/external/chromium_org/chrome/browser/extensions/ |
H A D | alert_apitest.cc | 18 ASSERT_TRUE(RunExtensionTest("alert")) << message_; 26 base::ASCIIToUTF16("alert('This should not crash.');")); 28 AppModalDialog* alert = ui_test_utils::WaitForAppModalDialog(); local 29 ASSERT_TRUE(alert); 30 alert->CloseModalDialog();
|
/external/chromium_org/ash/ |
H A D | default_accessibility_delegate.cc | 105 AccessibilityAlert alert) { 106 accessibility_alert_ = alert; 104 TriggerAccessibilityAlert( AccessibilityAlert alert) argument
|
/external/kernel-headers/original/uapi/linux/ |
H A D | net_dropmon.h | 42 struct net_dm_alert_msg alert; member in union:net_dm_user_msg::__anon22375
|
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_record.c | 271 * @alert: Buffer for returning an alert value on failure 280 u8 *out_data, size_t *out_len, u8 *alert) 311 *alert = TLS_ALERT_PROTOCOL_VERSION; 319 *alert = TLS_ALERT_RECORD_OVERFLOW; 342 *alert = TLS_ALERT_UNEXPECTED_MESSAGE; 351 *alert = TLS_ALERT_INTERNAL_ERROR; 359 *alert = TLS_ALERT_DECRYPTION_FAILED; 368 * TLS v1.0 defines different alert values for various 370 * use the same bad_record_mac alert regardles 278 tlsv1_record_receive(struct tlsv1_record_layer *rl, const u8 *in_data, size_t in_len, u8 *out_data, size_t *out_len, u8 *alert) argument [all...] |
H A D | tlsv1_client_read.c | 441 u8 alert; local 554 &alert) < 0) 1025 wpa_printf(MSG_DEBUG, "TLSv1: Received alert %d:%d",
|
H A D | tlsv1_client_write.c | 833 u8 *alert, *pos, *length; local 838 alert = os_malloc(10); 839 if (alert == NULL) 842 pos = alert; 863 *out_len = pos - alert; 865 return alert;
|
H A D | tlsv1_common.c | 403 const u8 *pos, size_t len, u8 *alert) 412 *alert = TLS_ALERT_DECODE_ERROR; 418 *alert = TLS_ALERT_DECODE_ERROR; 430 *alert = TLS_ALERT_INTERNAL_ERROR; 437 *alert = TLS_ALERT_INTERNAL_ERROR; 444 *alert = TLS_ALERT_DECRYPT_ERROR; 478 *alert = TLS_ALERT_DECRYPT_ERROR; 488 *alert = TLS_ALERT_DECRYPT_ERROR; 401 tls_verify_signature(u16 tls_version, struct crypto_public_key *pk, const u8 *data, size_t data_len, const u8 *pos, size_t len, u8 *alert) argument
|
H A D | tlsv1_server_read.c | 779 u8 alert; local 923 hash, hlen, pos, end - pos, &alert) < 0) { 925 tlsv1_server_alert(conn, TLS_ALERT_LEVEL_FATAL, alert); 1170 tlsv1_server_log(conn, "Received alert %d:%d", buf[0], buf[1]);
|
H A D | tlsv1_server_write.c | 907 u8 *alert, *pos, *length; local 912 alert = os_malloc(10); 913 if (alert == NULL) 916 pos = alert; 937 *out_len = pos - alert; 939 return alert;
|
