/toolchain/binutils/binutils-2.27/ld/testsuite/ld-cris/ |
tls-local-64.d | 1 #source: tls-ie-8.s --pic 3 #source: tls-hx.s 24 ..: 00000080 +4 +TLS +LOCAL +DEFAULT +6 x
|
tls-local-54.d | 1 #source: tls-local-54.s 7 # Check that we have proper NPTL/TLS markings and GOT. 13 TLS off .*
|
tls-ok-30.d | 1 #source: tls-gdgotrelm.s --defsym r=8191
|
tls-ok-32.d | 1 #source: tls-dtprelm.s --defsym r=32767
|
/external/curl/docs/cmdline-opts/ |
tls-max.d | 1 Long: tls-max 6 Requires: TLS 10 VERSION defines maximum supported TLS version. A minimum is defined 15 Use up to recommended TLS version.
|
/external/llvm/test/MC/PowerPC/ |
ppc64-errors.s | 17 # TLS register operands 20 # CHECK-NEXT: add 3, symbol@tls, 4 21 add 3, symbol@tls, 4 24 # CHECK-NEXT: subf 3, 4, symbol@tls 25 subf 3, 4, symbol@tls
|
/toolchain/binutils/binutils-2.27/gas/testsuite/gas/arm/ |
tls_vxworks.d | 2 #name: TLS 6 #source: tls.s 9 # Test generation of TLS relocations
|
/toolchain/binutils/binutils-2.27/ld/testsuite/ld-aarch64/ |
tls-large-ie-be.d | 1 #source: tls-large-ie.s
|
tls-large-ie.d | 1 #source: tls-large-ie.s
|
tls-tiny-gd.d | 1 #source: tls-tiny-gd.s
|
/toolchain/binutils/binutils-2.27/ld/testsuite/ld-arm/ |
tls-gdierelax.d | 2 tmpdir/tls-app-rel-ie: file format elf32-.*arm.*
|
arm-elf.exp | 108 {"TLS shared library" "-shared -T arm-lib.ld" "" "" {tls-lib.s} 109 {{objdump -fdw tls-lib.d} {objdump -Rw tls-lib.r}} 110 "tls-lib.so"} 111 {"TLS dynamic application" "-T arm-dyn.ld tmpdir/tls-lib.so" "" "" {tls-app.s} 112 {{objdump -fdw tls-app.d} {objdump -Rw tls-app.r} [all...] |
/toolchain/binutils/binutils-2.27/ld/testsuite/ld-frv/ |
tls-relax-static-3.d | 1 #name: FRV TLS undefweak relocs, static linking with relaxation 2 #source: tls-3.s
|
/external/scapy/scapy/layers/tls/ |
record_tls13.py | 6 Common TLS 1.3 fields & bindings. 11 See the TLS class documentation for more information. 20 from scapy.layers.tls.session import _GenericTLSSessionInheritance 21 from scapy.layers.tls.basefields import (_TLSVersionField, _tls_version, 23 from scapy.layers.tls.record import _TLSMsgListField 24 from scapy.layers.tls.crypto.cipher_aead import AEADTagError 25 from scapy.layers.tls.crypto.cipher_stream import Cipher_NULL 26 from scapy.layers.tls.crypto.ciphers import CipherError 30 ### TLS Record Protocol ### 34 name = "TLS Inner Plaintext [all...] |
automaton.py | 7 The _TLSAutomaton class provides methods common to both TLS client and server. 15 from scapy.layers.tls.basefields import _tls_type 16 from scapy.layers.tls.cert import Cert, PrivKey 17 from scapy.layers.tls.record import TLS 18 from scapy.layers.tls.record_sslv2 import SSLv2 19 from scapy.layers.tls.record_tls13 import TLS13 24 SSLv3 and TLS 1.0-1.2 typically need a 2-RTT handshake: 48 accross TLS records and TCP packets. This is why we use a 'get_next_msg' 50 which has not yet been interpreted as a TLS record is kept in 'remain_in' [all...] |
record.py | 7 Common TLS fields & bindings. 12 See the TLS class documentation for more information. 23 from scapy.layers.tls.session import _GenericTLSSessionInheritance 24 from scapy.layers.tls.handshake import (_tls_handshake_cls, _TLSHandshake, 26 from scapy.layers.tls.basefields import (_TLSVersionField, _tls_version, 30 from scapy.layers.tls.crypto.pkcs1 import randstring, pkcs_i2osp 31 from scapy.layers.tls.crypto.compression import Comp_NULL 32 from scapy.layers.tls.crypto.cipher_aead import AEADTagError 34 from scapy.layers.tls.crypto.cipher_aead import Cipher_CHACHA20_POLY1305 35 from scapy.layers.tls.crypto.cipher_stream import Cipher_NUL [all...] |
/frameworks/native/opengl/libs/EGL/ |
