/dports/security/s2n/s2n-tls-1.1.2/tls/ |
H A D | s2n_handshake_io.c | 229 [NEGOTIATED | FULL_HANDSHAKE | CLIENT_AUTH] = { 237 [NEGOTIATED | FULL_HANDSHAKE | CLIENT_AUTH | NO_CLIENT_CERT ] = { 245 [NEGOTIATED | FULL_HANDSHAKE | CLIENT_AUTH | WITH_SESSION_TICKET] = { 293 [NEGOTIATED | FULL_HANDSHAKE | OCSP_STATUS | CLIENT_AUTH] = { 502 [NEGOTIATED | FULL_HANDSHAKE | HELLO_RETRY_REQUEST | CLIENT_AUTH] = { 556 [NEGOTIATED | FULL_HANDSHAKE | CLIENT_AUTH] = { 563 [NEGOTIATED | FULL_HANDSHAKE | CLIENT_AUTH | MIDDLEBOX_COMPAT] = { 577 [NEGOTIATED | FULL_HANDSHAKE | CLIENT_AUTH | NO_CLIENT_CERT] = { 774 RESULT_GUARD(s2n_handshake_type_set_flag(conn, CLIENT_AUTH)); in s2n_conn_set_tls13_handshake_type() 778 RESULT_GUARD(s2n_handshake_type_set_flag(conn, CLIENT_AUTH)); in s2n_conn_set_tls13_handshake_type() [all …]
|
H A D | s2n_handshake_type.h | 33 ( s2n_handshake_type_check_flag(conn, CLIENT_AUTH) ) 63 CLIENT_AUTH = 4, enumerator
|
/dports/security/s2n/s2n-tls-1.1.2/tests/saw/spec/handshake/ |
H A D | s2n_handshake_io.cry | 53 then CLIENT_AUTH 87 then CLIENT_AUTH 448 if handshk == (NEGOTIATED || FULL_HANDSHAKE || HELLO_RETRY_REQUEST || CLIENT_AUTH) 496 if handshk == (NEGOTIATED || FULL_HANDSHAKE || CLIENT_AUTH) 502 if handshk == (NEGOTIATED || FULL_HANDSHAKE || CLIENT_AUTH || MIDDLEBOX_COMPAT) 514 if handshk == (NEGOTIATED || FULL_HANDSHAKE || CLIENT_AUTH || NO_CLIENT_CERT) 596 if handshk == (NEGOTIATED || FULL_HANDSHAKE || CLIENT_AUTH) 606 if handshk == (NEGOTIATED || FULL_HANDSHAKE || CLIENT_AUTH || NO_CLIENT_CERT) 646 if handshk == (NEGOTIATED || FULL_HANDSHAKE || OCSP_STATUS || CLIENT_AUTH) then [ 753 CLIENT_AUTH : [32] [all …]
|
/dports/security/s2n/s2n-tls-1.1.2/tests/unit/ |
H A D | s2n_client_auth_handshake_test.c | 175 …EXPECT_EQUAL(server_conn->handshake.handshake_type, NEGOTIATED | FULL_HANDSHAKE | CLIENT_AUTH | MI… in s2n_test_client_auth_message_by_message() 228 …EXPECT_EQUAL(client_conn->handshake.handshake_type, NEGOTIATED | FULL_HANDSHAKE | CLIENT_AUTH | MI… in s2n_test_client_auth_message_by_message() 251 …L(client_conn->handshake.handshake_type, NEGOTIATED | FULL_HANDSHAKE | CLIENT_AUTH | NO_CLIENT_CER… in s2n_test_client_auth_message_by_message() 253 …L(client_conn->handshake.handshake_type, NEGOTIATED | FULL_HANDSHAKE | CLIENT_AUTH | MIDDLEBOX_COM… in s2n_test_client_auth_message_by_message() 274 …L(server_conn->handshake.handshake_type, NEGOTIATED | FULL_HANDSHAKE | CLIENT_AUTH | NO_CLIENT_CER… in s2n_test_client_auth_message_by_message() 276 …L(server_conn->handshake.handshake_type, NEGOTIATED | FULL_HANDSHAKE | CLIENT_AUTH | MIDDLEBOX_COM… in s2n_test_client_auth_message_by_message()
