Home
last modified time | relevance | path

Searched refs:cipher_name (Results 1 – 18 of 18) sorted by relevance

/third_party/openssl/test/
Ddtls_mtu_test.c168 const char *cipher_name = SSL_CIPHER_get_name(cipher); in run_mtu_tests() local
171 if (strncmp(cipher_name, "PSK-", 4) != 0) in run_mtu_tests()
174 if (!TEST_int_gt(ret = mtu_test(ctx, cipher_name, 0), 0)) in run_mtu_tests()
176 TEST_info("%s OK", cipher_name); in run_mtu_tests()
181 if (!TEST_int_gt(ret = mtu_test(ctx, cipher_name, 1), 0)) in run_mtu_tests()
183 TEST_info("%s without EtM OK", cipher_name); in run_mtu_tests()
/third_party/openssl/demos/mac/
Dcmac-aes256.c75 char cipher_name[] = "aes256"; in main() local
98 *p++ = OSSL_PARAM_construct_utf8_string(OSSL_MAC_PARAM_CIPHER, cipher_name, in main()
99 sizeof(cipher_name)); in main()
/third_party/openssl/doc/man3/
DOSSL_ENCODER_CTX_new_for_pkey.pod24 const char *cipher_name,
65 name I<cipher_name>. The interpretation of that I<cipher_name> is
70 I<cipher_name> may also be NULL, which will result in unencrypted
/third_party/openssl/crypto/encode_decode/
Dencoder_pkey.c26 const char *cipher_name, in DEFINE_STACK_OF()
33 (void *)cipher_name, 0); in DEFINE_STACK_OF()
/third_party/node/deps/openssl/openssl/crypto/encode_decode/
Dencoder_pkey.c26 const char *cipher_name, in DEFINE_STACK_OF()
33 (void *)cipher_name, 0); in DEFINE_STACK_OF()
/third_party/node/deps/openssl/openssl/include/openssl/
Dencoder.h67 const char *cipher_name,
/third_party/openssl/include/openssl/
Dencoder.h67 const char *cipher_name,
/third_party/node/src/quic/
Dtlscontext.h125 v8::MaybeLocal<v8::Value> cipher_name(Environment* env) const;
Dtlscontext.cc511 MaybeLocal<Value> TLSContext::cipher_name(Environment* env) const { in cipher_name() function in node::quic::TLSContext
/third_party/mbedtls/library/
Dcipher.c106 const char *cipher_name) in mbedtls_cipher_info_from_string() argument
110 if (NULL == cipher_name) { in mbedtls_cipher_info_from_string()
115 if (!strcmp(def->info->name, cipher_name)) { in mbedtls_cipher_info_from_string()
/third_party/mbedtls/include/mbedtls/
Dcipher.h395 const mbedtls_cipher_info_t *mbedtls_cipher_info_from_string(const char *cipher_name);
/third_party/node/deps/openssl/openssl/crypto/evp/
Dp_lib.c615 const char *cipher_name, in new_cmac_key_int() argument
629 cipher_name = EVP_CIPHER_get0_name(cipher); in new_cmac_key_int()
631 if (cipher_name == NULL) { in new_cmac_key_int()
648 (char *)cipher_name, 0); in new_cmac_key_int()
/third_party/openssl/crypto/evp/
Dp_lib.c615 const char *cipher_name, in new_cmac_key_int() argument
629 cipher_name = EVP_CIPHER_get0_name(cipher); in new_cmac_key_int()
631 if (cipher_name == NULL) { in new_cmac_key_int()
648 (char *)cipher_name, 0); in new_cmac_key_int()
/third_party/python/Modules/
D_ssl.c1899 const char *cipher_name, *cipher_protocol; in cipher_to_tuple() local
1904 cipher_name = SSL_CIPHER_get_name(cipher); in cipher_to_tuple()
1905 if (cipher_name == NULL) { in cipher_to_tuple()
1909 v = PyUnicode_FromString(cipher_name); in cipher_to_tuple()
1941 const char *cipher_name, *cipher_protocol; in cipher_to_dict() local
1950 cipher_name = SSL_CIPHER_get_name(cipher); in cipher_to_dict()
1975 "name", cipher_name, in cipher_to_dict()
/third_party/node/src/crypto/
Dcrypto_keys.cc688 Utf8Value cipher_name(env->isolate(), args[*offset]); in GetPrivateKeyEncodingFromJs() local
689 result.cipher_ = EVP_get_cipherbyname(*cipher_name); in GetPrivateKeyEncodingFromJs()
/third_party/rust/crates/rust-openssl/openssl/src/ssl/test/
Dmod.rs1479 super::cipher_name("TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384"), in openssl_cipher_name()
1483 assert_eq!(super::cipher_name("asdf"), "(NONE)"); in openssl_cipher_name()
/third_party/rust/crates/rust-openssl/openssl/
DCHANGELOG.md475 * Fixed the return type of `ssl::cipher_name`.
487 * Added `SslCipherRef::standard_name` and `ssl::cipher_name`.
/third_party/rust/crates/rust-openssl/openssl/src/ssl/
Dmod.rs124 pub fn cipher_name(std_name: &str) -> &'static str { in cipher_name() function