HomeSort by: relevance | last modified time | path
    Searched defs:alert (Results 1 - 25 of 26) sorted by relevancy

1 2

  /src/crypto/external/apache2/openssl/dist/util/perl/TLSProxy/
Message.pm 12 use TLSProxy::Alert;
37 #Alert levels
43 #Alert descriptions
162 my $alert;
175 $alert = undef;
328 $alert = TLSProxy::Alert->new(
519 sub alert subroutine
521 return $alert;
  /src/crypto/external/bsd/openssl/dist/util/perl/TLSProxy/
Message.pm 12 use TLSProxy::Alert;
34 #Alert levels
40 #Alert descriptions
148 my $alert;
161 $alert = undef;
291 $alert = TLSProxy::Alert->new(
422 sub alert subroutine
424 return $alert;
  /src/crypto/external/bsd/openssl.old/dist/util/perl/TLSProxy/
Message.pm 12 use TLSProxy::Alert;
34 #Alert levels
40 #Alert descriptions
148 my $alert;
161 $alert = undef;
291 $alert = TLSProxy::Alert->new(
413 sub alert subroutine
415 return $alert;
  /src/sys/external/bsd/drm2/dist/drm/amd/powerplay/hwmgr/
amdgpu_smu7_thermal.c 310 * Set the requested temperature range for high and low alert signals
313 * @param range Temperature range to be programmed for high and low alert signals
371 uint32_t alert; local
373 alert = PHM_READ_VFPF_INDIRECT_FIELD(hwmgr->device, CGS_IND_REG__SMC,
375 alert &= ~(SMU7_THERMAL_HIGH_ALERT_MASK | SMU7_THERMAL_LOW_ALERT_MASK);
377 CG_THERMAL_INT, THERM_INT_MASK, alert);
389 uint32_t alert; local
391 alert = PHM_READ_VFPF_INDIRECT_FIELD(hwmgr->device, CGS_IND_REG__SMC,
393 alert |= (SMU7_THERMAL_HIGH_ALERT_MASK | SMU7_THERMAL_LOW_ALERT_MASK);
395 CG_THERMAL_INT, THERM_INT_MASK, alert);
    [all...]
  /src/crypto/external/apache2/openssl/dist/ssl/record/
rec_layer_d1.c 180 * Alert records (e.g. close_notify) or renegotiation requests. ChangeCipherSpec
188 * Alert protocol
275 * record that isn't an alert.
358 * We might had to delay a close_notify alert because of reordered
359 * app data. If there was an alert and there is no message to read
380 PACKET alert; local
382 if (!PACKET_buf_init(&alert, alert_bytes, rr->length)
383 || !PACKET_get_1(&alert, &alert_level)
384 || !PACKET_get_1(&alert, &alert_descr)
385 || PACKET_remaining(&alert) != 0)
    [all...]
rec_layer_s3.c 368 /* If we have an alert to send, lets send it */
534 * else some failure but there is no alert code. We don't log an
605 * Alert records (e.g. close_notify) or renegotiation requests. ChangeCipherSpec
613 * Alert protocol
725 * record that isn't an alert.
850 * we're using then this must be a client side alert we're dealing
867 PACKET alert; local
869 if (!PACKET_buf_init(&alert, alert_bytes, rr->length)
870 || !PACKET_get_1(&alert, &alert_level)
871 || !PACKET_get_1(&alert, &alert_descr
    [all...]
  /src/sys/arch/shark/include/
profileio.h 147 int alert; /* if set then the daemon sends a SIGINT to member in struct:stopSamplingCommand
  /src/crypto/external/bsd/openssl/dist/ssl/record/
rec_layer_d1.c 326 * Alert records (e.g. close_notify) or renegotiation requests. ChangeCipherSpec
334 * Alert protocol
440 * record that isn't an alert.
