/dports/security/tor/tor-0.4.6.8/src/test/ |
H A D | test_keygen.sh | 123 ${TOR} --DataDirectory "${DATA_DIR}/orig" ${SILENTLY} --list-fingerprint > /dev/null 133 ${TOR} --DataDirectory "${DATA_DIR}/keygen" --keygen --no-passphrase 2>"${DATA_DIR}/keygen/stderr" 145 echo "passphrase" | ${TOR} --DataDirectory "${DATA_DIR}/encrypted" --keygen --passphrase-fd 0 169 if ${TOR} --DataDirectory "${ME}" --list-fingerprint > "${ME}/stdout"; then 228 ${TOR} --DataDirectory "${ME}" --keygen || die "Keygen failed with only master key" 308 if ${TOR} --DataDirectory "${ME}" --list-fingerprint > "${ME}/stdout"; then 399 if ${TOR} --DataDirectory "${ME}" --list-fingerprint >"${ME}/stdout"; then 417 if ${TOR} --DataDirectory "${ME}" --passphrase-fd 1 > "${ME}/stdout"; then 435 if ${TOR} --DataDirectory "${ME}" --no-passphrase > "${ME}/stdout"; then 453 if ${TOR} --DataDirectory "${ME}" --newpass > "${ME}/stdout"; then [all …]
|
H A D | test_key_expiration.sh | 102 TOR="${TOR_BINARY} --DisableNetwork 1 --ShutdownWaitLength 0 --ORPort 12345 --ExitRelay 0 --DataDir… 110 ${TOR} ${SILENTLY} --list-fingerprint > /dev/null 131 ${TOR} ${QUIETLY} --key-expiration 2>"$FN" || true 142 ${TOR} ${QUIETLY} --key-expiration sign 2>"$FN" 157 ${TOR} --key-expiration sign > "$FN" 2>&1 174 ${TOR} --format iso8601 > "$FN" 2>&1 || true 185 ${TOR} --key-expiration sign --format > "$FN" 2>&1 || true 197 ${TOR} --key-expiration sign --format invalid > "$FN" 2>&1 || true 209 ${TOR} ${QUIETLY} --key-expiration sign --format iso8601 2>"$FN" 221 ${TOR} ${QUIETLY} --key-expiration sign --format timestamp 2>"$FN"
|
H A D | zero_length_keys.sh | 50 TOR="${TOR_BINARY} --hush --DisableNetwork 1 --ShutdownWaitLength 0 --ORPort 12345 --ExitRelay 0 -f… 58 $TOR --DataDirectory "$DATA_DIR" --list-fingerprint 95 $TOR --DataDirectory "$DATA_DIR" --list-fingerprint
|
/dports/security/tor-devel/tor-0.4.7.2-alpha/src/test/ |
H A D | test_keygen.sh | 123 ${TOR} --DataDirectory "${DATA_DIR}/orig" ${SILENTLY} --list-fingerprint > /dev/null 133 ${TOR} --DataDirectory "${DATA_DIR}/keygen" --keygen --no-passphrase 2>"${DATA_DIR}/keygen/stderr" 145 echo "passphrase" | ${TOR} --DataDirectory "${DATA_DIR}/encrypted" --keygen --passphrase-fd 0 169 if ${TOR} --DataDirectory "${ME}" --list-fingerprint > "${ME}/stdout"; then 228 ${TOR} --DataDirectory "${ME}" --keygen || die "Keygen failed with only master key" 308 if ${TOR} --DataDirectory "${ME}" --list-fingerprint > "${ME}/stdout"; then 399 if ${TOR} --DataDirectory "${ME}" --list-fingerprint >"${ME}/stdout"; then 417 if ${TOR} --DataDirectory "${ME}" --passphrase-fd 1 > "${ME}/stdout"; then 435 if ${TOR} --DataDirectory "${ME}" --no-passphrase > "${ME}/stdout"; then 453 if ${TOR} --DataDirectory "${ME}" --newpass > "${ME}/stdout"; then [all …]