getProcAddress.cpp | 46 "ldr r12, [r12, %[tls]] \n" \ 54 : [tls] "J"(TLS_SLOT_OPENGL_API*4), \ 68 "ldr x16, [x16, %[tls]]\n" \ 75 : [tls] "i" (TLS_SLOT_OPENGL_API * sizeof(void*)), \ 88 "mov %P[tls](%%eax), %%eax\n" \ 96 : [tls] "i" (TLS_SLOT_OPENGL_API*sizeof(void*)), \ 109 "mov %P[tls](%%rax), %%rax\n" \ 117 : [tls] "i" (TLS_SLOT_OPENGL_API*sizeof(void*)), \ 134 "rdhwr %[tls], $29\n\t" \ 135 "ld %[t0], %[OPENGL_API](%[tls])\n\t" [all...] |
/prebuilts/go/darwin-x86/src/crypto/tls/ |
alert.go | 5 package tls package 74 return "tls: " + s 76 return "tls: alert(" + strconv.Itoa(int(e)) + ")"
|
/prebuilts/go/linux-x86/src/crypto/tls/ |
alert.go | 5 package tls package 74 return "tls: " + s 76 return "tls: alert(" + strconv.Itoa(int(e)) + ")"
|
/external/boringssl/src/ssl/test/runner/ |
tls.go | 5 // Package tls partially implements TLS 1.2, as specified in RFC 5246. 24 // Server returns a new TLS server side connection 34 // Client returns a new TLS client side connection 44 // A listener implements a network listener (net.Listener) for TLS connections. 50 // Accept waits for and returns the next incoming TLS connection. 51 // The returned connection c is a *tls.Conn. 72 // Listen creates a TLS listener accepting connections on the 78 return nil, errors.New("tls.Listen: no certificates in configuration") 89 func (timeoutError) Error() string { return "tls: DialWithDialer timed out" [all...] |
/toolchain/binutils/binutils-2.27/gold/ |
i386.cc | 40 #include "tls.h" 349 // TLS info comes from 350 // http://people.redhat.com/drepper/tls.pdf 351 // http://www.lsd.ic.unicamp.br/~oliva/writeups/TLS/RFC-TLSDESC-x86.txt 639 gold_error(_("missing expected TLS relocation")); 660 // Do a TLS relocation. 669 // Do a TLS General-Dynamic to Initial-Exec transition. 677 // Do a TLS General-Dynamic to Local-Exec transition. 705 // Do a TLS Local-Dynamic to Local-Exec transition. 714 // Do a TLS Initial-Exec to Local-Exec transition [all...] |
x86_64.cc | 40 #include "tls.h" 436 // TLS info comes from 437 // http://people.redhat.com/drepper/tls.pdf 438 // http://www.lsd.ic.unicamp.br/~oliva/writeups/TLS/RFC-TLSDESC-x86.txt 869 gold_error(_("missing expected TLS relocation")); 883 // Do a TLS relocation. 892 // Do a TLS General-Dynamic to Initial-Exec transition. 901 // Do a TLS General-Dynamic to Local-Exec transition. 928 // Do a TLS Local-Dynamic to Local-Exec transition. 937 // Do a TLS Initial-Exec to Local-Exec transition [all...] |
/toolchain/binutils/binutils-2.27/ld/testsuite/ld-mips-elf/ |
mips-elf.exp | 633 {"Static executable with TLS" "-static -melf32btsmip -T mips-dyn.ld" "" 636 "tls-static-o32"} 637 {"Shared library with TLS" "-shared -melf32btsmip -T mips-lib.ld" "" 641 {"Dynamic executable with TLS" 645 "tls-dynamic-o32"} 646 {"Shared library with multiple GOTs and TLS" 648 "-EB -march=mips1 -32 -KPIC" {tls-multi-got-1-1.s tls-multi-got-1-2.s} 649 {{readelf {-d -r} tls-multi-got-1.r} 650 {objdump {-dr -m mips:isa32r2} tls-multi-got-1.d [all...] |
/external/libcups/cups/ |
tls-darwin.c | 2 * TLS support code for CUPS on macOS. 16 /**** This file is included from tls.c ****/ 56 static int tls_options = -1;/* Options for TLS connections */ 447 if (!http || !http->tls || !credentials) 450 if (!(error = SSLCopyPeerTrust(http->tls, &peerTrust)) && peerTrust) 1059 * '_httpTLSInitialize()' - Initialize the TLS stack. 1072 * '_httpTLSPending()' - Return the number of pending TLS-encrypted bytes. 1081 if (!SSLGetBufferedReadSize(http->tls, &bytes)) 1089 * '_httpTLSRead()' - Read from a SSL/TLS connection. 1102 error = SSLRead(http->tls, buf, (size_t)len, &processed) [all...] |
/prebuilts/go/darwin-x86/src/net/http/httptest/ |
httptest.go | 11 "crypto/tls" 25 // The TLS field is set to a non-nil dummy value if target has scheme 83 req.TLS = &tls.ConnectionState{ 84 Version: tls.VersionTLS12,
|