57 arbitrary TCP/IP ports can also be forwarded over the secure channel.
69 rlogin and rsh, and provide secure encrypted communications between
71 arbitrary TCP/IP ports can also be forwarded over the secure channel.
/freebsd-9.3-release/crypto/openssh/contrib/redhat/
H A Dopenssh.spec137 rsh, and to provide secure encrypted communications between two
139 arbitrary TCP/IP ports can also be forwarded over the secure channel.
158 the secure shell daemon (sshd). The sshd daemon allows SSH clients to
/freebsd-9.3-release/crypto/heimdal/lib/krb5/
H A Dkrb5.h677 krb5_boolean secure; member in struct:krb5_verify_opt
/freebsd-9.3-release/contrib/llvm/tools/clang/lib/StaticAnalyzer/Checkers/
H A DCheckSecuritySyntaxOnly.cpp475 " format string to be secure (" << numX << " 'X'";
638 "'random' is not a secure random number generator",
/freebsd-9.3-release/contrib/wpa/src/ap/
H A Dwpa_auth.c1059 wpa_printf(MSG_DEBUG, "WPA: Send EAPOL(version=%d secure=%d mic=%d "
1685 int wpa_ie_len, secure, keyidx, encr = 0; local
1716 secure = 1;
1724 secure = 0;
1803 (secure ? WPA_KEY_INFO_SECURE : 0) | WPA_KEY_INFO_MIC |
/freebsd-9.3-release/contrib/wpa/src/rsn_supp/
H A Dwpa.c444 const u8 *addr, int secure)
454 if (secure) {
443 wpa_supplicant_key_neg_complete(struct wpa_sm *sm, const u8 *addr, int secure) argument
/freebsd-9.3-release/contrib/bind9/bin/dnssec/
H A Ddnssec-signzone.c1006 secure(dns_name_t *name, dns_dbnode_t *node) { function
1475 secure(name, node))
2216 !secure(nextname, nextnode)) {
2344 !secure(nextname, nextnode)) {
2955 fprintf(stderr, "use pseudorandom data (faster but less secure)\n");
/freebsd-9.3-release/release/picobsd/build/
H A Dpicobsd217 for i in lib secure/lib gnu/lib \
612 secure/usr.bin secure/usr.sbin secure/libexec secure/lib"
/freebsd-9.3-release/contrib/bind9/lib/bind9/
H A Dcheck.c335 mustbesecure(const cfg_obj_t *secure, isc_symtab_t *symtab, isc_log_t *logctx, argument
348 obj = cfg_tuple_get(secure, "name");
358 result = nameexist(secure, namebuf, 1, symtab,
359 "dnssec-must-be-secure '%s': already "
962 * Check dnssec-must-be-secure.
965 (void)cfg_map_get(options, "dnssec-must-be-secure", &obj);
1345 { "dnssec-secure-to-insecure", MASTERZONE },

Completed in 690 milliseconds

123