Home
last modified time | relevance | path

Searched refs:TOR (Results 1 – 25 of 418) sorted by relevance

12345678910>>...17

/dports/security/tor/tor-0.4.6.8/src/test/
H A Dtest_keygen.sh123 ${TOR} --DataDirectory "${DATA_DIR}/orig" ${SILENTLY} --list-fingerprint > /dev/null
133 ${TOR} --DataDirectory "${DATA_DIR}/keygen" --keygen --no-passphrase 2>"${DATA_DIR}/keygen/stderr"
145 echo "passphrase" | ${TOR} --DataDirectory "${DATA_DIR}/encrypted" --keygen --passphrase-fd 0
169 if ${TOR} --DataDirectory "${ME}" --list-fingerprint > "${ME}/stdout"; then
228 ${TOR} --DataDirectory "${ME}" --keygen || die "Keygen failed with only master key"
308 if ${TOR} --DataDirectory "${ME}" --list-fingerprint > "${ME}/stdout"; then
399 if ${TOR} --DataDirectory "${ME}" --list-fingerprint >"${ME}/stdout"; then
417 if ${TOR} --DataDirectory "${ME}" --passphrase-fd 1 > "${ME}/stdout"; then
435 if ${TOR} --DataDirectory "${ME}" --no-passphrase > "${ME}/stdout"; then
453 if ${TOR} --DataDirectory "${ME}" --newpass > "${ME}/stdout"; then
[all …]
H A Dtest_key_expiration.sh102 TOR="${TOR_BINARY} --DisableNetwork 1 --ShutdownWaitLength 0 --ORPort 12345 --ExitRelay 0 --DataDir…
110 ${TOR} ${SILENTLY} --list-fingerprint > /dev/null
131 ${TOR} ${QUIETLY} --key-expiration 2>"$FN" || true
142 ${TOR} ${QUIETLY} --key-expiration sign 2>"$FN"
157 ${TOR} --key-expiration sign > "$FN" 2>&1
174 ${TOR} --format iso8601 > "$FN" 2>&1 || true
185 ${TOR} --key-expiration sign --format > "$FN" 2>&1 || true
197 ${TOR} --key-expiration sign --format invalid > "$FN" 2>&1 || true
209 ${TOR} ${QUIETLY} --key-expiration sign --format iso8601 2>"$FN"
221 ${TOR} ${QUIETLY} --key-expiration sign --format timestamp 2>"$FN"
H A Dzero_length_keys.sh50 TOR="${TOR_BINARY} --hush --DisableNetwork 1 --ShutdownWaitLength 0 --ORPort 12345 --ExitRelay 0 -f…
58 $TOR --DataDirectory "$DATA_DIR" --list-fingerprint
95 $TOR --DataDirectory "$DATA_DIR" --list-fingerprint
/dports/security/tor-devel/tor-0.4.7.2-alpha/src/test/
H A Dtest_keygen.sh123 ${TOR} --DataDirectory "${DATA_DIR}/orig" ${SILENTLY} --list-fingerprint > /dev/null
133 ${TOR} --DataDirectory "${DATA_DIR}/keygen" --keygen --no-passphrase 2>"${DATA_DIR}/keygen/stderr"
145 echo "passphrase" | ${TOR} --DataDirectory "${DATA_DIR}/encrypted" --keygen --passphrase-fd 0
169 if ${TOR} --DataDirectory "${ME}" --list-fingerprint > "${ME}/stdout"; then
228 ${TOR} --DataDirectory "${ME}" --keygen || die "Keygen failed with only master key"
308 if ${TOR} --DataDirectory "${ME}" --list-fingerprint > "${ME}/stdout"; then
399 if ${TOR} --DataDirectory "${ME}" --list-fingerprint >"${ME}/stdout"; then
417 if ${TOR} --DataDirectory "${ME}" --passphrase-fd 1 > "${ME}/stdout"; then