532 * We might had to delay a close_notify alert because of reordered
533 * app data. If there was an alert and there is no message to read
556 PACKET alert; local
558 if (!PACKET_buf_init(&alert, alert_bytes, SSL3_RECORD_get_length(rr))
559 || !PACKET_get_1(&alert, &alert_level)
560 || !PACKET_get_1(&alert, &alert_descr)
561 || PACKET_remaining(&alert) != 0)
    [all...]
rec_layer_s3.c 709 /* If we have an alert to send, lets send it */
1269 * Alert records (e.g. close_notify) or renegotiation requests. ChangeCipherSpec
1277 * Alert protocol
1403 * record that isn't an alert.
1537 * we're using then this must be a client side alert we're dealing
1555 PACKET alert; local
1557 if (!PACKET_buf_init(&alert, alert_bytes, SSL3_RECORD_get_length(rr))
1558 || !PACKET_get_1(&alert, &alert_level)
1559 || !PACKET_get_1(&alert, &alert_descr)
1560 || PACKET_remaining(&alert) != 0)
    [all...]
  /src/crypto/external/bsd/openssl.old/dist/ssl/record/
rec_layer_d1.c 325 * Alert records (e.g. close_notify) or renegotiation requests. ChangeCipherSpec
333 * Alert protocol
440 * record that isn't an alert.
530 * We might had to delay a close_notify alert because of reordered
531 * app data. If there was an alert and there is no message to read
554 PACKET alert; local
556 if (!PACKET_buf_init(&alert, alert_bytes, SSL3_RECORD_get_length(rr))
557 || !PACKET_get_1(&alert, &alert_level)
558 || !PACKET_get_1(&alert, &alert_descr)
559 || PACKET_remaining(&alert) != 0)
    [all...]
rec_layer_s3.c 694 /* If we have an alert to send, lets send it */
1219 * Alert records (e.g. close_notify) or renegotiation requests. ChangeCipherSpec
1227 * Alert protocol
1355 * record that isn't an alert.
1490 * we're using then this must be a client side alert we're dealing with
1509 PACKET alert; local
1511 if (!PACKET_buf_init(&alert, alert_bytes, SSL3_RECORD_get_length(rr))
1512 || !PACKET_get_1(&alert, &alert_level)
1513 || !PACKET_get_1(&alert, &alert_descr)
1514 || PACKET_remaining(&alert) != 0)
    [all...]
  /src/external/bsd/wpa/dist/src/tls/
tlsv1_client.c 169 u8 *msg = NULL, *in_msg = NULL, *in_pos, *in_end, alert, ct; local
209 in_msg, &in_msg_len, &alert);
213 tls_alert(conn, TLS_ALERT_LEVEL_FATAL, alert);
336 u8 alert, *out_pos, ct; local
347 alert = TLS_ALERT_INTERNAL_ERROR;
361 alert = TLS_ALERT_INTERNAL_ERROR;
367 out_pos, &olen, &alert);
383 alert = TLS_ALERT_INTERNAL_ERROR;
393 wpa_printf(MSG_DEBUG, "TLSv1: Alert "
395 alert = TLS_ALERT_DECODE_ERROR
    [all...]
tlsv1_client_read.c 669 u8 alert; local
786 &alert) < 0)
1490 wpa_printf(MSG_DEBUG, "TLSv1: Alert underflow");
1495 wpa_printf(MSG_DEBUG, "TLSv1: Received alert %d:%d",
tlsv1_client_write.c 964 u8 *alert, *pos, *length; local
966 wpa_printf(MSG_DEBUG, "TLSv1: Send Alert(%d:%d)", level, description);
969 alert = os_malloc(10);
970 if (alert == NULL)
973 pos = alert;
987 /* Alert */
994 *out_len = pos - alert;
996 return alert;
tlsv1_server.c 137 u8 *msg = NULL, *in_msg, *in_pos, *in_end, alert, ct; local
156 in_msg, &in_msg_len, &alert);
160 tlsv1_server_alert(conn, TLS_ALERT_LEVEL_FATAL, alert);
198 /* Avoid alert loops */
199 wpa_printf(MSG_DEBUG, "TLSv1: Drop alert loop");
266 u8 alert, *out_end, *out_pos, ct; local
278 out_pos, &olen, &alert);
281 tlsv1_server_alert(conn, TLS_ALERT_LEVEL_FATAL, alert);
288 tlsv1_server_alert(conn, TLS_ALERT_LEVEL_FATAL, alert);
294 tlsv1_server_log(conn, "Alert underflow")
    [all...]