|
H A D | test_key_expiration.sh | 102 TOR="${TOR_BINARY} --DisableNetwork 1 --ShutdownWaitLength 0 --ORPort 12345 --ExitRelay 0 --DataDir… 110 ${TOR} ${SILENTLY} --list-fingerprint > /dev/null 131 ${TOR} ${QUIETLY} --key-expiration 2>"$FN" || true 142 ${TOR} ${QUIETLY} --key-expiration sign 2>"$FN" 157 ${TOR} --key-expiration sign > "$FN" 2>&1 174 ${TOR} --format iso8601 > "$FN" 2>&1 || true 185 ${TOR} --key-expiration sign --format > "$FN" 2>&1 || true 197 ${TOR} --key-expiration sign --format invalid > "$FN" 2>&1 || true 209 ${TOR} ${QUIETLY} --key-expiration sign --format iso8601 2>"$FN" 221 ${TOR} ${QUIETLY} --key-expiration sign --format timestamp 2>"$FN"
|
H A D | zero_length_keys.sh | 50 TOR="${TOR_BINARY} --hush --DisableNetwork 1 --ShutdownWaitLength 0 --ORPort 12345 --ExitRelay 0 -f… 58 $TOR --DataDirectory "$DATA_DIR" --list-fingerprint 95 $TOR --DataDirectory "$DATA_DIR" --list-fingerprint
|
/dports/devel/gllvm/gllvm-1.3.0/examples/tor_and_its_dependencies/ |
H A D | Makefile | 22 TOR=tor-0.3.3.6 macro 23 TOR_TARBALL=${TOR}.tar.gz 44 ${TOR}: ${TOR_TARBALL} 47 ${TOR_INSTALL}/bin/tor: ${TOR} 48 cd ${TOR}; CC=${LLVMCC} ./configure; make && make install 101 make -C ${TOR} clean 104 rm -rf install ${TOR} ${ZLIB} ${OPENSSL} ${LIBEVENT}
|
/dports/net-p2p/bitcoin-utils/bitcoin-22.0/src/ |
H A D | torcontrol.cpp | 101 … LogPrint(BCLog::TOR, "tor: Received unexpected sync reply %i\n", self->message.code); in readcb() 120 LogPrint(BCLog::TOR, "tor: Successfully connected!\n"); in eventcb() 124 LogPrint(BCLog::TOR, "tor: Error connecting to Tor control socket\n"); in eventcb() 126 LogPrint(BCLog::TOR, "tor: End of stream\n"); in eventcb() 332 LogPrint(BCLog::TOR, "tor: ADD_ONION successful\n"); in add_onion_cb() 367 LogPrint(BCLog::TOR, "tor: Authentication successful\n"); in auth_cb() 421 LogPrint(BCLog::TOR, "tor: SAFECOOKIE authentication challenge successful\n"); in authchallenge_cb() 476 LogPrint(BCLog::TOR, "tor: Connected to Tor version %s\n", i->second); in protocolinfo_cb() 481 LogPrint(BCLog::TOR, "tor: Supported authentication method: %s\n", s); in protocolinfo_cb() 491 LogPrint(BCLog::TOR, "tor: Using HASHEDPASSWORD authentication\n"); in protocolinfo_cb() [all …]
|
/dports/net-p2p/bitcoin-daemon/bitcoin-22.0/src/ |
