Searched refs:CERT (Results 1 – 15 of 15) sorted by relevance
/external/boringssl/src/ssl/ |
D | tls_method.cc | 133 static void ssl_noop_x509_clear(CERT *cert) {} in ssl_noop_x509_clear() 134 static void ssl_noop_x509_free(CERT *cert) {} in ssl_noop_x509_free() 135 static void ssl_noop_x509_dup(CERT *new_cert, const CERT *cert) {} in ssl_noop_x509_dup() 136 static void ssl_noop_x509_flush_cached_leaf(CERT *cert) {} in ssl_noop_x509_flush_cached_leaf() 137 static void ssl_noop_x509_flush_cached_chain(CERT *cert) {} in ssl_noop_x509_flush_cached_chain()
|
D | ssl_cert.cc | 138 CERT::CERT(const SSL_X509_METHOD *x509_method_arg) in CERT() function in CERT 141 CERT::~CERT() { in ~CERT() 151 UniquePtr<CERT> ssl_cert_dup(CERT *cert) { in ssl_cert_dup() 152 UniquePtr<CERT> ret = MakeUnique<CERT>(cert->x509_method); in ssl_cert_dup() 197 void ssl_cert_clear_certs(CERT *cert) { in ssl_cert_clear_certs() 213 static void ssl_cert_set_cert_cb(CERT *cert, int (*cb)(SSL *ssl, void *arg), in ssl_cert_set_cert_cb() 265 CERT *cert, CRYPTO_BUFFER *const *certs, size_t num_certs, in cert_set_chain_and_key() 306 bool ssl_set_cert(CERT *cert, UniquePtr<CRYPTO_BUFFER> buffer) { in ssl_set_cert() 519 bool ssl_cert_check_private_key(const CERT *cert, const EVP_PKEY *privkey) { in ssl_cert_check_private_key() 810 const CERT *cert = hs->config->cert.get(); in ssl_can_serve_dc() [all …]
|
D | ssl_x509.cc | 203 static int ssl_cert_set_chain(CERT *cert, STACK_OF(X509) *chain) { in ssl_cert_set_chain() 238 static void ssl_crypto_x509_cert_flush_cached_leaf(CERT *cert) { in ssl_crypto_x509_cert_flush_cached_leaf() 243 static void ssl_crypto_x509_cert_flush_cached_chain(CERT *cert) { in ssl_crypto_x509_cert_flush_cached_chain() 263 static void ssl_crypto_x509_cert_clear(CERT *cert) { in ssl_crypto_x509_cert_clear() 271 static void ssl_crypto_x509_cert_free(CERT *cert) { in ssl_crypto_x509_cert_free() 276 static void ssl_crypto_x509_cert_dup(CERT *new_cert, const CERT *cert) { in ssl_crypto_x509_cert_dup() 732 static int ssl_use_certificate(CERT *cert, X509 *x) { in ssl_use_certificate() 761 static int ssl_cert_cache_leaf_cert(CERT *cert) { in ssl_cert_cache_leaf_cert() 778 static X509 *ssl_cert_get0_leaf(CERT *cert) { in ssl_cert_get0_leaf() 802 static int ssl_cert_set0_chain(CERT *cert, STACK_OF(X509) *chain) { in ssl_cert_set0_chain() [all …]
|
D | internal.h | 1873 struct CERT { 1876 explicit CERT(const SSL_X509_METHOD *x509_method); 1877 ~CERT(); 2035 void (*cert_clear)(CERT *cert); 2037 void (*cert_free)(CERT *cert); 2041 void (*cert_dup)(CERT *new_cert, const CERT *cert); 2042 void (*cert_flush_cached_chain)(CERT *cert); 2045 void (*cert_flush_cached_leaf)(CERT *cert); 2484 UniquePtr<CERT> cert; 2584 UniquePtr<CERT> ssl_cert_dup(CERT *cert); [all …]
|
D | tls13_both.cc | 421 CERT *const cert = hs->config->cert.get(); in tls13_add_certificate()
|
D | ssl_privkey.cc | 79 static bool ssl_set_pkey(CERT *cert, EVP_PKEY *pkey) { in ssl_set_pkey()
|
D | ssl_lib.cc | 601 ret->cert = MakeUnique<CERT>(method->x509_method); in SSL_CTX_new() 1495 static int set_session_id_context(CERT *cert, const uint8_t *sid_ctx, in set_session_id_context() 2420 UniquePtr<CERT> new_cert = ssl_cert_dup(ctx->cert.get()); in SSL_set_SSL_CTX()
|
D | t1_lib.cc | 3656 CERT *cert = hs->config->cert.get(); in tls1_choose_signature_algorithm()
|
/external/bzip2/ |
D | CHANGES | 318 Security fix only. Fixes CERT-FI 20469 as it applies to bzip2.
|
/external/libmtp/logs/ |
D | mtp-detect-sony-walkman-nwz-s516.txt | 336 ATURE_VALUE><SYMSIGNATURE>wZoo5yradZ+VhIjxNu6L8vGJF9o=</SYMSIGNATURE></CERT
|
D | mtp-detect-samsung-juke.txt | 345 …NATURE_VALUE>u0EXC4fOhglw5n4sOlS3Y2jtD0MPP0MpMEZm1PjEjxcyodTfxyOrQQ==</MSDRM_SIGNATURE_VALUE></CERT
|
D | mtp-detect-toshiba-gigabeat-met401.txt | 486 ATURE_VALUE><SYMSIGNATURE>ujbe6CEe0ruAawznaq1P0JTqGoY=</SYMSIGNATURE></CERT
|
/external/clang/include/clang/StaticAnalyzer/Checkers/ |
D | Checkers.td | 323 HelpText<"Warn on using a floating point value as a loop counter (CERT: FLP30-C, FLP30-CPP)">,
|
/external/clang/docs/ |
D | ThreadSafetyAnalysis.rst | 14 CERT/SEI, and is used extensively in Google's internal code base.
|
/external/libpng/ |
D | CHANGES | 1895 to eliminate a vulnerability (CVE-2007-2445, CERT VU#684664) 3222 (CVE-2011-0408, CERT VU#643140). The documentation did not accurately 3569 based on cHRM, and the divide-by-zero bug in png_handle_cHRM (CERT 4869 This fixes CERT VU#684412 and CVE-2014-0333.
|