/netbsd-src/external/ibm-public/postfix/dist/src/tls/ |
H A D | tls_proxy_context_scan.c | 82 VSTRING *cipher_name = vstring_alloc(25); in tls_proxy_context_scan() local 110 RECV_ATTR_STR(TLS_ATTR_CIPHER_NAME, cipher_name), in tls_proxy_context_scan() 134 tls_context->cipher_name = vstring_export(cipher_name); in tls_proxy_context_scan() 169 if (tls_context->cipher_name) in tls_proxy_context_free() 170 myfree((void *) tls_context->cipher_name); in tls_proxy_context_free()
|
H A D | tls_proxy_context_print.c | 82 STRING_OR_EMPTY(tp->cipher_name)), in tls_proxy_context_print()
|
H A D | tls_misc.c | 1190 ctx->protocol, ctx->cipher_name, ctx->cipher_usebits, in tls_log_summary() 1290 TLScontext->cipher_name = 0; in tls_alloc_sess_context()
|
H A D | tls.h | 231 const char *cipher_name; member
|
H A D | tls_client.c | 1229 TLScontext->cipher_name = SSL_CIPHER_get_name(cipher); in tls_client_post_connect()
|
H A D | tls_server.c | 1026 TLScontext->cipher_name = SSL_CIPHER_get_name(cipher); in tls_server_post_accept()
|
/netbsd-src/crypto/external/bsd/openssl.old/dist/test/ |
H A D | dtls_mtu_test.c | 168 const char *cipher_name = SSL_CIPHER_get_name(cipher); in run_mtu_tests() local 171 if (strncmp(cipher_name, "PSK-", 4) != 0) in run_mtu_tests() 174 if (!TEST_int_gt(ret = mtu_test(ctx, cipher_name, 0), 0)) in run_mtu_tests() 176 TEST_info("%s OK", cipher_name); in run_mtu_tests() 181 if (!TEST_int_gt(ret = mtu_test(ctx, cipher_name, 1), 0)) in run_mtu_tests() 183 TEST_info("%s without EtM OK", cipher_name); in run_mtu_tests()
|
/netbsd-src/crypto/external/bsd/openssl/dist/test/ |
H A D | dtls_mtu_test.c | 168 const char *cipher_name = SSL_CIPHER_get_name(cipher); in run_mtu_tests() local 171 if (strncmp(cipher_name, "PSK-", 4) != 0) in run_mtu_tests() 174 if (!TEST_int_gt(ret = mtu_test(ctx, cipher_name, 0), 0)) in run_mtu_tests() 176 TEST_info("%s OK", cipher_name); in run_mtu_tests() 181 if (!TEST_int_gt(ret = mtu_test(ctx, cipher_name, 1), 0)) in run_mtu_tests() 183 TEST_info("%s without EtM OK", cipher_name); in run_mtu_tests()
|
/netbsd-src/crypto/external/bsd/openssl/dist/demos/mac/ |
H A D | cmac-aes256.c | 75 char cipher_name[] = "aes256"; in main() local 98 *p++ = OSSL_PARAM_construct_utf8_string(OSSL_MAC_PARAM_CIPHER, cipher_name, in main() 99 sizeof(cipher_name)); in main()
|
/netbsd-src/crypto/external/bsd/heimdal/dist/lib/hcrypto/ |
H A D | evp.c | 1285 static const struct cipher_name { struct 1288 } cipher_name[] = { variable 1315 for (i = 0; i < sizeof(cipher_name)/sizeof(cipher_name[0]); i++) { in EVP_get_cipherbyname() 1316 if (strcasecmp(cipher_name[i].name, name) == 0) in EVP_get_cipherbyname() 1317 return (*cipher_name[i].func)(); in EVP_get_cipherbyname()
|
/netbsd-src/crypto/external/bsd/openssl/dist/doc/man3/ |
H A D | OSSL_ENCODER_CTX_new_for_pkey.pod | 24 const char *cipher_name, 65 name I<cipher_name>. The interpretation of that I<cipher_name> is 70 I<cipher_name> may also be NULL, which will result in unencrypted
|
/netbsd-src/crypto/external/bsd/openssl/dist/crypto/encode_decode/ |
H A D | encoder_pkey.c | 26 const char *cipher_name, in DEFINE_STACK_OF() 33 (void *)cipher_name, 0); in DEFINE_STACK_OF()
|
/netbsd-src/crypto/external/bsd/openssl/dist/include/openssl/ |
H A D | encoder.h | 67 const char *cipher_name,
|
/netbsd-src/external/ibm-public/postfix/dist/src/smtpd/ |
H A D | smtpd_milter.c | 133 return (IF_ENCRYPTED(state->tls_context->cipher_name)); in smtpd_milter_eval()
|
H A D | smtpd.c | 3441 state->tls_context->cipher_name, in common_pre_message_handling()
|
H A D | smtpd_check.c | 4099 IF_ENCRYPTED(state->tls_context->cipher_name, "")), in check_policy_service()
|
/netbsd-src/crypto/external/bsd/openssl/dist/crypto/evp/ |
H A D | p_lib.c | 615 const char *cipher_name, in new_cmac_key_int() argument 629 cipher_name = EVP_CIPHER_get0_name(cipher); in new_cmac_key_int() 631 if (cipher_name == NULL) { in new_cmac_key_int() 648 (char *)cipher_name, 0); in new_cmac_key_int()
|
/netbsd-src/crypto/external/bsd/libsaslc/dist/src/ |
H A D | mech_digestmd5.c | 147 cipher_name(cipher_t cipher) in cipher_name() function 2192 cipher_name(ms->rdata.cipher)) == -1) { in saslc__mech_digestmd5_reply()
|