|
H A D | s2n_self_talk_offload_signing_test.c | 207 S2N_TLS12, basic_handshake | CLIENT_AUTH | TLS12_PERFECT_FORWARD_SECRECY)); in main() 212 …2n_get_highest_fully_supported_tls_version(), expected_handshake_with_tls13_policy | CLIENT_AUTH)); in main() 251 S2N_TLS12, basic_handshake | CLIENT_AUTH)); in main() 256 S2N_TLS12, basic_handshake | CLIENT_AUTH | TLS12_PERFECT_FORWARD_SECRECY)); in main() 261 …2n_get_highest_fully_supported_tls_version(), expected_handshake_with_tls13_policy | CLIENT_AUTH)); in main()
|
/dports/security/s2n/s2n-tls-1.1.2/tests/saw/failure_tests/ |
H A D | tls_missing_full_handshake.patch | 27 - [NEGOTIATED | FULL_HANDSHAKE | OCSP_STATUS | CLIENT_AUTH] = { 35 [NEGOTIATED | FULL_HANDSHAKE | OCSP_STATUS | CLIENT_AUTH | NO_CLIENT_CERT ] = {
|
/dports/java/openjdk17/jdk17u-jdk-17.0.1-12-1/test/jdk/sun/security/ssl/SignatureScheme/ |
H A D | SigAlgosExtTestWithTLS12.java | 59 private static final boolean CLIENT_AUTH field in SigAlgosExtTestWithTLS12 217 serverEngine.setNeedClientAuth(CLIENT_AUTH); in configureServerEngine() 264 if (CLIENT_AUTH && EXPECT_FAIL) { in run()
|
/dports/devel/aws-sdk-cpp/aws-sdk-cpp-1.9.129/aws-cpp-sdk-acm-pca/source/model/ |
H A D | ExtendedKeyUsageType.cpp | 43 return ExtendedKeyUsageType::CLIENT_AUTH; in GetExtendedKeyUsageTypeForName() 89 case ExtendedKeyUsageType::CLIENT_AUTH: in GetNameForExtendedKeyUsageType()
|
/dports/security/softether-devel/v4.36-9754/src/Cedar/ |
H A D | Link.h | 121 CLIENT_AUTH *Auth; // Authentication data 143 LINK *NewLink(CEDAR *cedar, HUB *hub, CLIENT_OPTION *option, CLIENT_AUTH *auth, POLICY *policy);
|
/dports/security/softether/v4.38-9760/src/Cedar/ |
H A D | Link.h | 121 CLIENT_AUTH *Auth; // Authentication data 143 LINK *NewLink(CEDAR *cedar, HUB *hub, CLIENT_OPTION *option, CLIENT_AUTH *auth, POLICY *policy);
|
/dports/security/softether5/SoftEtherVPN-5.02.5180/src/Cedar/ |
H A D | Link.h | 28 CLIENT_AUTH *Auth; // Authentication data 50 LINK *NewLink(CEDAR *cedar, HUB *hub, CLIENT_OPTION *option, CLIENT_AUTH *auth, POLICY *policy);
|
/dports/java/openjdk11/jdk11u-jdk-11.0.13-8-1/test/jdk/sun/security/ssl/SSLSessionImpl/ |
H A D | ResumeChecksServer.java | 58 CLIENT_AUTH, enumConstant 116 case CLIENT_AUTH: in main() 175 case CLIENT_AUTH: in connect()
|
/dports/java/openjdk12/openjdk-jdk12u-jdk-12.0.2-10-4/test/jdk/sun/security/ssl/SSLSessionImpl/ |
H A D | ResumeChecksServer.java | 58 CLIENT_AUTH, enumConstant 116 case CLIENT_AUTH: in main() 175 case CLIENT_AUTH: in connect()
|
