| /src/crypto/external/apache2/openssl/dist/util/perl/TLSProxy/ |
| Message.pm | 12 use TLSProxy::Alert; 37 #Alert levels 43 #Alert descriptions 162 my $alert; 175 $alert = undef; 328 $alert = TLSProxy::Alert->new( 519 sub alert subroutine 521 return $alert;
|
| /src/crypto/external/bsd/openssl/dist/util/perl/TLSProxy/ |
| Message.pm | 12 use TLSProxy::Alert; 34 #Alert levels 40 #Alert descriptions 148 my $alert; 161 $alert = undef; 291 $alert = TLSProxy::Alert->new( 422 sub alert subroutine 424 return $alert;
|
| /src/crypto/external/bsd/openssl.old/dist/util/perl/TLSProxy/ |
| Message.pm | 12 use TLSProxy::Alert; 34 #Alert levels 40 #Alert descriptions 148 my $alert; 161 $alert = undef; 291 $alert = TLSProxy::Alert->new( 413 sub alert subroutine 415 return $alert;
|
| /src/sys/external/bsd/drm2/dist/drm/amd/powerplay/hwmgr/ |
| amdgpu_smu7_thermal.c | 310 * Set the requested temperature range for high and low alert signals 313 * @param range Temperature range to be programmed for high and low alert signals 371 uint32_t alert; local 373 alert = PHM_READ_VFPF_INDIRECT_FIELD(hwmgr->device, CGS_IND_REG__SMC, 375 alert &= ~(SMU7_THERMAL_HIGH_ALERT_MASK | SMU7_THERMAL_LOW_ALERT_MASK); 377 CG_THERMAL_INT, THERM_INT_MASK, alert); 389 uint32_t alert; local 391 alert = PHM_READ_VFPF_INDIRECT_FIELD(hwmgr->device, CGS_IND_REG__SMC, 393 alert |= (SMU7_THERMAL_HIGH_ALERT_MASK | SMU7_THERMAL_LOW_ALERT_MASK); 395 CG_THERMAL_INT, THERM_INT_MASK, alert); [all...] |
| /src/crypto/external/apache2/openssl/dist/ssl/record/ |
| rec_layer_d1.c | 180 * Alert records (e.g. close_notify) or renegotiation requests. ChangeCipherSpec 188 * Alert protocol 275 * record that isn't an alert. 358 * We might had to delay a close_notify alert because of reordered 359 * app data. If there was an alert and there is no message to read 380 PACKET alert; local 382 if (!PACKET_buf_init(&alert, alert_bytes, rr->length) 383 || !PACKET_get_1(&alert, &alert_level) 384 || !PACKET_get_1(&alert, &alert_descr) 385 || PACKET_remaining(&alert) != 0) [all...] |
| rec_layer_s3.c | 368 /* If we have an alert to send, lets send it */ 534 * else some failure but there is no alert code. We don't log an 605 * Alert records (e.g. close_notify) or renegotiation requests. ChangeCipherSpec 613 * Alert protocol 725 * record that isn't an alert. 850 * we're using then this must be a client side alert we're dealing 867 PACKET alert; local 869 if (!PACKET_buf_init(&alert, alert_bytes, rr->length) 870 || !PACKET_get_1(&alert, &alert_level) 871 || !PACKET_get_1(&alert, &alert_descr [all...] |
| /src/sys/arch/shark/include/ |
| profileio.h | 147 int alert; /* if set then the daemon sends a SIGINT to member in struct:stopSamplingCommand
|
| /src/crypto/external/bsd/openssl/dist/ssl/record/ |
| rec_layer_d1.c | 326 * Alert records (e.g. close_notify) or renegotiation requests. ChangeCipherSpec 334 * Alert protocol 440 * record that isn't an alert. 532 * We might had to delay a close_notify alert because of reordered 533 * app data. If there was an alert and there is no message to read 556 PACKET alert; local 558 if (!PACKET_buf_init(&alert, alert_bytes, SSL3_RECORD_get_length(rr)) 559 || !PACKET_get_1(&alert, &alert_level) 560 || !PACKET_get_1(&alert, &alert_descr) 561 || PACKET_remaining(&alert) != 0) [all...] |
