Home
last modified time | relevance | path

Searched refs:TLS (Results 1 – 25 of 253) sorted by relevance

1234567891011

/external/llvm/test/tools/llvm-readobj/
Dmips-got.test8 RUN: FileCheck %s -check-prefix GOT-TLS
58 GOT-EXE-NEXT: Number of TLS and multi-GOT entries: 0
175 GOT-SO-NEXT: Number of TLS and multi-GOT entries: 0
178 GOT-TLS: Primary GOT {
179 GOT-TLS-NEXT: Canonical gp value: 0x18BF0
180 GOT-TLS-NEXT: Reserved entries [
181 GOT-TLS-NEXT: Entry {
182 GOT-TLS-NEXT: Address: 0x10C00
183 GOT-TLS-NEXT: Access: -32752
184 GOT-TLS-NEXT: Initial: 0x0
[all …]
/external/llvm/test/Transforms/SafeStack/AArch64/
Dabi_ssp.ll1 ; RUN: opt -safe-stack -S -mtriple=aarch64-linux-android < %s -o - | FileCheck --check-prefix=TLS %s
7 ; TLS: call i8* @llvm.thread.pointer()
9 ; TLS: %[[TP2:.*]] = call i8* @llvm.thread.pointer()
10 ; TLS: %[[B:.*]] = getelementptr i8, i8* %[[TP2]], i32 40
11 ; TLS: %[[C:.*]] = bitcast i8* %[[B]] to i8**
12 ; TLS: %[[StackGuard:.*]] = load i8*, i8** %[[C]]
13 ; TLS: store i8* %[[StackGuard]], i8** %[[StackGuardSlot:.*]]
17 ; TLS: %[[A:.*]] = load i8*, i8** %[[StackGuardSlot]]
18 ; TLS: icmp ne i8* %[[StackGuard]], %[[A]]
/external/wpa_supplicant_8/wpa_supplicant/
Deap_testing.txt56 EAP-TLS + + + + + + + + - - + +
61 EAP-PEAPv0/TLS + + - + + + F + - - + +
72 EAP-PEAPv1/TLS - - - + + +1 F +5 - - + +
87 EAP-TTLS/EAP-TLS + - +2 + F + + + - - + -
107 EAP-FAST/TLS(aprov) - - - - - - - - - - + +
112 EAP-FAST/TLS(auth) - - - - - - - - - - + +
145 - EAP-TLS
149 - EAP-PEAPv0 / TLS
153 - EAP-TTLS / EAP-TLS
163 - EAP-TLS
[all …]
Dwpa_supplicant.conf1384 eap=TLS
1498 eap=TLS
1632 eap=TTLS PEAP TLS
1646 eap=TLS
/external/llvm/test/CodeGen/X86/
Dtls-android-negative.ll4 ; Make sure that some symboles are not emitted in emulated TLS model.
31 ; no direct access to emulated TLS variables.
32 ; no definition of emulated TLS variables.
33 ; no initializer for external TLS variables, __emutls_t.external_x
34 ; no initializer for 0-initialized TLS variables, __emutls_t.internal_y0
37 ; CHECK-NOT: external_x@TLS
38 ; CHECK-NOT: external_y@TLS
39 ; CHECK-NOT: internal_y@TLS
53 ; CHECK-NOT: external_x@TLS
54 ; CHECK-NOT: external_y@TLS
[all …]
/external/llvm/test/tools/llvm-objdump/
Dcoff-private-headers.test47 // RUN: FileCheck -check-prefix=TLS %s
49 TLS: TLS directory:
50 TLS-NEXT: StartAddressOfRawData: 0x00000000000000
51 TLS-NEXT: EndAddressOfRawData: 0x00000000000000
52 TLS-NEXT: AddressOfIndex: 0x00000000000000
53 TLS-NEXT: AddressOfCallBacks: 0x00000000000000
54 TLS-NEXT: SizeOfZeroFill: 0
55 TLS-NEXT: Characteristics: 0
56 TLS-NEXT: Alignment: 0
/external/llvm/test/CodeGen/ARM/Windows/
Dtls.ll23 ; CHECK-NEXT: ldr{{.w}} [[TLS:r[0-9]]], {{\[}}[[TLS_POINTER]], [[INDEX]], lsl #2]
27 ; CHECK-NEXT: ldr r0, {{\[}}[[TLS]], [[SLOT]]]
44 ; CHECK-NEXT: ldr{{.w}} [[TLS:r[0-9]]], {{\[}}[[TLS_POINTER]], [[INDEX]], lsl #2]
48 ; CHECK-NEXT: ldr r0, {{\[}}[[TLS]], [[SLOT]]]
