Home
last modified time | relevance | path

Searched +full:- +full:fsanitize (Results 1 – 25 of 852) sorted by relevance

12345678910>>...35

/aosp_15_r20/external/clang/test/Driver/
H A Dfsanitize.c1 …UN: %clang -target x86_64-linux-gnu -fsanitize=undefined -fsanitize-trap=undefined %s -### 2>&1 | …
2-target x86_64-linux-gnu -fsanitize=undefined -fsanitize-trap=undefined -fno-sanitize-trap=signed-
3 …clang -target x86_64-linux-gnu -fsanitize=undefined -fsanitize-undefined-trap-on-error %s -### 2>&…
4 …ang -target x86_64-linux-gnu -fsanitize=undefined-trap -fsanitize-undefined-trap-on-error %s -### …
5 …ang -target x86_64-linux-gnu -fsanitize-undefined-trap-on-error -fsanitize=undefined-trap %s -### …
6-UNDEFINED-TRAP: "-fsanitize={{((signed-integer-overflow|integer-divide-by-zero|float-divide-by-ze…
7-UNDEFINED-TRAP: "-fsanitize-trap=alignment,array-bounds,bool,enum,float-cast-overflow,float-divid…
8-UNDEFINED-TRAP2: "-fsanitize-trap=alignment,array-bounds,bool,enum,float-cast-overflow,float-divi…
10 // RUN: %clang -target x86_64-linux-gnu -fsanitize=undefined %s -### 2>&1 | FileCheck %s --check-pr…
11-UNDEFINED: "-fsanitize={{((signed-integer-overflow|integer-divide-by-zero|float-divide-by-zero|fu…
[all …]
H A Dfsanitize-coverage.c1 …N: %clang -target x86_64-linux-gnu -fsanitize=address -fsanitize-coverage=0 %s -### 2>&1 | FileChe…
2-target x86_64-linux-gnu -fsanitize=address -fsanitize-coverage=edge -fsanitize-coverage=0 %s -###…
3 // RUN: %clang -target x86_64-linux-gnu -fsanitize=address %s -### 2>&1 | FileCheck %s --check-pref…
4 // CHECK-SANITIZE-COVERAGE-0-NOT: fsanitize-coverage-type
5 // CHECK-SANITIZE-COVERAGE-0: -fsanitize=address
7 … %clang -target x86_64-linux-gnu -fsanitize=address -fsanitize-coverage=func %s -### 2>&1 | FileCh…
8 …: %clang -target x86_64-linux-gnu -fsanitize=memory -fsanitize-coverage=func %s -### 2>&1 | FileCh…
9 …N: %clang -target x86_64-linux-gnu -fsanitize=leak -fsanitize-coverage=func %s -### 2>&1 | FileChe…
10 …%clang -target x86_64-linux-gnu -fsanitize=undefined -fsanitize-coverage=func %s -### 2>&1 | FileC…
11 …N: %clang -target x86_64-linux-gnu -fsanitize=bool -fsanitize-coverage=func %s -### 2>&1 | FileChe…
[all …]
H A Dfsanitize-blacklist.c4 // REQUIRES: clang-driver, shell
6 // Make sure we don't match the -NOT lines with the linker invocation.
15-target x86_64-linux-gnu -fsanitize=address -fsanitize-blacklist=%t.good -fsanitize-blacklist=%t.s…
16 // CHECK-BLACKLIST: -fsanitize-blacklist={{.*}}.good" "-fsanitize-blacklist={{.*}}.second
18 // Now, check for -fdepfile-entry flags.
19-target x86_64-linux-gnu -fsanitize=address -fsanitize-blacklist=%t.good -fsanitize-blacklist=%t.s…
20 // CHECK-BLACKLIST2: -fdepfile-entry={{.*}}.good" "-fdepfile-entry={{.*}}.second
23-target x86_64-linux-gnu -fsanitize=address -resource-dir=%S/Inputs/resource_dir %s -### 2>&1 | Fi…
24 // CHECK-DEFAULT-BLACKLIST: -fsanitize-blacklist={{.*}}asan_blacklist.txt
26 // Ignore -fsanitize-blacklist flag if there is no -fsanitize flag.
