Home
last modified time | relevance | path

Searched refs:tls_auth (Results 1 – 25 of 38) sorted by relevance

12

/dports/dns/nsd/nsd-4.3.9/
H A Dconfigparser.y203 | tls_auth
638 tls_auth:
642 assert(cfg_parser->tls_auth == NULL);
643 cfg_parser->tls_auth = tls_auth;
647 struct tls_auth_options *tls_auth = cfg_parser->tls_auth; variable
648 if(tls_auth->name == NULL) {
650 } else if(tls_auth->auth_domain_name == NULL) {
651 yyerror("tls-auth %s has no auth-domain-name", tls_auth->name);
653 yyerror("duplicate tls-auth %s", tls_auth->name);
655 tls_auth_options_insert(cfg_parser->opt, tls_auth);
[all …]
H A Dconfigparser.c2577 assert(cfg_parser->tls_auth == NULL); in yyparse()
2578 cfg_parser->tls_auth = tls_auth; in yyparse()
2586 struct tls_auth_options *tls_auth = cfg_parser->tls_auth; in yyparse() local
2587 if(tls_auth->name == NULL) { in yyparse()
2589 } else if(tls_auth->auth_domain_name == NULL) { in yyparse()
2590 yyerror("tls-auth %s has no auth-domain-name", tls_auth->name); in yyparse()
2591 } else if(tls_auth_options_find(cfg_parser->opt, tls_auth->name)) { in yyparse()
2592 yyerror("duplicate tls-auth %s", tls_auth->name); in yyparse()
2594 tls_auth_options_insert(cfg_parser->opt, tls_auth); in yyparse()
2595 cfg_parser->tls_auth = NULL; in yyparse()
[all …]
H A Doptions.h380 struct tls_auth_options *tls_auth; member
/dports/net/wireshark/wireshark-3.6.1/epan/dissectors/
H A Dpacket-openvpn.c166 gboolean tls_auth; in dissect_openvpn_msg_common() local
222 tls_auth = TRUE; in dissect_openvpn_msg_common()
224 tls_auth = FALSE; in dissect_openvpn_msg_common()
227 tls_auth = pref_tls_auth; in dissect_openvpn_msg_common()
230 if (tls_auth == TRUE) { in dissect_openvpn_msg_common()
/dports/net/wireshark-lite/wireshark-3.6.1/epan/dissectors/
H A Dpacket-openvpn.c166 gboolean tls_auth; in dissect_openvpn_msg_common() local
222 tls_auth = TRUE; in dissect_openvpn_msg_common()
224 tls_auth = FALSE; in dissect_openvpn_msg_common()
227 tls_auth = pref_tls_auth; in dissect_openvpn_msg_common()
230 if (tls_auth == TRUE) { in dissect_openvpn_msg_common()
/dports/net/tshark-lite/wireshark-3.6.1/epan/dissectors/
H A Dpacket-openvpn.c166 gboolean tls_auth; in dissect_openvpn_msg_common() local
222 tls_auth = TRUE; in dissect_openvpn_msg_common()
224 tls_auth = FALSE; in dissect_openvpn_msg_common()
227 tls_auth = pref_tls_auth; in dissect_openvpn_msg_common()
230 if (tls_auth == TRUE) { in dissect_openvpn_msg_common()
/dports/net/tshark/wireshark-3.6.1/epan/dissectors/
H A Dpacket-openvpn.c166 gboolean tls_auth;
222 tls_auth = TRUE;
224 tls_auth = FALSE;
227 tls_auth = pref_tls_auth;
230 if (tls_auth == TRUE) {
/dports/sysutils/py-salt/salt-3004.1/salt/states/
H A Dgrafana4_datasource.py67 tls_auth=None, argument
145 tlsAuth=tls_auth,
/dports/security/tlswrap/tlswrap-1.04/
H A Dtls.h5 void tls_auth(struct user_data *, int, char *, char *);
H A Dtls.c126 tls_auth(struct user_data *ud, int data, char *ucertspath, char *cafile) in tls_auth() function
H A Dparse.c343 tls_auth(ud, 0, ucertspath, cafile); in parse_serv_buf()
H A Dtlswrap.c830 tls_auth(&ud[i], 1, ucertspath, cfg_cafile); in main2()
1113 tls_auth(&ud[i], 0, ucertspath, cfg_cafile); in main2()
/dports/devel/lion/lion/
H A Dtls.h65 int tls_auth( connection_t * );
H A Dtls.c255 int tls_auth( connection_t *node ) in tls_auth() function
809 return tls_auth(node); in tls_peek()
H A Dlion.c725 ret = tls_auth( node ); in lion_ssl_set()
/dports/ftp/wzdftpd/wzdftpd-0.8.3/libwzd-core/
H A Dwzd_tls.h34 int tls_auth (const char *type, wzd_context_t * context);
H A Dlibwzd_core.def254 tls_auth
H A Dwzd_tls.c459 int tls_auth (const char *type, wzd_context_t * context) in tls_auth() function
968 int tls_auth (const char *type, wzd_context_t * context) in tls_auth() function
1371 int tls_auth (const char *type, wzd_context_t * context) in tls_auth() function
H A Dwzd_login.c478 ret = tls_auth(token,context); in do_login_loop()
/dports/ftp/wzdftpd/wzdftpd-0.8.3/visual/libwzd-core/
H A Dlibwzd_core.def254 tls_auth
/dports/irc/eggdrop/eggdrop-1.9.1/src/
H A Ddcc.c48 int tls_auth = 0; /* Allow certificate authentication */ variable
1539 if (dcc[idx].ssl && (tls_auth == 2)) {
1632 if (dcc[idx].ssl && tls_auth) {
1643 } else if (tls_auth == 2) {
1670 if (dcc[idx].ssl && tls_auth) {
1686 } else if (tls_auth == 2) {
H A Dtcl.c69 extern int tls_maxdepth, tls_vfybots, tls_vfyclients, tls_vfydcc, tls_auth;
455 {"ssl-cert-auth", &tls_auth, 0},
/dports/dns/getdns/getdns-1.5.2/src/
H A Dcontext.h372 getdns_tls_authentication_t tls_auth; /* What user requested for TLS*/ member
/dports/dns/getdns/getdns-1.5.2/src/tools/
H A Dgetdns_server_mon.c775 uint32_t tls_auth; in get_report_info() local
778 …if (getdns_dict_get_int(context_dict, "/all_context/tls_authentication", &tls_auth) == GETDNS_RETU… in get_report_info()
781 switch(tls_auth) { in get_report_info()
/dports/textproc/augeas/augeas-1.12.0/lenses/
H A Dopenvpn.aug422 let tls_auth = [ key "tls-auth" . sep var
612 | tls_auth

12