/aosp12/bionic/docs/ |
H A D | elf-tls.md | 1 # Android ELF TLS (Draft) 23 TLS Block". TLS variables within the Static TLS Block exist at fixed offsets from an 105 module's TLS block. Before it can do this, it ensures that the module's TLS block is allocated. A 207 # Shared Objects with Static TLS 218 Neither musl nor the Bionic TLS prototype currently allocate any surplus TLS memory. 230 # TLS Descriptors (TLSDESC) 500 * `dlsym` of a TLS variable 516 ## TLS Allocator 563 solib's TLS variables. Drepper makes this argument in his TLS document: 575 ## ELF TLS Not Usable in libc [all …]
|
/aosp12/frameworks/base/core/java/org/apache/http/conn/ssl/ |
H A D | SSLSocketFactory.java | 149 public static final String TLS = "TLS"; field in SSLSocketFactory 201 algorithm = TLS; in SSLSocketFactory() 223 this(TLS, keystore, keystorePassword, truststore, null, null); in SSLSocketFactory() 229 this(TLS, keystore, keystorePassword, null, null, null); in SSLSocketFactory() 235 this(TLS, null, null, truststore, null, null); in SSLSocketFactory()
|
/aosp12/packages/modules/DnsResolver/tests/ |
H A D | resolv_gold_test.cpp | 47 enum class DnsProtocol { CLEARTEXT, TLS }; enumerator 169 return protocol == DnsProtocol::TLS ? kNetcontextTls : kNetcontext; in GetNetContext() 248 if (protocol == DnsProtocol::TLS) EXPECT_TRUE(tls.waitForQueries(queries)); in VerifyResolver() 413 ::testing::Combine(::testing::Values(DnsProtocol::TLS), 423 ::testing::Combine(::testing::Values(DnsProtocol::TLS), 439 } else if (protocol == DnsProtocol::TLS) { in TEST_P()
|
/aosp12/packages/modules/Wifi/framework/tests/src/android/net/wifi/ |
H A D | WifiNetworkSpecifierTest.java | 116 enterpriseConfig.setEapMethod(WifiEnterpriseConfig.Eap.TLS); in testWifiNetworkSpecifierBuilderForWpa2EapHiddenNetworkWithSsidAndBssid() 153 enterpriseConfig.setEapMethod(WifiEnterpriseConfig.Eap.TLS); in testWifiNetworkSpecifierBuilderForWpa3EapNetwork() 187 enterpriseConfig.setEapMethod(WifiEnterpriseConfig.Eap.TLS); in testWifiNetworkSpecifierBuilderForWpa3EapNetworkWithStandardApi() 222 enterpriseConfig.setEapMethod(WifiEnterpriseConfig.Eap.TLS); in testWifiNetworkSpecifierBuilderForWpa3EapNetworkWithSuiteBRsaCerts() 260 enterpriseConfig.setEapMethod(WifiEnterpriseConfig.Eap.TLS); in testWifiNetworkSpecifierBuilderForWpa3EapNetworkWithSuiteBEccCerts() 296 enterpriseConfig.setEapMethod(WifiEnterpriseConfig.Eap.TLS); in testWifiNetworkSpecifierBuilderForWpa3SuiteBRsaEapNetwork() 330 enterpriseConfig.setEapMethod(WifiEnterpriseConfig.Eap.TLS); in testWifiNetworkSpecifierBuilderForWpa3SuiteBEccEapNetwork() 365 enterpriseConfig.setEapMethod(WifiEnterpriseConfig.Eap.TLS); in testWifiNetworkSpecifierBuilderForWpa3SuiteBRsaEapNetworkWith192BitApi() 400 enterpriseConfig.setEapMethod(WifiEnterpriseConfig.Eap.TLS); in testWifiNetworkSpecifierBuilderForWpa3SuiteBEccEapNetworkWith192BitApi()
|