H A D | torcontrol.cpp | 101 … LogPrint(BCLog::TOR, "tor: Received unexpected sync reply %i\n", self->message.code); in readcb() 120 LogPrint(BCLog::TOR, "tor: Successfully connected!\n"); in eventcb() 124 LogPrint(BCLog::TOR, "tor: Error connecting to Tor control socket\n"); in eventcb() 126 LogPrint(BCLog::TOR, "tor: End of stream\n"); in eventcb() 332 LogPrint(BCLog::TOR, "tor: ADD_ONION successful\n"); in add_onion_cb() 367 LogPrint(BCLog::TOR, "tor: Authentication successful\n"); in auth_cb() 421 LogPrint(BCLog::TOR, "tor: SAFECOOKIE authentication challenge successful\n"); in authchallenge_cb() 476 LogPrint(BCLog::TOR, "tor: Connected to Tor version %s\n", i->second); in protocolinfo_cb() 481 LogPrint(BCLog::TOR, "tor: Supported authentication method: %s\n", s); in protocolinfo_cb() 491 LogPrint(BCLog::TOR, "tor: Using HASHEDPASSWORD authentication\n"); in protocolinfo_cb() [all …]
|
/dports/net-p2p/bitcoin/bitcoin-22.0/src/ |
H A D | torcontrol.cpp | 101 … LogPrint(BCLog::TOR, "tor: Received unexpected sync reply %i\n", self->message.code); in readcb() 120 LogPrint(BCLog::TOR, "tor: Successfully connected!\n"); in eventcb() 124 LogPrint(BCLog::TOR, "tor: Error connecting to Tor control socket\n"); in eventcb() 126 LogPrint(BCLog::TOR, "tor: End of stream\n"); in eventcb() 332 LogPrint(BCLog::TOR, "tor: ADD_ONION successful\n"); in add_onion_cb() 367 LogPrint(BCLog::TOR, "tor: Authentication successful\n"); in auth_cb() 421 LogPrint(BCLog::TOR, "tor: SAFECOOKIE authentication challenge successful\n"); in authchallenge_cb() 476 LogPrint(BCLog::TOR, "tor: Connected to Tor version %s\n", i->second); in protocolinfo_cb() 481 LogPrint(BCLog::TOR, "tor: Supported authentication method: %s\n", s); in protocolinfo_cb() 491 LogPrint(BCLog::TOR, "tor: Using HASHEDPASSWORD authentication\n"); in protocolinfo_cb() [all …]
|
/dports/net-p2p/litecoin-daemon/litecoin-0.18.1/src/ |
H A D | torcontrol.cpp | 183 LogPrint(BCLog::TOR, "tor: Successfully connected!\n"); in eventcb() 187 LogPrint(BCLog::TOR, "tor: Error connecting to Tor control socket\n"); in eventcb() 189 LogPrint(BCLog::TOR, "tor: End of stream\n"); in eventcb() 488 LogPrint(BCLog::TOR, "tor: ADD_ONION successful\n"); in add_onion_cb() 523 LogPrint(BCLog::TOR, "tor: Authentication successful\n"); in auth_cb() 576 LogPrint(BCLog::TOR, "tor: SAFECOOKIE authentication challenge successful\n"); in authchallenge_cb() 631 LogPrint(BCLog::TOR, "tor: Connected to Tor version %s\n", i->second); in protocolinfo_cb() 636 LogPrint(BCLog::TOR, "tor: Supported authentication method: %s\n", s); in protocolinfo_cb() 646 LogPrint(BCLog::TOR, "tor: Using HASHEDPASSWORD authentication\n"); in protocolinfo_cb() 653 LogPrint(BCLog::TOR, "tor: Using NULL authentication\n"); in protocolinfo_cb() [all …]
|
/dports/net-p2p/litecoin-utils/litecoin-0.18.1/src/ |
