/third_party/node/deps/openssl/openssl/ssl/record/ |
D | ssl3_record_tls13.c | 23 int tls13_enc(SSL *s, SSL3_RECORD *recs, size_t n_recs, int sending, in tls13_enc() argument 43 if (sending) { in tls13_enc() 100 if (sending && EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_AEAD_SET_TAG, taglen, in tls13_enc() 114 if (!sending) { in tls13_enc() 146 if (EVP_CipherInit_ex(ctx, NULL, NULL, NULL, iv, sending) <= 0 in tls13_enc() 147 || (!sending && EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_AEAD_SET_TAG, in tls13_enc() 182 if (sending) { in tls13_enc()
|
D | ssl3_record.c | 848 int ssl3_enc(SSL *s, SSL3_RECORD *inrecs, size_t n_recs, int sending, in ssl3_enc() argument 863 if (sending) { in ssl3_enc() 888 if ((bs != 1) && sending && !provided) { in ssl3_enc() 906 if (!sending) { in ssl3_enc() 922 if (!sending && mac != NULL) { in ssl3_enc() 947 if (!sending) in ssl3_enc() 972 int tls1_enc(SSL *s, SSL3_RECORD *recs, size_t n_recs, int sending, in tls1_enc() argument 983 int tlstree_enc = sending ? (s->mac_flags & SSL_MAC_FLAG_WRITE_MAC_TLSTREE) in tls1_enc() 991 if (sending) { in tls1_enc() 1072 seq = sending ? RECORD_LAYER_get_write_sequence(&s->rlayer) in tls1_enc() [all …]
|
/third_party/openssl/ssl/record/ |
D | ssl3_record_tls13.c | 23 int tls13_enc(SSL *s, SSL3_RECORD *recs, size_t n_recs, int sending, in tls13_enc() argument 43 if (sending) { in tls13_enc() 100 if (sending && EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_AEAD_SET_TAG, taglen, in tls13_enc() 114 if (!sending) { in tls13_enc() 146 if (EVP_CipherInit_ex(ctx, NULL, NULL, NULL, iv, sending) <= 0 in tls13_enc() 147 || (!sending && EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_AEAD_SET_TAG, in tls13_enc() 182 if (sending) { in tls13_enc()
|
D | ssl3_record.c | 848 int ssl3_enc(SSL *s, SSL3_RECORD *inrecs, size_t n_recs, int sending, in ssl3_enc() argument 863 if (sending) { in ssl3_enc() 888 if ((bs != 1) && sending && !provided) { in ssl3_enc() 906 if (!sending) { in ssl3_enc() 922 if (!sending && mac != NULL) { in ssl3_enc() 947 if (!sending) in ssl3_enc() 972 int tls1_enc(SSL *s, SSL3_RECORD *recs, size_t n_recs, int sending, in tls1_enc() argument 983 int tlstree_enc = sending ? (s->mac_flags & SSL_MAC_FLAG_WRITE_MAC_TLSTREE) in tls1_enc() 991 if (sending) { in tls1_enc() 1072 seq = sending ? RECORD_LAYER_get_write_sequence(&s->rlayer) in tls1_enc() [all …]
|
/third_party/libwebsockets/minimal-examples/secure-streams/minimal-secure-streams-client-tx/ |
D | README.md | 35 [2021/02/19 11:25:21:1444] U: myss_tx: sending pkt 1 36 [2021/02/19 11:25:21:1945] U: myss_tx: sending pkt 2 37 [2021/02/19 11:25:21:2459] U: myss_tx: sending pkt 3 38 [2021/02/19 11:25:21:2971] U: myss_tx: sending pkt 4
|
/third_party/typescript/tests/baselines/reference/ |
D | untypedModuleImport_noImplicitAny_typesForPackageExist.errors.txt | 2 …If the 'foo' package actually exposes this module, consider sending a pull request to amend 'https… 6 …If the '@scope/foo' package actually exposes this module, consider sending a pull request to amend… 16 !!! error TS7016: If the 'foo' package actually exposes this module, consider sending a pull requ… 25 !!! error TS7016: If the '@scope/foo' package actually exposes this module, consider sending a pu…
|
D | jsDeclarationsNestedParams.types | 6 * Cancels the request, sending a cancellation to the other party 22 * Cancels the request, sending a cancellation to the other party
|
D | jsDeclarationsNestedParams.symbols | 6 * Cancels the request, sending a cancellation to the other party 22 * Cancels the request, sending a cancellation to the other party
|
/third_party/openssl/ssl/ |
D | tls13_enc.c | 333 static int derive_secret_key_and_iv(SSL *s, int sending, const EVP_MD *md, in derive_secret_key_and_iv() argument 391 if (EVP_CipherInit_ex(ciph_ctx, ciph, NULL, NULL, NULL, sending) <= 0 in derive_secret_key_and_iv() 746 int tls13_update_key(SSL *s, int sending) in tls13_update_key() argument 768 if (s->server == sending) in tls13_update_key() 773 if (sending) { in tls13_update_key() 784 if (!derive_secret_key_and_iv(s, sending, md, in tls13_update_key() 796 log_label = s->server == sending ? SERVER_APPLICATION_N_LABEL : CLIENT_APPLICATION_N_LABEL; in tls13_update_key()
|
/third_party/node/deps/openssl/openssl/ssl/statem/ |
