HomeSort by relevance Sort by last modified time
    Searched refs:tls (Results 176 - 200 of 614) sorted by null

1 2 3 4 5 6 78 91011>>

  /prebuilts/gcc/linux-x86/host/x86_64-w64-mingw32-4.8/x86_64-w64-mingw32/lib/ldscripts/
i386pe.xn 113 *(SORT(.CRT$XL*)) /* TLS callbacks */
114 /* ___crt_xl_end__ is defined in the TLS Directory support code */
122 /* Windows TLS expects .tls$AAA to be at the start and .tls$ZZZ to be
124 be at the beginning of the section to enable SECREL32 relocations with TLS
126 .tls BLOCK(__section_alignment__) :
129 *(.tls$AAA)
130 *(.tls)
131 *(.tls$
    [all...]
i386pep.x 118 *(SORT(.CRT$XL*)) /* TLS callbacks */
119 /* ___crt_xl_end__ is defined in the TLS Directory support code */
127 /* Windows TLS expects .tls$AAA to be at the start and .tls$ZZZ to be
128 at the end of the .tls section. This is important because _tls_start MUST
129 be at the beginning of the section to enable SECREL32 relocations with TLS
131 .tls BLOCK(__section_alignment__) :
134 *(.tls$AAA)
135 *(.tls)
    [all...]
i386pep.xa 117 *(SORT(.CRT$XL*)) /* TLS callbacks */
118 /* ___crt_xl_end__ is defined in the TLS Directory support code */
126 /* Windows TLS expects .tls$AAA to be at the start and .tls$ZZZ to be
127 at the end of the .tls section. This is important because _tls_start MUST
128 be at the beginning of the section to enable SECREL32 relocations with TLS
130 .tls BLOCK(__section_alignment__) :
133 *(.tls$AAA)
134 *(.tls)
    [all...]
i386pep.xbn 117 *(SORT(.CRT$XL*)) /* TLS callbacks */
118 /* ___crt_xl_end__ is defined in the TLS Directory support code */
126 /* Windows TLS expects .tls$AAA to be at the start and .tls$ZZZ to be
127 at the end of the .tls section. This is important because _tls_start MUST
128 be at the beginning of the section to enable SECREL32 relocations with TLS
130 .tls BLOCK(__section_alignment__) :
133 *(.tls$AAA)
134 *(.tls)
    [all...]
i386pep.xn 117 *(SORT(.CRT$XL*)) /* TLS callbacks */
118 /* ___crt_xl_end__ is defined in the TLS Directory support code */
126 /* Windows TLS expects .tls$AAA to be at the start and .tls$ZZZ to be
127 at the end of the .tls section. This is important because _tls_start MUST
128 be at the beginning of the section to enable SECREL32 relocations with TLS
130 .tls BLOCK(__section_alignment__) :
133 *(.tls$AAA)
134 *(.tls)
    [all...]
  /prebuilts/go/darwin-x86/src/crypto/tls/
example_test.go 8 "crypto/tls"
65 conn, err := tls.Dial("tcp", "mail.google.com:443", &tls.Config{
75 // Debugging TLS applications by decrypting a network traffic capture.
83 server.TLS = &tls.Config{
90 // w, err := os.OpenFile("tls-secrets.txt", os.O_WRONLY|os.O_CREATE|os.O_TRUNC, 0600)
95 TLSClientConfig: &tls.Config{
109 // The resulting file can be used with Wireshark to decrypt the TLS
key_agreement.go 5 package tls package
23 var errClientKeyExchange = errors.New("tls: invalid ClientKeyExchange message")
24 var errServerKeyExchange = errors.New("tls: invalid ServerKeyExchange message")
26 // rsaKeyAgreement implements the standard TLS key agreement where the client
49 return nil, errors.New("tls: certificate private key does not implement crypto.Decrypter")
66 return errors.New("tls: unexpected ServerKeyExchange")
99 // md5SHA1Hash implements TLS 1.0's hybrid hash function which consists of the
114 // is only used for >= TLS 1.2 and identifies the hash function to use.
118 return nil, crypto.Hash(0), errors.New("tls: unsupported hash function used by peer")
137 // pickTLS12HashForSignature returns a TLS 1.2 hash identifier for signing
    [all...]
  /prebuilts/go/linux-x86/src/crypto/tls/
example_test.go 8 "crypto/tls"
65 conn, err := tls.Dial("tcp", "mail.google.com:443", &tls.Config{
75 // Debugging TLS applications by decrypting a network traffic capture.
83 server.TLS = &tls.Config{
90 // w, err := os.OpenFile("tls-secrets.txt", os.O_WRONLY|os.O_CREATE|os.O_TRUNC, 0600)
95 TLSClientConfig: &tls.Config{