H A D | torcontrol.cpp | 183 LogPrint(BCLog::TOR, "tor: Successfully connected!\n"); in eventcb() 187 LogPrint(BCLog::TOR, "tor: Error connecting to Tor control socket\n"); in eventcb() 189 LogPrint(BCLog::TOR, "tor: End of stream\n"); in eventcb() 488 LogPrint(BCLog::TOR, "tor: ADD_ONION successful\n"); in add_onion_cb() 523 LogPrint(BCLog::TOR, "tor: Authentication successful\n"); in auth_cb() 576 LogPrint(BCLog::TOR, "tor: SAFECOOKIE authentication challenge successful\n"); in authchallenge_cb() 631 LogPrint(BCLog::TOR, "tor: Connected to Tor version %s\n", i->second); in protocolinfo_cb() 636 LogPrint(BCLog::TOR, "tor: Supported authentication method: %s\n", s); in protocolinfo_cb() 646 LogPrint(BCLog::TOR, "tor: Using HASHEDPASSWORD authentication\n"); in protocolinfo_cb() 653 LogPrint(BCLog::TOR, "tor: Using NULL authentication\n"); in protocolinfo_cb() [all …]
|
/dports/net-p2p/qtum/qtum-mainnet-fastlane-v0.20.3/src/ |
H A D | torcontrol.cpp | 183 LogPrint(BCLog::TOR, "tor: Successfully connected!\n"); in eventcb() 187 LogPrint(BCLog::TOR, "tor: Error connecting to Tor control socket\n"); in eventcb() 189 LogPrint(BCLog::TOR, "tor: End of stream\n"); in eventcb() 488 LogPrint(BCLog::TOR, "tor: ADD_ONION successful\n"); in add_onion_cb() 523 LogPrint(BCLog::TOR, "tor: Authentication successful\n"); in auth_cb() 576 LogPrint(BCLog::TOR, "tor: SAFECOOKIE authentication challenge successful\n"); in authchallenge_cb() 631 LogPrint(BCLog::TOR, "tor: Connected to Tor version %s\n", i->second); in protocolinfo_cb() 636 LogPrint(BCLog::TOR, "tor: Supported authentication method: %s\n", s); in protocolinfo_cb() 646 LogPrint(BCLog::TOR, "tor: Using HASHEDPASSWORD authentication\n"); in protocolinfo_cb() 653 LogPrint(BCLog::TOR, "tor: Using NULL authentication\n"); in protocolinfo_cb() [all …]
|
/dports/net-p2p/namecoin-daemon/namecoin-core-nc0.21.0.1/src/ |
H A D | torcontrol.cpp | 167 … LogPrint(BCLog::TOR, "tor: Received unexpected sync reply %i\n", self->message.code); in readcb() 186 LogPrint(BCLog::TOR, "tor: Successfully connected!\n"); in eventcb() 190 LogPrint(BCLog::TOR, "tor: Error connecting to Tor control socket\n"); in eventcb() 192 LogPrint(BCLog::TOR, "tor: End of stream\n"); in eventcb() 493 LogPrint(BCLog::TOR, "tor: ADD_ONION successful\n"); in add_onion_cb() 528 LogPrint(BCLog::TOR, "tor: Authentication successful\n"); in auth_cb() 582 LogPrint(BCLog::TOR, "tor: SAFECOOKIE authentication challenge successful\n"); in authchallenge_cb() 637 LogPrint(BCLog::TOR, "tor: Connected to Tor version %s\n", i->second); in protocolinfo_cb() 642 LogPrint(BCLog::TOR, "tor: Supported authentication method: %s\n", s); in protocolinfo_cb() 652 LogPrint(BCLog::TOR, "tor: Using HASHEDPASSWORD authentication\n"); in protocolinfo_cb() [all …]
|
/dports/net-p2p/namecoin/namecoin-core-nc0.21.0.1/src/ |
