Home
last modified time | relevance | path

Searched refs:CERT (Results 1 – 15 of 15) sorted by relevance

/external/boringssl/src/ssl/
Dtls_method.cc133 static void ssl_noop_x509_clear(CERT *cert) {} in ssl_noop_x509_clear()
134 static void ssl_noop_x509_free(CERT *cert) {} in ssl_noop_x509_free()
135 static void ssl_noop_x509_dup(CERT *new_cert, const CERT *cert) {} in ssl_noop_x509_dup()
136 static void ssl_noop_x509_flush_cached_leaf(CERT *cert) {} in ssl_noop_x509_flush_cached_leaf()
137 static void ssl_noop_x509_flush_cached_chain(CERT *cert) {} in ssl_noop_x509_flush_cached_chain()
Dssl_cert.cc138 CERT::CERT(const SSL_X509_METHOD *x509_method_arg) in CERT() function in CERT
141 CERT::~CERT() { in ~CERT()
151 UniquePtr<CERT> ssl_cert_dup(CERT *cert) { in ssl_cert_dup()
152 UniquePtr<CERT> ret = MakeUnique<CERT>(cert->x509_method); in ssl_cert_dup()
197 void ssl_cert_clear_certs(CERT *cert) { in ssl_cert_clear_certs()
213 static void ssl_cert_set_cert_cb(CERT *cert, int (*cb)(SSL *ssl, void *arg), in ssl_cert_set_cert_cb()
265 CERT *cert, CRYPTO_BUFFER *const *certs, size_t num_certs, in cert_set_chain_and_key()
306 bool ssl_set_cert(CERT *cert, UniquePtr<CRYPTO_BUFFER> buffer) { in ssl_set_cert()
519 bool ssl_cert_check_private_key(const CERT *cert, const EVP_PKEY *privkey) { in ssl_cert_check_private_key()
810 const CERT *cert = hs->config->cert.get(); in ssl_can_serve_dc()
[all …]
Dssl_x509.cc203 static int ssl_cert_set_chain(CERT *cert, STACK_OF(X509) *chain) { in ssl_cert_set_chain()
238 static void ssl_crypto_x509_cert_flush_cached_leaf(CERT *cert) { in ssl_crypto_x509_cert_flush_cached_leaf()
243 static void ssl_crypto_x509_cert_flush_cached_chain(CERT *cert) { in ssl_crypto_x509_cert_flush_cached_chain()
263 static void ssl_crypto_x509_cert_clear(CERT *cert) { in ssl_crypto_x509_cert_clear()
271 static void ssl_crypto_x509_cert_free(CERT *cert) { in ssl_crypto_x509_cert_free()
276 static void ssl_crypto_x509_cert_dup(CERT *new_cert, const CERT *cert) { in ssl_crypto_x509_cert_dup()
732 static int ssl_use_certificate(CERT *cert, X509 *x) { in ssl_use_certificate()
761 static int ssl_cert_cache_leaf_cert(CERT *cert) { in ssl_cert_cache_leaf_cert()
778 static X509 *ssl_cert_get0_leaf(CERT *cert) { in ssl_cert_get0_leaf()
802 static int ssl_cert_set0_chain(CERT *cert, STACK_OF(X509) *chain) { in ssl_cert_set0_chain()
[all …]
Dinternal.h1873 struct CERT {
1876 explicit CERT(const SSL_X509_METHOD *x509_method);
1877 ~CERT();
2035 void (*cert_clear)(CERT *cert);
2037 void (*cert_free)(CERT *cert);
2041 void (*cert_dup)(CERT *new_cert, const CERT *cert);
2042 void (*cert_flush_cached_chain)(CERT *cert);
2045 void (*cert_flush_cached_leaf)(CERT *cert);
2484 UniquePtr<CERT> cert;
2584 UniquePtr<CERT> ssl_cert_dup(CERT *cert);
[all …]
Dtls13_both.cc421 CERT *const cert = hs->config->cert.get(); in tls13_add_certificate()
Dssl_privkey.cc79 static bool ssl_set_pkey(CERT *cert, EVP_PKEY *pkey) { in ssl_set_pkey()
Dssl_lib.cc601 ret->cert = MakeUnique<CERT>(method->x509_method); in SSL_CTX_new()
1495 static int set_session_id_context(CERT *cert, const uint8_t *sid_ctx, in set_session_id_context()
2420 UniquePtr<CERT> new_cert = ssl_cert_dup(ctx->cert.get()); in SSL_set_SSL_CTX()
Dt1_lib.cc3656 CERT *cert = hs->config->cert.get(); in tls1_choose_signature_algorithm()
/external/bzip2/
DCHANGES318 Security fix only. Fixes CERT-FI 20469 as it applies to bzip2.
/external/libmtp/logs/
Dmtp-detect-sony-walkman-nwz-s516.txt336 ATURE_VALUE><SYMSIGNATURE>wZoo5yradZ+VhIjxNu6L8vGJF9o=</SYMSIGNATURE></CERT
Dmtp-detect-samsung-juke.txt345 …NATURE_VALUE>u0EXC4fOhglw5n4sOlS3Y2jtD0MPP0MpMEZm1PjEjxcyodTfxyOrQQ==</MSDRM_SIGNATURE_VALUE></CERT
Dmtp-detect-toshiba-gigabeat-met401.txt486 ATURE_VALUE><SYMSIGNATURE>ujbe6CEe0ruAawznaq1P0JTqGoY=</SYMSIGNATURE></CERT
/external/clang/include/clang/StaticAnalyzer/Checkers/
DCheckers.td323 HelpText<"Warn on using a floating point value as a loop counter (CERT: FLP30-C, FLP30-CPP)">,
/external/clang/docs/
DThreadSafetyAnalysis.rst14 CERT/SEI, and is used extensively in Google's internal code base.
/external/libpng/
DCHANGES1895 to eliminate a vulnerability (CVE-2007-2445, CERT VU#684664)
3222 (CVE-2011-0408, CERT VU#643140). The documentation did not accurately
3569 based on cHRM, and the divide-by-zero bug in png_handle_cHRM (CERT
4869 This fixes CERT VU#684412 and CVE-2014-0333.