435 if ${TOR} --DataDirectory "${ME}" --no-passphrase > "${ME}/stdout"; then
453 if ${TOR} --DataDirectory "${ME}" --newpass > "${ME}/stdout"; then
[all …]
H A Dtest_key_expiration.sh102 TOR="${TOR_BINARY} --DisableNetwork 1 --ShutdownWaitLength 0 --ORPort 12345 --ExitRelay 0 --DataDir…
110 ${TOR} ${SILENTLY} --list-fingerprint > /dev/null
131 ${TOR} ${QUIETLY} --key-expiration 2>"$FN" || true
142 ${TOR} ${QUIETLY} --key-expiration sign 2>"$FN"
157 ${TOR} --key-expiration sign > "$FN" 2>&1
174 ${TOR} --format iso8601 > "$FN" 2>&1 || true
185 ${TOR} --key-expiration sign --format > "$FN" 2>&1 || true
197 ${TOR} --key-expiration sign --format invalid > "$FN" 2>&1 || true
209 ${TOR} ${QUIETLY} --key-expiration sign --format iso8601 2>"$FN"
221 ${TOR} ${QUIETLY} --key-expiration sign --format timestamp 2>"$FN"
H A Dzero_length_keys.sh50 TOR="${TOR_BINARY} --hush --DisableNetwork 1 --ShutdownWaitLength 0 --ORPort 12345 --ExitRelay 0 -f…
58 $TOR --DataDirectory "$DATA_DIR" --list-fingerprint
95 $TOR --DataDirectory "$DATA_DIR" --list-fingerprint
/dports/devel/gllvm/gllvm-1.3.0/examples/tor_and_its_dependencies/
H A DMakefile22 TOR=tor-0.3.3.6 macro
23 TOR_TARBALL=${TOR}.tar.gz
44 ${TOR}: ${TOR_TARBALL}
47 ${TOR_INSTALL}/bin/tor: ${TOR}
48 cd ${TOR}; CC=${LLVMCC} ./configure; make && make install
101 make -C ${TOR} clean
104 rm -rf install ${TOR} ${ZLIB} ${OPENSSL} ${LIBEVENT}
/dports/net-p2p/bitcoin-utils/bitcoin-22.0/src/
H A Dtorcontrol.cpp101 … LogPrint(BCLog::TOR, "tor: Received unexpected sync reply %i\n", self->message.code); in readcb()
120 LogPrint(BCLog::TOR, "tor: Successfully connected!\n"); in eventcb()
124 LogPrint(BCLog::TOR, "tor: Error connecting to Tor control socket\n"); in eventcb()
126 LogPrint(BCLog::TOR, "tor: End of stream\n"); in eventcb()
332 LogPrint(BCLog::TOR, "tor: ADD_ONION successful\n"); in add_onion_cb()
367 LogPrint(BCLog::TOR, "tor: Authentication successful\n"); in auth_cb()
421 LogPrint(BCLog::TOR, "tor: SAFECOOKIE authentication challenge successful\n"); in authchallenge_cb()
476 LogPrint(BCLog::TOR, "tor: Connected to Tor version %s\n", i->second); in protocolinfo_cb()
481 LogPrint(BCLog::TOR, "tor: Supported authentication method: %s\n", s); in protocolinfo_cb()
491 LogPrint(BCLog::TOR, "tor: Using HASHEDPASSWORD authentication\n"); in protocolinfo_cb()
[all …]
/dports/net-p2p/bitcoin-daemon/bitcoin-22.0/src/
H A Dtorcontrol.cpp101 … LogPrint(BCLog::TOR, "tor: Received unexpected sync reply %i\n", self->message.code); in readcb()
120 LogPrint(BCLog::TOR, "tor: Successfully connected!\n"); in eventcb()
124 LogPrint(BCLog::TOR, "tor: Error connecting to Tor control socket\n"); in eventcb()