D | statem.c | 215 void ossl_statem_check_finish_init(SSL *s, int sending) in ossl_statem_check_finish_init() argument 217 if (sending == -1) { in ossl_statem_check_finish_init() 230 if ((sending && (s->statem.hand_state == TLS_ST_PENDING_EARLY_DATA_END in ossl_statem_check_finish_init() 233 || (!sending && s->statem.hand_state == TLS_ST_EARLY_DATA)) { in ossl_statem_check_finish_init() 239 if (sending && s->early_data_state == SSL_EARLY_DATA_WRITE_RETRY) in ossl_statem_check_finish_init()
|
/third_party/openssl/ssl/statem/ |
D | statem.c | 215 void ossl_statem_check_finish_init(SSL *s, int sending) in ossl_statem_check_finish_init() argument 217 if (sending == -1) { in ossl_statem_check_finish_init() 230 if ((sending && (s->statem.hand_state == TLS_ST_PENDING_EARLY_DATA_END in ossl_statem_check_finish_init() 233 || (!sending && s->statem.hand_state == TLS_ST_EARLY_DATA)) { in ossl_statem_check_finish_init() 239 if (sending && s->early_data_state == SSL_EARLY_DATA_WRITE_RETRY) in ossl_statem_check_finish_init()
|
/third_party/node/deps/openssl/openssl/ssl/ |
D | tls13_enc.c | 333 static int derive_secret_key_and_iv(SSL *s, int sending, const EVP_MD *md, in derive_secret_key_and_iv() argument 391 if (EVP_CipherInit_ex(ciph_ctx, ciph, NULL, NULL, NULL, sending) <= 0 in derive_secret_key_and_iv() 956 int tls13_update_key(SSL *s, int sending) in tls13_update_key() argument 978 if (s->server == sending) in tls13_update_key() 983 if (sending) { in tls13_update_key() 994 if (!derive_secret_key_and_iv(s, sending, md, in tls13_update_key() 1006 log_label = s->server == sending ? SERVER_APPLICATION_N_LABEL : CLIENT_APPLICATION_N_LABEL; in tls13_update_key()
|
/third_party/mesa3d/src/vulkan/overlay-layer/ |
D | README.rst | 88 The client connected to the overlay layer can enable statistics capturing by sending the command: 94 And disable it by sending:
|
/third_party/openssl/doc/man3/ |
D | SSL_key_update.pod | 27 the sending keys for this connection will be updated and the peer will be 29 B<SSL_KEY_UPDATE_REQUESTED> then the sending keys for this connection will be 31 peer to additionally update its sending keys. It is an error if B<updatetype> is
|
/third_party/typescript/doc/wiki/ |
D | README.md | 5 To contribute by filing an issue or sending a pull request, [visit the wiki repository](https://git…
|
/third_party/gstreamer/gstplugins_base/gst/tcp/ |
D | gstmultifdsink.c | 694 if (!mhclient->sending) { in gst_multi_fd_sink_handle_client_write() 761 if (mhclient->sending) { in gst_multi_fd_sink_handle_client_write() 768 head = GST_BUFFER (mhclient->sending->data); in gst_multi_fd_sink_handle_client_write() 811 mhclient->sending = g_slist_remove (mhclient->sending, head); in gst_multi_fd_sink_handle_client_write()
|
/third_party/curl/tests/data/ |
D | test169 | 33 HTTP/1.1 407 NTLM type-1 received sending back type-2 55 HTTP/1.1 407 NTLM type-1 received sending back type-2
|
/third_party/gstreamer/gstplugins_good/gst/rtp/ |
D | TODO | 2 - ffmpeg mpeg4 decoder gives error message when sending only the config
|
/third_party/curl/docs/cmdline-opts/ |
D | false-start.d | 13 where a TLS client starts sending application data before verifying the
|
D | retry-all-errors.d | 15 such as sending or receiving duplicate data. Do not use with redirected input
|
D | location-trusted.d | 12 Like --location, but allows sending the name + password to all hosts that the
|
/third_party/libwebsockets/minimal-examples/api-tests/ |
D | README.md | 11 api-test-smtp_client|SMTP client for sending emails
|
/third_party/node/deps/npm/node_modules/socks/docs/examples/typescript/ |
D | associateExample.md | 29 // Create a local UDP socket for sending/receiving packets to/from the proxy. 51 …// This should be the ip and port of the expected client that will be sending UDP frames to the ne…
|
/third_party/node/deps/npm/node_modules/socks/docs/examples/javascript/ |
D | associateExample.md | 29 // Create a local UDP socket for sending/receiving packets to/from the proxy. 51 …// This should be the ip and port of the expected client that will be sending UDP frames to the ne…
|
/third_party/libphonenumber/ |
D | CONTRIBUTING.md | 5 Please read the following before filing an issue or sending a pull request. 80 issue, with instructions for sending private documentation to our closed 93 issue, with instructions for sending private documentation to our closed 104 before sending the pull request. If the issue wasn’t reproducible and seems to be
|