/aosp_15_r20/external/clang/test/Driver/ |
H A D | fsanitize.c | 1 …UN: %clang -target x86_64-linux-gnu -fsanitize=undefined -fsanitize-trap=undefined %s -### 2>&1 | … 2 …-target x86_64-linux-gnu -fsanitize=undefined -fsanitize-trap=undefined -fno-sanitize-trap=signed-… 3 …clang -target x86_64-linux-gnu -fsanitize=undefined -fsanitize-undefined-trap-on-error %s -### 2>&… 4 …ang -target x86_64-linux-gnu -fsanitize=undefined-trap -fsanitize-undefined-trap-on-error %s -### … 5 …ang -target x86_64-linux-gnu -fsanitize-undefined-trap-on-error -fsanitize=undefined-trap %s -### … 6 …-UNDEFINED-TRAP: "-fsanitize={{((signed-integer-overflow|integer-divide-by-zero|float-divide-by-ze… 7 …-UNDEFINED-TRAP: "-fsanitize-trap=alignment,array-bounds,bool,enum,float-cast-overflow,float-divid… 8 …-UNDEFINED-TRAP2: "-fsanitize-trap=alignment,array-bounds,bool,enum,float-cast-overflow,float-divi… 10 // RUN: %clang -target x86_64-linux-gnu -fsanitize=undefined %s -### 2>&1 | FileCheck %s --check-pr… 11 …-UNDEFINED: "-fsanitize={{((signed-integer-overflow|integer-divide-by-zero|float-divide-by-zero|fu… [all …]
|
H A D | fsanitize-coverage.c | 1 …N: %clang -target x86_64-linux-gnu -fsanitize=address -fsanitize-coverage=0 %s -### 2>&1 | FileChe… 2 …-target x86_64-linux-gnu -fsanitize=address -fsanitize-coverage=edge -fsanitize-coverage=0 %s -###… 3 // RUN: %clang -target x86_64-linux-gnu -fsanitize=address %s -### 2>&1 | FileCheck %s --check-pref… 4 // CHECK-SANITIZE-COVERAGE-0-NOT: fsanitize-coverage-type 5 // CHECK-SANITIZE-COVERAGE-0: -fsanitize=address 7 … %clang -target x86_64-linux-gnu -fsanitize=address -fsanitize-coverage=func %s -### 2>&1 | FileCh… 8 …: %clang -target x86_64-linux-gnu -fsanitize=memory -fsanitize-coverage=func %s -### 2>&1 | FileCh… 9 …N: %clang -target x86_64-linux-gnu -fsanitize=leak -fsanitize-coverage=func %s -### 2>&1 | FileChe… 10 …%clang -target x86_64-linux-gnu -fsanitize=undefined -fsanitize-coverage=func %s -### 2>&1 | FileC… 11 …N: %clang -target x86_64-linux-gnu -fsanitize=bool -fsanitize-coverage=func %s -### 2>&1 | FileChe… [all …]
|
H A D | fsanitize-blacklist.c | 4 // REQUIRES: clang-driver, shell 6 // Make sure we don't match the -NOT lines with the linker invocation. 15 …-target x86_64-linux-gnu -fsanitize=address -fsanitize-blacklist=%t.good -fsanitize-blacklist=%t.s… 16 // CHECK-BLACKLIST: -fsanitize-blacklist={{.*}}.good" "-fsanitize-blacklist={{.*}}.second 18 // Now, check for -fdepfile-entry flags. 19 …-target x86_64-linux-gnu -fsanitize=address -fsanitize-blacklist=%t.good -fsanitize-blacklist=%t.s… 20 // CHECK-BLACKLIST2: -fdepfile-entry={{.*}}.good" "-fdepfile-entry={{.*}}.second 23 …-target x86_64-linux-gnu -fsanitize=address -resource-dir=%S/Inputs/resource_dir %s -### 2>&1 | Fi… 24 // CHECK-DEFAULT-BLACKLIST: -fsanitize-blacklist={{.*}}asan_blacklist.txt 26 // Ignore -fsanitize-blacklist flag if there is no -fsanitize flag. [all …]
|
H A D | sanitizer-ld.c | 3 // RUN: %clang -no-canonical-prefixes %s -### -o %t.o 2>&1 \ 4 // RUN: -target i386-unknown-linux -fsanitize=address \ 5 // RUN: -resource-dir=%S/Inputs/resource_dir \ 6 // RUN: --sysroot=%S/Inputs/basic_linux_tree \ 7 // RUN: | FileCheck --check-prefix=CHECK-ASAN-LINUX %s 9 // CHECK-ASAN-LINUX: "{{(.*[^-.0-9A-Z_a-z])?}}ld{{(.exe)?}}" 10 // CHECK-ASAN-LINUX-NOT: "-lc" 11 // CHECK-ASAN-LINUX: libclang_rt.asan-i386.a" 12 // CHECK-ASAN-LINUX-NOT: "-export-dynamic" 13 // CHECK-ASAN-LINUX: "--dynamic-list={{.*}}libclang_rt.asan-i386.a.syms" [all …]