H A D | torcontrol.cpp | 167 … LogPrint(BCLog::TOR, "tor: Received unexpected sync reply %i\n", self->message.code); in readcb() 186 LogPrint(BCLog::TOR, "tor: Successfully connected!\n"); in eventcb() 190 LogPrint(BCLog::TOR, "tor: Error connecting to Tor control socket\n"); in eventcb() 192 LogPrint(BCLog::TOR, "tor: End of stream\n"); in eventcb() 493 LogPrint(BCLog::TOR, "tor: ADD_ONION successful\n"); in add_onion_cb() 528 LogPrint(BCLog::TOR, "tor: Authentication successful\n"); in auth_cb() 582 LogPrint(BCLog::TOR, "tor: SAFECOOKIE authentication challenge successful\n"); in authchallenge_cb() 637 LogPrint(BCLog::TOR, "tor: Connected to Tor version %s\n", i->second); in protocolinfo_cb() 642 LogPrint(BCLog::TOR, "tor: Supported authentication method: %s\n", s); in protocolinfo_cb() 652 LogPrint(BCLog::TOR, "tor: Using HASHEDPASSWORD authentication\n"); in protocolinfo_cb() [all …]
|
/dports/net-p2p/namecoin-utils/namecoin-core-nc0.21.0.1/src/ |
H A D | torcontrol.cpp | 167 … LogPrint(BCLog::TOR, "tor: Received unexpected sync reply %i\n", self->message.code); in readcb() 186 LogPrint(BCLog::TOR, "tor: Successfully connected!\n"); in eventcb() 190 LogPrint(BCLog::TOR, "tor: Error connecting to Tor control socket\n"); in eventcb() 192 LogPrint(BCLog::TOR, "tor: End of stream\n"); in eventcb() 493 LogPrint(BCLog::TOR, "tor: ADD_ONION successful\n"); in add_onion_cb() 528 LogPrint(BCLog::TOR, "tor: Authentication successful\n"); in auth_cb() 582 LogPrint(BCLog::TOR, "tor: SAFECOOKIE authentication challenge successful\n"); in authchallenge_cb() 637 LogPrint(BCLog::TOR, "tor: Connected to Tor version %s\n", i->second); in protocolinfo_cb() 642 LogPrint(BCLog::TOR, "tor: Supported authentication method: %s\n", s); in protocolinfo_cb() 652 LogPrint(BCLog::TOR, "tor: Using HASHEDPASSWORD authentication\n"); in protocolinfo_cb() [all …]
|
/dports/net-p2p/litecoin/litecoin-0.18.1/src/ |
H A D | torcontrol.cpp | 183 LogPrint(BCLog::TOR, "tor: Successfully connected!\n"); in eventcb() 187 LogPrint(BCLog::TOR, "tor: Error connecting to Tor control socket\n"); in eventcb() 189 LogPrint(BCLog::TOR, "tor: End of stream\n"); in eventcb() 488 LogPrint(BCLog::TOR, "tor: ADD_ONION successful\n"); in add_onion_cb() 523 LogPrint(BCLog::TOR, "tor: Authentication successful\n"); in auth_cb() 576 LogPrint(BCLog::TOR, "tor: SAFECOOKIE authentication challenge successful\n"); in authchallenge_cb() 631 LogPrint(BCLog::TOR, "tor: Connected to Tor version %s\n", i->second); in protocolinfo_cb() 636 LogPrint(BCLog::TOR, "tor: Supported authentication method: %s\n", s); in protocolinfo_cb() 646 LogPrint(BCLog::TOR, "tor: Using HASHEDPASSWORD authentication\n"); in protocolinfo_cb() 653 LogPrint(BCLog::TOR, "tor: Using NULL authentication\n"); in protocolinfo_cb() [all …]
|
/dports/science/aircraft-datcom/aircraft-datcom-ed877bb/src/ |
