/dports/security/openvpn-mbedtls/openvpn-2.5.6/src/openvpn/ |
H A D | ssl_verify.h | 225 …truct tls_multi *multi, const unsigned int mda_key_id, const bool auth, const char *client_reason); 236 void auth_set_client_reason(struct tls_multi *multi, const char *client_reason); 241 return multi->client_reason; in tls_client_reason()
|
H A D | ssl_verify.c | 817 auth_set_client_reason(struct tls_multi *multi, const char *client_reason) in auth_set_client_reason() argument 819 if (multi->client_reason) in auth_set_client_reason() 821 free(multi->client_reason); in auth_set_client_reason() 822 multi->client_reason = NULL; in auth_set_client_reason() 824 if (client_reason && strlen(client_reason)) in auth_set_client_reason() 826 multi->client_reason = string_alloc(client_reason, NULL); in auth_set_client_reason() 1068 …struct tls_multi *multi, const unsigned int mda_key_id, const bool auth, const char *client_reason) in tls_authenticate_key() argument 1074 auth_set_client_reason(multi, client_reason); in tls_authenticate_key()
|
H A D | push.c | 263 send_auth_failed(struct context *c, const char *client_reason) in send_auth_failed() argument 271 len = (client_reason ? strlen(client_reason)+1 : 0) + sizeof(auth_failed); in send_auth_failed() 280 if (client_reason) in send_auth_failed() 282 buf_printf(&buf, ",%s", client_reason); in send_auth_failed() 740 const char *client_reason = tls_client_reason(c->c2.tls_multi); in process_incoming_push_request() local 741 send_auth_failed(c, client_reason); in process_incoming_push_request()
|
H A D | push.h | 73 void send_auth_failed(struct context *c, const char *client_reason);
|
H A D | ssl_common.h | 560 char *client_reason; member
|
H A D | manage.h | 175 const char *client_reason,
|
H A D | multi.c | 3941 const char *client_reason, in management_client_auth() argument 3951 ret = tls_authenticate_key(mi->context.c2.tls_multi, mda_key_id, auth, client_reason); in management_client_auth() 3966 … msg(D_MULTI_LOW, "MULTI: connection rejected: %s, CLI:%s", reason, np(client_reason)); in management_client_auth() 3970 send_auth_failed(&mi->context, client_reason); /* mid-session reauth failed */ in management_client_auth()
|
H A D | manage.c | 1062 …ment *man, const char *cid_str, const char *kid_str, const char *reason, const char *client_reason) in man_client_deny() argument 1076 client_reason, in man_client_deny()
|
/dports/security/openvpn-devel/openvpn-0033811e0215af76f469d78912c95a2f59813454/src/openvpn/ |
H A D | ssl_verify.h | 246 …truct tls_multi *multi, const unsigned int mda_key_id, const bool auth, const char *client_reason); 257 void auth_set_client_reason(struct tls_multi *multi, const char *client_reason); 262 return multi->client_reason; in tls_client_reason()
|
H A D | push.c | 338 send_auth_failed(struct context *c, const char *client_reason) in send_auth_failed() argument 352 len = (client_reason ? strlen(client_reason)+1 : 0) + sizeof(auth_failed); in send_auth_failed() 361 if (client_reason) in send_auth_failed() 363 buf_printf(&buf, ",%s", client_reason); in send_auth_failed() 866 const char *client_reason = tls_client_reason(c->c2.tls_multi); in process_incoming_push_request() local 867 send_auth_failed(c, client_reason); in process_incoming_push_request()
|
H A D | ssl_verify.c | 849 auth_set_client_reason(struct tls_multi *multi, const char *client_reason) in auth_set_client_reason() argument 851 free(multi->client_reason); in auth_set_client_reason() 852 multi->client_reason = NULL; in auth_set_client_reason() 854 if (client_reason && strlen(client_reason)) in auth_set_client_reason() 856 multi->client_reason = string_alloc(client_reason, NULL); in auth_set_client_reason() 1206 …struct tls_multi *multi, const unsigned int mda_key_id, const bool auth, const char *client_reason) in tls_authenticate_key() argument 1212 auth_set_client_reason(multi, client_reason); in tls_authenticate_key()
