/external/llvm/lib/CodeGen/AsmPrinter/ |
AddressPool.h | 25 bool TLS; 26 AddressPoolEntry(unsigned Number, bool TLS) : Number(Number), TLS(TLS) {} 41 unsigned getIndex(const MCSymbol *Sym, bool TLS = false);
|
AddressPool.cpp | 19 unsigned AddressPool::getIndex(const MCSymbol *Sym, bool TLS) { 22 Pool.insert(std::make_pair(Sym, AddressPoolEntry(Pool.size(), TLS))); 39 I.second.TLS
|
/external/pixman/pixman/ |
config.h | 22 /* The compiler supported TLS storage class */ 23 #define TLS __thread
|
pixman-compiler.h | 106 /* TLS */ 114 #elif defined(TLS) 117 static TLS type name
|
/external/nist-sip/java/gov/nist/javax/sip/address/ |
ParameterNames.java | 47 public static final String TLS = GenericURI.TLS; 92 * Added changes for TLS support contributed by Daniel Martinez
|
/external/wpa_supplicant_8/wpa_supplicant/examples/ |
wpa2-eap-ccmp.conf | 1 # WPA2-EAP/CCMP using EAP-TLS 11 eap=TLS
|
openCryptoki.conf | 1 # EAP-TLS using private key and certificates via OpenSSL PKCS#11 engine and 25 eap=TLS
|
/external/chromium_org/third_party/tlslite/tlslite/ |
errors.py | 18 """Base class for all TLS Lite exceptions.""" 29 """The socket was closed without a proper TLS shutdown. 31 The TLS specification mandates that an alert of some sort 35 TLS implementation, or a random network failure. 40 """A TLS alert has been signalled.""" 72 """A TLS alert has been signalled by the local implementation. 100 """A TLS alert has been signalled by the remote implementation.
|
/external/nist-sip/java/javax/sip/ |
ListeningPoint.java | 11 String TLS = "TLS";
|
/device/generic/goldfish/opengl/system/gralloc/ |
Android.mk | 14 # Need to access the special OPENGL TLS Slot
|
/frameworks/rs/cpu_ref/linkloader/lib/ |
ELFSymbol.cpp | 34 CASE(TLS)
|
/external/apache-http/src/org/apache/http/conn/ssl/ |
SSLSocketFactory.java | 59 * Layered socket factory for TLS/SSL connections, based on JSSE. 146 public static final String TLS = "TLS"; 194 algorithm = TLS; 216 this(TLS, keystore, keystorePassword, truststore, null, null); 222 this(TLS, keystore, keystorePassword, null, null, null); 228 this(TLS, null, null, truststore, null, null); 347 * This factory creates TLS/SSL socket connections
|
/packages/apps/Email/emailcommon/src/com/android/emailcommon/utility/ |
SSLSocketFactory.java | 65 * Layered socket factory for TLS/SSL connections, based on JSSE. 147 public static final String TLS = "TLS"; 188 algorithm = TLS; 210 this(TLS, keystore, keystorePassword, truststore, null, null); 216 this(TLS, keystore, keystorePassword, null, null, null); 222 this(TLS, null, null, truststore, null, null); 341 * This factory creates TLS/SSL socket connections
|
/external/chromium_org/third_party/cython/src/Cython/Includes/cpython/ |
pythread.pxd | 32 # Thread Local Storage (TLS) API
|
/external/wpa_supplicant_8/wpa_supplicant/ |
wpa_supplicant.conf | 404 # (EAP-TLS). Full path to the file should be used since working 518 # 0 = do not use OCSP stapling (TLS certificate status extension) [all...] |
/external/chromium_org/third_party/skia/tests/ |
TLSTest.cpp | 70 DEF_TEST(TLS, reporter) { 73 // ('flaky segfault in TLS test on Shuttle_Ubuntu12 buildbots') 76 // Test to ensure that at thread destruction, TLS destructors
|
/external/elfutils/0.153/libebl/ |
eblsegmenttypename.c | 81 PTYPE (TLS)
|
/external/skia/tests/ |
TLSTest.cpp | 70 DEF_TEST(TLS, reporter) { 73 // ('flaky segfault in TLS test on Shuttle_Ubuntu12 buildbots') 76 // Test to ensure that at thread destruction, TLS destructors
|
/cts/tests/tests/net/src/android/net/wifi/cts/ |
WifiEnterpriseConfigTest.java | 67 config.setEapMethod(Eap.TLS); 68 assertTrue(config.getEapMethod() == Eap.TLS);
|
/device/generic/goldfish/opengl/system/egl/ |
Android.mk | 18 # Used to access the Bionic private OpenGL TLS slot
|
/external/pixman/ |
config.h.in | 115 /* The compiler supported TLS storage class */ 116 #undef TLS
|
/external/smack/src/org/xbill/DNS/ |
KEYRecord.java | 32 public static final int TLS = 1; 54 protocols.add(TLS, "TLS"); 278 public static final int PROTOCOL_TLS = Protocol.TLS;
|
/external/chromium_org/chrome/browser/resources/cryptotoken/ |
webrequest.js | 291 * Normalizes the TLS channel ID value: 296 * @param {Object|string|undefined} opt_tlsChannelId TLS Channel id 297 * @return {Object|string} The normalized TLS channel ID value. 301 // Case 1: Always set some value for TLS channel ID, even if it's the empty 310 // so return an empty string: the browser definitely supports TLS 317 console.warn('Unparseable TLS channel ID value ' + opt_tlsChannelId); 331 * @param {Object|string|undefined} opt_tlsChannelId TLS Channel Id 349 * @param {Object|string|undefined} opt_tlsChannelId TLS Channel Id 363 * @param {Object|string|undefined} opt_tlsChannelId TLS Channel Id
|
/external/llvm/test/MC/ARM/ |
thumb-types.s | 32 .long tls(TPOFF) 48 .type tls,%object 50 tls: label 52 .size tls, 4 92 @ CHECK: Name: tls 94 @ CHECK: Type: TLS
|
/external/chromium_org/remoting/webapp/ |
xmpp_login_handler.js | 23 * @param {function():void} startTlsCallback Callback to call to start TLS on 77 * TLS handshake 115 this.startStream_('<starttls xmlns="urn:ietf:params:xml:ns:xmpp-tls"/>'); 137 this.onError_(remoting.Error.UNEXPECTED, "Server doesn't support TLS."); 147 "Failed to start TLS: " +
|