/external/libsepol/src/ |
H A D | debug.c | 9 .msg_callback = sepol_msg_default_handler, 15 sepol_compat_handle.msg_callback = (on) ? 80 void (*msg_callback) (void *varg, 87 handle->msg_callback = msg_callback;
|
H A D | handle.h | 14 void (*msg_callback) (void *varg, member in struct:sepol_handle
|
H A D | debug.h | 39 if (_sepol_h->msg_callback) { \ 44 _sepol_h->msg_callback( \
|
H A D | handle.c | 14 sh->msg_callback = sepol_msg_default_handler;
|
/external/libsepol/include/sepol/ |
H A D | debug.h | 29 void (*msg_callback) (void *varg,
|
/external/chromium_org/third_party/boringssl/src/ssl/ |
H A D | s23_clnt.c | 449 if ((ret >= 2) && s->msg_callback) 451 /* Client Hello has been sent; tell msg_callback */ 453 s->msg_callback(1, version, SSL3_RT_HEADER, s->init_buf->data, 5, s, s->msg_callback_arg); 454 s->msg_callback(1, version, SSL3_RT_HANDSHAKE, s->init_buf->data+5, ret-5, s, s->msg_callback_arg); 536 if (s->msg_callback) 538 s->msg_callback(0, s->version, SSL3_RT_HEADER, p, 5, s, s->msg_callback_arg); 539 s->msg_callback(0, s->version, SSL3_RT_ALERT, p+5, 2, s, s->msg_callback_arg);
|
H A D | s3_pkt.c | 330 if (s->msg_callback) 331 s->msg_callback(0, 0, SSL3_RT_HEADER, p, 5, s, s->msg_callback_arg); 812 if (s->msg_callback) 813 s->msg_callback(1, 0, SSL3_RT_HEADER, plen - 5, 5, s, s->msg_callback_arg); 1137 if (s->msg_callback) 1138 s->msg_callback(0, s->version, SSL3_RT_HANDSHAKE, s->s3->handshake_fragment, 4, s, s->msg_callback_arg); 1203 if (s->msg_callback) 1204 s->msg_callback(0, s->version, SSL3_RT_ALERT, s->s3->alert_fragment, 2, s, s->msg_callback_arg); 1306 if (s->msg_callback) 1307 s->msg_callback( [all...] |
H A D | s3_both.c | 144 if (s->msg_callback) 145 s->msg_callback(1, s->version, type, s->init_buf->data, (size_t)(s->init_off + s->init_num), s, s->msg_callback_arg); 406 if (s->msg_callback) 407 s->msg_callback(0, s->version, SSL3_RT_HANDSHAKE, p, 4, s, s->msg_callback_arg); 478 if (s->msg_callback) 479 s->msg_callback(0, s->version, SSL3_RT_HANDSHAKE, s->init_buf->data, (size_t)s->init_num + 4, s, s->msg_callback_arg);
|
H A D | d1_pkt.c | 568 if (s->msg_callback) 569 s->msg_callback(0, 0, SSL3_RT_HEADER, p, DTLS1_RT_HEADER_LENGTH, s, s->msg_callback_arg); 967 if (s->msg_callback) 968 s->msg_callback(0, s->version, SSL3_RT_HANDSHAKE, 1018 if (s->msg_callback) 1019 s->msg_callback(0, s->version, SSL3_RT_ALERT, 1117 if (s->msg_callback) 1118 s->msg_callback(0, s->version, SSL3_RT_CHANGE_CIPHER_SPEC, 1484 if (s->msg_callback) 1485 s->msg_callback( [all...] |