|
/aosp_15_r20/external/cronet/build/config/sanitizers/ |
H A D | BUILD.gn | 2 # Use of this source code is governed by a BSD-style license that can be 36 "$clang_base_path/bin/llvm-symbolizer${exe}", 69 "ASan is only supported in 64-bit builds on Windows.") 89 _clang_rt_dso_path = "windows/clang_rt.asan_dynamic-x86_64.dll" 92 _clang_rt_dso_path = "windows/clang_rt.ubsan_dynamic-x86_64.dll" 112 "code-sign-file", 113 "--identity=" + ios_code_signing_identity, 114 "--output=" + rebase_path(outputs[0], root_build_dir), 131 ldflags = [ "-Wl,-u,__sanitizer_options_link_helper" ] 133 ldflags = [ "-Wl,-u_sanitizer_options_link_helper" ] [all …]
|
/aosp_15_r20/external/angle/build/config/sanitizers/ |
H A D | BUILD.gn | 2 # Use of this source code is governed by a BSD-style license that can be 22 # However the linker does not necessarily support `-wrap` on all POSIX 25 # noticed a need for it as the known-affected large fuzzers only run on Linux. 48 "$clang_base_path/bin/llvm-symbolizer${exe}", 80 "ASan is only supported in 64-bit builds on Windows.") 103 _clang_rt_dso_path = "windows/clang_rt.asan_dynamic-x86_64.dll" 106 _clang_rt_dso_path = "windows/clang_rt.ubsan_dynamic-x86_64.dll" 126 "code-sign-file", 127 "--identity=" + ios_code_signing_identity, 128 "--output=" + rebase_path(outputs[0], root_build_dir), [all …]
|
/aosp_15_r20/external/clang/docs/ |
H A D | UndefinedBehaviorSanitizer.rst | 12 UBSan modifies the program at compile-time to catch various kinds of undefined 17 * Conversion to, from, or between floating-point types which would 20 See the full list of available :ref:`checks <ubsan-checks>` below. 22 UBSan has an optional run-time library which provides better error reporting. 33 Use ``clang++`` to compile and link your program with ``-fsanitize=undefined`` 38 .. code-block:: console 46 % clang++ -fsanitize=undefined test.cc 50 You can enable only a subset of :ref:`checks <ubsan-checks>` offered by UBSan, 55 * execute a trap instruction (doesn't require UBSan run-time support). 59 .. code-block:: console [all …]
|
H A D | ControlFlowIntegrity.rst | 22 To enable Clang's available CFI schemes, use the flag ``-fsanitize=cfi``. 23 You can also enable a subset of available :ref:`schemes <cfi-schemes>`. 24 As currently implemented, all schemes rely on link-time optimization (LTO); 25 so it is required to specify ``-flto``, and the linker used must support LTO, 38 The ``-fsanitize=cfi-{vcall,nvcall,derived-cast,unrelated-cast}`` flags 39 require that a ``-fvisibility=`` flag also be specified. This is because the 40 default visibility setting is ``-fvisibility=default``, which would disable 42 to specify ``-fvisibility=hidden``, which enables CFI checks for such classes. 44 Experimental support for :ref:`cross-DSO control flow integrity 45 <cfi-cross-dso>` exists that does not require classes to have hidden LTO [all …]
|
/aosp_15_r20/external/perfetto/gn/standalone/sanitizers/ |