126 LogPrint(BCLog::TOR, "tor: End of stream\n"); in eventcb()
332 LogPrint(BCLog::TOR, "tor: ADD_ONION successful\n"); in add_onion_cb()
367 LogPrint(BCLog::TOR, "tor: Authentication successful\n"); in auth_cb()
421 LogPrint(BCLog::TOR, "tor: SAFECOOKIE authentication challenge successful\n"); in authchallenge_cb()
476 LogPrint(BCLog::TOR, "tor: Connected to Tor version %s\n", i->second); in protocolinfo_cb()
481 LogPrint(BCLog::TOR, "tor: Supported authentication method: %s\n", s); in protocolinfo_cb()
491 LogPrint(BCLog::TOR, "tor: Using HASHEDPASSWORD authentication\n"); in protocolinfo_cb()
[all …]
/dports/net-p2p/bitcoin/bitcoin-22.0/src/
H A Dtorcontrol.cpp101 … LogPrint(BCLog::TOR, "tor: Received unexpected sync reply %i\n", self->message.code); in readcb()
120 LogPrint(BCLog::TOR, "tor: Successfully connected!\n"); in eventcb()
124 LogPrint(BCLog::TOR, "tor: Error connecting to Tor control socket\n"); in eventcb()
126 LogPrint(BCLog::TOR, "tor: End of stream\n"); in eventcb()
332 LogPrint(BCLog::TOR, "tor: ADD_ONION successful\n"); in add_onion_cb()
367 LogPrint(BCLog::TOR, "tor: Authentication successful\n"); in auth_cb()
421 LogPrint(BCLog::TOR, "tor: SAFECOOKIE authentication challenge successful\n"); in authchallenge_cb()
476 LogPrint(BCLog::TOR, "tor: Connected to Tor version %s\n", i->second); in protocolinfo_cb()
481 LogPrint(BCLog::TOR, "tor: Supported authentication method: %s\n", s); in protocolinfo_cb()
491 LogPrint(BCLog::TOR, "tor: Using HASHEDPASSWORD authentication\n"); in protocolinfo_cb()
[all …]
/dports/net-p2p/litecoin-daemon/litecoin-0.18.1/src/
H A Dtorcontrol.cpp183 LogPrint(BCLog::TOR, "tor: Successfully connected!\n"); in eventcb()
187 LogPrint(BCLog::TOR, "tor: Error connecting to Tor control socket\n"); in eventcb()
189 LogPrint(BCLog::TOR, "tor: End of stream\n"); in eventcb()
488 LogPrint(BCLog::TOR, "tor: ADD_ONION successful\n"); in add_onion_cb()
523 LogPrint(BCLog::TOR, "tor: Authentication successful\n"); in auth_cb()
576 LogPrint(BCLog::TOR, "tor: SAFECOOKIE authentication challenge successful\n"); in authchallenge_cb()
631 LogPrint(BCLog::TOR, "tor: Connected to Tor version %s\n", i->second); in protocolinfo_cb()
636 LogPrint(BCLog::TOR, "tor: Supported authentication method: %s\n", s); in protocolinfo_cb()
646 LogPrint(BCLog::TOR, "tor: Using HASHEDPASSWORD authentication\n"); in protocolinfo_cb()
653 LogPrint(BCLog::TOR, "tor: Using NULL authentication\n"); in protocolinfo_cb()
[all …]
/dports/net-p2p/litecoin-utils/litecoin-0.18.1/src/
H A Dtorcontrol.cpp183 LogPrint(BCLog::TOR, "tor: Successfully connected!\n"); in eventcb()
187 LogPrint(BCLog::TOR, "tor: Error connecting to Tor control socket\n"); in eventcb()
