/dports/dns/nsd/nsd-4.3.9/ |
H A D | configparser.y | 203 | tls_auth 638 tls_auth: 642 assert(cfg_parser->tls_auth == NULL); 643 cfg_parser->tls_auth = tls_auth; 647 struct tls_auth_options *tls_auth = cfg_parser->tls_auth; variable 648 if(tls_auth->name == NULL) { 650 } else if(tls_auth->auth_domain_name == NULL) { 651 yyerror("tls-auth %s has no auth-domain-name", tls_auth->name); 653 yyerror("duplicate tls-auth %s", tls_auth->name); 655 tls_auth_options_insert(cfg_parser->opt, tls_auth); [all …]
|
H A D | configparser.c | 2577 assert(cfg_parser->tls_auth == NULL); in yyparse() 2578 cfg_parser->tls_auth = tls_auth; in yyparse() 2586 struct tls_auth_options *tls_auth = cfg_parser->tls_auth; in yyparse() local 2587 if(tls_auth->name == NULL) { in yyparse() 2589 } else if(tls_auth->auth_domain_name == NULL) { in yyparse() 2590 yyerror("tls-auth %s has no auth-domain-name", tls_auth->name); in yyparse() 2591 } else if(tls_auth_options_find(cfg_parser->opt, tls_auth->name)) { in yyparse() 2592 yyerror("duplicate tls-auth %s", tls_auth->name); in yyparse() 2594 tls_auth_options_insert(cfg_parser->opt, tls_auth); in yyparse() 2595 cfg_parser->tls_auth = NULL; in yyparse() [all …]
|
H A D | options.h | 380 struct tls_auth_options *tls_auth; member
|
/dports/net/wireshark/wireshark-3.6.1/epan/dissectors/ |
H A D | packet-openvpn.c | 166 gboolean tls_auth; in dissect_openvpn_msg_common() local 222 tls_auth = TRUE; in dissect_openvpn_msg_common() 224 tls_auth = FALSE; in dissect_openvpn_msg_common() 227 tls_auth = pref_tls_auth; in dissect_openvpn_msg_common() 230 if (tls_auth == TRUE) { in dissect_openvpn_msg_common()
|
/dports/net/wireshark-lite/wireshark-3.6.1/epan/dissectors/ |
H A D | packet-openvpn.c | 166 gboolean tls_auth; in dissect_openvpn_msg_common() local 222 tls_auth = TRUE; in dissect_openvpn_msg_common() 224 tls_auth = FALSE; in dissect_openvpn_msg_common() 227 tls_auth = pref_tls_auth; in dissect_openvpn_msg_common() 230 if (tls_auth == TRUE) { in dissect_openvpn_msg_common()
|
/dports/net/tshark-lite/wireshark-3.6.1/epan/dissectors/ |
H A D | packet-openvpn.c | 166 gboolean tls_auth; in dissect_openvpn_msg_common() local 222 tls_auth = TRUE; in dissect_openvpn_msg_common() 224 tls_auth = FALSE; in dissect_openvpn_msg_common() 227 tls_auth = pref_tls_auth; in dissect_openvpn_msg_common() 230 if (tls_auth == TRUE) { in dissect_openvpn_msg_common()
|
/dports/net/tshark/wireshark-3.6.1/epan/dissectors/ |
H A D | packet-openvpn.c | 166 gboolean tls_auth; 222 tls_auth = TRUE; 224 tls_auth = FALSE; 227 tls_auth = pref_tls_auth; 230 if (tls_auth == TRUE) {
|
/dports/sysutils/py-salt/salt-3004.1/salt/states/ |
H A D | grafana4_datasource.py | 67 tls_auth=None, argument 145 tlsAuth=tls_auth,
|
/dports/security/tlswrap/tlswrap-1.04/ |
H A D | tls.h | 5 void tls_auth(struct user_data *, int, char *, char *);
|
H A D | tls.c | 126 tls_auth(struct user_data *ud, int data, char *ucertspath, char *cafile) in tls_auth() function
|
H A D | parse.c | 343 tls_auth(ud, 0, ucertspath, cafile); in parse_serv_buf()
|
H A D | tlswrap.c | 830 tls_auth(&ud[i], 1, ucertspath, cfg_cafile); in main2() 1113 tls_auth(&ud[i], 0, ucertspath, cfg_cafile); in main2()
|
/dports/devel/lion/lion/ |
H A D | tls.h | 65 int tls_auth( connection_t * );
|
H A D | tls.c | 255 int tls_auth( connection_t *node ) in tls_auth() function 809 return tls_auth(node); in tls_peek()
|
H A D | lion.c | 725 ret = tls_auth( node ); in lion_ssl_set()
|
/dports/ftp/wzdftpd/wzdftpd-0.8.3/libwzd-core/ |
H A D | wzd_tls.h | 34 int tls_auth (const char *type, wzd_context_t * context);
|
H A D | libwzd_core.def | 254 tls_auth
|
H A D | wzd_tls.c | 459 int tls_auth (const char *type, wzd_context_t * context) in tls_auth() function 968 int tls_auth (const char *type, wzd_context_t * context) in tls_auth() function 1371 int tls_auth (const char *type, wzd_context_t * context) in tls_auth() function
|
H A D | wzd_login.c | 478 ret = tls_auth(token,context); in do_login_loop()
|
/dports/ftp/wzdftpd/wzdftpd-0.8.3/visual/libwzd-core/ |
H A D | libwzd_core.def | 254 tls_auth
|
/dports/irc/eggdrop/eggdrop-1.9.1/src/ |
H A D | dcc.c | 48 int tls_auth = 0; /* Allow certificate authentication */ variable 1539 if (dcc[idx].ssl && (tls_auth == 2)) { 1632 if (dcc[idx].ssl && tls_auth) { 1643 } else if (tls_auth == 2) { 1670 if (dcc[idx].ssl && tls_auth) { 1686 } else if (tls_auth == 2) {
|
H A D | tcl.c | 69 extern int tls_maxdepth, tls_vfybots, tls_vfyclients, tls_vfydcc, tls_auth; 455 {"ssl-cert-auth", &tls_auth, 0},
|
/dports/dns/getdns/getdns-1.5.2/src/ |
H A D | context.h | 372 getdns_tls_authentication_t tls_auth; /* What user requested for TLS*/ member
|
/dports/dns/getdns/getdns-1.5.2/src/tools/ |
H A D | getdns_server_mon.c | 775 uint32_t tls_auth; in get_report_info() local 778 …if (getdns_dict_get_int(context_dict, "/all_context/tls_authentication", &tls_auth) == GETDNS_RETU… in get_report_info() 781 switch(tls_auth) { in get_report_info()
|
/dports/textproc/augeas/augeas-1.12.0/lenses/ |
H A D | openvpn.aug | 422 let tls_auth = [ key "tls-auth" . sep var 612 | tls_auth
|