Searched refs:alert (Results 1 - 25 of 36) sorted by relevance

12

/openbsd-current/lib/libssl/
H A Dssl_tlsext.c90 tlsext_alpn_server_process(SSL *s, uint16_t msg_type, CBS *cbs, int *alert) argument
119 *alert = SSL_AD_INTERNAL_ERROR;
130 *alert = SSL_AD_NO_APPLICATION_PROTOCOL;
164 tlsext_alpn_client_process(SSL *s, uint16_t msg_type, CBS *cbs, int *alert) argument
169 *alert = SSL_AD_UNSUPPORTED_EXTENSION;
232 int *alert)
256 *alert = SSL_AD_HANDSHAKE_FAILURE;
272 *alert = SSL_AD_INTERNAL_ERROR;
287 *alert = SSL_AD_ILLEGAL_PARAMETER;
325 int *alert)
231 tlsext_supportedgroups_server_process(SSL *s, uint16_t msg_type, CBS *cbs, int *alert) argument
324 tlsext_supportedgroups_client_process(SSL *s, uint16_t msg_type, CBS *cbs, int *alert) argument
376 tlsext_ecpf_process(SSL *s, uint16_t msg_type, CBS *cbs, int *alert) argument
416 tlsext_ecpf_server_process(SSL *s, uint16_t msg_type, CBS *cbs, int *alert) argument
434 tlsext_ecpf_client_process(SSL *s, uint16_t msg_type, CBS *cbs, int *alert) argument
465 tlsext_ri_server_process(SSL *s, uint16_t msg_type, CBS *cbs, int *alert) argument
514 tlsext_ri_client_process(SSL *s, uint16_t msg_type, CBS *cbs, int *alert) argument
597 tlsext_sigalgs_server_process(SSL *s, uint16_t msg_type, CBS *cbs, int *alert) argument
634 tlsext_sigalgs_client_process(SSL *s, uint16_t msg_type, CBS *cbs, int *alert) argument
761 tlsext_sni_server_process(SSL *s, uint16_t msg_type, CBS *cbs, int *alert) argument
857 tlsext_sni_client_process(SSL *s, uint16_t msg_type, CBS *cbs, int *alert) argument
945 tlsext_ocsp_server_process(SSL *s, uint16_t msg_type, CBS *cbs, int *alert) argument
1053 tlsext_ocsp_client_process(SSL *s, uint16_t msg_type, CBS *cbs, int *alert) argument
1173 tlsext_sessionticket_server_process(SSL *s, uint16_t msg_type, CBS *cbs, int *alert) argument
1210 tlsext_sessionticket_client_process(SSL *s, uint16_t msg_type, CBS *cbs, int *alert) argument
1282 tlsext_srtp_server_process(SSL *s, uint16_t msg_type, CBS *cbs, int *alert) argument
1387 tlsext_srtp_client_process(SSL *s, uint16_t msg_type, CBS *cbs, int *alert) argument
1468 tlsext_keyshare_server_process(SSL *s, uint16_t msg_type, CBS *cbs, int *alert) argument
1664 tlsext_keyshare_client_process(SSL *s, uint16_t msg_type, CBS *cbs, int *alert) argument
1739 tlsext_versions_server_process(SSL *s, uint16_t msg_type, CBS *cbs, int *alert) argument
1786 tlsext_versions_client_process(SSL *s, uint16_t msg_type, CBS *cbs, int *alert) argument
1836 tlsext_cookie_server_process(SSL *s, uint16_t msg_type, CBS *cbs, int *alert) argument
1893 tlsext_cookie_client_process(SSL *s, uint16_t msg_type, CBS *cbs, int *alert) argument
1948 tlsext_psk_kex_modes_server_process(SSL *s, uint16_t msg_type, CBS *cbs, int *alert) argument
1982 tlsext_psk_kex_modes_client_process(SSL *s, uint16_t msg_type, CBS *cbs, int *alert) argument
2005 tlsext_psk_client_process(SSL *s, uint16_t msg_type, CBS *cbs, int *alert) argument
2023 tlsext_psk_server_process(SSL *s, uint16_t msg_type, CBS *cbs, int *alert) argument
2050 tlsext_quic_transport_parameters_client_process(SSL *s, uint16_t msg_type, CBS *cbs, int *alert) argument
2085 tlsext_quic_transport_parameters_server_process(SSL *s, uint16_t msg_type, CBS *cbs, int *alert) argument
2556 tlsext_parse(SSL *s, struct tlsext_data *td, int is_server, uint16_t msg_type, CBS *cbs, int *alert) argument
2626 tlsext_process(SSL *s, struct tlsext_data *td, int is_server, uint16_t msg_type, int *alert) argument
2681 tlsext_server_parse(SSL *s, uint16_t msg_type, CBS *cbs, int *alert) argument
2722 tlsext_client_parse(SSL *s, uint16_t msg_type, CBS *cbs, int *alert) argument
[all...]