H A D | BUILD.gn | 7 # http://www.apache.org/licenses/LICENSE-2.0 47 "-fno-omit-frame-pointer", 48 "-fsanitize-ignorelist=$ignorelist_path_", 53 cflags += [ "-fsanitize=address" ] 57 cflags += [ "-fsanitize=leak" ] 61 cflags += [ "-fsanitize=thread" ] 69 "-fsanitize=memory", 70 "-fsanitize-memory-track-origins=2", 76 "-fsanitize=bounds", 77 "-fsanitize=float-divide-by-zero", [all …]
|
/aosp_15_r20/external/clang/lib/Driver/ |
H A D | SanitizerArgs.cpp | 1 //===--- SanitizerArgs.cpp - Arguments for sanitizer tools ---------------===// 8 //===----------------------------------------------------------------------===// 56 /// Parse a -fsanitize= or -fno-sanitize= argument's values, diagnosing any 61 /// Parse -f(no-)?sanitize-coverage= flag values, diagnosing any invalid 67 /// "-fsanitize=thread,vptr -fsanitize=address" with mask \c NeedsUbsanRt 68 /// would produce "-fsanitize=vptr". 75 /// "-fsanitize=address,alignment" with mask \c NeedsUbsanRt would produce 76 /// "-fsanitize=alignment". 80 /// Produce a string containing comma-separated names of sanitizers in \p 129 if (Arg->getOption().matches(options::OPT_fsanitize_trap_EQ)) { in parseSanitizeTrapArgs() [all …]
|
/aosp_15_r20/external/rust/android-crates-io/crates/grpcio-sys/grpc/tools/ |
D | bazel.rc | 3 # for platform-appropriate cxxopts 4 common --enable_platform_specific_config 6 build:windows --cxxopt='/std:c++14' 7 build:windows --host_cxxopt='/std:c++14' 8 build:linux --cxxopt='-std=c++14' 9 build:linux --host_cxxopt='-std=c++14' 10 build:macos --cxxopt='-std=c++14' 11 build:macos --host_cxxopt='-std=c++14' 12 build:freebsd --cxxopt='-std=c++14' 13 build:freebsd --host_cxxopt='-std=c++14' [all …]
|
/aosp_15_r20/external/grpc-grpc/tools/ |
H A D | bazel.rc | 5 common --enable_bzlmod=false 7 # for platform-appropriate cxxopts 8 common --enable_platform_specific_config 10 build:windows --cxxopt='/std:c++14' 11 build:windows --host_cxxopt='/std:c++14' 12 build:linux --cxxopt='-std=c++14' 13 build:linux --host_cxxopt='-std=c++14' 14 build:macos --cxxopt='-std=c++14' 15 build:macos --host_cxxopt='-std=c++14' 16 build:freebsd --cxxopt='-std=c++14' [all …]
|
/aosp_15_r20/external/clang/test/CodeGen/ |
H A D | sanitize-address-field-padding.cpp | 1 // Test -fsanitize-address-field-padding 2 // RUN: echo 'type:SomeNamespace::BlacklistedByName=field-padding' > %t.type.blacklist 3 // RUN: echo 'src:*sanitize-address-field-padding.cpp=field-padding' > %t.file.blacklist 4 …-triple x86_64-unknown-unknown -fsanitize=address -fsanitize-address-field-padding=1 -fsanitize-bl… 5 …-triple x86_64-unknown-unknown -fsanitize=address -fsanitize-address-field-padding=1 -fsanitize-bl… 6 …-triple x86_64-unknown-unknown -fsanitize=address -fsanitize-address-field-padding=1 -fsanitize-bl… 7 // RUN: %clang_cc1 -fsanitize=address -emit-llvm -o - %s 2>&1 | FileCheck %s --check-prefix=NO_PADD… 8 // Try to emulate -save-temps option and make sure -disable-llvm-passes will not run sanitize instr… 9 …ang_cc1 -fsanitize=address -emit-llvm -disable-llvm-passes -o - %s | %clang_cc1 -fsanitize=address… 14 // CHECK: -fsanitize-address-field-padding applied to Positive1 [all …]
|