| rec_layer_s3.c | 709 /* If we have an alert to send, lets send it */ 1269 * Alert records (e.g. close_notify) or renegotiation requests. ChangeCipherSpec 1277 * Alert protocol 1403 * record that isn't an alert. 1537 * we're using then this must be a client side alert we're dealing 1555 PACKET alert; local 1557 if (!PACKET_buf_init(&alert, alert_bytes, SSL3_RECORD_get_length(rr)) 1558 || !PACKET_get_1(&alert, &alert_level) 1559 || !PACKET_get_1(&alert, &alert_descr) 1560 || PACKET_remaining(&alert) != 0) [all...] |
| /src/crypto/external/bsd/openssl.old/dist/ssl/record/ |
| rec_layer_d1.c | 325 * Alert records (e.g. close_notify) or renegotiation requests. ChangeCipherSpec 333 * Alert protocol 440 * record that isn't an alert. 530 * We might had to delay a close_notify alert because of reordered 531 * app data. If there was an alert and there is no message to read 554 PACKET alert; local 556 if (!PACKET_buf_init(&alert, alert_bytes, SSL3_RECORD_get_length(rr)) 557 || !PACKET_get_1(&alert, &alert_level) 558 || !PACKET_get_1(&alert, &alert_descr) 559 || PACKET_remaining(&alert) != 0) [all...] |
| rec_layer_s3.c | 694 /* If we have an alert to send, lets send it */ 1219 * Alert records (e.g. close_notify) or renegotiation requests. ChangeCipherSpec 1227 * Alert protocol 1355 * record that isn't an alert. 1490 * we're using then this must be a client side alert we're dealing with 1509 PACKET alert; local 1511 if (!PACKET_buf_init(&alert, alert_bytes, SSL3_RECORD_get_length(rr)) 1512 || !PACKET_get_1(&alert, &alert_level) 1513 || !PACKET_get_1(&alert, &alert_descr) 1514 || PACKET_remaining(&alert) != 0) [all...] |
| /src/external/bsd/wpa/dist/src/tls/ |
| tlsv1_client.c | 169 u8 *msg = NULL, *in_msg = NULL, *in_pos, *in_end, alert, ct; local 209 in_msg, &in_msg_len, &alert); 213 tls_alert(conn, TLS_ALERT_LEVEL_FATAL, alert); 336 u8 alert, *out_pos, ct; local 347 alert = TLS_ALERT_INTERNAL_ERROR; 361 alert = TLS_ALERT_INTERNAL_ERROR; 367 out_pos, &olen, &alert); 383 alert = TLS_ALERT_INTERNAL_ERROR; 393 wpa_printf(MSG_DEBUG, "TLSv1: Alert " 395 alert = TLS_ALERT_DECODE_ERROR [all...] |
| tlsv1_client_read.c | 669 u8 alert; local 786 &alert) < 0) 1490 wpa_printf(MSG_DEBUG, "TLSv1: Alert underflow"); 1495 wpa_printf(MSG_DEBUG, "TLSv1: Received alert %d:%d",
|
| tlsv1_client_write.c | 964 u8 *alert, *pos, *length; local 966 wpa_printf(MSG_DEBUG, "TLSv1: Send Alert(%d:%d)", level, description); 969 alert = os_malloc(10); 970 if (alert == NULL) 973 pos = alert; 987 /* Alert */ 994 *out_len = pos - alert; 996 return alert;
|
| tlsv1_server.c | 137 u8 *msg = NULL, *in_msg, *in_pos, *in_end, alert, ct; local 156 in_msg, &in_msg_len, &alert); 160 tlsv1_server_alert(conn, TLS_ALERT_LEVEL_FATAL, alert); 198 /* Avoid alert loops */ 199 wpa_printf(MSG_DEBUG, "TLSv1: Drop alert loop"); 266 u8 alert, *out_end, *out_pos, ct; local 278 out_pos, &olen, &alert); 281 tlsv1_server_alert(conn, TLS_ALERT_LEVEL_FATAL, alert); 288 tlsv1_server_alert(conn, TLS_ALERT_LEVEL_FATAL, alert); 294 tlsv1_server_log(conn, "Alert underflow") [all...] |
