| /src/external/bsd/openldap/dist/contrib/ldapc++/examples/ |
| startTls.cpp | 20 TlsOptions tls; local 22 std::cout << " CaCertfile: " << tls.getStringOption( TlsOptions::CACERTFILE) << std::endl; 23 std::cout << " CaCertDir: " << tls.getStringOption( TlsOptions::CACERTDIR ) << std::endl; 24 std::cout << " Require Cert: " << tls.getIntOption( TlsOptions::REQUIRE_CERT ) << std::endl; 26 tls.setOption( TlsOptions::CACERTFILE, cacert ); 27 tls.setOption( TlsOptions::REQUIRE_CERT, TlsOptions::DEMAND ); 28 std::cout << " CaCertfile: " << tls.getStringOption( TlsOptions::CACERTFILE ) << std::endl; 29 std::cout << " Require Cert: " << tls.getIntOption( TlsOptions::REQUIRE_CERT ) << std::endl; 44 tls=l1.getTlsOptions(); 46 std::cout << " CaCertfile: " << tls.getStringOption( TlsOptions::CACERTFILE) << std::endl [all...] |
| /src/external/mpl/bind/dist/bin/tests/system/isctest/ |
| query.py | 39 if query_func.__name__ == "tls": 51 if query_func.__name__ == "tls": 95 def tls(*args, **kwargs) -> Any: function 97 return generic_query(dns.query.tls, *args, **kwargs) 100 "dnspython 2.5.0 or newer is required for isctest.query.tls()"
|
| /src/external/gpl3/gdb/dist/gdb/ |
| arm-fbsd-nat.c | 93 bool tls = false; local 99 tls = have_regset (inferior_ptid, NT_ARM_TLS) != 0; 101 desc = arm_fbsd_read_description_auxv (tls);
|
| aarch64-fbsd-tdep.c | 190 cb (".reg-aarch-tls", AARCH64_FBSD_SIZEOF_TLSREGSET, 192 "TLS register", cb_data); 201 asection *tls = bfd_get_section_by_name (abfd, ".reg-aarch-tls"); local 204 features.tls = tls != nullptr? 1 : 0;
|
| arm-fbsd-tdep.c | 203 cb (".reg-aarch-tls", ARM_FBSD_SIZEOF_TLSREGSET, ARM_FBSD_SIZEOF_TLSREGSET, 218 target_ops *target, gdbarch *gdbarch, bool tls) 225 return arm_read_description (ARM_FP_TYPE_NONE, tls); 230 return aarch32_read_description (tls); 233 return arm_read_description (ARM_FP_TYPE_VFPV3, tls); 235 return arm_read_description (ARM_FP_TYPE_VFPV2, tls); 238 return arm_read_description (ARM_FP_TYPE_NONE, tls); 244 arm_fbsd_read_description_auxv (bool tls) 250 tls); 260 asection *tls = bfd_get_section_by_name (abfd, ".reg-aarch-tls") local [all...] |
| /src/external/gpl3/gdb.old/dist/gdb/ |
| arm-fbsd-nat.c | 93 bool tls = false; local 99 tls = have_regset (inferior_ptid, NT_ARM_TLS) != 0; 101 desc = arm_fbsd_read_description_auxv (tls);
|
| aarch64-fbsd-tdep.c | 190 cb (".reg-aarch-tls", AARCH64_FBSD_SIZEOF_TLSREGSET, 192 "TLS register", cb_data); 201 asection *tls = bfd_get_section_by_name (abfd, ".reg-aarch-tls"); local 204 features.tls = tls != nullptr? 1 : 0;
|
| arm-fbsd-tdep.c | 203 cb (".reg-aarch-tls", ARM_FBSD_SIZEOF_TLSREGSET, ARM_FBSD_SIZEOF_TLSREGSET, 218 target_ops *target, gdbarch *gdbarch, bool tls) 225 return arm_read_description (ARM_FP_TYPE_NONE, tls); 230 return aarch32_read_description (tls); 233 return arm_read_description (ARM_FP_TYPE_VFPV3, tls); 235 return arm_read_description (ARM_FP_TYPE_VFPV2, tls); 238 return arm_read_description (ARM_FP_TYPE_NONE, tls); 244 arm_fbsd_read_description_auxv (bool tls) 250 tls); 260 asection *tls = bfd_get_section_by_name (abfd, ".reg-aarch-tls") local [all...] |