[all …]
H A Dsanitizer-ld.c3 // RUN: %clang -no-canonical-prefixes %s -### -o %t.o 2>&1 \
4 // RUN: -target i386-unknown-linux -fsanitize=address \
5 // RUN: -resource-dir=%S/Inputs/resource_dir \
6 // RUN: --sysroot=%S/Inputs/basic_linux_tree \
7 // RUN: | FileCheck --check-prefix=CHECK-ASAN-LINUX %s
9 // CHECK-ASAN-LINUX: "{{(.*[^-.0-9A-Z_a-z])?}}ld{{(.exe)?}}"
10 // CHECK-ASAN-LINUX-NOT: "-lc"
11 // CHECK-ASAN-LINUX: libclang_rt.asan-i386.a"
12 // CHECK-ASAN-LINUX-NOT: "-export-dynamic"
13 // CHECK-ASAN-LINUX: "--dynamic-list={{.*}}libclang_rt.asan-i386.a.syms"
[all …]
/aosp_15_r20/external/cronet/build/config/sanitizers/
H A DBUILD.gn2 # Use of this source code is governed by a BSD-style license that can be
36 "$clang_base_path/bin/llvm-symbolizer${exe}",
69 "ASan is only supported in 64-bit builds on Windows.")
89 _clang_rt_dso_path = "windows/clang_rt.asan_dynamic-x86_64.dll"
92 _clang_rt_dso_path = "windows/clang_rt.ubsan_dynamic-x86_64.dll"
112 "code-sign-file",
113 "--identity=" + ios_code_signing_identity,
114 "--output=" + rebase_path(outputs[0], root_build_dir),
131 ldflags = [ "-Wl,-u,__sanitizer_options_link_helper" ]
133 ldflags = [ "-Wl,-u_sanitizer_options_link_helper" ]
[all …]
/aosp_15_r20/external/angle/build/config/sanitizers/
H A DBUILD.gn2 # Use of this source code is governed by a BSD-style license that can be
22 # However the linker does not necessarily support `-wrap` on all POSIX
25 # noticed a need for it as the known-affected large fuzzers only run on Linux.
48 "$clang_base_path/bin/llvm-symbolizer${exe}",
80 "ASan is only supported in 64-bit builds on Windows.")
103 _clang_rt_dso_path = "windows/clang_rt.asan_dynamic-x86_64.dll"
106 _clang_rt_dso_path = "windows/clang_rt.ubsan_dynamic-x86_64.dll"
126 "code-sign-file",
127 "--identity=" + ios_code_signing_identity,
128 "--output=" + rebase_path(outputs[0], root_build_dir),
[all …]
/aosp_15_r20/external/clang/docs/
H A DUndefinedBehaviorSanitizer.rst12 UBSan modifies the program at compile-time to catch various kinds of undefined
17 * Conversion to, from, or between floating-point types which would
20 See the full list of available :ref:`checks <ubsan-checks>` below.
22 UBSan has an optional run-time library which provides better error reporting.
33 Use ``clang++`` to compile and link your program with ``-fsanitize=undefined``
38 .. code-block:: console
46 % clang++ -fsanitize=undefined test.cc
50 You can enable only a subset of :ref:`checks <ubsan-checks>` offered by UBSan,
55 * execute a trap instruction (doesn't require UBSan run-time support).
59 .. code-block:: console
[all …]
H A DControlFlowIntegrity.rst22 To enable Clang's available CFI schemes, use the flag ``-fsanitize=cfi``.
23 You can also enable a subset of available :ref:`schemes <cfi-schemes>`.
24 As currently implemented, all schemes rely on link-time optimization (LTO);
25 so it is required to specify ``-flto``, and the linker used must support LTO,
38 The ``-fsanitize=cfi-{vcall,nvcall,derived-cast,unrelated-cast}`` flags
39 require that a ``-fvisibility=`` flag also be specified. This is because the
40 default visibility setting is ``-fvisibility=default``, which would disable
42 to specify ``-fvisibility=hidden``, which enables CFI checks for such classes.
44 Experimental support for :ref:`cross-DSO control flow integrity
45 <cfi-cross-dso>` exists that does not require classes to have hidden LTO
[all …]
/aosp_15_r20/external/perfetto/gn/standalone/sanitizers/
H A DBUILD.gn7 # http://www.apache.org/licenses/LICENSE-2.0
47 "-fno-omit-frame-pointer",
48 "-fsanitize-ignorelist=$ignorelist_path_",
53 cflags += [ "-fsanitize=address" ]
57 cflags += [ "-fsanitize=leak" ]
61 cflags += [ "-fsanitize=thread" ]
69 "-fsanitize=memory",
70 "-fsanitize-memory-track-origins=2",
76 "-fsanitize=bounds",
77 "-fsanitize=float-divide-by-zero",
[all …]
/aosp_15_r20/external/clang/lib/Driver/
H A DSanitizerArgs.cpp1 //===--- SanitizerArgs.cpp - Arguments for sanitizer tools ---------------===//
8 //===----------------------------------------------------------------------===//
56 /// Parse a -fsanitize= or -fno-sanitize= argument's values, diagnosing any
61 /// Parse -f(no-)?sanitize-coverage= flag values, diagnosing any invalid
67 /// "-fsanitize=thread,vptr -fsanitize=address" with mask \c NeedsUbsanRt
68 /// would produce "-fsanitize=vptr".