189 LogPrint(BCLog::TOR, "tor: End of stream\n"); in eventcb()
488 LogPrint(BCLog::TOR, "tor: ADD_ONION successful\n"); in add_onion_cb()
523 LogPrint(BCLog::TOR, "tor: Authentication successful\n"); in auth_cb()
576 LogPrint(BCLog::TOR, "tor: SAFECOOKIE authentication challenge successful\n"); in authchallenge_cb()
631 LogPrint(BCLog::TOR, "tor: Connected to Tor version %s\n", i->second); in protocolinfo_cb()
636 LogPrint(BCLog::TOR, "tor: Supported authentication method: %s\n", s); in protocolinfo_cb()
646 LogPrint(BCLog::TOR, "tor: Using HASHEDPASSWORD authentication\n"); in protocolinfo_cb()
653 LogPrint(BCLog::TOR, "tor: Using NULL authentication\n"); in protocolinfo_cb()
[all …]
/dports/net-p2p/qtum/qtum-mainnet-fastlane-v0.20.3/src/
H A Dtorcontrol.cpp183 LogPrint(BCLog::TOR, "tor: Successfully connected!\n"); in eventcb()
187 LogPrint(BCLog::TOR, "tor: Error connecting to Tor control socket\n"); in eventcb()
189 LogPrint(BCLog::TOR, "tor: End of stream\n"); in eventcb()
488 LogPrint(BCLog::TOR, "tor: ADD_ONION successful\n"); in add_onion_cb()
523 LogPrint(BCLog::TOR, "tor: Authentication successful\n"); in auth_cb()
576 LogPrint(BCLog::TOR, "tor: SAFECOOKIE authentication challenge successful\n"); in authchallenge_cb()
631 LogPrint(BCLog::TOR, "tor: Connected to Tor version %s\n", i->second); in protocolinfo_cb()
636 LogPrint(BCLog::TOR, "tor: Supported authentication method: %s\n", s); in protocolinfo_cb()
646 LogPrint(BCLog::TOR, "tor: Using HASHEDPASSWORD authentication\n"); in protocolinfo_cb()
653 LogPrint(BCLog::TOR, "tor: Using NULL authentication\n"); in protocolinfo_cb()
[all …]
/dports/net-p2p/namecoin-daemon/namecoin-core-nc0.21.0.1/src/
H A Dtorcontrol.cpp167 … LogPrint(BCLog::TOR, "tor: Received unexpected sync reply %i\n", self->message.code); in readcb()
186 LogPrint(BCLog::TOR, "tor: Successfully connected!\n"); in eventcb()
190 LogPrint(BCLog::TOR, "tor: Error connecting to Tor control socket\n"); in eventcb()
192 LogPrint(BCLog::TOR, "tor: End of stream\n"); in eventcb()
493 LogPrint(BCLog::TOR, "tor: ADD_ONION successful\n"); in add_onion_cb()
528 LogPrint(BCLog::TOR, "tor: Authentication successful\n"); in auth_cb()
582 LogPrint(BCLog::TOR, "tor: SAFECOOKIE authentication challenge successful\n"); in authchallenge_cb()
637 LogPrint(BCLog::TOR, "tor: Connected to Tor version %s\n", i->second); in protocolinfo_cb()
642 LogPrint(BCLog::TOR, "tor: Supported authentication method: %s\n", s); in protocolinfo_cb()
652 LogPrint(BCLog::TOR, "tor: Using HASHEDPASSWORD authentication\n"); in protocolinfo_cb()
[all …]
/dports/net-p2p/namecoin/namecoin-core-nc0.21.0.1/src/
H A Dtorcontrol.cpp167 … LogPrint(BCLog::TOR, "tor: Received unexpected sync reply %i\n", self->message.code); in readcb()