H A D | ubsan-strip-path-components.cpp | 1 // RUN: %clang_cc1 %s -triple=x86_64-linux-gnu -emit-llvm -fsanitize=unreachable -o - | FileCheck %… 2 …-triple=x86_64-linux-gnu -emit-llvm -fsanitize=unreachable -o - -fsanitize-undefined-strip-path-co… 3 …-triple=x86_64-linux-gnu -emit-llvm -fsanitize=unreachable -o - -fsanitize-undefined-strip-path-co… 6 …_cc1 %s -triple=x86_64-linux-gnu -emit-llvm -fsanitize=unreachable -o - -fsanitize-undefined-strip… 7 …%s -triple=x86_64-linux-gnu -emit-llvm -fsanitize=unreachable -o - -fsanitize-undefined-strip-path… 10 … %s -triple=x86_64-linux-gnu -emit-llvm -fsanitize=unreachable -o - -fsanitize-undefined-strip-pat… 11 … %s -triple=x86_64-linux-gnu -emit-llvm -fsanitize=unreachable -o - -fsanitize-undefined-strip-pat… 13 …REGULAR: @[[SRC:[0-9.a-zA-Z_]+]] = private unnamed_addr constant [{{.*}} x i8] c"{{.*test(.|\… 16 …/ REMOVE-FIRST-TWO: @[[STR:[0-9.a-zA-Z_]+]] = private unnamed_addr constant [{{.*}} x i8] c"{{(.:|… 17 // REMOVE-FIRST-TWO: @[[SRC:[0-9.a-zA-Z_]+]] = private unnamed_addr constant [{{.*}} x i8] c"[[REST… [all …]
|
/aosp_15_r20/external/grpc-grpc/ |
H A D | build_handwritten.yaml | 8 '#04': not listed in doc/g_stands_for.md - and update that document to list the 11 '#07': Master always has a "-dev" suffix 12 '#08': Use "-preN" suffixes to identify pre-release versions 13 '#09': Per-language overrides are possible with (eg) ruby_version tag here 23 CPPFLAGS: -O0 -fsanitize-coverage=edge,trace-pc-guard -fsanitize=address -fno-omit-frame-pointer 24 -Wno-unused-command-line-argument -DGPR_NO_DIRECT_SYSCALLS 27 LDFLAGS: -fsanitize=address 33 asan-noleaks: 35 CPPFLAGS: -O0 -fsanitize-coverage=edge,trace-pc-guard -fsanitize=address -fno-omit-frame-pointer 36 -Wno-unused-command-line-argument -DGPR_NO_DIRECT_SYSCALLS [all …]
|
/aosp_15_r20/external/rust/android-crates-io/crates/grpcio-sys/grpc/ |
D | build_handwritten.yaml | 8 '#04': not listed in doc/g_stands_for.md - and update that document to list the 11 '#07': Master always has a "-dev" suffix 12 '#08': Use "-preN" suffixes to identify pre-release versions 13 '#09': Per-language overrides are possible with (eg) ruby_version tag here 23 CPPFLAGS: -O0 -fsanitize-coverage=edge,trace-pc-guard -fsanitize=address -fno-omit-frame-pointer 24 -Wno-unused-command-line-argument -DGPR_NO_DIRECT_SYSCALLS 27 LDFLAGS: -fsanitize=address 33 asan-noleaks: 35 CPPFLAGS: -O0 -fsanitize-coverage=edge,trace-pc-guard -fsanitize=address -fno-omit-frame-pointer 36 -Wno-unused-command-line-argument -DGPR_NO_DIRECT_SYSCALLS [all …]
|
/aosp_15_r20/external/compiler-rt/test/ubsan/TestCases/Integer/ |
H A D | shift.cpp | 1 …ngxx -DLSH_OVERFLOW -DOP='<<' -fsanitize=shift-base -fno-sanitize-recover=shift %s -o %t1 && not %… 2 …langxx -DLSH_OVERFLOW -DOP='<<=' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t2 && not %ru… 3 …angxx -DTOO_LOW -DOP='<<' -fsanitize=shift-exponent -fno-sanitize-recover=shift %s -o %t3 && not %… 4 … %clangxx -DTOO_LOW -DOP='>>' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t4 && not %run %… 5 … %clangxx -DTOO_LOW -DOP='<<=' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t5 && not %run … 6 … %clangxx -DTOO_LOW -DOP='>>=' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t6 && not %run … 7 …ngxx -DTOO_HIGH -DOP='<<' -fsanitize=shift-exponent -fno-sanitize-recover=shift %s -o %t7 && not %… 8 … %clangxx -DTOO_HIGH -DOP='>>' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t8 && not %run … 9 …%clangxx -DTOO_HIGH -DOP='<<=' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t9 && not %run … 10 …clangxx -DTOO_HIGH -DOP='>>=' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t10 && not %run … [all …]