tlsv1_server_read.c 892 u8 alert; local
1031 hash, hlen, pos, end - pos, &alert) < 0) {
1033 tlsv1_server_alert(conn, TLS_ALERT_LEVEL_FATAL, alert);
1274 tlsv1_server_log(conn, "Alert underflow");
1279 tlsv1_server_log(conn, "Received alert %d:%d", buf[0], buf[1]);
tlsv1_server_write.c 1060 u8 *alert, *pos, *length; local
1062 tlsv1_server_log(conn, "Send Alert(%d:%d)", level, description);
1065 alert = os_malloc(10);
1066 if (alert == NULL)
1069 pos = alert;
1083 /* Alert */
1090 *out_len = pos - alert;
1092 return alert;
  /src/sys/dev/acpi/
smbus_acpi.c 196 acpi_smbus_poll_alert(ACPI_HANDLE hdl, int *alert)
236 if (alert != NULL) {
245 *alert = info->poll_int;
470 ACPI_BUFFER alert; local
476 rv = acpi_eval_struct(hdl, "_SBA", &alert);
483 p = alert.Pointer;
498 "alert for 0x%x\n", addr);
502 if (alert.Pointer != NULL)
503 ACPI_FREE(alert.Pointer);
  /src/crypto/external/apache2/openssl/dist/ssl/quic/
quic_tls.c 21 (rl)->alert = (ad); \
40 * QUIC error code (usually in the TLS Alert-mapped CRYPTO_ERR range). Valid
80 * If we hit an error, what alert code should be used
82 int alert; member in struct:ossl_record_layer_st
250 unsigned char alert; local
294 * We assume that libssl always sends both bytes of an alert to
302 * Byte 0 is the alert level (we ignore it) and byte 1 is the alert
305 alert = template->buf[1];
307 if (!rl->qtls->args.alert_cb(rl->qtls->args.alert_cb_arg, alert)) {
    [all...]
  /src/crypto/external/apache2/openssl/dist/ssl/record/methods/
recmethod_local.h 274 /* Alert code to be used if an error occurs */
275 int alert; member in struct:ossl_record_layer_st
  /src/crypto/external/bsd/openssl/dist/ssl/statem/
statem_lib.c 29 int alert; member in struct:x509err2alert_st
1408 return tp->alert;
1824 * 0x0300 MUST abort the handshake with a "protocol_version" alert."
  /src/crypto/external/bsd/openssl.old/dist/ssl/statem/
statem_lib.c 27 int alert; member in struct:x509err2alert_st
1394 return tp->alert;
1820 * 0x0300 MUST abort the handshake with a "protocol_version" alert."
  /src/external/bsd/wpa/dist/src/crypto/
tls.h 79 } alert; member in union:tls_event_data
446 * TLS library has a TLS alert to send out, that should be returned as the
606 * tls_connection_get_read_alerts - Get connection read alert status
615 * tls_connection_get_write_alerts - Get connection write alert status
tls_gnutls.c 316 * and "close notify" shutdown alert would confuse AS. */
1474 gnutls_alert_description_t alert; local
1490 ev.alert.is_local = 1;
1491 ev.alert.type = "fatal";
1492 ev.alert.description = "insufficient security";
1497 * Could send a TLS Alert to the server, but for now,
1504 alert = gnutls_alert_get(conn->session);
1505 wpa_printf(MSG_DEBUG, "%s - received fatal '%s' alert",
1506 __func__, gnutls_alert_get_name(alert));
1510 ev.alert.is_local = 0
    [all...]
  /src/crypto/external/apache2/openssl/dist/ssl/statem/
statem_lib.c 31 int alert; member in struct:x509err2alert_st
1802 return tp->alert;
2234 * 0x0300 MUST abort the handshake with a "protocol_version" alert."

Completed in 53 milliseconds

1 2