75 /// "-fsanitize=address,alignment" with mask \c NeedsUbsanRt would produce
76 /// "-fsanitize=alignment".
80 /// Produce a string containing comma-separated names of sanitizers in \p
129 if (Arg->getOption().matches(options::OPT_fsanitize_trap_EQ)) { in parseSanitizeTrapArgs()
[all …]
/aosp_15_r20/external/rust/android-crates-io/crates/grpcio-sys/grpc/tools/
Dbazel.rc3 # for platform-appropriate cxxopts
4 common --enable_platform_specific_config
6 build:windows --cxxopt='/std:c++14'
7 build:windows --host_cxxopt='/std:c++14'
8 build:linux --cxxopt='-std=c++14'
9 build:linux --host_cxxopt='-std=c++14'
10 build:macos --cxxopt='-std=c++14'
11 build:macos --host_cxxopt='-std=c++14'
12 build:freebsd --cxxopt='-std=c++14'
13 build:freebsd --host_cxxopt='-std=c++14'
[all …]
/aosp_15_r20/external/grpc-grpc/tools/
H A Dbazel.rc5 common --enable_bzlmod=false
7 # for platform-appropriate cxxopts
8 common --enable_platform_specific_config
10 build:windows --cxxopt='/std:c++14'
11 build:windows --host_cxxopt='/std:c++14'
12 build:linux --cxxopt='-std=c++14'
13 build:linux --host_cxxopt='-std=c++14'
14 build:macos --cxxopt='-std=c++14'
15 build:macos --host_cxxopt='-std=c++14'
16 build:freebsd --cxxopt='-std=c++14'
[all …]
/aosp_15_r20/external/clang/test/CodeGen/
H A Dsanitize-address-field-padding.cpp1 // Test -fsanitize-address-field-padding
2 // RUN: echo 'type:SomeNamespace::BlacklistedByName=field-padding' > %t.type.blacklist
3 // RUN: echo 'src:*sanitize-address-field-padding.cpp=field-padding' > %t.file.blacklist
4-triple x86_64-unknown-unknown -fsanitize=address -fsanitize-address-field-padding=1 -fsanitize-bl…
5-triple x86_64-unknown-unknown -fsanitize=address -fsanitize-address-field-padding=1 -fsanitize-bl…
6-triple x86_64-unknown-unknown -fsanitize=address -fsanitize-address-field-padding=1 -fsanitize-bl…
7 // RUN: %clang_cc1 -fsanitize=address -emit-llvm -o - %s 2>&1 | FileCheck %s --check-prefix=NO_PADD…
8 // Try to emulate -save-temps option and make sure -disable-llvm-passes will not run sanitize instr…
9 …ang_cc1 -fsanitize=address -emit-llvm -disable-llvm-passes -o - %s | %clang_cc1 -fsanitize=address…
14 // CHECK: -fsanitize-address-field-padding applied to Positive1
[all …]
H A Dubsan-strip-path-components.cpp1 // RUN: %clang_cc1 %s -triple=x86_64-linux-gnu -emit-llvm -fsanitize=unreachable -o - | FileCheck %…
2-triple=x86_64-linux-gnu -emit-llvm -fsanitize=unreachable -o - -fsanitize-undefined-strip-path-co…
3-triple=x86_64-linux-gnu -emit-llvm -fsanitize=unreachable -o - -fsanitize-undefined-strip-path-co…
6 …_cc1 %s -triple=x86_64-linux-gnu -emit-llvm -fsanitize=unreachable -o - -fsanitize-undefined-strip
7 …%s -triple=x86_64-linux-gnu -emit-llvm -fsanitize=unreachable -o - -fsanitize-undefined-strip-path
10 … %s -triple=x86_64-linux-gnu -emit-llvm -fsanitize=unreachable -o - -fsanitize-undefined-strip-pat…
11 … %s -triple=x86_64-linux-gnu -emit-llvm -fsanitize=unreachable -o - -fsanitize-undefined-strip-pat…
13 …REGULAR: @[[SRC:[0-9.a-zA-Z_]+]] = private unnamed_addr constant [{{.*}} x i8] c"{{.*test(.|\…
16 …/ REMOVE-FIRST-TWO: @[[STR:[0-9.a-zA-Z_]+]] = private unnamed_addr constant [{{.*}} x i8] c"{{(.:|…
17 // REMOVE-FIRST-TWO: @[[SRC:[0-9.a-zA-Z_]+]] = private unnamed_addr constant [{{.*}} x i8] c"[[REST…
[all …]
/aosp_15_r20/external/grpc-grpc/
H A Dbuild_handwritten.yaml8 '#04': not listed in doc/g_stands_for.md - and update that document to list the
