/prebuilts/gcc/linux-x86/host/x86_64-w64-mingw32-4.8/x86_64-w64-mingw32/lib/ldscripts/ |
i386pe.xn | 113 *(SORT(.CRT$XL*)) /* TLS callbacks */ 114 /* ___crt_xl_end__ is defined in the TLS Directory support code */ 122 /* Windows TLS expects .tls$AAA to be at the start and .tls$ZZZ to be 124 be at the beginning of the section to enable SECREL32 relocations with TLS 126 .tls BLOCK(__section_alignment__) : 129 *(.tls$AAA) 130 *(.tls) 131 *(.tls$ [all...] |
i386pep.x | 118 *(SORT(.CRT$XL*)) /* TLS callbacks */ 119 /* ___crt_xl_end__ is defined in the TLS Directory support code */ 127 /* Windows TLS expects .tls$AAA to be at the start and .tls$ZZZ to be 128 at the end of the .tls section. This is important because _tls_start MUST 129 be at the beginning of the section to enable SECREL32 relocations with TLS 131 .tls BLOCK(__section_alignment__) : 134 *(.tls$AAA) 135 *(.tls) [all...] |
i386pep.xa | 117 *(SORT(.CRT$XL*)) /* TLS callbacks */ 118 /* ___crt_xl_end__ is defined in the TLS Directory support code */ 126 /* Windows TLS expects .tls$AAA to be at the start and .tls$ZZZ to be 127 at the end of the .tls section. This is important because _tls_start MUST 128 be at the beginning of the section to enable SECREL32 relocations with TLS 130 .tls BLOCK(__section_alignment__) : 133 *(.tls$AAA) 134 *(.tls) [all...] |
i386pep.xbn | 117 *(SORT(.CRT$XL*)) /* TLS callbacks */ 118 /* ___crt_xl_end__ is defined in the TLS Directory support code */ 126 /* Windows TLS expects .tls$AAA to be at the start and .tls$ZZZ to be 127 at the end of the .tls section. This is important because _tls_start MUST 128 be at the beginning of the section to enable SECREL32 relocations with TLS 130 .tls BLOCK(__section_alignment__) : 133 *(.tls$AAA) 134 *(.tls) [all...] |
i386pep.xn | 117 *(SORT(.CRT$XL*)) /* TLS callbacks */ 118 /* ___crt_xl_end__ is defined in the TLS Directory support code */ 126 /* Windows TLS expects .tls$AAA to be at the start and .tls$ZZZ to be 127 at the end of the .tls section. This is important because _tls_start MUST 128 be at the beginning of the section to enable SECREL32 relocations with TLS 130 .tls BLOCK(__section_alignment__) : 133 *(.tls$AAA) 134 *(.tls) [all...] |
/prebuilts/go/darwin-x86/src/crypto/tls/ |
example_test.go | 8 "crypto/tls" 65 conn, err := tls.Dial("tcp", "mail.google.com:443", &tls.Config{ 75 // Debugging TLS applications by decrypting a network traffic capture. 83 server.TLS = &tls.Config{ 90 // w, err := os.OpenFile("tls-secrets.txt", os.O_WRONLY|os.O_CREATE|os.O_TRUNC, 0600) 95 TLSClientConfig: &tls.Config{ 109 // The resulting file can be used with Wireshark to decrypt the TLS
|
key_agreement.go | 5 package tls package 23 var errClientKeyExchange = errors.New("tls: invalid ClientKeyExchange message") 24 var errServerKeyExchange = errors.New("tls: invalid ServerKeyExchange message") 26 // rsaKeyAgreement implements the standard TLS key agreement where the client 49 return nil, errors.New("tls: certificate private key does not implement crypto.Decrypter") 66 return errors.New("tls: unexpected ServerKeyExchange") 99 // md5SHA1Hash implements TLS 1.0's hybrid hash function which consists of the 114 // is only used for >= TLS 1.2 and identifies the hash function to use. 118 return nil, crypto.Hash(0), errors.New("tls: unsupported hash function used by peer") 137 // pickTLS12HashForSignature returns a TLS 1.2 hash identifier for signing [all...] |
/prebuilts/go/linux-x86/src/crypto/tls/ |
example_test.go | 8 "crypto/tls" 65 conn, err := tls.Dial("tcp", "mail.google.com:443", &tls.Config{ 75 // Debugging TLS applications by decrypting a network traffic capture. 83 server.TLS = &tls.Config{ 90 // w, err := os.OpenFile("tls-secrets.txt", os.O_WRONLY|os.O_CREATE|os.O_TRUNC, 0600) 95 TLSClientConfig: &tls.Config{ 109 // The resulting file can be used with Wireshark to decrypt the TLS
|