65 ; CHECK-NEXT: ldr{{.w}} [[TLS:r[0-9]]], {{\[}}[[TLS_POINTER]], [[INDEX]], lsl #2]
69 ; CHECK-NEXT: ldr r0, {{\[}}[[TLS]], [[SLOT]]]
86 ; CHECK-NEXT: ldr{{.w}} [[TLS:r[0-9]]], {{\[}}[[TLS_POINTER]], [[INDEX]], lsl #2]
90 ; CHECK-NEXT: ldr r0, {{\[}}[[TLS]], [[SLOT]]]
107 ; CHECK-NEXT: ldr{{.w}} [[TLS:r[0-9]]], {{\[}}[[TLS_POINTER]], [[INDEX]], lsl #2]
111 ; CHECK-NEXT: ldr r0, {{\[}}[[TLS]], [[SLOT]]]
[all …]
/external/llvm/test/Transforms/SafeStack/X86/
Dabi_ssp.ll1 ; RUN: opt -safe-stack -S -mtriple=i686-pc-linux-gnu < %s -o - | FileCheck --check-prefix=TLS --che…
2 ; RUN: opt -safe-stack -S -mtriple=x86_64-pc-linux-gnu < %s -o - | FileCheck --check-prefix=TLS --c…
3 ; RUN: opt -safe-stack -S -mtriple=i686-linux-android < %s -o - | FileCheck --check-prefix=TLS --ch…
4 ; RUN: opt -safe-stack -S -mtriple=x86_64-linux-android < %s -o - | FileCheck --check-prefix=TLS --…
10 ; TLS: store i8* %[[StackGuard]], i8** %[[StackGuardSlot:.*]]
14 ; TLS: %[[A:.*]] = load i8*, i8** %[[StackGuardSlot]]
15 ; TLS: icmp ne i8* %[[StackGuard]], %[[A]]
Dabi.ll1 ; RUN: opt -safe-stack -S -mtriple=i386-pc-linux-gnu < %s -o - | FileCheck %s --check-prefix=TLS
2 ; RUN: opt -safe-stack -S -mtriple=x86_64-pc-linux-gnu < %s -o - | FileCheck %s --check-prefix=TLS
9 ; TLS: %[[USP:.*]] = load i8*, i8** @__safestack_unsafe_stack_ptr
10 ; TLS: %[[USST:.*]] = getelementptr i8, i8* %[[USP]], i32 -16
11 ; TLS: store i8* %[[USST]], i8** @__safestack_unsafe_stack_ptr
24 ; TLS: store i8* %[[USP]], i8** @__safestack_unsafe_stack_ptr
/external/llvm/lib/CodeGen/AsmPrinter/
DAddressPool.h25 bool TLS; member
26 AddressPoolEntry(unsigned Number, bool TLS) : Number(Number), TLS(TLS) {} in AddressPoolEntry()
41 unsigned getIndex(const MCSymbol *Sym, bool TLS = false);
DAddressPool.cpp19 unsigned AddressPool::getIndex(const MCSymbol *Sym, bool TLS) { in getIndex() argument
22 Pool.insert(std::make_pair(Sym, AddressPoolEntry(Pool.size(), TLS))); in getIndex()
39 I.second.TLS in emit()
/external/wpa_supplicant_8/hostapd/
Deap_testing.txt21 EAP-TLS + + +1 + +
25 EAP-PEAPv0/TLS + F - + +
35 EAP-PEAPv1/TLS + F - - +
49 EAP-TTLS/EAP-TLS + F - - -
63 EAP-FAST/TLS(aprov) + - - - -
68 EAP-FAST/TLS(auth) + - - - -
75 1) EAP-TLS itself worked, but peer certificate validation failed at
76 least when using the internal TLS server (peer included incorrect
Dhostapd.eap_user19 # EAP-TLS, EAP-PEAP, EAP-TTLS, EAP-FAST, EAP-SIM, and EAP-AKA do not use
27 # avoid having to configure every certificate for EAP-TLS authentication. The
61 "example user" TLS
72 "0"* AKA,TTLS,TLS,PEAP,SIM
73 "1"* SIM,TTLS,TLS,PEAP,AKA
74 "2"* AKA,TTLS,TLS,PEAP,SIM
75 "3"* SIM,TTLS,TLS,PEAP,AKA
76 "4"* AKA,TTLS,TLS,PEAP,SIM
77 "5"* SIM,TTLS,TLS,PEAP,AKA
83 * PEAP,TTLS,TLS,SIM,AKA
/external/libvncserver/libvncserver/
Dzlib.c48 #if LIBVNCSERVER_HAVE_LIBPTHREAD && LIBVNCSERVER_HAVE_TLS && !defined(TLS) && defined(__linux__)
49 #define TLS __thread macro
51 #ifndef TLS
52 #define TLS macro