|
H A D | push.h | 71 void send_auth_failed(struct context *c, const char *client_reason);
|
H A D | ssl_common.h | 574 char *client_reason; member
|
H A D | manage.h | 172 const char *client_reason,
|
H A D | multi.c | 3957 const char *client_reason, in management_client_auth() argument 3967 ret = tls_authenticate_key(mi->context.c2.tls_multi, mda_key_id, auth, client_reason); in management_client_auth() 3980 … msg(D_MULTI_LOW, "MULTI: connection rejected: %s, CLI:%s", reason, np(client_reason)); in management_client_auth()
|
H A D | manage.c | 1050 …ment *man, const char *cid_str, const char *kid_str, const char *reason, const char *client_reason) in man_client_deny() argument 1064 client_reason, in man_client_deny()
|
/dports/security/openvpn/openvpn-2.5.6/src/openvpn/ |
H A D | ssl_verify.h | 225 …truct tls_multi *multi, const unsigned int mda_key_id, const bool auth, const char *client_reason); 236 void auth_set_client_reason(struct tls_multi *multi, const char *client_reason); 241 return multi->client_reason; in tls_client_reason()
|
H A D | ssl_verify.c | 817 auth_set_client_reason(struct tls_multi *multi, const char *client_reason) in auth_set_client_reason() argument 819 if (multi->client_reason) in auth_set_client_reason() 821 free(multi->client_reason); in auth_set_client_reason() 822 multi->client_reason = NULL; in auth_set_client_reason() 824 if (client_reason && strlen(client_reason)) in auth_set_client_reason() 826 multi->client_reason = string_alloc(client_reason, NULL); in auth_set_client_reason() 1068 …struct tls_multi *multi, const unsigned int mda_key_id, const bool auth, const char *client_reason) in tls_authenticate_key() argument 1074 auth_set_client_reason(multi, client_reason); in tls_authenticate_key()
|
H A D | push.c | 263 send_auth_failed(struct context *c, const char *client_reason) in send_auth_failed() argument 271 len = (client_reason ? strlen(client_reason)+1 : 0) + sizeof(auth_failed); in send_auth_failed() 280 if (client_reason) in send_auth_failed() 282 buf_printf(&buf, ",%s", client_reason); in send_auth_failed() 740 const char *client_reason = tls_client_reason(c->c2.tls_multi); in process_incoming_push_request() local 741 send_auth_failed(c, client_reason); in process_incoming_push_request()
|
H A D | push.h | 73 void send_auth_failed(struct context *c, const char *client_reason);
|
H A D | ssl_common.h | 560 char *client_reason; member
|
H A D | manage.h | 175 const char *client_reason,
|
H A D | multi.c | 3941 const char *client_reason, in management_client_auth() argument 3951 ret = tls_authenticate_key(mi->context.c2.tls_multi, mda_key_id, auth, client_reason); in management_client_auth() 3966 … msg(D_MULTI_LOW, "MULTI: connection rejected: %s, CLI:%s", reason, np(client_reason)); in management_client_auth() 3970 send_auth_failed(&mi->context, client_reason); /* mid-session reauth failed */ in management_client_auth()
|
H A D | manage.c | 1062 …ment *man, const char *cid_str, const char *kid_str, const char *reason, const char *client_reason) in man_client_deny() argument 1076 client_reason, in man_client_deny()
|
/dports/mail/dovecot/dovecot-2.3.17/src/lib-master/ |
H A D | master-login-auth.c | 133 const char *log_reason, const char *client_reason) in request_failure() argument 154 request->callback(NULL, client_reason, request->context); in request_failure()
|