/external/wpa_supplicant_8/hostapd/src/eapol_supp/ |
H A D | eapol_supp_sm.h | 247 * cert_cb - Notification of a peer certificate 256 void (*cert_cb)(void *ctx, int depth, const char *subject, member in struct:eapol_ctx
|
H A D | eapol_supp_sm.c | 2002 if (sm->ctx->cert_cb) 2003 sm->ctx->cert_cb(sm->ctx->ctx, depth, subject, altsubject,
|
/external/wpa_supplicant_8/src/eapol_supp/ |
H A D | eapol_supp_sm.h | 247 * cert_cb - Notification of a peer certificate 256 void (*cert_cb)(void *ctx, int depth, const char *subject, member in struct:eapol_ctx
|
H A D | eapol_supp_sm.c | 2002 if (sm->ctx->cert_cb) 2003 sm->ctx->cert_cb(sm->ctx->ctx, depth, subject, altsubject,
|
/external/wpa_supplicant_8/wpa_supplicant/src/eapol_supp/ |
H A D | eapol_supp_sm.h | 247 * cert_cb - Notification of a peer certificate 256 void (*cert_cb)(void *ctx, int depth, const char *subject, member in struct:eapol_ctx
|
H A D | eapol_supp_sm.c | 2002 if (sm->ctx->cert_cb) 2003 sm->ctx->cert_cb(sm->ctx->ctx, depth, subject, altsubject,
|
/external/boringssl/src/ssl/ |
H A D | ssl_cert.cc | 183 ret->cert_cb = cert->cert_cb; 241 cert->cert_cb = cb;
|
H A D | tls13_client.cc | 631 // Call cert_cb to update the certificate. 632 if (ssl->cert->cert_cb != NULL) { 633 int rv = ssl->cert->cert_cb(ssl, ssl->cert->cert_cb_arg);
|
H A D | handshake_server.cc | 520 // Call |cert_cb| to update server certificates if required. 521 if (ssl->cert->cert_cb != NULL) { 522 int rv = ssl->cert->cert_cb(ssl, ssl->cert->cert_cb_arg); 548 // Negotiate the cipher suite. This must be done after |cert_cb| so the
|
H A D | handshake_client.cc | 1206 // Call cert_cb to update the certificate. 1207 if (ssl->cert->cert_cb != NULL) { 1208 int rv = ssl->cert->cert_cb(ssl, ssl->cert->cert_cb_arg);
|
H A D | internal.h | 1748 int (*cert_cb)(SSL *ssl, void *arg); member in struct:bssl::CERT
|
/external/wpa_supplicant_8/hostapd/src/utils/ |
H A D | http_curl.c | 48 int (*cert_cb)(void *ctx, struct http_cert *cert); member in struct:http_ctx 895 if (ctx->cert_cb == NULL) { 896 wpa_printf(MSG_DEBUG, "%s: no cert_cb configured", __func__); 908 ret = ctx->cert_cb(ctx->cert_cb_ctx, &hcert); 1729 ctx->cert_cb = cb;
|
/external/wpa_supplicant_8/src/utils/ |
H A D | http_curl.c | 48 int (*cert_cb)(void *ctx, struct http_cert *cert); member in struct:http_ctx 895 if (ctx->cert_cb == NULL) { 896 wpa_printf(MSG_DEBUG, "%s: no cert_cb configured", __func__); 908 ret = ctx->cert_cb(ctx->cert_cb_ctx, &hcert); 1729 ctx->cert_cb = cb;
|
/external/wpa_supplicant_8/wpa_supplicant/src/utils/ |
H A D | http_curl.c | 48 int (*cert_cb)(void *ctx, struct http_cert *cert); member in struct:http_ctx 895 if (ctx->cert_cb == NULL) { 896 wpa_printf(MSG_DEBUG, "%s: no cert_cb configured", __func__); 908 ret = ctx->cert_cb(ctx->cert_cb_ctx, &hcert); 1729 ctx->cert_cb = cb;
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | wpas_glue.c | 1121 ctx->cert_cb = wpa_supplicant_cert_cb;
|
H A D | eapol_test.c | 610 ctx->cert_cb = eapol_test_cert_cb;
|
/external/conscrypt/common/src/jni/main/cpp/conscrypt/ |
H A D | native_crypto.cc | 6137 static int cert_cb(SSL* ssl, CONSCRYPT_UNUSED void* arg) { function 6138 JNI_TRACE("ssl=%p cert_cb", ssl); 6140 // cert_cb is called for both clients and servers, but we are only 6143 JNI_TRACE("ssl=%p cert_cb not a client => 1", ssl); 6150 ALOGE("AppData->env missing in cert_cb"); 6151 JNI_TRACE("ssl=%p cert_cb env error => 0", ssl); 6155 JNI_TRACE("ssl=%p cert_cb already pending exception => 0", ssl); 6180 JNI_TRACE("ssl=%p cert_cb bytes == null => 0", ssl); 6193 JNI_TRACE("ssl=%p cert_cb exception => 0", ssl); 6197 JNI_TRACE("ssl=%p cert_cb [all...] |