/external/llvm/test/tools/llvm-readobj/ |
D | mips-got.test | 8 RUN: FileCheck %s -check-prefix GOT-TLS 58 GOT-EXE-NEXT: Number of TLS and multi-GOT entries: 0 175 GOT-SO-NEXT: Number of TLS and multi-GOT entries: 0 178 GOT-TLS: Primary GOT { 179 GOT-TLS-NEXT: Canonical gp value: 0x18BF0 180 GOT-TLS-NEXT: Reserved entries [ 181 GOT-TLS-NEXT: Entry { 182 GOT-TLS-NEXT: Address: 0x10C00 183 GOT-TLS-NEXT: Access: -32752 184 GOT-TLS-NEXT: Initial: 0x0 [all …]
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | eap_testing.txt | 56 EAP-TLS + + + + + + + + - - + + 61 EAP-PEAPv0/TLS + + - + + + F + - - + + 72 EAP-PEAPv1/TLS - - - + + +1 F +5 - - + + 87 EAP-TTLS/EAP-TLS + - +2 + F + + + - - + - 107 EAP-FAST/TLS(aprov) - - - - - - - - - - + + 112 EAP-FAST/TLS(auth) - - - - - - - - - - + + 145 - EAP-TLS 149 - EAP-PEAPv0 / TLS 153 - EAP-TTLS / EAP-TLS 163 - EAP-TLS [all …]
|
D | wpa_supplicant.conf | 1187 eap=TLS 1301 eap=TLS 1435 eap=TTLS PEAP TLS 1449 eap=TLS
|
D | todo.txt | 56 - make sure that TLS session cache is not shared between EAP types or if it 58 created with EAP-TLS must not be allowed to do fast re-auth with EAP-TTLS 67 - change TLS/crypto library interface to use a structure of function 69 requiring every TLS wrapper to implement all functions 73 - cleanup TLS/PEAP/TTLS/FAST fragmentation: both the handshake and Appl. Data
|
D | android.config | 81 # EAP-TLS 270 # Select TLS implementation 277 # TLS-based EAP methods require at least TLS v1.0. Newer version of TLS (v1.1) 279 # are used. It should be noted that some existing TLS v1.0 -based 280 # implementation may not be compatible with TLS v1.1 message (ClientHello is 284 # TLS-based EAP methods require at least TLS v1.0. Newer version of TLS (v1.2) 286 # noted that some existing TLS v1.0 -based implementation may not be compatible 287 # with TLS v1.2 message (ClientHello is sent prior to negotiating which version 335 # This means that EAP-TLS/PEAP/TTLS/FAST cannot be added as dynamic libraries
|
D | defconfig | 93 # EAP-TLS 103 # Note: If OpenSSL is used as the TLS library, OpenSSL 1.0 or newer is needed 286 # Select TLS implementation 293 # TLS-based EAP methods require at least TLS v1.0. Newer version of TLS (v1.1) 295 # are used. It should be noted that some existing TLS v1.0 -based 296 # implementation may not be compatible with TLS v1.1 message (ClientHello is 300 # TLS-based EAP methods require at least TLS v1.0. Newer version of TLS (v1.2) 302 # noted that some existing TLS v1.0 -based implementation may not be compatible 303 # with TLS v1.2 message (ClientHello is sent prior to negotiating which version 351 # This means that EAP-TLS/PEAP/TTLS/FAST cannot be added as dynamic libraries
|
/external/llvm/lib/CodeGen/AsmPrinter/ |
D | AddressPool.h | 25 bool TLS; member 26 AddressPoolEntry(unsigned Number, bool TLS) : Number(Number), TLS(TLS) {} in AddressPoolEntry() 41 unsigned getIndex(const MCSymbol *Sym, bool TLS = false);
|
D | AddressPool.cpp | 19 unsigned AddressPool::getIndex(const MCSymbol *Sym, bool TLS) { in getIndex() argument 22 Pool.insert(std::make_pair(Sym, AddressPoolEntry(Pool.size(), TLS))); in getIndex() 39 I.second.TLS in emit()
|
/external/wpa_supplicant_8/hostapd/ |
D | eap_testing.txt | 21 EAP-TLS + + +1 + + 25 EAP-PEAPv0/TLS + F - + + 35 EAP-PEAPv1/TLS + F - - + 49 EAP-TTLS/EAP-TLS + F - - - 63 EAP-FAST/TLS(aprov) + - - - - 68 EAP-FAST/TLS(auth) + - - - - 75 1) EAP-TLS itself worked, but peer certificate validation failed at 76 least when using the internal TLS server (peer included incorrect
|
D | hostapd.eap_user | 19 # EAP-TLS, EAP-PEAP, EAP-TTLS, EAP-FAST, EAP-SIM, and EAP-AKA do not use 27 # avoid having to configure every certificate for EAP-TLS authentication. The 61 "example user" TLS 72 "0"* AKA,TTLS,TLS,PEAP,SIM 73 "1"* SIM,TTLS,TLS,PEAP,AKA 74 "2"* AKA,TTLS,TLS,PEAP,SIM 75 "3"* SIM,TTLS,TLS,PEAP,AKA 76 "4"* AKA,TTLS,TLS,PEAP,SIM 77 "5"* SIM,TTLS,TLS,PEAP,AKA 83 * PEAP,TTLS,TLS,SIM,AKA