H A D | WifiNetworkSuggestionTest.java | 285 enterpriseConfig.setEapMethod(WifiEnterpriseConfig.Eap.TLS); in testWifiNetworkSuggestionBuilderForWpa3EapNetwork() 320 enterpriseConfig.setEapMethod(WifiEnterpriseConfig.Eap.TLS); in testWifiNetworkSuggestionBuilderForWpa3EapNetworkWithStandardApi() 356 enterpriseConfig.setEapMethod(WifiEnterpriseConfig.Eap.TLS); in testWifiNetworkSuggestionBuilderForWpa3EapNetworkWithSuiteBRsaCerts() 395 enterpriseConfig.setEapMethod(WifiEnterpriseConfig.Eap.TLS); in testWifiNetworkSuggestionBuilderForWpa3EapNetworkWithSuiteBEccCerts() 432 enterpriseConfig.setEapMethod(WifiEnterpriseConfig.Eap.TLS); in testWifiNetworkSuggestionBuilderForWpa3SuiteBRsaEapNetwork() 468 enterpriseConfig.setEapMethod(WifiEnterpriseConfig.Eap.TLS); in testWifiNetworkSuggestionBuilderForWpa3SuiteBRsaEapNetworWith192BitApi() 503 enterpriseConfig.setEapMethod(WifiEnterpriseConfig.Eap.TLS); in testWifiNetworkSuggestionBuilderForWpa3SuiteBEccEapNetwork() 539 enterpriseConfig.setEapMethod(WifiEnterpriseConfig.Eap.TLS); in testWifiNetworkSuggestionBuilderForWpa3SuiteBEccEapNetworkWith192BitApi() 574 enterpriseConfig.setEapMethod(WifiEnterpriseConfig.Eap.TLS); in testWifiNetworkSuggestionBuilderForEapNetworkWithoutCa() 592 enterpriseConfig.setEapMethod(WifiEnterpriseConfig.Eap.TLS); in testWifiNetworkSuggestionBuilderForEapNetworkWithoutMatch() [all …]
|
H A D | WifiEnterpriseConfigTest.java | 279 mEnterpriseConfig.setEapMethod(Eap.TLS); in eapPhase2MethodForTls() 593 testIsEnterpriseConfigServerCertEnabled(Eap.TLS); in testIsEnterpriseConfigServerCertEnabledWithTls()
|
/aosp12/system/memory/libmeminfo/testdata1/ |
H A D | smaps | 12049 Name: [anon:bionic TLS] 12396 Name: [anon:bionic TLS] 12539 Name: [anon:bionic TLS] 14011 Name: [anon:bionic TLS] 14137 Name: [anon:bionic TLS] 14528 Name: [anon:bionic TLS] 14875 Name: [anon:bionic TLS] 15429 Name: [anon:bionic TLS] 15471 Name: [anon:bionic TLS] 15576 Name: [anon:bionic TLS] [all …]
|
/aosp12/packages/modules/DnsResolver/ |
H A D | README-DoT.md | 1 # DNS-over-TLS query forwarder design 5 The DNS-over-TLS query forwarder consists of five classes: 26 `DnsTlsSessionCache` allows TLS session resumption. 123 run without actually connecting over TLS to a test server. (The integration tests 124 do actual TLS.)
|
/aosp12/frameworks/compile/mclinker/include/mcld/LD/ |
H A D | DiagRelocations.inc | 55 "TLS relocation against invalid symbol `%0' in section `%1'", 56 "TLS relocation against invalid symbol `%0' in section `%1'")
|
/aosp12/system/libprocinfo/testdata/ |
H A D | maps | 728 70629c0000-70629c3000 rw-p 00000000 00:00 0 [anon:bionic TLS] 737 70629f9000-70629fc000 rw-p 00000000 00:00 0 [anon:bionic TLS] 795 70e686e000-70e6871000 rw-p 00000000 00:00 0 [anon:bionic TLS] 797 70e6873000-70e6876000 rw-p 00000000 00:00 0 [anon:bionic TLS] 826 70e69ff000-70e6a02000 rw-p 00000000 00:00 0 [anon:bionic TLS] 864 70e6bb7000-70e6bba000 rw-p 00000000 00:00 0 [anon:bionic TLS] 1520 70eaf49000-70eaf4c000 rw-p 00000000 00:00 0 [anon:bionic TLS] 1540 70eb037000-70eb03a000 rw-p 00000000 00:00 0 [anon:bionic TLS] 1550 70eb064000-70eb067000 rw-p 00000000 00:00 0 [anon:bionic TLS] 1555 70eb06e000-70eb071000 rw-p 00000000 00:00 0 [anon:bionic TLS] [all …]
|
/aosp12/packages/modules/Wifi/framework/java/android/net/wifi/ |
H A D | WifiEnterpriseConfig.java | 392 public static final int TLS = 1; field in WifiEnterpriseConfig.Eap 503 if (mEapMethod != Eap.TLS && mEapMethod != Eap.UNAUTH_TLS && mPhase2Method != Phase2.NONE) { in saveToSupplicant() 557 case Eap.TLS: in setEapMethod() 1488 return mEapMethod == Eap.PEAP || mEapMethod == Eap.TLS || mEapMethod == Eap.TTLS; in isEapMethodServerCertUsed()
