/openbsd-current/lib/libssl/ |
H A D | ssl_tlsext.c | 90 tlsext_alpn_server_process(SSL *s, uint16_t msg_type, CBS *cbs, int *alert) argument 119 *alert = SSL_AD_INTERNAL_ERROR; 130 *alert = SSL_AD_NO_APPLICATION_PROTOCOL; 164 tlsext_alpn_client_process(SSL *s, uint16_t msg_type, CBS *cbs, int *alert) argument 169 *alert = SSL_AD_UNSUPPORTED_EXTENSION; 232 int *alert) 256 *alert = SSL_AD_HANDSHAKE_FAILURE; 272 *alert = SSL_AD_INTERNAL_ERROR; 287 *alert = SSL_AD_ILLEGAL_PARAMETER; 325 int *alert) 231 tlsext_supportedgroups_server_process(SSL *s, uint16_t msg_type, CBS *cbs, int *alert) argument 324 tlsext_supportedgroups_client_process(SSL *s, uint16_t msg_type, CBS *cbs, int *alert) argument 376 tlsext_ecpf_process(SSL *s, uint16_t msg_type, CBS *cbs, int *alert) argument 416 tlsext_ecpf_server_process(SSL *s, uint16_t msg_type, CBS *cbs, int *alert) argument 434 tlsext_ecpf_client_process(SSL *s, uint16_t msg_type, CBS *cbs, int *alert) argument 465 tlsext_ri_server_process(SSL *s, uint16_t msg_type, CBS *cbs, int *alert) argument 514 tlsext_ri_client_process(SSL *s, uint16_t msg_type, CBS *cbs, int *alert) argument 597 tlsext_sigalgs_server_process(SSL *s, uint16_t msg_type, CBS *cbs, int *alert) argument 634 tlsext_sigalgs_client_process(SSL *s, uint16_t msg_type, CBS *cbs, int *alert) argument 761 tlsext_sni_server_process(SSL *s, uint16_t msg_type, CBS *cbs, int *alert) argument 857 tlsext_sni_client_process(SSL *s, uint16_t msg_type, CBS *cbs, int *alert) argument 945 tlsext_ocsp_server_process(SSL *s, uint16_t msg_type, CBS *cbs, int *alert) argument 1053 tlsext_ocsp_client_process(SSL *s, uint16_t msg_type, CBS *cbs, int *alert) argument 1173 tlsext_sessionticket_server_process(SSL *s, uint16_t msg_type, CBS *cbs, int *alert) argument 1210 tlsext_sessionticket_client_process(SSL *s, uint16_t msg_type, CBS *cbs, int *alert) argument 1282 tlsext_srtp_server_process(SSL *s, uint16_t msg_type, CBS *cbs, int *alert) argument 1387 tlsext_srtp_client_process(SSL *s, uint16_t msg_type, CBS *cbs, int *alert) argument 1468 tlsext_keyshare_server_process(SSL *s, uint16_t msg_type, CBS *cbs, int *alert) argument 1664 tlsext_keyshare_client_process(SSL *s, uint16_t msg_type, CBS *cbs, int *alert) argument 1739 tlsext_versions_server_process(SSL *s, uint16_t msg_type, CBS *cbs, int *alert) argument 1786 tlsext_versions_client_process(SSL *s, uint16_t msg_type, CBS *cbs, int *alert) argument 1836 tlsext_cookie_server_process(SSL *s, uint16_t msg_type, CBS *cbs, int *alert) argument 1893 tlsext_cookie_client_process(SSL *s, uint16_t msg_type, CBS *cbs, int *alert) argument 1948 tlsext_psk_kex_modes_server_process(SSL *s, uint16_t msg_type, CBS *cbs, int *alert) argument 1982 tlsext_psk_kex_modes_client_process(SSL *s, uint16_t msg_type, CBS *cbs, int *alert) argument 2005 tlsext_psk_client_process(SSL *s, uint16_t msg_type, CBS *cbs, int *alert) argument 2023 tlsext_psk_server_process(SSL *s, uint16_t msg_type, CBS *cbs, int *alert) argument 2050 tlsext_quic_transport_parameters_client_process(SSL *s, uint16_t msg_type, CBS *cbs, int *alert) argument 2085 tlsext_quic_transport_parameters_server_process(SSL *s, uint16_t msg_type, CBS *cbs, int *alert) argument 2556 tlsext_parse(SSL *s, struct tlsext_data *td, int is_server, uint16_t msg_type, CBS *cbs, int *alert) argument 2626 tlsext_process(SSL *s, struct tlsext_data *td, int is_server, uint16_t msg_type, int *alert) argument 2681 tlsext_server_parse(SSL *s, uint16_t msg_type, CBS *cbs, int *alert) argument 2722 tlsext_client_parse(SSL *s, uint16_t msg_type, CBS *cbs, int *alert) argument [all...] |
H A D | ssl_tlsext.h | 38 int tlsext_client_parse(SSL *s, uint16_t msg_type, CBS *cbs, int *alert); 41 int tlsext_server_parse(SSL *s, uint16_t msg_type, CBS *cbs, int *alert);
|