H A D | tlsv1_client.c | 145 u8 *msg = NULL, *in_msg = NULL, *in_pos, *in_end, alert, ct; local 185 in_msg, &in_msg_len, &alert); 189 tls_alert(conn, TLS_ALERT_LEVEL_FATAL, alert); 312 u8 alert, *out_pos, ct; local 323 alert = TLS_ALERT_INTERNAL_ERROR; 337 alert = TLS_ALERT_INTERNAL_ERROR; 343 out_pos, &olen, &alert); 359 alert = TLS_ALERT_INTERNAL_ERROR; 371 alert = TLS_ALERT_DECODE_ERROR; 374 wpa_printf(MSG_DEBUG, "TLSv1: Received alert [all...] |
H A D | tlsv1_server.c | 137 u8 *msg = NULL, *in_msg, *in_pos, *in_end, alert, ct; local 156 in_msg, &in_msg_len, &alert); 160 tlsv1_server_alert(conn, TLS_ALERT_LEVEL_FATAL, alert); 167 tlsv1_server_alert(conn, TLS_ALERT_LEVEL_FATAL, alert); 197 /* Avoid alert loops */ 198 wpa_printf(MSG_DEBUG, "TLSv1: Drop alert loop"); 264 u8 alert, *out_end, *out_pos, ct; local 276 out_pos, &olen, &alert); 279 tlsv1_server_alert(conn, TLS_ALERT_LEVEL_FATAL, alert); 286 tlsv1_server_alert(conn, TLS_ALERT_LEVEL_FATAL, alert); [all...] |
/external/wpa_supplicant_8/src/tls/ |
H A D | tlsv1_record.c | 271 * @alert: Buffer for returning an alert value on failure 280 u8 *out_data, size_t *out_len, u8 *alert) 311 *alert = TLS_ALERT_PROTOCOL_VERSION; 319 *alert = TLS_ALERT_RECORD_OVERFLOW; 342 *alert = TLS_ALERT_UNEXPECTED_MESSAGE; 351 *alert = TLS_ALERT_INTERNAL_ERROR; 359 *alert = TLS_ALERT_DECRYPTION_FAILED; 368 * TLS v1.0 defines different alert values for various 370 * use the same bad_record_mac alert regardles 278 tlsv1_record_receive(struct tlsv1_record_layer *rl, const u8 *in_data, size_t in_len, u8 *out_data, size_t *out_len, u8 *alert) argument [all...] |
H A D | tlsv1_client_read.c | 441 u8 alert; local 554 &alert) < 0) 1025 wpa_printf(MSG_DEBUG, "TLSv1: Received alert %d:%d",
|
H A D | tlsv1_client_write.c | 833 u8 *alert, *pos, *length; local 838 alert = os_malloc(10); 839 if (alert == NULL) 842 pos = alert; 863 *out_len = pos - alert; 865 return alert;
|
H A D | tlsv1_common.c | 403 const u8 *pos, size_t len, u8 *alert) 412 *alert = TLS_ALERT_DECODE_ERROR; 418 *alert = TLS_ALERT_DECODE_ERROR; 430 *alert = TLS_ALERT_INTERNAL_ERROR; 437 *alert = TLS_ALERT_INTERNAL_ERROR; 444 *alert = TLS_ALERT_DECRYPT_ERROR; 478 *alert = TLS_ALERT_DECRYPT_ERROR; 488 *alert = TLS_ALERT_DECRYPT_ERROR; 401 tls_verify_signature(u16 tls_version, struct crypto_public_key *pk, const u8 *data, size_t data_len, const u8 *pos, size_t len, u8 *alert) argument
|
H A D | tlsv1_server_read.c | 779 u8 alert; local 923 hash, hlen, pos, end - pos, &alert) < 0) { 925 tlsv1_server_alert(conn, TLS_ALERT_LEVEL_FATAL, alert); 1170 tlsv1_server_log(conn, "Received alert %d:%d", buf[0], buf[1]);
|
H A D | tlsv1_server_write.c | 907 u8 *alert, *pos, *length; local 912 alert = os_malloc(10); 913 if (alert == NULL) 916 pos = alert; 937 *out_len = pos - alert; 939 return alert;
|