186 LogPrint(BCLog::TOR, "tor: Successfully connected!\n"); in eventcb()
190 LogPrint(BCLog::TOR, "tor: Error connecting to Tor control socket\n"); in eventcb()
192 LogPrint(BCLog::TOR, "tor: End of stream\n"); in eventcb()
493 LogPrint(BCLog::TOR, "tor: ADD_ONION successful\n"); in add_onion_cb()
528 LogPrint(BCLog::TOR, "tor: Authentication successful\n"); in auth_cb()
582 LogPrint(BCLog::TOR, "tor: SAFECOOKIE authentication challenge successful\n"); in authchallenge_cb()
637 LogPrint(BCLog::TOR, "tor: Connected to Tor version %s\n", i->second); in protocolinfo_cb()
642 LogPrint(BCLog::TOR, "tor: Supported authentication method: %s\n", s); in protocolinfo_cb()
652 LogPrint(BCLog::TOR, "tor: Using HASHEDPASSWORD authentication\n"); in protocolinfo_cb()
[all …]
/dports/net-p2p/namecoin-utils/namecoin-core-nc0.21.0.1/src/
H A Dtorcontrol.cpp167 … LogPrint(BCLog::TOR, "tor: Received unexpected sync reply %i\n", self->message.code); in readcb()
186 LogPrint(BCLog::TOR, "tor: Successfully connected!\n"); in eventcb()
190 LogPrint(BCLog::TOR, "tor: Error connecting to Tor control socket\n"); in eventcb()
192 LogPrint(BCLog::TOR, "tor: End of stream\n"); in eventcb()
493 LogPrint(BCLog::TOR, "tor: ADD_ONION successful\n"); in add_onion_cb()
528 LogPrint(BCLog::TOR, "tor: Authentication successful\n"); in auth_cb()
582 LogPrint(BCLog::TOR, "tor: SAFECOOKIE authentication challenge successful\n"); in authchallenge_cb()
637 LogPrint(BCLog::TOR, "tor: Connected to Tor version %s\n", i->second); in protocolinfo_cb()
642 LogPrint(BCLog::TOR, "tor: Supported authentication method: %s\n", s); in protocolinfo_cb()
652 LogPrint(BCLog::TOR, "tor: Using HASHEDPASSWORD authentication\n"); in protocolinfo_cb()
[all …]
/dports/net-p2p/litecoin/litecoin-0.18.1/src/
H A Dtorcontrol.cpp183 LogPrint(BCLog::TOR, "tor: Successfully connected!\n"); in eventcb()
187 LogPrint(BCLog::TOR, "tor: Error connecting to Tor control socket\n"); in eventcb()
189 LogPrint(BCLog::TOR, "tor: End of stream\n"); in eventcb()
488 LogPrint(BCLog::TOR, "tor: ADD_ONION successful\n"); in add_onion_cb()
523 LogPrint(BCLog::TOR, "tor: Authentication successful\n"); in auth_cb()
576 LogPrint(BCLog::TOR, "tor: SAFECOOKIE authentication challenge successful\n"); in authchallenge_cb()
631 LogPrint(BCLog::TOR, "tor: Connected to Tor version %s\n", i->second); in protocolinfo_cb()
636 LogPrint(BCLog::TOR, "tor: Supported authentication method: %s\n", s); in protocolinfo_cb()
646 LogPrint(BCLog::TOR, "tor: Using HASHEDPASSWORD authentication\n"); in protocolinfo_cb()
653 LogPrint(BCLog::TOR, "tor: Using NULL authentication\n"); in protocolinfo_cb()
[all …]