H A D | tls13_server.c | 182 ctx->alert = TLS13_ALERT_ILLEGAL_PARAMETER; 188 ctx->alert = TLS13_ALERT_INTERNAL_ERROR; 193 ctx->alert = TLS13_ALERT_INTERNAL_ERROR; 197 ctx->alert = TLS13_ALERT_INTERNAL_ERROR; 201 ctx->alert = TLS13_ALERT_INTERNAL_ERROR; 205 ctx->alert = TLS13_ALERT_INTERNAL_ERROR; 209 ctx->alert = TLS13_ALERT_INTERNAL_ERROR; 214 ctx->alert = alert_desc; 221 ctx->alert = TLS13_ALERT_INTERNAL_ERROR; 226 ctx->alert 494 uint8_t alert = TLS13_ALERT_INTERNAL_ERROR; local [all...] |
H A D | tls13_lib.c | 117 uint8_t alert[] = {alert_level, alert_desc}; local 125 CBS_init(&cbs, alert, sizeof(alert)); 158 * We treat this as advisory, since a close_notify alert 159 * SHOULD follow this alert (RFC 8446 section 6.1). 168 ERR_asprintf_error_data("SSL alert number %d", alert_desc); 245 ctx->alert = TLS13_ALERT_INTERNAL_ERROR; 250 ctx->alert = TLS13_ALERT_BAD_CERTIFICATE_STATUS_RESPONSE; 324 uint8_t alert = TLS13_ALERT_INTERNAL_ERROR; local 329 alert 381 int alert, session_id_length; local [all...] |
H A D | tls13_client.c | 139 /* We may receive a pre-TLSv1.3 alert in response to the client hello. */ 244 ctx->alert = TLS13_ALERT_ILLEGAL_PARAMETER; 269 ctx->alert = alert_desc; 280 ctx->alert = TLS13_ALERT_PROTOCOL_VERSION; 289 ctx->alert = TLS13_ALERT_ILLEGAL_PARAMETER; 299 ctx->alert = TLS13_ALERT_ILLEGAL_PARAMETER; 303 ctx->alert = TLS13_ALERT_ILLEGAL_PARAMETER; 312 ctx->alert = TLS13_ALERT_ILLEGAL_PARAMETER; 319 ctx->alert = TLS13_ALERT_ILLEGAL_PARAMETER; 326 if (ctx->alert [all...] |
H A D | tls13_handshake.c | 406 if (ctx->alert != 0) 407 return tls13_send_alert(ctx->rl, ctx->alert); 414 if (ctx->alert != 0) 415 return tls13_send_alert(ctx->rl, ctx->alert); 555 ctx->alert = TLS13_ALERT_DECODE_ERROR;
|
H A D | t1_lib.c | 124 static int tls_decrypt_ticket(SSL *s, CBS *ticket, int *alert, 904 tls1_process_ticket(SSL *s, CBS *ext_block, int *alert, SSL_SESSION **ret) argument 927 *alert = SSL_AD_DECODE_ERROR; 934 *alert = SSL_AD_DECODE_ERROR; 964 return tls_decrypt_ticket(s, &ext_data, alert, ret); 979 tls_decrypt_ticket(SSL *s, CBS *ticket, int *alert, SSL_SESSION **psess) argument 1123 *alert = alert_desc;
|
H A D | tls13_record_layer.c | 74 * Read and/or write channels are closed due to an alert being 75 * sent or received. In the case of an error alert both channels 90 uint8_t alert; member in struct:tls13_record_layer 92 /* Pending alert messages. */ 289 * A TLSv1.3 alert record can only contain a single alert - this means 290 * that processing the alert must consume all of the record. The alert 309 * however for error alerts (RFC 8446 section 6.2), the alert level 398 * If an alert i [all...] |
H A D | tls13_internal.h | 291 uint8_t alert; member in struct:tls13_ctx 337 int tls13_legacy_servername_process(struct tls13_ctx *ctx, uint8_t *alert);
|
H A D | tls13_legacy.c | 129 /* If we received a fatal alert we already put an error on the stack. */ 518 * handshake or alert data. Only one attempt is made with no 536 tls13_legacy_servername_process(struct tls13_ctx *ctx, uint8_t *alert) argument 558 *alert = legacy_alert;
|
/openbsd-current/gnu/usr.bin/binutils/gdb/testsuite/gdb.base/ |
H A D | charset.c | 36 [0] --- the `alert' character, '\a' 62 char alert, char backspace, char form_feed, 67 string[0] = alert; 60 init_string(char string[], char x, char alert, char backspace, char form_feed, char line_feed, char carriage_return, char horizontal_tab, char vertical_tab, char cent, char misc_ctrl) argument
|
/openbsd-current/regress/usr.sbin/syslogd/ |
H A D | args-tls-cipher-null.pl | 19 qr/.*CONNECT.*:sslv3 alert handshake failure/ => 1,
|
H A D | args-server-tls-tcp.pl | 44 qr/CONNECT_CR_SRVR_HELLO:tlsv1 alert protocol version/ => 1,
|
H A D | args-client-tls-tcp.pl | 45 qr/ACCEPT_SR_CLNT_HELLO:tlsv1 alert protocol version/ => 1,