109 // The resulting file can be used with Wireshark to decrypt the TLS
key_agreement.go 5 package tls package
23 var errClientKeyExchange = errors.New("tls: invalid ClientKeyExchange message")
24 var errServerKeyExchange = errors.New("tls: invalid ServerKeyExchange message")
26 // rsaKeyAgreement implements the standard TLS key agreement where the client
49 return nil, errors.New("tls: certificate private key does not implement crypto.Decrypter")
66 return errors.New("tls: unexpected ServerKeyExchange")
99 // md5SHA1Hash implements TLS 1.0's hybrid hash function which consists of the
114 // is only used for >= TLS 1.2 and identifies the hash function to use.
118 return nil, crypto.Hash(0), errors.New("tls: unsupported hash function used by peer")
137 // pickTLS12HashForSignature returns a TLS 1.2 hash identifier for signing
    [all...]
  /toolchain/binutils/binutils-2.27/ld/testsuite/ld-cris/
tls-e-20a.d 4 #source: tls-gd-2.s
5 #source: tls-ld-6.s
6 #source: tls-ie-10.s
7 #source: tls-hx.s
8 #source: tls-hx1x2.s
13 # Like tls-e-20.d but with an offset for all TLS GOT entries, and an
14 # offset for all TLS data we care about. Offsets different for TLS
24 TLS off 0x0+dc vaddr 0x0+820dc paddr 0x0+820dc align 2\*\*
    [all...]
tls-e-tpoffgotcomm1.d 2 #source: tls-dso-tpoffgotcomm1.s --pic
7 # Like tls-dso-tpoffgotcomm1.d but making sure we can link *an
17 TLS off 0x0+a4 vaddr .* paddr .* align 2\*\*2
tls-gc-71.d 1 #source: tls-gc-71.s
4 #source: tls-hx.s
10 # Check that we still have the other, global, TLS variable.
14 TLS off .*
tls-gc-76.d 4 #source: tls-gc-76.s
5 #source: tls-hx.s
tls-js1.d 2 #source: tls-ld-4.s
5 #source: tls-hx.s
tls-le-13.d 3 #source: tls-le-13.s
4 #source: tls-x1x2.s
9 # Check that we have proper NPTL/TLS markings and GOT for an
16 TLS off 0x0+a4 vaddr 0x0+820a4 paddr 0x0+820a4 align 2\*\*2
tls-le-13s.d 3 #source: tls-le-13s.s
4 #source: tls-x1x2.s
9 # Check that we have proper NPTL/TLS markings and GOT for an
16 TLS off 0x0+a0 vaddr 0x0+820a0 paddr 0x0+820a0 align 2\*\*2
tls-local-63.d 1 #source: tls-ie-8.s --pic
2 #source: tls-hx.s
22 .: 00000000 +4 +TLS +LOCAL +DEFAULT +6 x
  /external/libcups/cups/
tls-gnutls.c 2 * TLS support code for CUPS using GNU TLS.
16 /**** This file is included from tls.c ****/
38 static int tls_options = -1;/* Options for TLS connections */
78 int result; /* Result of GNU TLS calls */
311 if (!http || !http->tls || !credentials)
315 certs = gnutls_certificate_get_peers(http->tls, &count);
871 int result; /* Result from GNU TLS */
1080 * 'http_gnutls_read()' - Read function for the GNU TLS library.
1120 * 'http_gnutls_write()' - Write function for the GNU TLS library
    [all...]
  /external/llvm/test/MC/ELF/
type.s 29 tls: label
30 .global tls
31 .type tls,@tls_object
32 .type tls,@gnu_indirect_function
192 // CHECK-NEXT: Type: TLS (0x6)
201 // CHECK-NEXT: Type: TLS (0x6)
210 // CHECK-NEXT: Type: TLS (0x6)
282 // CHECK-NEXT: Type: TLS (0x6)
287 // CHECK-NEXT: Name: tls
291 // CHECK-NEXT: Type: TLS
    [all...]
  /external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/tls/
AndroidTrustRootIndex.java 16 package com.squareup.okhttp.internal.tls;
  /prebuilts/go/darwin-x86/src/runtime/cgo/
gcc_windows_386.c 57 :: "r"(ts.tls), "r"(ts.g) : "%eax"
gcc_windows_amd64.c 57 :: "r"(ts.tls), "r"(ts.g) : "%rax"
  /prebuilts/go/linux-x86/src/runtime/cgo/
gcc_windows_386.c 57 :: "r"(ts.tls), "r"(ts.g) : "%eax"
gcc_windows_amd64.c 57 :: "r"(ts.tls), "r"(ts.g) : "%rax"
  /toolchain/binutils/binutils-2.27/gold/
tls.h 0 // tls.h -- Thread-Local Storage utility routines for gold -*- C++ -*-
32 namespace tls namespace in namespace:gold
46 // Check the range for a TLS relocation. This is inlined for efficiency.
59 _("TLS relocation out of range"));
62 // Check the validity of a TLS relocation. This is like assert.
73 _("TLS relocation against invalid instruction"));
77 } // End namespace tls.

Completed in 1837 milliseconds

1 2 3 4 5 6 78 91011>>