Home
last modified time | relevance | path

Searched refs:CLIENT_AUTH (Results 1 – 25 of 335) sorted by relevance

12345678910>>...14

/dports/security/s2n/s2n-tls-1.1.2/tls/
H A Ds2n_handshake_io.c229 [NEGOTIATED | FULL_HANDSHAKE | CLIENT_AUTH] = {
237 [NEGOTIATED | FULL_HANDSHAKE | CLIENT_AUTH | NO_CLIENT_CERT ] = {
245 [NEGOTIATED | FULL_HANDSHAKE | CLIENT_AUTH | WITH_SESSION_TICKET] = {
293 [NEGOTIATED | FULL_HANDSHAKE | OCSP_STATUS | CLIENT_AUTH] = {
502 [NEGOTIATED | FULL_HANDSHAKE | HELLO_RETRY_REQUEST | CLIENT_AUTH] = {
556 [NEGOTIATED | FULL_HANDSHAKE | CLIENT_AUTH] = {
563 [NEGOTIATED | FULL_HANDSHAKE | CLIENT_AUTH | MIDDLEBOX_COMPAT] = {
577 [NEGOTIATED | FULL_HANDSHAKE | CLIENT_AUTH | NO_CLIENT_CERT] = {
774 RESULT_GUARD(s2n_handshake_type_set_flag(conn, CLIENT_AUTH)); in s2n_conn_set_tls13_handshake_type()
778 RESULT_GUARD(s2n_handshake_type_set_flag(conn, CLIENT_AUTH)); in s2n_conn_set_tls13_handshake_type()
[all …]
H A Ds2n_handshake_type.h33 ( s2n_handshake_type_check_flag(conn, CLIENT_AUTH) )
63 CLIENT_AUTH = 4, enumerator
/dports/security/s2n/s2n-tls-1.1.2/tests/saw/spec/handshake/
H A Ds2n_handshake_io.cry53 then CLIENT_AUTH
87 then CLIENT_AUTH
448 if handshk == (NEGOTIATED || FULL_HANDSHAKE || HELLO_RETRY_REQUEST || CLIENT_AUTH)
496 if handshk == (NEGOTIATED || FULL_HANDSHAKE || CLIENT_AUTH)
502 if handshk == (NEGOTIATED || FULL_HANDSHAKE || CLIENT_AUTH || MIDDLEBOX_COMPAT)
514 if handshk == (NEGOTIATED || FULL_HANDSHAKE || CLIENT_AUTH || NO_CLIENT_CERT)
596 if handshk == (NEGOTIATED || FULL_HANDSHAKE || CLIENT_AUTH)
606 if handshk == (NEGOTIATED || FULL_HANDSHAKE || CLIENT_AUTH || NO_CLIENT_CERT)
646 if handshk == (NEGOTIATED || FULL_HANDSHAKE || OCSP_STATUS || CLIENT_AUTH) then [
753 CLIENT_AUTH : [32]
[all …]
/dports/security/s2n/s2n-tls-1.1.2/tests/unit/
H A Ds2n_client_auth_handshake_test.c175 …EXPECT_EQUAL(server_conn->handshake.handshake_type, NEGOTIATED | FULL_HANDSHAKE | CLIENT_AUTH | MI… in s2n_test_client_auth_message_by_message()
228 …EXPECT_EQUAL(client_conn->handshake.handshake_type, NEGOTIATED | FULL_HANDSHAKE | CLIENT_AUTH | MI… in s2n_test_client_auth_message_by_message()
251 …L(client_conn->handshake.handshake_type, NEGOTIATED | FULL_HANDSHAKE | CLIENT_AUTH | NO_CLIENT_CER… in s2n_test_client_auth_message_by_message()
253 …L(client_conn->handshake.handshake_type, NEGOTIATED | FULL_HANDSHAKE | CLIENT_AUTH | MIDDLEBOX_COM… in s2n_test_client_auth_message_by_message()
274 …L(server_conn->handshake.handshake_type, NEGOTIATED | FULL_HANDSHAKE | CLIENT_AUTH | NO_CLIENT_CER… in s2n_test_client_auth_message_by_message()