55 static TLS int zlibBeforeBufSize = 0;
56 static TLS char *zlibBeforeBuf = NULL;
58 static TLS int zlibAfterBufSize = 0;
59 static TLS char *zlibAfterBuf = NULL;
60 static TLS int zlibAfterBufLen = 0;
/external/curl/tests/data/
Dtest3235 TLS-SRP
16 TLS-SRP
19 TLS-SRP to non-TLS-SRP server
Dtest3225 TLS-SRP
16 TLS-SRP
19 TLS-SRP with bad password
Dtest3215 TLS-SRP
16 TLS-SRP
19 TLS-SRP with bad username and password
Dtest3245 TLS-SRP
16 TLS-SRP
19 TLS-SRP with server cert checking
/external/curl/docs/
DLICENSE-MIXING28 (May be used for SSL/TLS support) Uses an Original BSD-style license
33 licensing is a problem for you, consider using another TLS library.
37 (May be used for SSL/TLS support) Uses the LGPL[3] license. If this is
38 a problem for you, consider using another TLS library. Also note that
44 (May be used for SSL/TLS support) Uses the GPL[1] license or a
46 another TLS library.
50 (May be used for SSL/TLS support) Is covered by the MPL[4] license,
58 (May be used for SSL/TLS support) Uses a Modified BSD-style license.
62 (May be used for SSL/TLS support) Uses the GPL[1] license or a
64 another TLS library.
[all …]
DSSL-PROBLEMS9 First, let's establish that we often refer to TLS and SSL interchangeably as
10 SSL here. The current protocol is called TLS, it was called SSL a long time
37 built with support for older SSL and TLS versions disabled!
39 All versions of SSL are considered insecure and should be avoided. Use TLS.
66 BEAST is the name of a TLS 1.0 attack that surfaced 2011. When adding means
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/
Dwpa_supplicant.conf.sgml45 EAP-TLS as work network.</para>
59 # work network; use EAP-TLS with WPA; allow only CCMP and TKIP ciphers
66 eap=TLS
100 within an encrypted TLS tunnel.</para>
122 (require both unicast and broadcast); use EAP-TLS for
131 eap=TLS
159 eap=TTLS PEAP TLS
203 certificates. EAP-TLS uses both server side and client
/external/conscrypt/openjdk/src/test/resources/
DREADME13 - ct-signed-timestamp-list: TLS-encoded SignedCertificateTimestampList containing one SCT for
16 - ct-signed-timestamp-list-invalid: TLS-encoded SignedCertificateTimestampList containing one SCT
19 - ct-signed-timestamp-list-unknown: TLS-encoded SignedCertificateTimestampList containing one SCT
/external/boringssl/src/ssl/test/
DREADME.md5 Testing a TLS implementation can be difficult. We need to produce invalid but
7 cases. TLS's cryptographic steps mean we cannot use a transcript and effectively
8 need a TLS implementation on the other end. But we do not wish to litter
32 control the Go TLS implementation's behavior.
/external/nist-sip/java/gov/nist/javax/sip/address/
DParameterNames.java47 public static final String TLS = GenericURI.TLS; field
/external/llvm/test/CodeGen/SystemZ/
Dtls-05.ll1 ; Test general-dynamic TLS access optimizations.
3 ; If we access the same TLS variable twice, there should only be

1234567891011