/dports/java/openjdk11-jre/jdk11u-jdk-11.0.13-8-1/test/jdk/sun/security/ssl/SSLSessionImpl/ |
H A D | ResumeChecksServer.java | 58 CLIENT_AUTH, enumConstant 116 case CLIENT_AUTH: in main() 175 case CLIENT_AUTH: in connect()
|
/dports/java/openjdk15/jdk15u-jdk-15.0.6-1-1/test/jdk/sun/security/ssl/SSLSessionImpl/ |
H A D | ResumeChecksServer.java | 60 CLIENT_AUTH, enumConstant 118 case CLIENT_AUTH: in main() 177 case CLIENT_AUTH: in connect()
|
/dports/java/openjdk16/jdk16u-jdk-16.0.2-7-1/test/jdk/sun/security/ssl/SSLSessionImpl/ |
H A D | ResumeChecksServer.java | 60 CLIENT_AUTH, 118 case CLIENT_AUTH: 177 case CLIENT_AUTH:
|
/dports/java/openjdk14/jdk14u-jdk-14.0.2-12-1/test/jdk/sun/security/ssl/SSLSessionImpl/ |
H A D | ResumeChecksServer.java | 60 CLIENT_AUTH, enumConstant 118 case CLIENT_AUTH: in main() 177 case CLIENT_AUTH: in connect()
|
/dports/java/openjdk13/jdk13u-jdk-13.0.10-1-1/test/jdk/sun/security/ssl/SSLSessionImpl/ |
H A D | ResumeChecksServer.java | 60 CLIENT_AUTH, enumConstant 118 case CLIENT_AUTH: in main() 177 case CLIENT_AUTH: in connect()
|
/dports/java/openjdk17/jdk17u-jdk-17.0.1-12-1/test/jdk/sun/security/ssl/SSLSessionImpl/ |
H A D | ResumeChecksServer.java | 60 CLIENT_AUTH, enumConstant 118 case CLIENT_AUTH: in main() 177 case CLIENT_AUTH: in connect()
|
/dports/java/openjdk8/jdk8u-jdk8u312-b07.1/jdk/test/sun/security/ssl/SSLSessionImpl/ |
H A D | ResumeChecksServer.java | 58 CLIENT_AUTH, enumConstant 116 case CLIENT_AUTH: in main() 175 case CLIENT_AUTH: in connect()
|
/dports/java/openjdk8-jre/jdk8u-jdk8u312-b07.1/jdk/test/sun/security/ssl/SSLSessionImpl/ |
H A D | ResumeChecksServer.java | 58 CLIENT_AUTH, enumConstant 116 case CLIENT_AUTH: in main() 175 case CLIENT_AUTH: in connect()
|
/dports/security/wolfssl/wolfssl-5.1.0/IDE/iotsafe/ |
H A D | memory-tls.c | 43 #define CLIENT_AUTH macro 229 #ifdef CLIENT_AUTH in client_loop() 326 #ifdef CLIENT_AUTH in server_loop()
|
/dports/databases/mariadb105-client/mariadb-10.5.15/extra/wolfssl/wolfssl/IDE/iotsafe/ |
H A D | memory-tls.c | 43 #define CLIENT_AUTH macro 229 #ifdef CLIENT_AUTH in client_loop() 326 #ifdef CLIENT_AUTH in server_loop()
|
/dports/databases/mariadb104-server/mariadb-10.4.24/extra/wolfssl/wolfssl/IDE/iotsafe/ |
H A D | memory-tls.c | 43 #define CLIENT_AUTH macro 229 #ifdef CLIENT_AUTH in client_loop() 326 #ifdef CLIENT_AUTH in server_loop()
|
/dports/databases/mariadb104-client/mariadb-10.4.24/extra/wolfssl/wolfssl/IDE/iotsafe/ |
H A D | memory-tls.c | 43 #define CLIENT_AUTH macro 229 #ifdef CLIENT_AUTH in client_loop() 326 #ifdef CLIENT_AUTH in server_loop()
|