/third_party/openssl/test/ |
D | dtls_mtu_test.c | 168 const char *cipher_name = SSL_CIPHER_get_name(cipher); in run_mtu_tests() local 171 if (strncmp(cipher_name, "PSK-", 4) != 0) in run_mtu_tests() 174 if (!TEST_int_gt(ret = mtu_test(ctx, cipher_name, 0), 0)) in run_mtu_tests() 176 TEST_info("%s OK", cipher_name); in run_mtu_tests() 181 if (!TEST_int_gt(ret = mtu_test(ctx, cipher_name, 1), 0)) in run_mtu_tests() 183 TEST_info("%s without EtM OK", cipher_name); in run_mtu_tests()
|
/third_party/openssl/demos/mac/ |
D | cmac-aes256.c | 75 char cipher_name[] = "aes256"; in main() local 98 *p++ = OSSL_PARAM_construct_utf8_string(OSSL_MAC_PARAM_CIPHER, cipher_name, in main() 99 sizeof(cipher_name)); in main()
|
/third_party/openssl/doc/man3/ |
D | OSSL_ENCODER_CTX_new_for_pkey.pod | 24 const char *cipher_name, 65 name I<cipher_name>. The interpretation of that I<cipher_name> is 70 I<cipher_name> may also be NULL, which will result in unencrypted
|
/third_party/openssl/crypto/encode_decode/ |
D | encoder_pkey.c | 26 const char *cipher_name, in DEFINE_STACK_OF() 33 (void *)cipher_name, 0); in DEFINE_STACK_OF()
|
/third_party/openssl/include/openssl/ |
D | encoder.h | 67 const char *cipher_name,
|
/third_party/mbedtls/library/ |
D | cipher.c | 114 const char *cipher_name ) in mbedtls_cipher_info_from_string() argument 118 if( NULL == cipher_name ) in mbedtls_cipher_info_from_string() 122 if( ! strcmp( def->info->name, cipher_name ) ) in mbedtls_cipher_info_from_string()
|
/third_party/mbedtls/include/mbedtls/ |
D | cipher.h | 402 const mbedtls_cipher_info_t *mbedtls_cipher_info_from_string( const char *cipher_name );
|
/third_party/openssl/crypto/evp/ |
D | p_lib.c | 615 const char *cipher_name, in new_cmac_key_int() argument 629 cipher_name = EVP_CIPHER_get0_name(cipher); in new_cmac_key_int() 631 if (cipher_name == NULL) { in new_cmac_key_int() 648 (char *)cipher_name, 0); in new_cmac_key_int()
|
/third_party/python/Modules/ |
D | _ssl.c | 1899 const char *cipher_name, *cipher_protocol; in cipher_to_tuple() local 1904 cipher_name = SSL_CIPHER_get_name(cipher); in cipher_to_tuple() 1905 if (cipher_name == NULL) { in cipher_to_tuple() 1909 v = PyUnicode_FromString(cipher_name); in cipher_to_tuple() 1941 const char *cipher_name, *cipher_protocol; in cipher_to_dict() local 1950 cipher_name = SSL_CIPHER_get_name(cipher); in cipher_to_dict() 1975 "name", cipher_name, in cipher_to_dict()
|
/third_party/rust/crates/rust-openssl/openssl/ |
D | CHANGELOG.md | 385 * Fixed the return type of `ssl::cipher_name`. 397 * Added `SslCipherRef::standard_name` and `ssl::cipher_name`.
|
/third_party/rust/crates/rust-openssl/openssl/src/ssl/test/ |
D | mod.rs | 1402 super::cipher_name("TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384"), in openssl_cipher_name() 1406 assert_eq!(super::cipher_name("asdf"), "(NONE)"); in openssl_cipher_name()
|
/third_party/rust/crates/rust-openssl/openssl/src/ssl/ |
D | mod.rs | 124 pub fn cipher_name(std_name: &str) -> &'static str { in cipher_name() function
|
/third_party/node/src/ |
D | node_crypto.cc | 3030 String::Utf8Value cipher_name(env->isolate(), in GetPrivateKeyEncodingFromJs() local 3032 result.cipher_ = EVP_get_cipherbyname(*cipher_name); in GetPrivateKeyEncodingFromJs()
|