Home
last modified time | relevance | path

Searched refs:TLS (Results 1 – 25 of 158) sorted by relevance

1234567

/external/llvm/test/tools/llvm-readobj/
Dmips-got.test8 RUN: FileCheck %s -check-prefix GOT-TLS
58 GOT-EXE-NEXT: Number of TLS and multi-GOT entries: 0
175 GOT-SO-NEXT: Number of TLS and multi-GOT entries: 0
178 GOT-TLS: Primary GOT {
179 GOT-TLS-NEXT: Canonical gp value: 0x18BF0
180 GOT-TLS-NEXT: Reserved entries [
181 GOT-TLS-NEXT: Entry {
182 GOT-TLS-NEXT: Address: 0x10C00
183 GOT-TLS-NEXT: Access: -32752
184 GOT-TLS-NEXT: Initial: 0x0
[all …]
/external/wpa_supplicant_8/wpa_supplicant/
Deap_testing.txt56 EAP-TLS + + + + + + + + - - + +
61 EAP-PEAPv0/TLS + + - + + + F + - - + +
72 EAP-PEAPv1/TLS - - - + + +1 F +5 - - + +
87 EAP-TTLS/EAP-TLS + - +2 + F + + + - - + -
107 EAP-FAST/TLS(aprov) - - - - - - - - - - + +
112 EAP-FAST/TLS(auth) - - - - - - - - - - + +
145 - EAP-TLS
149 - EAP-PEAPv0 / TLS
153 - EAP-TTLS / EAP-TLS
163 - EAP-TLS
[all …]
Dwpa_supplicant.conf1187 eap=TLS
1301 eap=TLS
1435 eap=TTLS PEAP TLS
1449 eap=TLS
Dtodo.txt56 - make sure that TLS session cache is not shared between EAP types or if it
58 created with EAP-TLS must not be allowed to do fast re-auth with EAP-TTLS
67 - change TLS/crypto library interface to use a structure of function
69 requiring every TLS wrapper to implement all functions
73 - cleanup TLS/PEAP/TTLS/FAST fragmentation: both the handshake and Appl. Data
Dandroid.config81 # EAP-TLS
270 # Select TLS implementation
277 # TLS-based EAP methods require at least TLS v1.0. Newer version of TLS (v1.1)
279 # are used. It should be noted that some existing TLS v1.0 -based
280 # implementation may not be compatible with TLS v1.1 message (ClientHello is
284 # TLS-based EAP methods require at least TLS v1.0. Newer version of TLS (v1.2)
286 # noted that some existing TLS v1.0 -based implementation may not be compatible
287 # with TLS v1.2 message (ClientHello is sent prior to negotiating which version
335 # This means that EAP-TLS/PEAP/TTLS/FAST cannot be added as dynamic libraries
Ddefconfig93 # EAP-TLS
103 # Note: If OpenSSL is used as the TLS library, OpenSSL 1.0 or newer is needed
286 # Select TLS implementation
293 # TLS-based EAP methods require at least TLS v1.0. Newer version of TLS (v1.1)
295 # are used. It should be noted that some existing TLS v1.0 -based
296 # implementation may not be compatible with TLS v1.1 message (ClientHello is
300 # TLS-based EAP methods require at least TLS v1.0. Newer version of TLS (v1.2)
302 # noted that some existing TLS v1.0 -based implementation may not be compatible
303 # with TLS v1.2 message (ClientHello is sent prior to negotiating which version
351 # This means that EAP-TLS/PEAP/TTLS/FAST cannot be added as dynamic libraries
/external/llvm/lib/CodeGen/AsmPrinter/
DAddressPool.h25 bool TLS; member
26 AddressPoolEntry(unsigned Number, bool TLS) : Number(Number), TLS(TLS) {} in AddressPoolEntry()
41 unsigned getIndex(const MCSymbol *Sym, bool TLS = false);
DAddressPool.cpp19 unsigned AddressPool::getIndex(const MCSymbol *Sym, bool TLS) { in getIndex() argument
22 Pool.insert(std::make_pair(Sym, AddressPoolEntry(Pool.size(), TLS))); in getIndex()
39 I.second.TLS in emit()
/external/wpa_supplicant_8/hostapd/
Deap_testing.txt21 EAP-TLS + + +1 + +
25 EAP-PEAPv0/TLS + F - + +
35 EAP-PEAPv1/TLS + F - - +
49 EAP-TTLS/EAP-TLS + F - - -
63 EAP-FAST/TLS(aprov) + - - - -
68 EAP-FAST/TLS(auth) + - - - -
75 1) EAP-TLS itself worked, but peer certificate validation failed at
76 least when using the internal TLS server (peer included incorrect
Dhostapd.eap_user19 # EAP-TLS, EAP-PEAP, EAP-TTLS, EAP-FAST, EAP-SIM, and EAP-AKA do not use
27 # avoid having to configure every certificate for EAP-TLS authentication. The
61 "example user" TLS
72 "0"* AKA,TTLS,TLS,PEAP,SIM
73 "1"* SIM,TTLS,TLS,PEAP,AKA
74 "2"* AKA,TTLS,TLS,PEAP,SIM