| /src/external/mpl/bind/dist/bin/named/ |
| transportconf.c | 144 const cfg_obj_t *tls = NULL; local 154 tls = cfg_listelt_value(element); 155 tlsid = cfg_obj_asstring(cfg_map_getname(tls)); 167 parse_transport_option(tls, transport, "key-file", 169 parse_transport_option(tls, transport, "cert-file", 171 parse_transport_tls_versions(tls, transport, "protocols", 173 parse_transport_option(tls, transport, "ciphers", 175 parse_transport_option(tls, transport, "cipher-suites", 178 tls, transport, "prefer-server-ciphers", 180 parse_transport_option(tls, transport, "ca-file" [all...] |
| /src/external/apache2/mDNSResponder/dist/mDNSPosix/ |
| mbedtls.c | 16 * This file contains a TLS Shim that allows mDNSPosix to use mbedtls to do TLS session 17 * establishment and also to accept TLS connections. 46 // Posix TLS server context 58 // Context that is shared amongs all TLS connections, regardless of which server cert/key is in use. 79 mDNSPosixTLSContextFree(TLSContext *tls) 81 mbedtls_ssl_free(&tls->context); 82 mDNSPlatformMemFree(tls); 89 TLSContext *tls; local 102 tls = mDNSPlatformMemAllocateClear(sizeof(*tls)) 181 TLSContext *tls = mDNSPlatformMemAllocateClear(sizeof(*tls)); local [all...] |
| mDNSPosix.h | 97 TLSContext *tls; member in struct:TCPSocket_struct 111 TLSServerContext *tls; member in struct:TCPListener_struct 141 // From the TLS shim: 143 extern void mDNSPosixTLSContextFree(TLSContext *tls);
|
| /src/external/gpl3/gcc/dist/libsanitizer/lsan/ |
| lsan_common_fuchsia.cpp | 107 // can all be excluded from the reported TLS ranges. 113 // Callback from libc for TLS regions. This includes thread_local 115 auto tls = +[](void *chunk, size_t size, void *data) { local 126 ¶ms->argument->frontier, "TLS", kReachable); 128 ScanRangeForPointers(begin2, end, ¶ms->argument->frontier, "TLS", 131 ScanRangeForPointers(begin, end, ¶ms->argument->frontier, "TLS", 142 flags()->use_tls ? tls : nullptr, 147 // and their stacks, registers, and TLS regions. So use it separately
|
| /src/external/gpl3/gcc.old/dist/libsanitizer/lsan/ |
| lsan_common_fuchsia.cpp | 98 // can all be excluded from the reported TLS ranges. 104 // Callback from libc for TLS regions. This includes thread_local 106 auto tls = +[](void *chunk, size_t size, void *data) { local 116 ¶ms->argument->frontier, "TLS", kReachable); 118 ScanRangeForPointers(begin2, end, ¶ms->argument->frontier, "TLS", 121 ScanRangeForPointers(begin, end, ¶ms->argument->frontier, "TLS", 132 flags()->use_tls ? tls : nullptr, 137 // and their stacks, registers, and TLS regions. So use it separately
|
| /src/crypto/external/apache2/openssl/dist/include/internal/ |
| quic_channel.h | 122 SSL *tls; member in struct:quic_channel_args_st 317 /* Gets the TLS handshake layer used with the channel. */
|
| /src/external/bsd/ntp/dist/libparse/ |
| clk_trimtsip.c | 351 int tls = t->t_gpsutc = (u_short) getshort((unsigned char *)&mb(12)); /* current leap correction (GPS-UTC) */ local 368 (tlsf != tls) && /* something will change */ 372 if (tlsf > tls)
|
| /src/external/ibm-public/postfix/dist/src/smtp/ |
