| /src/crypto/external/apache2/openssl/dist/test/recipes/ |
| 70-test_tls13alerts.t | 36 #Test 1: We test that a server can handle an unencrypted alert when normally the 41 my $alert = TLSProxy::Message->alert(); 42 ok(TLSProxy::Message->fail() && !$alert->server() && !$alert->encrypted(), "Client sends an unencrypted alert");
|
| 70-test_tls13downgrade.t | 121 # Validate that the exchange fails with an illegal parameter alert from 126 my $alert = TLSProxy::Message->alert(); 127 return 1 if !$alert->server() 128 && $alert->description()
|
| /src/crypto/external/bsd/openssl/dist/test/recipes/ |
| 70-test_tls13alerts.t | 38 #Test 1: We test that a server can handle an unencrypted alert when normally the 43 my $alert = TLSProxy::Message->alert(); 44 ok(TLSProxy::Message->fail() && !$alert->server() && !$alert->encrypted(), "Client sends an unecrypted alert");
|
| 70-test_tls13downgrade.t | 72 my $alert = TLSProxy::Message->alert(); 74 && !$alert->server() 75 && $alert->description() == TLSProxy::Message::AL_DESC_ILLEGAL_PARAMETER,
|
| /src/crypto/external/bsd/openssl.old/dist/test/recipes/ |
| 70-test_tls13alerts.t | 38 #Test 1: We test that a server can handle an unencrypted alert when normally the 43 my $alert = TLSProxy::Message->alert(); 44 ok(TLSProxy::Message->fail() && !$alert->server() && !$alert->encrypted(), "Client sends an unecrypted alert");
|
| 70-test_tls13downgrade.t | 70 my $alert = TLSProxy::Message->alert(); 72 && !$alert->server() 73 && $alert->description() == TLSProxy::Message::AL_DESC_ILLEGAL_PARAMETER,
|
| /src/usr.sbin/bootp/bootpd/ |
| syslog.conf | 9 # Note: Have to exclude user from most lines so that user.alert 25 *.alert;kern.err;daemon.err;user.none operator 26 *.alert;user.none root 48 user.alert /var/log/syslog 57 user.alert `root, operator'
|
| /src/external/bsd/wpa/dist/src/tls/ |
| tlsv1_record.c | 271 * @alert: Buffer for returning an alert value on failure 280 u8 *out_data, size_t *out_len, u8 *alert) 311 *alert = TLS_ALERT_PROTOCOL_VERSION; 319 *alert = TLS_ALERT_RECORD_OVERFLOW; 342 *alert = TLS_ALERT_UNEXPECTED_MESSAGE; 351 *alert = TLS_ALERT_INTERNAL_ERROR; 359 *alert = TLS_ALERT_DECRYPTION_FAILED; 368 * TLS v1.0 defines different alert values for various 370 * use the same bad_record_mac alert regardless of th [all...] |
| tlsv1_client.c | 169 u8 *msg = NULL, *in_msg = NULL, *in_pos, *in_end, alert, ct; local 209 in_msg, &in_msg_len, &alert); 213 tls_alert(conn, TLS_ALERT_LEVEL_FATAL, alert); 336 u8 alert, *out_pos, ct; local 347 alert = TLS_ALERT_INTERNAL_ERROR; 361 alert = TLS_ALERT_INTERNAL_ERROR; 367 out_pos, &olen, &alert); 383 alert = TLS_ALERT_INTERNAL_ERROR; 393 wpa_printf(MSG_DEBUG, "TLSv1: Alert " 395 alert = TLS_ALERT_DECODE_ERROR [all...] |
| tlsv1_common.c | 418 const u8 *pos, size_t len, u8 *alert) 427 *alert = TLS_ALERT_DECODE_ERROR; 433 *alert = TLS_ALERT_DECODE_ERROR; 445 *alert = TLS_ALERT_INTERNAL_ERROR; 452 *alert = TLS_ALERT_INTERNAL_ERROR; 459 *alert = TLS_ALERT_DECRYPT_ERROR; 508 *alert = TLS_ALERT_DECRYPT_ERROR; 518 *alert = TLS_ALERT_DECRYPT_ERROR;
|
| tlsv1_record.h | 69 u8 *out_data, size_t *out_len, u8 *alert);
|
| /src/sys/external/bsd/drm2/dist/drm/amd/powerplay/hwmgr/ |
| amdgpu_smu7_thermal.c | 310 * Set the requested temperature range for high and low alert signals 313 * @param range Temperature range to be programmed for high and low alert signals 371 uint32_t alert; local 373 alert = PHM_READ_VFPF_INDIRECT_FIELD(hwmgr->device, CGS_IND_REG__SMC, 375 alert &= ~(SMU7_THERMAL_HIGH_ALERT_MASK | SMU7_THERMAL_LOW_ALERT_MASK); 377 CG_THERMAL_INT, THERM_INT_MASK, alert); 389 uint32_t alert; local 391 alert = PHM_READ_VFPF_INDIRECT_FIELD(hwmgr->device, CGS_IND_REG__SMC, 393 alert |= (SMU7_THERMAL_HIGH_ALERT_MASK | SMU7_THERMAL_LOW_ALERT_MASK); 395 CG_THERMAL_INT, THERM_INT_MASK, alert); [all...] |