|
/aosp_15_r20/external/compiler-rt/test/msan/ |
H A D | dtor-vtable.cc | 1 // RUN: %clangxx_msan %s -O0 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t && MSAN_OPTIO… 3 // RUN: %clangxx_msan %s -O1 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t && MSAN_OPTIO… 5 // RUN: %clangxx_msan %s -O2 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t && MSAN_OPTIO… 7 // RUN: %clangxx_msan %s -DVPTRA=1 -O2 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t && … 9 // RUN: %clangxx_msan %s -DVPTRCA=1 -O2 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t &&… 11 // RUN: %clangxx_msan %s -DVPTRCB=1 -O2 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t &&… 13 // RUN: %clangxx_msan %s -DVPTRC=1 -O2 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t && … 45 a->~A(); in main() 49 a->A_Foo(); in main() 53 c->~C(); in main() [all …]
|
/aosp_15_r20/external/rust/android-crates-io/crates/libz-sys/src/zlib-ng/cmake/ |
D | detect-sanitizer.cmake | 1 # detect-sanitizer.cmake -- Detect supported compiler sanitizer flags 6 add_compile_options(-g3) 8 check_c_compiler_flag(-fno-omit-frame-pointer HAVE_NO_OMIT_FRAME_POINTER) 10 add_compile_options(-fno-omit-frame-pointer) 11 add_link_options(-fno-omit-frame-pointer) 13 check_c_compiler_flag(-fno-optimize-sibling-calls HAVE_NO_OPTIMIZE_SIBLING_CALLS) 15 add_compile_options(-fno-optimize-sibling-calls) 16 add_link_options(-fno-optimize-sibling-calls) 33 set(CMAKE_REQUIRED_FLAGS -fsanitize=${compile_checks}) 51 pointer-compare [all …]
|
/aosp_15_r20/external/rust/android-crates-io/crates/quiche/deps/boringssl/src/ |
D | CMakeLists.txt | 17 # This is a dummy target which all other targets depend on (manually - see other 23 # Android-NDK CMake files reconfigure the path and so Go and Perl won't be 39 pkg_check_modules(LIBUNWIND libunwind-generic) 41 add_definitions(-DBORINGSSL_HAVE_LIBUNWIND) 59 add_definitions(-DBORINGSSL_ALLOW_CXX_RUNTIME) 66 add_definitions(-DBORINGSSL_DISPATCH_TEST) 68 # command-line, but not add_definitions. 69 set(CMAKE_ASM_NASM_FLAGS "${CMAKE_ASM_NASM_FLAGS} -DBORINGSSL_DISPATCH_TEST") 76 string(REGEX REPLACE "(^| )[/-]DNDEBUG( |$)" " " "${VAR}_RELWITHASSERTS" 81 add_definitions(-DBORINGSSL_PREFIX=${BORINGSSL_PREFIX}) [all …]
|
/aosp_15_r20/external/rust/crates/quiche/deps/boringssl/src/ |
D | CMakeLists.txt | 17 # This is a dummy target which all other targets depend on (manually - see other 23 # Android-NDK CMake files reconfigure the path and so Go and Perl won't be 39 pkg_check_modules(LIBUNWIND libunwind-generic) 41 add_definitions(-DBORINGSSL_HAVE_LIBUNWIND) 59 add_definitions(-DBORINGSSL_ALLOW_CXX_RUNTIME) 66 add_definitions(-DBORINGSSL_DISPATCH_TEST) 68 # command-line, but not add_definitions. 69 set(CMAKE_ASM_NASM_FLAGS "${CMAKE_ASM_NASM_FLAGS} -DBORINGSSL_DISPATCH_TEST") 76 string(REGEX REPLACE "(^| )[/-]DNDEBUG( |$)" " " "${VAR}_RELWITHASSERTS" 81 add_definitions(-DBORINGSSL_PREFIX=${BORINGSSL_PREFIX}) [all …]