75 "3"* SIM,TTLS,TLS,PEAP,AKA
76 "4"* AKA,TTLS,TLS,PEAP,SIM
77 "5"* SIM,TTLS,TLS,PEAP,AKA
83 * PEAP,TTLS,TLS,SIM,AKA
Ddefconfig65 # EAP-TLS for the integrated EAP server
108 # Note: If OpenSSL is used as the TLS library, OpenSSL 1.0 or newer is needed
243 # Select TLS implementation
250 # TLS-based EAP methods require at least TLS v1.0. Newer version of TLS (v1.1)
255 # TLS-based EAP methods require at least TLS v1.0. Newer version of TLS (v1.2)
/external/libvncserver/libvncserver/
Dzlib.c48 #if LIBVNCSERVER_HAVE_LIBPTHREAD && LIBVNCSERVER_HAVE_TLS && !defined(TLS) && defined(__linux__)
49 #define TLS __thread macro
51 #ifndef TLS
52 #define TLS macro
55 static TLS int zlibBeforeBufSize = 0;
56 static TLS char *zlibBeforeBuf = NULL;
58 static TLS int zlibAfterBufSize = 0;
59 static TLS char *zlibAfterBuf = NULL;
60 static TLS int zlibAfterBufLen = 0;
Dtight.c60 #if LIBVNCSERVER_HAVE_LIBPTHREAD && LIBVNCSERVER_HAVE_TLS && !defined(TLS) && defined(__linux__)
61 #define TLS __thread macro
63 #ifndef TLS
64 #define TLS macro
68 static TLS rfbBool usePixelFormat24 = FALSE;
109 static TLS int compressLevel = 1;
110 static TLS int qualityLevel = 95;
111 static TLS int subsampLevel = TJ_444;
138 static TLS int paletteNumColors = 0;
139 static TLS int paletteMaxColors = 0;
[all …]
/external/nist-sip/java/gov/nist/javax/sip/address/
DParameterNames.java47 public static final String TLS = GenericURI.TLS; field
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/
Dwpa_supplicant.conf.sgml45 EAP-TLS as work network.</para>
59 # work network; use EAP-TLS with WPA; allow only CCMP and TKIP ciphers
66 eap=TLS
100 within an encrypted TLS tunnel.</para>
122 (require both unicast and broadcast); use EAP-TLS for
131 eap=TLS
159 eap=TTLS PEAP TLS
203 certificates. EAP-TLS uses both server side and client
/external/llvm/test/CodeGen/SystemZ/
Dtls-05.ll1 ; Test general-dynamic TLS access optimizations.
3 ; If we access the same TLS variable twice, there should only be
Dtls-07.ll1 ; Test local-dynamic TLS access optimizations.
3 ; If we access two different local-dynamic TLS variables, we only
Dtls-06.ll1 ; Test general-dynamic TLS access optimizations.
3 ; If we access two different TLS variables, we need two calls to
Dtls-02.ll1 ; Test initial-exec TLS accesses.
7 ; The offset must be loaded from the GOT. This TLS access model does
Dtls-03.ll1 ; Test general-dynamic TLS accesses.
8 ; Call __tls_get_offset to retrieve the symbol's TLS offset.
Dtls-04.ll1 ; Test local-dynamic TLS accesses.
8 ; Call __tls_get_offset to retrieve the module's TLS base offset.
/external/llvm/test/CodeGen/PowerPC/
Dpr15359.ll15 ; Verify that nextIdx has symbol type TLS.
22 ; CHECK-NEXT: Type: TLS
/external/llvm/test/CodeGen/X86/
Dtls-addr-non-leaf-function.ll10 ; Now, 'foo' is not a leaf function, because it performs a TLS access which on
18 ; a TLS access pseudo-instruction is created, so 'foo' appears to be a non-leaf
26 ; ... and the TLS library call is also present.
Dtls-local-dynamic.ll28 ; This bb does not access TLS, so should not call __tls_get_addr.
49 ; This accesses TLS, but is dominated by the previous block,
/external/mdnsresponder/
DPrivateDNS.txt8 Security (TLS), ensuring that the data is hidden from prying eyes, and
13 TLS communication channel if the server has been configured appropriately.
29 opens a TLS connection to the server on the port specified in the SRV
35 When setting up a long-lived query over TCP (with or without TLS)
77 encrypted TLS channel. To accommodate service providers who don't want
78 to have to keep open a large number of TLS connections to a large number
79 of client machines, the server has the option of dropping the TLS
86 a protocol based on TLS that is capable of securing datagram traffic.
101 set is sent over TLS/TCP, but subsequent change events are sent over

1234567