H A D | ptcp.f | 1 SUBROUTINE PTCP(RSP,TOR,CASENO,PSTROT,TCPOUT) argument 22 IF(TOR.EQ.2.0)GO TO 1070 57 IF(TOR.EQ.1.0)GO TO 1220 110 IF(TOR.EQ.2.0)GO TO 1180 126 IF(.NOT.ONLY10.AND.TOR.EQ.1.0)GO TO 1200 127 IF(TOR.EQ.2.0)GO TO 1200 181 IF(.NOT.ONLY10.AND.TOR.EQ.1.0)GO TO 1020 196 IF(.NOT.ONLY10.AND.TOR.EQ.1.0)GO TO 1040
|
/dports/net/py-sbws/sbws-25aa5b232ca26729e1bf30a7c5a54fd22f5c3eeb/ |
H A D | .gitlab-ci.yml | 23 TOR: tor/tor-nightly-master-buster 40 - apt install -yqq $TOR 60 TOR: tor/tor-nightly-0.3.5.x-buster 70 TOR: tor/tor-nightly-0.4.5.x-buster 80 TOR: tor/tor-nightly-0.4.6.x-buster 98 TOR: tor/buster 115 - apt install -yqq $TOR
|
H A D | .travis.yml | 15 ## The TOR env var should be kept in sync with the Linux tor version in 17 - TOR="master-nightly" 40 env: TOR="0.3.5-nightly" 48 env: TOR="0.4.1-nightly" 57 env: TOR="stable-release" 65 env: TOR="0.4.2-nightly"
|
/dports/net-p2p/torrentsniff/torrentsniff-0.3.0/ |
H A D | torrentsniff | 117 local *TOR; 118 if( not open(TOR, "< $file") ) { 122 binmode(TOR); 124 read(TOR, $body, (-s $file)); 125 close(TOR);
|
/dports/science/mdynamix/md528/ |
H A D | service.f | 634 TOR(II)=0.d0 648 TOR(1)=TOR(1)+MASSD(IS)*(WY(N)**2+WZ(N)**2) 649 TOR(5)=TOR(5)+MASSD(IS)*(WX(N)**2+WZ(N)**2) 650 TOR(9)=TOR(9)+MASSD(IS)*(WX(N)**2+WY(N)**2) 651 TOR(2)=TOR(2)-MASSD(IS)*WX(N)*WY(N) 652 TOR(3)=TOR(3)-MASSD(IS)*WX(N)*WZ(N) 653 TOR(6)=TOR(6)-MASSD(IS)*WY(N)*WZ(N) 655 TOR(4)=TOR(2) 656 TOR(7)=TOR(3) 657 TOR(8)=TOR(6) [all …]
|
/dports/security/tor-devel/tor-0.4.7.2-alpha/scripts/maint/ |
H A D | run_check_subsystem_order.sh | 5 TOR="${abs_top_builddir:-.}/src/app/tor" 14 "${TOR}" --dbg-dump-subsystem-list | \
|
/dports/security/tor/tor-0.4.6.8/scripts/maint/ |
H A D | run_check_subsystem_order.sh | 5 TOR="${abs_top_builddir:-.}/src/app/tor" 14 "${TOR}" --dbg-dump-subsystem-list | \
|
/dports/biology/gatk/gatk-4.2.0.0/src/test/resources/org/broadinstitute/hellbender/tools/funcotator/ |
H A D | Three_sample_somatic.vcf | 112 ##FORMAT=<ID=TOR,Number=2,Type=Integer,Description="Other reads (weak support or insufficient indel… 122 …3;QSI_NT=33;RC=5;RU=A;SGT=ref->het;SOMATIC;TQSI=1;TQSI_NT=1 DP:DP2:TAR:TIR:TOR:DP50:FDP50:SUBDP50 … 123 …3;QSI_NT=43;RC=6;RU=A;SGT=ref->het;SOMATIC;TQSI=2;TQSI_NT=2 DP:DP2:TAR:TIR:TOR:DP50:FDP50:SUBDP50 … 124 …6;QSI_NT=36;RC=7;RU=A;SGT=ref->het;SOMATIC;TQSI=1;TQSI_NT=1 DP:DP2:TAR:TIR:TOR:DP50:FDP50:SUBDP50 … 125 …QSI_NT=88;RC=1;RU=AGA;SGT=ref->het;SOMATIC;TQSI=1;TQSI_NT=1 DP:DP2:TAR:TIR:TOR:DP50:FDP50:SUBDP50 … 126 …QSI_NT=88;RC=1;RU=AGA;SGT=ref->het;SOMATIC;TQSI=1;TQSI_NT=1 DP:DP2:TAR:TIR:TOR:DP50:FDP50:SUBDP50 … 127 …QSI_NT=88;RC=1;RU=AGA;SGT=ref->het;SOMATIC;TQSI=1;TQSI_NT=1 DP:DP2:TAR:TIR:TOR:DP50:FDP50:SUBDP50 …
|