|
/aosp_15_r20/build/make/core/ |
H A D | config_sanitizers.mk | 29 my_global_sanitize := $(filter-out integer_overflow,$(my_global_sanitize)) 30 my_global_sanitize_diag := $(filter-out integer_overflow,$(my_global_sanitize_diag)) 36 my_global_sanitize := $(filter-out integer_overflow,$(my_global_sanitize)) 37 my_global_sanitize_diag := $(filter-out integer_overflow,$(my_global_sanitize_diag)) 40 my_global_sanitize := $(filter-out integer_overflow,$(my_global_sanitize)) 41 my_global_sanitize_diag := $(filter-out integer_overflow,$(my_global_sanitize_diag)) 51 my_global_sanitize := $(filter-out cfi,$(my_global_sanitize)) 52 my_global_sanitize_diag := $(filter-out cfi,$(my_global_sanitize_diag)) 63 my_global_sanitize := $(filter-out memtag_heap,$(my_global_sanitize)) 64 my_global_sanitize_diag := $(filter-out memtag_heap,$(my_global_sanitize_diag)) [all …]
|
/aosp_15_r20/external/ot-br-posix/third_party/Simple-web-server/repo/tests/ |
H A D | CMakeLists.txt | 2 add_compile_options(-fno-access-control) 4 add_compile_options(-Wno-thread-safety) 9 target_link_libraries(sws_io_test simple-web-server) 13 target_link_libraries(sws_parse_test simple-web-server) 20 target_link_libraries(sws_crypto_test simple-web-server) 26 target_link_libraries(status_code_test simple-web-server) 32 target_compile_options(percent_decode PRIVATE -fsanitize=address,fuzzer) 33 target_link_options(percent_decode PRIVATE -fsanitize=address,fuzzer) 34 target_link_libraries(percent_decode simple-web-server) 37 target_compile_options(query_string_parse PRIVATE -fsanitize=address,fuzzer) [all …]
|
/aosp_15_r20/external/boringssl/src/ |
H A D | CMakeLists.txt | 32 pkg_check_modules(LIBUNWIND libunwind-generic>=1.3.0) 34 add_definitions(-DBORINGSSL_HAVE_LIBUNWIND) 47 add_definitions(-DBORINGSSL_DISPATCH_TEST) 49 # command-line, but not add_definitions. 50 set(CMAKE_ASM_NASM_FLAGS "${CMAKE_ASM_NASM_FLAGS} -DBORINGSSL_DISPATCH_TEST") 57 string(REGEX REPLACE "(^| )[/-]DNDEBUG( |$)" " " "${VAR}_RELWITHASSERTS" 63 add_definitions(-DBORINGSSL_PREFIX=${BORINGSSL_PREFIX}) 64 # CMake automatically connects include_directories to the NASM command-line, 66 set(CMAKE_ASM_NASM_FLAGS "${CMAKE_ASM_NASM_FLAGS} -DBORINGSSL_PREFIX=${BORINGSSL_PREFIX}") 74 COMMAND ${CMAKE_COMMAND} -E make_directory ${CMAKE_CURRENT_BINARY_DIR}/symbol_prefix_include [all …]
|
/aosp_15_r20/external/cronet/third_party/boringssl/src/ |
H A D | CMakeLists.txt | 32 pkg_check_modules(LIBUNWIND libunwind-generic>=1.3.0) 34 add_definitions(-DBORINGSSL_HAVE_LIBUNWIND) 47 add_definitions(-DBORINGSSL_DISPATCH_TEST) 49 # command-line, but not add_definitions. 50 set(CMAKE_ASM_NASM_FLAGS "${CMAKE_ASM_NASM_FLAGS} -DBORINGSSL_DISPATCH_TEST") 57 string(REGEX REPLACE "(^| )[/-]DNDEBUG( |$)" " " "${VAR}_RELWITHASSERTS" 63 add_definitions(-DBORINGSSL_PREFIX=${BORINGSSL_PREFIX}) 64 # CMake automatically connects include_directories to the NASM command-line, 66 set(CMAKE_ASM_NASM_FLAGS "${CMAKE_ASM_NASM_FLAGS} -DBORINGSSL_PREFIX=${BORINGSSL_PREFIX}") 74 COMMAND ${CMAKE_COMMAND} -E make_directory ${CMAKE_CURRENT_BINARY_DIR}/symbol_prefix_include [all …]
|