H A D | tlsv1_client.c | 145 u8 *msg = NULL, *in_msg = NULL, *in_pos, *in_end, alert, ct; local 185 in_msg, &in_msg_len, &alert); 189 tls_alert(conn, TLS_ALERT_LEVEL_FATAL, alert); 312 u8 alert, *out_pos, ct; local 323 alert = TLS_ALERT_INTERNAL_ERROR; 337 alert = TLS_ALERT_INTERNAL_ERROR; 343 out_pos, &olen, &alert); 359 alert = TLS_ALERT_INTERNAL_ERROR; 371 alert = TLS_ALERT_DECODE_ERROR; 374 wpa_printf(MSG_DEBUG, "TLSv1: Received alert [all...] |
H A D | tlsv1_server.c | 137 u8 *msg = NULL, *in_msg, *in_pos, *in_end, alert, ct; local 156 in_msg, &in_msg_len, &alert); 160 tlsv1_server_alert(conn, TLS_ALERT_LEVEL_FATAL, alert); 167 tlsv1_server_alert(conn, TLS_ALERT_LEVEL_FATAL, alert); 197 /* Avoid alert loops */ 198 wpa_printf(MSG_DEBUG, "TLSv1: Drop alert loop"); 264 u8 alert, *out_end, *out_pos, ct; local 276 out_pos, &olen, &alert); 279 tlsv1_server_alert(conn, TLS_ALERT_LEVEL_FATAL, alert); 286 tlsv1_server_alert(conn, TLS_ALERT_LEVEL_FATAL, alert); [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | tlsv1_record.c | 271 * @alert: Buffer for returning an alert value on failure 280 u8 *out_data, size_t *out_len, u8 *alert) 311 *alert = TLS_ALERT_PROTOCOL_VERSION; 319 *alert = TLS_ALERT_RECORD_OVERFLOW; 342 *alert = TLS_ALERT_UNEXPECTED_MESSAGE; 351 *alert = TLS_ALERT_INTERNAL_ERROR; 359 *alert = TLS_ALERT_DECRYPTION_FAILED; 368 * TLS v1.0 defines different alert values for various 370 * use the same bad_record_mac alert regardles 278 tlsv1_record_receive(struct tlsv1_record_layer *rl, const u8 *in_data, size_t in_len, u8 *out_data, size_t *out_len, u8 *alert) argument [all...] |
H A D | tlsv1_client_read.c | 441 u8 alert; local 554 &alert) < 0) 1025 wpa_printf(MSG_DEBUG, "TLSv1: Received alert %d:%d",
|
H A D | tlsv1_client_write.c | 833 u8 *alert, *pos, *length; local 838 alert = os_malloc(10); 839 if (alert == NULL) 842 pos = alert; 863 *out_len = pos - alert; 865 return alert;
|
H A D | tlsv1_common.c | 403 const u8 *pos, size_t len, u8 *alert) 412 *alert = TLS_ALERT_DECODE_ERROR; 418 *alert = TLS_ALERT_DECODE_ERROR; 430 *alert = TLS_ALERT_INTERNAL_ERROR; 437 *alert = TLS_ALERT_INTERNAL_ERROR; 444 *alert = TLS_ALERT_DECRYPT_ERROR; 478 *alert = TLS_ALERT_DECRYPT_ERROR; 488 *alert = TLS_ALERT_DECRYPT_ERROR; 401 tls_verify_signature(u16 tls_version, struct crypto_public_key *pk, const u8 *data, size_t data_len, const u8 *pos, size_t len, u8 *alert) argument
|
H A D | tlsv1_server_read.c | 779 u8 alert; local 923 hash, hlen, pos, end - pos, &alert) < 0) { 925 tlsv1_server_alert(conn, TLS_ALERT_LEVEL_FATAL, alert); 1170 tlsv1_server_log(conn, "Received alert %d:%d", buf[0], buf[1]);
|
H A D | tlsv1_server_write.c | 907 u8 *alert, *pos, *length; local 912 alert = os_malloc(10); 913 if (alert == NULL) 916 pos = alert; 937 *out_len = pos - alert; 939 return alert;
|