|
H A D | WifiNetworkSpecifier.java | 377 if (enterpriseConfig.getEapMethod() != WifiEnterpriseConfig.Eap.TLS) { in setWpa3Enterprise192BitModeConfig() 444 && mWpa3EnterpriseConfig.getEapMethod() == WifiEnterpriseConfig.Eap.TLS in setSecurityParamsInWifiConfiguration()
|
H A D | WifiNetworkSuggestion.java | 438 if (enterpriseConfig.getEapMethod() != WifiEnterpriseConfig.Eap.TLS) { in setWpa3Enterprise192BitModeConfig() 920 && mWpa3EnterpriseConfig.getEapMethod() == WifiEnterpriseConfig.Eap.TLS in setSecurityParamsInWifiConfiguration()
|
/aosp12/hardware/interfaces/wifi/supplicant/1.2/ |
H A D | ISupplicantStaNetwork.hal | 185 * Enable TLS Suite-B in EAP Phase1 187 * @param enable Set to true to enable TLS Suite-B in EAP phase1
|
/aosp12/frameworks/proto_logging/stats/enums/stats/tls/ |
H A D | enums.proto | 65 // TLS 1.3 cipher suites
|
/aosp12/bionic/tests/ |
H A D | Android.bp | 503 // the compiler to reference an ordinary ELF TLS __sancov_lowest_stack 505 // until the platform is switched to ELF TLS. 533 // the compiler to reference an ordinary ELF TLS __sancov_lowest_stack 535 // until the platform is switched to ELF TLS.
|
/aosp12/system/chre/build/sys_support/qcom/ |
H A D | uimage_v2.lcs | 98 /* TLS */
|
/aosp12/art/build/ |
H A D | Android.bp | 175 // We optimize Thread::Current() with a direct TLS access. This requires access to a 189 // We optimize Thread::Current() with a direct TLS access. This requires access to a
|
/aosp12/packages/modules/Wifi/service/tests/wifitests/src/com/android/server/wifi/ |
H A D | WifiConfigurationTestUtil.java | 483 configuration.enterpriseConfig.setEapMethod(WifiEnterpriseConfig.Eap.TLS); in createEapSuiteBNetwork() 615 config.setEapMethod(WifiEnterpriseConfig.Eap.TLS); in createTLSWifiEnterpriseConfigWithNonePhase2() 625 config.setEapMethod(WifiEnterpriseConfig.Eap.TLS); in createTLSWifiEnterpriseConfigWithAkaPhase2()
|
/aosp12/system/ca-certificates/google/files/ |
H A D | ff783690.0 | 74 TLS Web Server Authentication, IPSec End System, IPSec Tunnel, IPSec User
|
H A D | 4fbd6bfa.0 | 74 … TLS Web Server Authentication, Microsoft Server Gated Crypto, Netscape Server Gated Crypto
|
/aosp12/frameworks/base/core/tests/ConnectivityManagerTest/src/com/android/connectivitymanagertest/ |
H A D | WifiConfigurationHelper.java | 301 return WifiEnterpriseConfig.Eap.TLS; in getEapMethod()
|
/aosp12/packages/modules/adb/ |
H A D | protocol.txt | 86 The TLS message informs the recipient that the connection will be encrypted 87 and will need to perform a TLS handshake. version is the current version of
|
/aosp12/packages/modules/Wifi/service/java/com/android/server/wifi/hotspot2/ |
H A D | PasspointProvider.java | 634 case WifiEnterpriseConfig.Eap.TLS: in convertFromWifiConfig() 954 config.setEapMethod(WifiEnterpriseConfig.Eap.TLS); in buildEnterpriseConfigForCertCredential()
|
/aosp12/packages/apps/ManagedProvisioning/src/com/android/managedprovisioning/task/wifi/ |
H A D | WifiConfigurationProvider.java | 79 map.put("TLS", WifiEnterpriseConfig.Eap.TLS); in buildEapMethodsMap()
|