/dports/science/aircraft-datcom/aircraft-datcom-ed877bb/src/
H A Dptcp.f1 SUBROUTINE PTCP(RSP,TOR,CASENO,PSTROT,TCPOUT) argument
22 IF(TOR.EQ.2.0)GO TO 1070
57 IF(TOR.EQ.1.0)GO TO 1220
110 IF(TOR.EQ.2.0)GO TO 1180
126 IF(.NOT.ONLY10.AND.TOR.EQ.1.0)GO TO 1200
127 IF(TOR.EQ.2.0)GO TO 1200
181 IF(.NOT.ONLY10.AND.TOR.EQ.1.0)GO TO 1020
196 IF(.NOT.ONLY10.AND.TOR.EQ.1.0)GO TO 1040
/dports/net/py-sbws/sbws-25aa5b232ca26729e1bf30a7c5a54fd22f5c3eeb/
H A D.gitlab-ci.yml23 TOR: tor/tor-nightly-master-buster
40 - apt install -yqq $TOR
60 TOR: tor/tor-nightly-0.3.5.x-buster
70 TOR: tor/tor-nightly-0.4.5.x-buster
80 TOR: tor/tor-nightly-0.4.6.x-buster
98 TOR: tor/buster
115 - apt install -yqq $TOR
H A D.travis.yml15 ## The TOR env var should be kept in sync with the Linux tor version in
17 - TOR="master-nightly"
40 env: TOR="0.3.5-nightly"
48 env: TOR="0.4.1-nightly"
57 env: TOR="stable-release"
65 env: TOR="0.4.2-nightly"
/dports/net-p2p/torrentsniff/torrentsniff-0.3.0/
H A Dtorrentsniff117 local *TOR;
118 if( not open(TOR, "< $file") ) {
122 binmode(TOR);
124 read(TOR, $body, (-s $file));
125 close(TOR);
/dports/science/mdynamix/md528/
H A Dservice.f634 TOR(II)=0.d0
648 TOR(1)=TOR(1)+MASSD(IS)*(WY(N)**2+WZ(N)**2)
649 TOR(5)=TOR(5)+MASSD(IS)*(WX(N)**2+WZ(N)**2)
650 TOR(9)=TOR(9)+MASSD(IS)*(WX(N)**2+WY(N)**2)
651 TOR(2)=TOR(2)-MASSD(IS)*WX(N)*WY(N)
652 TOR(3)=TOR(3)-MASSD(IS)*WX(N)*WZ(N)
653 TOR(6)=TOR(6)-MASSD(IS)*WY(N)*WZ(N)
655 TOR(4)=TOR(2)
656 TOR(7)=TOR(3)
657 TOR(8)=TOR(6)
[all …]
/dports/security/tor-devel/tor-0.4.7.2-alpha/scripts/maint/
H A Drun_check_subsystem_order.sh5 TOR="${abs_top_builddir:-.}/src/app/tor"
14 "${TOR}" --dbg-dump-subsystem-list | \
/dports/security/tor/tor-0.4.6.8/scripts/maint/
H A Drun_check_subsystem_order.sh5 TOR="${abs_top_builddir:-.}/src/app/tor"
14 "${TOR}" --dbg-dump-subsystem-list | \
/dports/biology/gatk/gatk-4.2.0.0/src/test/resources/org/broadinstitute/hellbender/tools/funcotator/
H A DThree_sample_somatic.vcf112 ##FORMAT=<ID=TOR,Number=2,Type=Integer,Description="Other reads (weak support or insufficient indel…
122 …3;QSI_NT=33;RC=5;RU=A;SGT=ref->het;SOMATIC;TQSI=1;TQSI_NT=1 DP:DP2:TAR:TIR:TOR:DP50:FDP50:SUBDP50 …
123 …3;QSI_NT=43;RC=6;RU=A;SGT=ref->het;SOMATIC;TQSI=2;TQSI_NT=2 DP:DP2:TAR:TIR:TOR:DP50:FDP50:SUBDP50 …
124 …6;QSI_NT=36;RC=7;RU=A;SGT=ref->het;SOMATIC;TQSI=1;TQSI_NT=1 DP:DP2:TAR:TIR:TOR:DP50:FDP50:SUBDP50 …
125 …QSI_NT=88;RC=1;RU=AGA;SGT=ref->het;SOMATIC;TQSI=1;TQSI_NT=1 DP:DP2:TAR:TIR:TOR:DP50:FDP50:SUBDP50 …
126 …QSI_NT=88;RC=1;RU=AGA;SGT=ref->het;SOMATIC;TQSI=1;TQSI_NT=1 DP:DP2:TAR:TIR:TOR:DP50:FDP50:SUBDP50 …
127 …QSI_NT=88;RC=1;RU=AGA;SGT=ref->het;SOMATIC;TQSI=1;TQSI_NT=1 DP:DP2:TAR:TIR:TOR:DP50:FDP50:SUBDP50 …

12345678910>>...17