| /src/external/gpl3/gdb/dist/gdb/testsuite/gdb.base/ |
| charset.c | 30 [0] --- the `alert' character, '\a' 91 unsigned char alert, 105 string[0] = alert;
|
| /src/external/gpl3/gdb.old/dist/gdb/testsuite/gdb.base/ |
| charset.c | 30 [0] --- the `alert' character, '\a' 91 unsigned char alert, 105 string[0] = alert;
|
| /src/crypto/external/bsd/openssl.old/dist/test/ssl-tests/ |
| 09-alpn.conf | 8 test-3 = 3-alpn-alert-on-mismatch 18 test-13 = 13-alpn-alert-on-mismatch-resumption 116 [3-alpn-alert-on-mismatch] 117 ssl_conf = 3-alpn-alert-on-mismatch-ssl 119 [3-alpn-alert-on-mismatch-ssl] 120 server = 3-alpn-alert-on-mismatch-server 121 client = 3-alpn-alert-on-mismatch-client 123 [3-alpn-alert-on-mismatch-server] 128 [3-alpn-alert-on-mismatch-client] 136 server = 3-alpn-alert-on-mismatch-server-extr [all...] |
| /src/sys/dev/acpi/ |
| smbus_acpi.c | 196 acpi_smbus_poll_alert(ACPI_HANDLE hdl, int *alert) 236 if (alert != NULL) { 245 *alert = info->poll_int; 470 ACPI_BUFFER alert; local 476 rv = acpi_eval_struct(hdl, "_SBA", &alert); 483 p = alert.Pointer; 498 "alert for 0x%x\n", addr); 502 if (alert.Pointer != NULL) 503 ACPI_FREE(alert.Pointer);
|
| /src/sys/arch/shark/include/ |
| profileio.h | 147 int alert; /* if set then the daemon sends a SIGINT to member in struct:stopSamplingCommand
|
| /src/crypto/external/bsd/openssl/dist/util/perl/TLSProxy/ |
| Message.pm | 12 use TLSProxy::Alert; 34 #Alert levels 40 #Alert descriptions 148 my $alert; 161 $alert = undef; 291 $alert = TLSProxy::Alert->new( 422 sub alert subroutine 424 return $alert;
|
| /src/crypto/external/bsd/openssl.old/dist/util/perl/TLSProxy/ |
| Message.pm | 12 use TLSProxy::Alert; 34 #Alert levels 40 #Alert descriptions 148 my $alert; 161 $alert = undef; 291 $alert = TLSProxy::Alert->new( 413 sub alert subroutine 415 return $alert;
|
| /src/sys/external/gpl2/dts/dist/arch/arm/boot/dts/gemini/ |
| gemini-dlink-dir-685.dts | 145 alert: chassis-alert { 161 trip = <&alert>;
|
| /src/crypto/external/apache2/openssl/dist/ssl/quic/ |
| quic_tls.c | 21 (rl)->alert = (ad); \ 40 * QUIC error code (usually in the TLS Alert-mapped CRYPTO_ERR range). Valid 80 * If we hit an error, what alert code should be used 82 int alert; member in struct:ossl_record_layer_st 250 unsigned char alert; local 294 * We assume that libssl always sends both bytes of an alert to 302 * Byte 0 is the alert level (we ignore it) and byte 1 is the alert 305 alert = template->buf[1]; 307 if (!rl->qtls->args.alert_cb(rl->qtls->args.alert_cb_arg, alert)) { [all...] |
| /src/external/bsd/tmux/dist/ |
| session.c | 407 session_next(struct session *s, int alert) 415 if (alert) 419 if (alert && ((wl = session_next_alert(wl)) == NULL)) 438 session_previous(struct session *s, int alert) 446 if (alert) 450 if (alert && (wl = session_previous_alert(wl)) == NULL)
|
| /src/external/gpl3/gcc.old/dist/libphobos/libdruntime/core/sync/ |
| condition.d | 693 bool alert = false; 700 while ( !alert ) 717 alert = true; 859 bool alert = false; 866 while ( !alert ) 883 alert = true;
|
| /src/crypto/external/apache2/openssl/dist/test/helpers/ |
| ssl_test_ctx.h | 175 /* See ssl.h for alert codes. */ 176 /* Alert sent by the client / received by the server. */ 178 /* Alert sent by the server / received by the client. */ 187 * terminated with an alert, the servername will match with 240 const char *ssl_alert_name(int alert);
|
| /src/crypto/external/bsd/openssl/dist/test/helpers/ |
| ssl_test_ctx.h | 174 /* See ssl.h for alert codes. */ 175 /* Alert sent by the client / received by the server. */ 177 /* Alert sent by the server / received by the client. */ 186 * terminated with an alert, the servername will match with 234 const char *ssl_alert_name(int alert);
|