| tlsv1_server_read.c | 892 u8 alert; local 1031 hash, hlen, pos, end - pos, &alert) < 0) { 1033 tlsv1_server_alert(conn, TLS_ALERT_LEVEL_FATAL, alert); 1274 tlsv1_server_log(conn, "Alert underflow"); 1279 tlsv1_server_log(conn, "Received alert %d:%d", buf[0], buf[1]);
|
| tlsv1_server_write.c | 1060 u8 *alert, *pos, *length; local 1062 tlsv1_server_log(conn, "Send Alert(%d:%d)", level, description); 1065 alert = os_malloc(10); 1066 if (alert == NULL) 1069 pos = alert; 1083 /* Alert */ 1090 *out_len = pos - alert; 1092 return alert;
|
| /src/sys/dev/acpi/ |
| smbus_acpi.c | 196 acpi_smbus_poll_alert(ACPI_HANDLE hdl, int *alert) 236 if (alert != NULL) { 245 *alert = info->poll_int; 470 ACPI_BUFFER alert; local 476 rv = acpi_eval_struct(hdl, "_SBA", &alert); 483 p = alert.Pointer; 498 "alert for 0x%x\n", addr); 502 if (alert.Pointer != NULL) 503 ACPI_FREE(alert.Pointer);
|
| /src/crypto/external/apache2/openssl/dist/ssl/quic/ |
| quic_tls.c | 21 (rl)->alert = (ad); \ 40 * QUIC error code (usually in the TLS Alert-mapped CRYPTO_ERR range). Valid 80 * If we hit an error, what alert code should be used 82 int alert; member in struct:ossl_record_layer_st 250 unsigned char alert; local 294 * We assume that libssl always sends both bytes of an alert to 302 * Byte 0 is the alert level (we ignore it) and byte 1 is the alert 305 alert = template->buf[1]; 307 if (!rl->qtls->args.alert_cb(rl->qtls->args.alert_cb_arg, alert)) { [all...] |
| /src/crypto/external/apache2/openssl/dist/ssl/record/methods/ |
| recmethod_local.h | 274 /* Alert code to be used if an error occurs */ 275 int alert; member in struct:ossl_record_layer_st
|
| /src/crypto/external/bsd/openssl/dist/ssl/statem/ |
| statem_lib.c | 29 int alert; member in struct:x509err2alert_st 1408 return tp->alert; 1824 * 0x0300 MUST abort the handshake with a "protocol_version" alert."
|
| /src/crypto/external/bsd/openssl.old/dist/ssl/statem/ |
| statem_lib.c | 27 int alert; member in struct:x509err2alert_st 1394 return tp->alert; 1820 * 0x0300 MUST abort the handshake with a "protocol_version" alert."
|
| /src/external/bsd/wpa/dist/src/crypto/ |
| tls.h | 79 } alert; member in union:tls_event_data 446 * TLS library has a TLS alert to send out, that should be returned as the 606 * tls_connection_get_read_alerts - Get connection read alert status 615 * tls_connection_get_write_alerts - Get connection write alert status
|
| tls_gnutls.c | 316 * and "close notify" shutdown alert would confuse AS. */ 1474 gnutls_alert_description_t alert; local 1490 ev.alert.is_local = 1; 1491 ev.alert.type = "fatal"; 1492 ev.alert.description = "insufficient security"; 1497 * Could send a TLS Alert to the server, but for now, 1504 alert = gnutls_alert_get(conn->session); 1505 wpa_printf(MSG_DEBUG, "%s - received fatal '%s' alert", 1506 __func__, gnutls_alert_get_name(alert)); 1510 ev.alert.is_local = 0 [all...] |
| /src/crypto/external/apache2/openssl/dist/ssl/statem/ |
| statem_lib.c | 31 int alert; member in struct:x509err2alert_st 1802 return tp->alert; 2234 * 0x0300 MUST abort the handshake with a "protocol_version" alert."
|