276 …L(server_conn->handshake.handshake_type, NEGOTIATED | FULL_HANDSHAKE | CLIENT_AUTH | MIDDLEBOX_COM… in s2n_test_client_auth_message_by_message()
H A Ds2n_self_talk_offload_signing_test.c207 S2N_TLS12, basic_handshake | CLIENT_AUTH | TLS12_PERFECT_FORWARD_SECRECY)); in main()
212 …2n_get_highest_fully_supported_tls_version(), expected_handshake_with_tls13_policy | CLIENT_AUTH)); in main()
251 S2N_TLS12, basic_handshake | CLIENT_AUTH)); in main()
256 S2N_TLS12, basic_handshake | CLIENT_AUTH | TLS12_PERFECT_FORWARD_SECRECY)); in main()
261 …2n_get_highest_fully_supported_tls_version(), expected_handshake_with_tls13_policy | CLIENT_AUTH)); in main()
/dports/security/s2n/s2n-tls-1.1.2/tests/saw/failure_tests/
H A Dtls_missing_full_handshake.patch27 - [NEGOTIATED | FULL_HANDSHAKE | OCSP_STATUS | CLIENT_AUTH] = {
35 [NEGOTIATED | FULL_HANDSHAKE | OCSP_STATUS | CLIENT_AUTH | NO_CLIENT_CERT ] = {
/dports/java/openjdk17/jdk17u-jdk-17.0.1-12-1/test/jdk/sun/security/ssl/SignatureScheme/
H A DSigAlgosExtTestWithTLS12.java59 private static final boolean CLIENT_AUTH field in SigAlgosExtTestWithTLS12
217 serverEngine.setNeedClientAuth(CLIENT_AUTH); in configureServerEngine()
264 if (CLIENT_AUTH && EXPECT_FAIL) { in run()
/dports/devel/aws-sdk-cpp/aws-sdk-cpp-1.9.129/aws-cpp-sdk-acm-pca/source/model/
H A DExtendedKeyUsageType.cpp43 return ExtendedKeyUsageType::CLIENT_AUTH; in GetExtendedKeyUsageTypeForName()
89 case ExtendedKeyUsageType::CLIENT_AUTH: in GetNameForExtendedKeyUsageType()
/dports/security/softether-devel/v4.36-9754/src/Cedar/
H A DLink.h121 CLIENT_AUTH *Auth; // Authentication data
143 LINK *NewLink(CEDAR *cedar, HUB *hub, CLIENT_OPTION *option, CLIENT_AUTH *auth, POLICY *policy);
/dports/security/softether/v4.38-9760/src/Cedar/
H A DLink.h121 CLIENT_AUTH *Auth; // Authentication data
143 LINK *NewLink(CEDAR *cedar, HUB *hub, CLIENT_OPTION *option, CLIENT_AUTH *auth, POLICY *policy);
/dports/security/softether5/SoftEtherVPN-5.02.5180/src/Cedar/
H A DLink.h28 CLIENT_AUTH *Auth; // Authentication data
50 LINK *NewLink(CEDAR *cedar, HUB *hub, CLIENT_OPTION *option, CLIENT_AUTH *auth, POLICY *policy);
/dports/java/openjdk11/jdk11u-jdk-11.0.13-8-1/test/jdk/sun/security/ssl/SSLSessionImpl/
H A DResumeChecksServer.java58 CLIENT_AUTH, enumConstant
116 case CLIENT_AUTH: in main()
175 case CLIENT_AUTH: in connect()
/dports/java/openjdk12/openjdk-jdk12u-jdk-12.0.2-10-4/test/jdk/sun/security/ssl/SSLSessionImpl/
H A DResumeChecksServer.java58 CLIENT_AUTH, enumConstant