H A D | s3_enc.c | 300 if (s->msg_callback) 305 s->msg_callback(2, s->version, wh | TLS1_RT_CRYPTO_MAC, 309 s->msg_callback(2, s->version, wh | TLS1_RT_CRYPTO_KEY, 314 s->msg_callback(2, s->version, wh | TLS1_RT_CRYPTO_IV, 781 if (s->msg_callback) 783 s->msg_callback(2, s->version, TLS1_RT_CRYPTO_PREMASTER, 785 s->msg_callback(2, s->version, TLS1_RT_CRYPTO_CLIENT_RANDOM, 788 s->msg_callback(2, s->version, TLS1_RT_CRYPTO_SERVER_RANDOM, 791 s->msg_callback(2, s->version, TLS1_RT_CRYPTO_MASTER,
|
H A D | s23_srvr.c | 429 if (s->msg_callback) 430 s->msg_callback(0, SSL2_VERSION, 0, s->packet+2, s->packet_length-2, s, s->msg_callback_arg); /* CLIENT-HELLO */
|
H A D | d1_both.c | 399 if (s->msg_callback) 400 s->msg_callback(1, s->version, type, s->init_buf->data, 478 if (s->msg_callback) 479 s->msg_callback(0, s->version, SSL3_RT_HANDSHAKE, 874 if (s->msg_callback) 875 s->msg_callback(0, s->version, SSL3_RT_HANDSHAKE,
|
H A D | t1_enc.c | 1199 if (s->msg_callback) 1201 s->msg_callback(2, s->version, TLS1_RT_CRYPTO_PREMASTER, 1203 s->msg_callback(2, s->version, TLS1_RT_CRYPTO_CLIENT_RANDOM, 1206 s->msg_callback(2, s->version, TLS1_RT_CRYPTO_SERVER_RANDOM, 1209 s->msg_callback(2, s->version, TLS1_RT_CRYPTO_MASTER,
|
/external/openssl/ssl/ |
H A D | s2_srvr.c | 436 if (s->msg_callback) 437 s->msg_callback(0, s->version, 0, p, (size_t)len, s, s->msg_callback_arg); /* CLIENT-MASTER-KEY */ 585 if (s->msg_callback) 586 s->msg_callback(0, s->version, 0, p, (size_t)len, s, s->msg_callback_arg); /* CLIENT-HELLO */ 858 if (s->msg_callback) 859 s->msg_callback(0, s->version, 0, p, len, s, s->msg_callback_arg); /* CLIENT-FINISHED */ 981 if (s->msg_callback) 982 s->msg_callback(0, s->version, 0, p, 3, s, s->msg_callback_arg); /* ERROR */ 1036 if (s->msg_callback) 1037 s->msg_callback( [all...] |
H A D | s3_both.c | 142 if (s->msg_callback) 143 s->msg_callback(1, s->version, type, s->init_buf->data, (size_t)(s->init_off + s->init_num), s, s->msg_callback_arg); 487 if (s->msg_callback) 488 s->msg_callback(0, s->version, SSL3_RT_HANDSHAKE, p, 4, s, s->msg_callback_arg); 566 if (s->msg_callback) 567 s->msg_callback(0, s->version, SSL3_RT_HANDSHAKE, s->init_buf->data, (size_t)s->init_num + 4, s, s->msg_callback_arg);
|
H A D | d1_both.c | 391 if (s->msg_callback) 392 s->msg_callback(1, s->version, type, s->init_buf->data, 465 if (s->msg_callback) 466 s->msg_callback(0, s->version, SSL3_RT_HANDSHAKE, 863 if (s->msg_callback) 864 s->msg_callback(0, s->version, SSL3_RT_HANDSHAKE, 1487 if (s->msg_callback) 1488 s->msg_callback(0, s->version, TLS1_RT_HEARTBEAT, 1532 if (r >= 0 && s->msg_callback) 1533 s->msg_callback( [all...] |
H A D | s2_clnt.c | 390 if (s->msg_callback) 391 s->msg_callback(0, s->version, 0, buf, (size_t)len, s, s->msg_callback_arg); /* SERVER-HELLO */ 769 if (s->msg_callback) 770 s->msg_callback(0, s->version, 0, buf, (size_t)s->init_num, s, s->msg_callback_arg); /* REQUEST-CERTIFICATE */ 938 if (s->msg_callback) 939 s->msg_callback(0, s->version, 0, p, len, s, s->msg_callback_arg); /* SERVER-VERIFY */ 996 if (s->msg_callback) 997 s->msg_callback(0, s->version, 0, buf, (size_t)s->init_num, s, s->msg_callback_arg); /* SERVER-FINISHED */