| smtp_session.c | 42 /* TLS context) so that it can be cached. The SMTP_SESSION 119 /* TLS Library. */ 275 * the TLS level, reuse count, and connection expiration time. 290 session->state->tls->level), 301 * Append the passivated TLS context. These memory writes should never 312 msg_fatal("smtp_session_passivate: cannot save TLS context: %m"); 342 SMTP_TLS_POLICY *tls = iter->parent->tls; local 358 * Sanity check: if TLS is required, the cached properties must contain a 359 * TLS context [all...] |
| smtp_tlsrpt.c | 32 /* object is passed to a TLS protocol engine, which may run in a 33 /* different process than the SMTP protocol engine. The TLS protocol 34 /* engine uses the TLSRPT_WRAPPER object to report a TLS handshake 36 /* object to report a TLS handshake error or success. 61 /* object with DANE or STS TLS policy information, and clears 73 /* tlsrpt_wrapper(3) TLSRPT support for the TLS protocol engine. 105 * TLS library. 107 #include <tls.h> 284 TLS_DANE *dane = state->tls->dane; 305 SMTP_TLS_POLICY *tls = state->tls local 339 SMTP_TLS_POLICY *tls = state->tls; local [all...] |
| /src/sys/compat/linux/common/ |
| linux_sched.c | 105 syscallarg(void *) tls; 243 SCARG(&clone_args, tls) = 244 (void *)(intptr_t)cl_args.tls; 258 syscallarg(void *) tls; 264 void *parent_tidptr, *tls, *child_tidptr; local 272 tls = SCARG(uap, tls); 313 error = LINUX_LWP_SETPRIVATE(l2, tls);
|
| /src/crypto/external/apache2/openssl/dist/ssl/quic/ |
| quic_local.h | 121 SSL *tls; member in struct:quic_conn_st
|
| quic_tserver.c | 40 /* SSL_CTX for creating the underlying TLS connection */ 43 /* SSL for the underlying TLS connection */ 44 SSL *tls; member in struct:quic_tserver_st 116 srv->tls = SSL_new(srv->ctx); 117 if (srv->tls == NULL) 136 if ((srv->ch = ossl_quic_port_create_incoming(srv->port, srv->tls)) == NULL) 156 SSL_free(srv->tls); 175 SSL_free(srv->tls); 566 SSL_set_msg_callback(srv->tls, f); 567 SSL_set_msg_callback_arg(srv->tls, arg) [all...] |
| /src/crypto/external/bsd/openssh/dist/ |
| ldapauth.h | 100 int tls; /* TLS only */ member in struct:ldap_options
|
| /src/external/bsd/nsd/dist/ |
| query.h | 84 * TLS objects. 86 SSL* tls; member in struct:query
|
| /src/external/bsd/wpa/dist/src/radius/ |
| radius_client.h | 39 * tls - Whether to use RADIUS/TLS instead of RADIUS/UDP 41 bool tls; member in struct:hostapd_radius_server 54 * ca_cert - Path to trusted CA certificate(s) for RADIUS/TLS 59 * client_cert - Path to client certificate for RADIUS/TLS 64 * private_key - Path to clienbt private key for RADIUS/TLS 69 * private_key_passwd - Password for the private key for RADIUS/TLS
|
| /src/external/gpl3/gdb/dist/gdb/arch/ |
| aarch64.h | 38 /* A positive TLS value indicates the number of TLS registers available. */ 39 uint8_t tls = 0; member in struct:aarch64_features 61 && lhs.tls == rhs.tls 79 if more TLS registers get added. */ 80 h = h << 2 | features.tls;
|
| /src/external/gpl3/gdb.old/dist/gdb/arch/ |
| aarch64.h | 38 /* A positive TLS value indicates the number of TLS registers available. */ 39 uint8_t tls = 0; member in struct:aarch64_features 61 && lhs.tls == rhs.tls 79 if more TLS registers get added. */ 80 h = h << 2 | features.tls;
|