/external/boringssl/src/ssl/ |
ssl_cert.cc | 179 ret->cert_cb = cert->cert_cb; 237 c->cert_cb = cb;
|
tls13_client.cc | 556 /* Call cert_cb to update the certificate. */ 557 if (ssl->cert->cert_cb != NULL) { 558 int rv = ssl->cert->cert_cb(ssl, ssl->cert->cert_cb_arg);
|
handshake_server.cc | 757 /* Call |cert_cb| to update server certificates if required. */ 758 if (ssl->cert->cert_cb != NULL) { 759 int rv = ssl->cert->cert_cb(ssl, ssl->cert->cert_cb_arg); 788 /* Negotiate the cipher suite. This must be done after |cert_cb| so the [all...] |
handshake_client.cc | [all...] |
internal.h | 1464 int (*cert_cb)(SSL *ssl, void *arg); member in struct:cert_st [all...] |
/external/wpa_supplicant_8/src/eapol_supp/ |
eapol_supp_sm.h | 247 * cert_cb - Notification of a peer certificate 256 void (*cert_cb)(void *ctx, int depth, const char *subject, member in struct:eapol_ctx
|
eapol_supp_sm.c | [all...] |
/external/wpa_supplicant_8/src/utils/ |
http_curl.c | 48 int (*cert_cb)(void *ctx, struct http_cert *cert); member in struct:http_ctx 896 if (ctx->cert_cb == NULL) { 897 wpa_printf(MSG_DEBUG, "%s: no cert_cb configured", __func__); 909 ret = ctx->cert_cb(ctx->cert_cb_ctx, &hcert); [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
wpas_glue.c | 1074 ctx->cert_cb = wpa_supplicant_cert_cb; [all...] |
eapol_test.c | 610 ctx->cert_cb = eapol_test_cert_cb; [all...] |
/external/conscrypt/common/src/jni/main/cpp/ |
NativeCrypto.cpp | 5651 static int cert_cb(SSL* ssl, CONSCRYPT_UNUSED void* arg) { function [all...] |