116 case CLIENT_AUTH: in main()
175 case CLIENT_AUTH: in connect()
/dports/java/openjdk11-jre/jdk11u-jdk-11.0.13-8-1/test/jdk/sun/security/ssl/SSLSessionImpl/
H A DResumeChecksServer.java58 CLIENT_AUTH, enumConstant
116 case CLIENT_AUTH: in main()
175 case CLIENT_AUTH: in connect()
/dports/java/openjdk15/jdk15u-jdk-15.0.6-1-1/test/jdk/sun/security/ssl/SSLSessionImpl/
H A DResumeChecksServer.java60 CLIENT_AUTH, enumConstant
118 case CLIENT_AUTH: in main()
177 case CLIENT_AUTH: in connect()
/dports/java/openjdk16/jdk16u-jdk-16.0.2-7-1/test/jdk/sun/security/ssl/SSLSessionImpl/
H A DResumeChecksServer.java60 CLIENT_AUTH,
118 case CLIENT_AUTH:
177 case CLIENT_AUTH:
/dports/java/openjdk14/jdk14u-jdk-14.0.2-12-1/test/jdk/sun/security/ssl/SSLSessionImpl/
H A DResumeChecksServer.java60 CLIENT_AUTH, enumConstant
118 case CLIENT_AUTH: in main()
177 case CLIENT_AUTH: in connect()
/dports/java/openjdk13/jdk13u-jdk-13.0.10-1-1/test/jdk/sun/security/ssl/SSLSessionImpl/
H A DResumeChecksServer.java60 CLIENT_AUTH, enumConstant
118 case CLIENT_AUTH: in main()
177 case CLIENT_AUTH: in connect()
/dports/java/openjdk17/jdk17u-jdk-17.0.1-12-1/test/jdk/sun/security/ssl/SSLSessionImpl/
H A DResumeChecksServer.java60 CLIENT_AUTH, enumConstant
118 case CLIENT_AUTH: in main()
177 case CLIENT_AUTH: in connect()
/dports/java/openjdk8/jdk8u-jdk8u312-b07.1/jdk/test/sun/security/ssl/SSLSessionImpl/
H A DResumeChecksServer.java58 CLIENT_AUTH, enumConstant
116 case CLIENT_AUTH: in main()
175 case CLIENT_AUTH: in connect()
/dports/java/openjdk8-jre/jdk8u-jdk8u312-b07.1/jdk/test/sun/security/ssl/SSLSessionImpl/
H A DResumeChecksServer.java58 CLIENT_AUTH, enumConstant
116 case CLIENT_AUTH: in main()
175 case CLIENT_AUTH: in connect()
/dports/security/wolfssl/wolfssl-5.1.0/IDE/iotsafe/
H A Dmemory-tls.c43 #define CLIENT_AUTH macro
229 #ifdef CLIENT_AUTH in client_loop()
326 #ifdef CLIENT_AUTH in server_loop()
/dports/databases/mariadb105-client/mariadb-10.5.15/extra/wolfssl/wolfssl/IDE/iotsafe/
H A Dmemory-tls.c43 #define CLIENT_AUTH macro
229 #ifdef CLIENT_AUTH in client_loop()
326 #ifdef CLIENT_AUTH in server_loop()
/dports/databases/mariadb104-server/mariadb-10.4.24/extra/wolfssl/wolfssl/IDE/iotsafe/
H A Dmemory-tls.c43 #define CLIENT_AUTH macro
229 #ifdef CLIENT_AUTH in client_loop()
326 #ifdef CLIENT_AUTH in server_loop()
/dports/databases/mariadb104-client/mariadb-10.4.24/extra/wolfssl/wolfssl/IDE/iotsafe/
H A Dmemory-tls.c43 #define CLIENT_AUTH macro
229 #ifdef CLIENT_AUTH in client_loop()
326 #ifdef CLIENT_AUTH in server_loop()

12345678910>>...14