/third_party/libwebsockets/lib/plat/freertos/esp32/drivers/netdev/ |
D | wifi-esp32.c | 176 w->authmode = ar->authmode; in lws_esp32_scan_update()
|
/third_party/mbedtls/tests/ |
D | Descriptions.txt | 16 For each ciphersuite/version/side/authmode it performs a full handshake
|
/third_party/mbedtls/library/ |
D | ssl_tls.c | 2010 int authmode ) in ssl_parse_certificate_coordinate() argument 2024 if( authmode == MBEDTLS_SSL_VERIFY_NONE ) in ssl_parse_certificate_coordinate() 2032 ((void) authmode); in ssl_parse_certificate_coordinate() 2039 int authmode, in ssl_parse_certificate_verify() argument 2051 if( authmode == MBEDTLS_SSL_VERIFY_NONE ) in ssl_parse_certificate_verify() 2164 if( authmode == MBEDTLS_SSL_VERIFY_OPTIONAL && in ssl_parse_certificate_verify() 2171 if( have_ca_chain == 0 && authmode == MBEDTLS_SSL_VERIFY_REQUIRED ) in ssl_parse_certificate_verify() 2282 const int authmode = ssl->handshake->sni_authmode != MBEDTLS_SSL_VERIFY_UNSET in mbedtls_ssl_parse_certificate() local 2284 : ssl->conf->authmode; in mbedtls_ssl_parse_certificate() 2286 const int authmode = ssl->conf->authmode; in mbedtls_ssl_parse_certificate() local [all …]
|
D | ssl_srv.c | 2687 int authmode; in ssl_write_certificate_request() local 2695 authmode = ssl->handshake->sni_authmode; in ssl_write_certificate_request() 2698 authmode = ssl->conf->authmode; in ssl_write_certificate_request() 2701 authmode == MBEDTLS_SSL_VERIFY_NONE ) in ssl_write_certificate_request()
|
/third_party/libwebsockets/include/libwebsockets/ |
D | lws-netdev.h | 217 uint8_t authmode; member
|
D | lws-misc.h | 859 uint8_t authmode; member
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/drivers/ |
D | driver_bsd.c | 1038 int authmode; in wpa_driver_bsd_set_auth_alg() local 1042 authmode = IEEE80211_AUTH_AUTO; in wpa_driver_bsd_set_auth_alg() 1044 authmode = IEEE80211_AUTH_SHARED; in wpa_driver_bsd_set_auth_alg() 1046 authmode = IEEE80211_AUTH_OPEN; in wpa_driver_bsd_set_auth_alg() 1048 return set80211param(priv, IEEE80211_IOC_AUTHMODE, authmode); in wpa_driver_bsd_set_auth_alg()
|
D | driver_atheros.c | 1913 int authmode; in atheros_set_authmode() local 1917 authmode = IEEE80211_AUTH_AUTO; in atheros_set_authmode() 1919 authmode = IEEE80211_AUTH_OPEN; in atheros_set_authmode() 1921 authmode = IEEE80211_AUTH_SHARED; in atheros_set_authmode() 1925 return set80211param(priv, IEEE80211_PARAM_AUTHMODE, authmode); in atheros_set_authmode()
|
D | driver.h | 3529 int (*set_authmode)(void *priv, int authmode);
|
/third_party/mbedtls/include/mbedtls/ |
D | ssl.h | 1234 uint8_t MBEDTLS_PRIVATE(authmode); /*!< MBEDTLS_SSL_VERIFY_XXX */ 1790 void mbedtls_ssl_conf_authmode( mbedtls_ssl_config *conf, int authmode ); 3382 int authmode );
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/drivers/ |
D | driver_bsd.c | 1178 int authmode; in wpa_driver_bsd_set_auth_alg() local 1182 authmode = IEEE80211_AUTH_AUTO; in wpa_driver_bsd_set_auth_alg() 1184 authmode = IEEE80211_AUTH_SHARED; in wpa_driver_bsd_set_auth_alg() 1186 authmode = IEEE80211_AUTH_OPEN; in wpa_driver_bsd_set_auth_alg() 1188 return set80211param(priv, IEEE80211_IOC_AUTHMODE, authmode); in wpa_driver_bsd_set_auth_alg()
|
D | driver_atheros.c | 1902 int authmode; in atheros_set_authmode() local 1906 authmode = IEEE80211_AUTH_AUTO; in atheros_set_authmode() 1908 authmode = IEEE80211_AUTH_OPEN; in atheros_set_authmode() 1910 authmode = IEEE80211_AUTH_SHARED; in atheros_set_authmode() 1914 return set80211param(priv, IEEE80211_PARAM_AUTHMODE, authmode); in atheros_set_authmode()
|
D | driver.h | 3828 int (*set_authmode)(void *priv, int authmode);
|
/third_party/mbedtls/programs/ssl/ |
D | ssl_server2.c | 691 int authmode; member 794 if( ( new->authmode = get_auth_mode( auth_str ) ) < 0 ) in sni_parse() 798 new->authmode = DFL_AUTH_MODE; in sni_parse() 828 if( cur->authmode != DFL_AUTH_MODE ) in sni_callback() 829 mbedtls_ssl_set_hs_authmode( ssl, cur->authmode ); in sni_callback()
|
/third_party/mbedtls/ |
D | ChangeLog | 2527 * Fix authentication bypass in SSL/TLS: when authmode is set to optional, 2531 triggered remotely from either side. (With authmode set to 'required' 2555 * With authmode set to optional, the TLS handshake is now aborted if the 3231 * The default authmode for SSL/TLS clients is now REQUIRED. 3274 * With authmode set to SSL_VERIFY_OPTIONAL, verification of keyUsage and
|
/third_party/gettext/gettext-tools/tests/ |
D | mm-viet.comp.po | 46027 #: src/authmode.c:469 46031 #: src/authmode.c:481 src/authmode.c:503 46035 #: src/authmode.c:526 46039 #: src/authmode.c:534 46044 #: src/authmode.c:541 46049 #: src/authmode.c:546 46054 #: src/authmode.c:551 46059 #: src/authmode.c:606 46065 #: src/authmode.c:637 src/map.c:164 src/net.c:150 src/net.c:217 46071 #: src/authmode.c:651 src/transmode.c:112 [all …]
|