|
D | defconfig | 65 # EAP-TLS for the integrated EAP server 108 # Note: If OpenSSL is used as the TLS library, OpenSSL 1.0 or newer is needed 243 # Select TLS implementation 250 # TLS-based EAP methods require at least TLS v1.0. Newer version of TLS (v1.1) 255 # TLS-based EAP methods require at least TLS v1.0. Newer version of TLS (v1.2)
|
/external/libvncserver/libvncserver/ |
D | zlib.c | 48 #if LIBVNCSERVER_HAVE_LIBPTHREAD && LIBVNCSERVER_HAVE_TLS && !defined(TLS) && defined(__linux__) 49 #define TLS __thread macro 51 #ifndef TLS 52 #define TLS macro 55 static TLS int zlibBeforeBufSize = 0; 56 static TLS char *zlibBeforeBuf = NULL; 58 static TLS int zlibAfterBufSize = 0; 59 static TLS char *zlibAfterBuf = NULL; 60 static TLS int zlibAfterBufLen = 0;
|
D | tight.c | 60 #if LIBVNCSERVER_HAVE_LIBPTHREAD && LIBVNCSERVER_HAVE_TLS && !defined(TLS) && defined(__linux__) 61 #define TLS __thread macro 63 #ifndef TLS 64 #define TLS macro 68 static TLS rfbBool usePixelFormat24 = FALSE; 109 static TLS int compressLevel = 1; 110 static TLS int qualityLevel = 95; 111 static TLS int subsampLevel = TJ_444; 138 static TLS int paletteNumColors = 0; 139 static TLS int paletteMaxColors = 0; [all …]
|
/external/nist-sip/java/gov/nist/javax/sip/address/ |
D | ParameterNames.java | 47 public static final String TLS = GenericURI.TLS; field
|
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/ |
D | wpa_supplicant.conf.sgml | 45 EAP-TLS as work network.</para> 59 # work network; use EAP-TLS with WPA; allow only CCMP and TKIP ciphers 66 eap=TLS 100 within an encrypted TLS tunnel.</para> 122 (require both unicast and broadcast); use EAP-TLS for 131 eap=TLS 159 eap=TTLS PEAP TLS 203 certificates. EAP-TLS uses both server side and client
|
/external/llvm/test/CodeGen/SystemZ/ |
D | tls-05.ll | 1 ; Test general-dynamic TLS access optimizations. 3 ; If we access the same TLS variable twice, there should only be
|
D | tls-07.ll | 1 ; Test local-dynamic TLS access optimizations. 3 ; If we access two different local-dynamic TLS variables, we only
|
D | tls-06.ll | 1 ; Test general-dynamic TLS access optimizations. 3 ; If we access two different TLS variables, we need two calls to
|
D | tls-02.ll | 1 ; Test initial-exec TLS accesses. 7 ; The offset must be loaded from the GOT. This TLS access model does
|
D | tls-03.ll | 1 ; Test general-dynamic TLS accesses. 8 ; Call __tls_get_offset to retrieve the symbol's TLS offset.
|
D | tls-04.ll | 1 ; Test local-dynamic TLS accesses. 8 ; Call __tls_get_offset to retrieve the module's TLS base offset.
|
/external/llvm/test/CodeGen/PowerPC/ |
D | pr15359.ll | 15 ; Verify that nextIdx has symbol type TLS. 22 ; CHECK-NEXT: Type: TLS
|
/external/llvm/test/CodeGen/X86/ |
D | tls-addr-non-leaf-function.ll | 10 ; Now, 'foo' is not a leaf function, because it performs a TLS access which on 18 ; a TLS access pseudo-instruction is created, so 'foo' appears to be a non-leaf 26 ; ... and the TLS library call is also present.
|
D | tls-local-dynamic.ll | 28 ; This bb does not access TLS, so should not call __tls_get_addr. 49 ; This accesses TLS, but is dominated by the previous block,
|
/external/mdnsresponder/ |
D | PrivateDNS.txt | 8 Security (TLS), ensuring that the data is hidden from prying eyes, and 13 TLS communication channel if the server has been configured appropriately. 29 opens a TLS connection to the server on the port specified in the SRV 35 When setting up a long-lived query over TCP (with or without TLS) 77 encrypted TLS channel. To accommodate service providers who don't want 78 to have to keep open a large number of TLS connections to a large number 79 of client machines, the server has the option of dropping the TLS 86 a protocol based on TLS that is capable of securing datagram traffic. 101 set is sent over TLS/TCP, but subsequent change events are sent over
|