|
H A D | args-tls-cafile-fake.pl | 39 qr/(tlsv1 alert decrypt error|$errors)/ => 1,
|
H A D | args-tls-cafile-default.pl | 41 qr/(ACCEPT_SR_FINISHED:tlsv1 alert unknown ca|$errors)/ => 1,
|
H A D | args-client-tls-fake.pl | 20 qr/.*:tlsv1 alert decrypt error/;
|
/openbsd-current/sys/dev/pci/drm/amd/pm/powerplay/hwmgr/ |
H A D | smu7_thermal.c | 312 * smu7_thermal_set_temperature_range - Set the requested temperature range for high and low alert signals 315 * @low_temp: Temperature to be programmed for high alert signals 316 * @high_temp: Temperature to be programmed for low alert signals 374 uint32_t alert; local 376 alert = PHM_READ_VFPF_INDIRECT_FIELD(hwmgr->device, CGS_IND_REG__SMC, 378 alert &= ~(SMU7_THERMAL_HIGH_ALERT_MASK | SMU7_THERMAL_LOW_ALERT_MASK); 380 CG_THERMAL_INT, THERM_INT_MASK, alert); 392 uint32_t alert; local 394 alert = PHM_READ_VFPF_INDIRECT_FIELD(hwmgr->device, CGS_IND_REG__SMC, 396 alert | [all...] |
/openbsd-current/regress/lib/libssl/tlsext/ |
H A D | tlsexttest.c | 33 int (*process)(SSL *s, uint16_t msg_type, CBS *cbs, int *alert); 168 int failure, alert; local 241 if (!server_funcs->process(ssl, SSL_TLSEXT_MSG_CH, &cbs, &alert)) { 308 if (!server_funcs->process(ssl, SSL_TLSEXT_MSG_CH, &cbs, &alert)) { 369 int failure, alert; local 445 if (client_funcs->process(ssl, SSL_TLSEXT_MSG_SH, &cbs, &alert)) { 456 if (!client_funcs->process(ssl, SSL_TLSEXT_MSG_SH, &cbs, &alert)) { 558 int failure, alert; local 669 if (!server_funcs->process(ssl, SSL_TLSEXT_MSG_CH, &cbs, &alert)) { 775 if (!server_funcs->process(ssl, SSL_TLSEXT_MSG_CH, &cbs, &alert)) { 898 int failure, alert; local 1132 int failure, alert; local 1378 int alert; local 1496 int alert; local 1628 int alert; local 1792 int alert; local 1930 int alert; local 2053 int alert; local 2182 int alert; local 2314 int alert; local 2820 int failure, alert; local 3060 int failure, alert; local 3466 int alert; local 3555 int alert; local 3651 int alert; local 3840 int alert; local 3975 int alert; local 4066 int alert; local 4184 int alert; local [all...] |
/openbsd-current/gnu/usr.bin/perl/cpan/Term-ANSIColor/t/module/ |
H A D | aliases-func.t | 24 my $output = eval { color('alert') }; 25 ok(!$output, 'alert color not recognized'); 28 qr{ \A Invalid [ ] attribute [ ] name [ ] alert [ ] at [ ] }xms, 33 is(coloralias('alert', 'red'), 'red', 'coloralias works and returns color'); 34 is(color('alert'), color('red'), 'alert now works as a color'); 35 is(colored('test', 'alert'), "\e[31mtest\e[0m", '..and colored works'); 36 ok(colorvalid('alert'), '...and alert is now a valid color'); 37 is(coloralias('alert'), 're [all...] |
/openbsd-current/usr.bin/tmux/ |
H A D | session.c | 415 session_next(struct session *s, int alert) argument 423 if (alert) 427 if (alert && ((wl = session_next_alert(wl)) == NULL)) 446 session_previous(struct session *s, int alert) argument 454 if (alert) 458 if (alert && (wl = session_previous_alert(wl)) == NULL)
|
/openbsd-current/gnu/usr.bin/perl/cpan/Sys-Syslog/t/ |
H A D | facilities-routing.t | 29 my @levels = qw< emerg alert crit err warning notice info debug >;
|
/openbsd-current/regress/lib/libssl/interop/botan/ |
H A D | client.cpp | 100 void tls_alert(Botan::TLS::Alert alert) override 102 errx(1, "alert: %s", alert.type_string().c_str());
|
/openbsd-current/gnu/usr.bin/binutils/gdb/osf-share/ |
H A D | cma_tcb_defs.h | 106 cma__c_debevt_term_alert = 6, /* Terminated due to alert/cancel */ 253 cma__t_int_alert alert; /* Current alert state info */ member in struct:CMA__T_INT_TCB
|
/openbsd-current/gnu/usr.bin/perl/cpan/Test-Simple/lib/Test2/IPC/ |
H A D | Driver.pm | 173 This is used to alert the driver that a new hub is expecting events. The driver 186 This is used to alert the driver that a hub is no longer accepting events. The
|