H A Dssl_tlsext.h38 int tlsext_client_parse(SSL *s, uint16_t msg_type, CBS *cbs, int *alert);
41 int tlsext_server_parse(SSL *s, uint16_t msg_type, CBS *cbs, int *alert);
H A Dtls13_server.c182 ctx->alert = TLS13_ALERT_ILLEGAL_PARAMETER;
188 ctx->alert = TLS13_ALERT_INTERNAL_ERROR;
193 ctx->alert = TLS13_ALERT_INTERNAL_ERROR;
197 ctx->alert = TLS13_ALERT_INTERNAL_ERROR;
201 ctx->alert = TLS13_ALERT_INTERNAL_ERROR;
205 ctx->alert = TLS13_ALERT_INTERNAL_ERROR;
209 ctx->alert = TLS13_ALERT_INTERNAL_ERROR;
214 ctx->alert = alert_desc;
221 ctx->alert = TLS13_ALERT_INTERNAL_ERROR;
226 ctx->alert
494 uint8_t alert = TLS13_ALERT_INTERNAL_ERROR; local
[all...]
H A Dtls13_lib.c117 uint8_t alert[] = {alert_level, alert_desc}; local
125 CBS_init(&cbs, alert, sizeof(alert));
158 * We treat this as advisory, since a close_notify alert
159 * SHOULD follow this alert (RFC 8446 section 6.1).
168 ERR_asprintf_error_data("SSL alert number %d", alert_desc);
245 ctx->alert = TLS13_ALERT_INTERNAL_ERROR;
250 ctx->alert = TLS13_ALERT_BAD_CERTIFICATE_STATUS_RESPONSE;
324 uint8_t alert = TLS13_ALERT_INTERNAL_ERROR; local
329 alert
381 int alert, session_id_length; local
[all...]
H A Dtls13_client.c139 /* We may receive a pre-TLSv1.3 alert in response to the client hello. */
244 ctx->alert = TLS13_ALERT_ILLEGAL_PARAMETER;
269 ctx->alert = alert_desc;
280 ctx->alert = TLS13_ALERT_PROTOCOL_VERSION;
289 ctx->alert = TLS13_ALERT_ILLEGAL_PARAMETER;
299 ctx->alert = TLS13_ALERT_ILLEGAL_PARAMETER;
303 ctx->alert = TLS13_ALERT_ILLEGAL_PARAMETER;
312 ctx->alert = TLS13_ALERT_ILLEGAL_PARAMETER;
319 ctx->alert = TLS13_ALERT_ILLEGAL_PARAMETER;
326 if (ctx->alert
[all...]
H A Dtls13_handshake.c406 if (ctx->alert != 0)
407 return tls13_send_alert(ctx->rl, ctx->alert);
414 if (ctx->alert != 0)
415 return tls13_send_alert(ctx->rl, ctx->alert);
555 ctx->alert = TLS13_ALERT_DECODE_ERROR;
H A Dt1_lib.c124 static int tls_decrypt_ticket(SSL *s, CBS *ticket, int *alert,
904 tls1_process_ticket(SSL *s, CBS *ext_block, int *alert, SSL_SESSION **ret) argument
927 *alert = SSL_AD_DECODE_ERROR;
934 *alert = SSL_AD_DECODE_ERROR;
964 return tls_decrypt_ticket(s, &ext_data, alert, ret);
979 tls_decrypt_ticket(SSL *s, CBS *ticket, int *alert, SSL_SESSION **psess) argument
1123 *alert = alert_desc;
H A Dtls13_record_layer.c74 * Read and/or write channels are closed due to an alert being
75 * sent or received. In the case of an error alert both channels
90 uint8_t alert; member in struct:tls13_record_layer
92 /* Pending alert messages. */
289 * A TLSv1.3 alert record can only contain a single alert - this means
290 * that processing the alert must consume all of the record. The alert
309 * however for error alerts (RFC 8446 section 6.2), the alert level
398 * If an alert i
[all...]