|
H A D | s3_pkt.c | 1189 if (s->msg_callback) 1190 s->msg_callback(0, s->version, SSL3_RT_HANDSHAKE, s->s3->handshake_fragment, 4, s, s->msg_callback_arg); 1255 if (s->msg_callback) 1256 s->msg_callback(0, s->version, SSL3_RT_ALERT, s->s3->alert_fragment, 2, s, s->msg_callback_arg); 1358 if (s->msg_callback) 1359 s->msg_callback(0, s->version, SSL3_RT_CHANGE_CIPHER_SPEC, rr->data, 1, s, s->msg_callback_arg); 1570 if (s->msg_callback) 1571 s->msg_callback(1, s->version, SSL3_RT_ALERT, s->s3->send_alert, 2, s, s->msg_callback_arg);
|
H A D | s23_clnt.c | 598 if ((ret >= 2) && s->msg_callback) 600 /* Client Hello has been sent; tell msg_callback */ 603 s->msg_callback(1, SSL2_VERSION, 0, s->init_buf->data+2, ret-2, s, s->msg_callback_arg); 605 s->msg_callback(1, version, SSL3_RT_HANDSHAKE, s->init_buf->data+5, ret-5, s, s->msg_callback_arg); 766 if (s->msg_callback) 767 s->msg_callback(0, s->version, SSL3_RT_ALERT, p+5, 2, s, s->msg_callback_arg);
|
H A D | d1_pkt.c | 1055 if (s->msg_callback) 1056 s->msg_callback(0, s->version, SSL3_RT_HANDSHAKE, 1106 if (s->msg_callback) 1107 s->msg_callback(0, s->version, SSL3_RT_ALERT, 1223 if (s->msg_callback) 1224 s->msg_callback(0, s->version, SSL3_RT_CHANGE_CIPHER_SPEC, 1738 if (s->msg_callback) 1739 s->msg_callback(1, s->version, SSL3_RT_ALERT, s->s3->send_alert,
|
H A D | s2_lib.c | 542 if (s->msg_callback) 543 s->msg_callback(1, s->version, 0, buf, 3, s, s->msg_callback_arg); /* ERROR */
|
H A D | s23_srvr.c | 479 if (s->msg_callback) 480 s->msg_callback(0, SSL2_VERSION, 0, s->packet+2, s->packet_length-2, s, s->msg_callback_arg); /* CLIENT-HELLO */
|
H A D | s2_pkt.c | 702 if (s->msg_callback) 703 s->msg_callback(1, s->version, 0, s->init_buf->data, (size_t)(s->init_off + s->init_num), s, s->msg_callback_arg);
|
H A D | ssl_lib.c | 322 s->msg_callback=ctx->msg_callback; 1143 s->msg_callback = (void (*)(int write_p, int version, int content_type, const void *buf, size_t len, SSL *ssl, void *arg))(fp); 1240 ctx->msg_callback = (void (*)(int write_p, int version, int content_type, const void *buf, size_t len, SSL *ssl, void *arg))(fp); 1909 ret->msg_callback=0; 2894 ret->msg_callback = s->msg_callback;
|
H A D | t1_lib.c | 2781 if (s->msg_callback) 2782 s->msg_callback(0, s->version, TLS1_RT_HEARTBEAT, 2817 if (r >= 0 && s->msg_callback) 2818 s->msg_callback(1, s->version, TLS1_RT_HEARTBEAT, 2907 if (s->msg_callback) 2908 s->msg_callback(1, s->version, TLS1_RT_HEARTBEAT,
|