/external/boringssl/src/ssl/ |
H A D | ssl_cert.cc | 179 ret->cert_cb = cert->cert_cb; 237 c->cert_cb = cb;
|
H A D | tls13_client.cc | 556 /* Call cert_cb to update the certificate. */ 557 if (ssl->cert->cert_cb != NULL) { 558 int rv = ssl->cert->cert_cb(ssl, ssl->cert->cert_cb_arg);
|
H A D | handshake_server.cc | 757 /* Call |cert_cb| to update server certificates if required. */ 758 if (ssl->cert->cert_cb != NULL) { 759 int rv = ssl->cert->cert_cb(ssl, ssl->cert->cert_cb_arg); 788 /* Negotiate the cipher suite. This must be done after |cert_cb| so the
|
H A D | handshake_client.cc | 1516 /* Call cert_cb to update the certificate. */ 1517 if (ssl->cert->cert_cb) { 1518 int ret = ssl->cert->cert_cb(ssl, ssl->cert->cert_cb_arg);
|
H A D | internal.h | 1464 int (*cert_cb)(SSL *ssl, void *arg); member in struct:cert_st
|
/external/wpa_supplicant_8/hostapd/src/eapol_supp/ |
H A D | eapol_supp_sm.h | 247 * cert_cb - Notification of a peer certificate 256 void (*cert_cb)(void *ctx, int depth, const char *subject, member in struct:eapol_ctx
|
H A D | eapol_supp_sm.c | 1987 if (sm->ctx->cert_cb) 1988 sm->ctx->cert_cb(sm->ctx->ctx, depth, subject, altsubject,
|
/external/wpa_supplicant_8/src/eapol_supp/ |
H A D | eapol_supp_sm.h | 247 * cert_cb - Notification of a peer certificate 256 void (*cert_cb)(void *ctx, int depth, const char *subject, member in struct:eapol_ctx
|
H A D | eapol_supp_sm.c | 1987 if (sm->ctx->cert_cb) 1988 sm->ctx->cert_cb(sm->ctx->ctx, depth, subject, altsubject,
|
/external/wpa_supplicant_8/wpa_supplicant/src/eapol_supp/ |
H A D | eapol_supp_sm.h | 247 * cert_cb - Notification of a peer certificate 256 void (*cert_cb)(void *ctx, int depth, const char *subject, member in struct:eapol_ctx
|
H A D | eapol_supp_sm.c | 1987 if (sm->ctx->cert_cb) 1988 sm->ctx->cert_cb(sm->ctx->ctx, depth, subject, altsubject,
|
/external/wpa_supplicant_8/hostapd/src/utils/ |
H A D | http_curl.c | 48 int (*cert_cb)(void *ctx, struct http_cert *cert); member in struct:http_ctx 896 if (ctx->cert_cb == NULL) { 897 wpa_printf(MSG_DEBUG, "%s: no cert_cb configured", __func__); 909 ret = ctx->cert_cb(ctx->cert_cb_ctx, &hcert); 1711 ctx->cert_cb = cb;
|
/external/wpa_supplicant_8/src/utils/ |
H A D | http_curl.c | 48 int (*cert_cb)(void *ctx, struct http_cert *cert); member in struct:http_ctx 896 if (ctx->cert_cb == NULL) { 897 wpa_printf(MSG_DEBUG, "%s: no cert_cb configured", __func__); 909 ret = ctx->cert_cb(ctx->cert_cb_ctx, &hcert); 1711 ctx->cert_cb = cb;
|
/external/wpa_supplicant_8/wpa_supplicant/src/utils/ |
H A D | http_curl.c | 48 int (*cert_cb)(void *ctx, struct http_cert *cert); member in struct:http_ctx 896 if (ctx->cert_cb == NULL) { 897 wpa_printf(MSG_DEBUG, "%s: no cert_cb configured", __func__); 909 ret = ctx->cert_cb(ctx->cert_cb_ctx, &hcert); 1711 ctx->cert_cb = cb;
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | wpas_glue.c | 1074 ctx->cert_cb = wpa_supplicant_cert_cb;
|
H A D | eapol_test.c | 610 ctx->cert_cb = eapol_test_cert_cb;
|
/external/conscrypt/common/src/jni/main/cpp/ |
H A D | NativeCrypto.cpp | 5651 static int cert_cb(SSL* ssl, CONSCRYPT_UNUSED void* arg) { function 5652 JNI_TRACE("ssl=%p cert_cb", ssl); 5654 // cert_cb is called for both clients and servers, but we are only 5657 JNI_TRACE("ssl=%p cert_cb not a client => 1", ssl); 5664 ALOGE("AppData->env missing in cert_cb"); 5665 JNI_TRACE("ssl=%p cert_cb env error => 0", ssl); 5669 JNI_TRACE("ssl=%p cert_cb already pending exception => 0", ssl); 5691 JNI_TRACE("ssl=%p cert_cb bytes == null => 0", ssl); 5702 JNI_TRACE("ssl=%p cert_cb exception => 0", ssl); 5706 JNI_TRACE("ssl=%p cert_cb [all...] |