H A Dtls13_internal.h291 uint8_t alert; member in struct:tls13_ctx
337 int tls13_legacy_servername_process(struct tls13_ctx *ctx, uint8_t *alert);
H A Dtls13_legacy.c129 /* If we received a fatal alert we already put an error on the stack. */
518 * handshake or alert data. Only one attempt is made with no
536 tls13_legacy_servername_process(struct tls13_ctx *ctx, uint8_t *alert) argument
558 *alert = legacy_alert;
/openbsd-current/gnu/usr.bin/binutils/gdb/testsuite/gdb.base/
H A Dcharset.c36 [0] --- the `alert' character, '\a'
62 char alert, char backspace, char form_feed,
67 string[0] = alert;
60 init_string(char string[], char x, char alert, char backspace, char form_feed, char line_feed, char carriage_return, char horizontal_tab, char vertical_tab, char cent, char misc_ctrl) argument
/openbsd-current/regress/usr.sbin/syslogd/
H A Dargs-tls-cipher-null.pl19 qr/.*CONNECT.*:sslv3 alert handshake failure/ => 1,
H A Dargs-server-tls-tcp.pl44 qr/CONNECT_CR_SRVR_HELLO:tlsv1 alert protocol version/ => 1,
H A Dargs-client-tls-tcp.pl45 qr/ACCEPT_SR_CLNT_HELLO:tlsv1 alert protocol version/ => 1,
H A Dargs-tls-cafile-fake.pl39 qr/(tlsv1 alert decrypt error|$errors)/ => 1,
H A Dargs-tls-cafile-default.pl41 qr/(ACCEPT_SR_FINISHED:tlsv1 alert unknown ca|$errors)/ => 1,
H A Dargs-client-tls-fake.pl20 qr/.*:tlsv1 alert decrypt error/;
/openbsd-current/sys/dev/pci/drm/amd/pm/powerplay/hwmgr/
H A Dsmu7_thermal.c312 * smu7_thermal_set_temperature_range - Set the requested temperature range for high and low alert signals
315 * @low_temp: Temperature to be programmed for high alert signals
316 * @high_temp: Temperature to be programmed for low alert signals
374 uint32_t alert; local
376 alert = PHM_READ_VFPF_INDIRECT_FIELD(hwmgr->device, CGS_IND_REG__SMC,
378 alert &= ~(SMU7_THERMAL_HIGH_ALERT_MASK | SMU7_THERMAL_LOW_ALERT_MASK);
380 CG_THERMAL_INT, THERM_INT_MASK, alert);
392 uint32_t alert; local
394 alert = PHM_READ_VFPF_INDIRECT_FIELD(hwmgr->device, CGS_IND_REG__SMC,
396 alert |
[all...]
/openbsd-current/regress/lib/libssl/tlsext/
H A Dtlsexttest.c33 int (*process)(SSL *s, uint16_t msg_type, CBS *cbs, int *alert);
168 int failure, alert; local
241 if (!server_funcs->process(ssl, SSL_TLSEXT_MSG_CH, &cbs, &alert)) {
308 if (!server_funcs->process(ssl, SSL_TLSEXT_MSG_CH, &cbs, &alert)) {
369 int failure, alert; local
445 if (client_funcs->process(ssl, SSL_TLSEXT_MSG_SH, &cbs, &alert)) {
456 if (!client_funcs->process(ssl, SSL_TLSEXT_MSG_SH, &cbs, &alert)) {
558 int failure, alert; local
669 if (!server_funcs->process(ssl, SSL_TLSEXT_MSG_CH, &cbs, &alert)) {
775 if (!server_funcs->process(ssl, SSL_TLSEXT_MSG_CH, &cbs, &alert)) {
898 int failure, alert; local
1132 int failure, alert; local
1378 int alert; local
1496 int alert; local
1628 int alert; local
1792 int alert; local
1930 int alert; local
2053 int alert; local
2182 int alert; local
2314 int alert; local
2820 int failure, alert; local
3060 int failure, alert; local
3466 int alert; local
3555 int alert; local
3651 int alert; local
3840 int alert; local
3975 int alert; local
4066 int alert; local
4184 int alert; local
[all...]
/openbsd-current/gnu/usr.bin/perl/cpan/Term-ANSIColor/t/module/
H A Daliases-func.t24 my $output = eval { color('alert') };
25 ok(!$output, 'alert color not recognized');
28 qr{ \A Invalid [ ] attribute [ ] name [ ] alert [ ] at [ ] }xms,
33 is(coloralias('alert', 'red'), 'red', 'coloralias works and returns color');
34 is(color('alert'), color('red'), 'alert now works as a color');
35 is(colored('test', 'alert'), "\e[31mtest\e[0m", '..and colored works');
36 ok(colorvalid('alert'), '...and alert is now a valid color');
37 is(coloralias('alert'), 're
[all...]
/openbsd-current/usr.bin/tmux/
H A Dsession.c415 session_next(struct session *s, int alert) argument
423 if (alert)
427 if (alert && ((wl = session_next_alert(wl)) == NULL))
446 session_previous(struct session *s, int alert) argument
454 if (alert)
458 if (alert && (wl = session_previous_alert(wl)) == NULL)
/openbsd-current/gnu/usr.bin/perl/cpan/Sys-Syslog/t/
H A Dfacilities-routing.t29 my @levels = qw< emerg alert crit err warning notice info debug >;
/openbsd-current/regress/lib/libssl/interop/botan/
H A Dclient.cpp100 void tls_alert(Botan::TLS::Alert alert) override
102 errx(1, "alert: %s", alert.type_string().c_str());
/openbsd-current/gnu/usr.bin/binutils/gdb/osf-share/
H A Dcma_tcb_defs.h106 cma__c_debevt_term_alert = 6, /* Terminated due to alert/cancel */
253 cma__t_int_alert alert; /* Current alert state info */ member in struct:CMA__T_INT_TCB
/openbsd-current/gnu/usr.bin/perl/cpan/Test-Simple/lib/Test2/IPC/
H A DDriver.pm173 This is used to alert the driver that a new hub is expecting events. The driver
186 This is used to alert the driver that a hub is no longer accepting events. The

Completed in 180 milliseconds

12