key_agreement.go | 5 package tls package 23 var errClientKeyExchange = errors.New("tls: invalid ClientKeyExchange message") 24 var errServerKeyExchange = errors.New("tls: invalid ServerKeyExchange message") 26 // rsaKeyAgreement implements the standard TLS key agreement where the client 49 return nil, errors.New("tls: certificate private key does not implement crypto.Decrypter") 66 return errors.New("tls: unexpected ServerKeyExchange") 99 // md5SHA1Hash implements TLS 1.0's hybrid hash function which consists of the 114 // is only used for >= TLS 1.2 and identifies the hash function to use. 118 return nil, crypto.Hash(0), errors.New("tls: unsupported hash function used by peer") 137 // pickTLS12HashForSignature returns a TLS 1.2 hash identifier for signing [all...] |
/toolchain/binutils/binutils-2.27/ld/testsuite/ld-cris/ |
tls-e-20a.d | 4 #source: tls-gd-2.s 5 #source: tls-ld-6.s 6 #source: tls-ie-10.s 7 #source: tls-hx.s 8 #source: tls-hx1x2.s 13 # Like tls-e-20.d but with an offset for all TLS GOT entries, and an 14 # offset for all TLS data we care about. Offsets different for TLS 24 TLS off 0x0+dc vaddr 0x0+820dc paddr 0x0+820dc align 2\*\* [all...] |
tls-e-tpoffgotcomm1.d | 2 #source: tls-dso-tpoffgotcomm1.s --pic 7 # Like tls-dso-tpoffgotcomm1.d but making sure we can link *an 17 TLS off 0x0+a4 vaddr .* paddr .* align 2\*\*2
|
tls-gc-71.d | 1 #source: tls-gc-71.s 4 #source: tls-hx.s 10 # Check that we still have the other, global, TLS variable. 14 TLS off .*
|
tls-gc-76.d | 4 #source: tls-gc-76.s 5 #source: tls-hx.s
|
tls-js1.d | 2 #source: tls-ld-4.s 5 #source: tls-hx.s
|
tls-le-13.d | 3 #source: tls-le-13.s 4 #source: tls-x1x2.s 9 # Check that we have proper NPTL/TLS markings and GOT for an 16 TLS off 0x0+a4 vaddr 0x0+820a4 paddr 0x0+820a4 align 2\*\*2
|
tls-le-13s.d | 3 #source: tls-le-13s.s 4 #source: tls-x1x2.s 9 # Check that we have proper NPTL/TLS markings and GOT for an 16 TLS off 0x0+a0 vaddr 0x0+820a0 paddr 0x0+820a0 align 2\*\*2
|
tls-local-63.d | 1 #source: tls-ie-8.s --pic 2 #source: tls-hx.s 22 .: 00000000 +4 +TLS +LOCAL +DEFAULT +6 x
|
/external/libcups/cups/ |
tls-gnutls.c | 2 * TLS support code for CUPS using GNU TLS. 16 /**** This file is included from tls.c ****/ 38 static int tls_options = -1;/* Options for TLS connections */ 78 int result; /* Result of GNU TLS calls */ 311 if (!http || !http->tls || !credentials) 315 certs = gnutls_certificate_get_peers(http->tls, &count); 871 int result; /* Result from GNU TLS */ 1080 * 'http_gnutls_read()' - Read function for the GNU TLS library. 1120 * 'http_gnutls_write()' - Write function for the GNU TLS library [all...] |
/external/llvm/test/MC/ELF/ |
type.s | 29 tls: label 30 .global tls 31 .type tls,@tls_object 32 .type tls,@gnu_indirect_function 192 // CHECK-NEXT: Type: TLS (0x6) 201 // CHECK-NEXT: Type: TLS (0x6) 210 // CHECK-NEXT: Type: TLS (0x6) 282 // CHECK-NEXT: Type: TLS (0x6) 287 // CHECK-NEXT: Name: tls 291 // CHECK-NEXT: Type: TLS [all...] |
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/tls/ |
AndroidTrustRootIndex.java | 16 package com.squareup.okhttp.internal.tls;
|
/prebuilts/go/darwin-x86/src/runtime/cgo/ |
gcc_windows_386.c | 57 :: "r"(ts.tls), "r"(ts.g) : "%eax"
|
gcc_windows_amd64.c | 57 :: "r"(ts.tls), "r"(ts.g) : "%rax"
|
/prebuilts/go/linux-x86/src/runtime/cgo/ |
gcc_windows_386.c | 57 :: "r"(ts.tls), "r"(ts.g) : "%eax"
|
gcc_windows_amd64.c | 57 :: "r"(ts.tls), "r"(ts.g) : "%rax"
|
/toolchain/binutils/binutils-2.27/gold/ |
tls.h | 0 // tls.h -- Thread-Local Storage utility routines for gold -*- C++ -*- 32 namespace tls namespace in namespace:gold 46 // Check the range for a TLS relocation. This is inlined for efficiency. 59 _("TLS relocation out of range")); 62 // Check the validity of a TLS relocation. This is like assert. 73 _("TLS relocation against invalid instruction")); 77 } // End namespace tls.
|