11 '#07': Master always has a "-dev" suffix
12 '#08': Use "-preN" suffixes to identify pre-release versions
13 '#09': Per-language overrides are possible with (eg) ruby_version tag here
23 CPPFLAGS: -O0 -fsanitize-coverage=edge,trace-pc-guard -fsanitize=address -fno-omit-frame-pointer
24 -Wno-unused-command-line-argument -DGPR_NO_DIRECT_SYSCALLS
27 LDFLAGS: -fsanitize=address
33 asan-noleaks:
35 CPPFLAGS: -O0 -fsanitize-coverage=edge,trace-pc-guard -fsanitize=address -fno-omit-frame-pointer
36 -Wno-unused-command-line-argument -DGPR_NO_DIRECT_SYSCALLS
[all …]
/aosp_15_r20/external/rust/android-crates-io/crates/grpcio-sys/grpc/
Dbuild_handwritten.yaml8 '#04': not listed in doc/g_stands_for.md - and update that document to list the
11 '#07': Master always has a "-dev" suffix
12 '#08': Use "-preN" suffixes to identify pre-release versions
13 '#09': Per-language overrides are possible with (eg) ruby_version tag here
23 CPPFLAGS: -O0 -fsanitize-coverage=edge,trace-pc-guard -fsanitize=address -fno-omit-frame-pointer
24 -Wno-unused-command-line-argument -DGPR_NO_DIRECT_SYSCALLS
27 LDFLAGS: -fsanitize=address
33 asan-noleaks:
35 CPPFLAGS: -O0 -fsanitize-coverage=edge,trace-pc-guard -fsanitize=address -fno-omit-frame-pointer
36 -Wno-unused-command-line-argument -DGPR_NO_DIRECT_SYSCALLS
[all …]
/aosp_15_r20/external/compiler-rt/test/ubsan/TestCases/Integer/
H A Dshift.cpp1 …ngxx -DLSH_OVERFLOW -DOP='<<' -fsanitize=shift-base -fno-sanitize-recover=shift %s -o %t1 && not %…
2 …langxx -DLSH_OVERFLOW -DOP='<<=' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t2 && not %ru…
3 …angxx -DTOO_LOW -DOP='<<' -fsanitize=shift-exponent -fno-sanitize-recover=shift %s -o %t3 && not %…
4 … %clangxx -DTOO_LOW -DOP='>>' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t4 && not %run %…
5 … %clangxx -DTOO_LOW -DOP='<<=' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t5 && not %run …
6 … %clangxx -DTOO_LOW -DOP='>>=' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t6 && not %run …
7 …ngxx -DTOO_HIGH -DOP='<<' -fsanitize=shift-exponent -fno-sanitize-recover=shift %s -o %t7 && not %…
8 … %clangxx -DTOO_HIGH -DOP='>>' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t8 && not %run …
9 …%clangxx -DTOO_HIGH -DOP='<<=' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t9 && not %run …
10 …clangxx -DTOO_HIGH -DOP='>>=' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t10 && not %run …
[all …]
/aosp_15_r20/external/compiler-rt/test/msan/
H A Ddtor-vtable.cc1 // RUN: %clangxx_msan %s -O0 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t && MSAN_OPTIO…
3 // RUN: %clangxx_msan %s -O1 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t && MSAN_OPTIO…
5 // RUN: %clangxx_msan %s -O2 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t && MSAN_OPTIO…
7 // RUN: %clangxx_msan %s -DVPTRA=1 -O2 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t && …
9 // RUN: %clangxx_msan %s -DVPTRCA=1 -O2 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t &&…
11 // RUN: %clangxx_msan %s -DVPTRCB=1 -O2 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t &&…
13 // RUN: %clangxx_msan %s -DVPTRC=1 -O2 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t && …
45 a->~A(); in main()
49 a->A_Foo(); in main()
53 c->~C(); in main()
[all …]
/aosp_15_r20/external/rust/android-crates-io/crates/libz-sys/src/zlib-ng/cmake/
Ddetect-sanitizer.cmake1 # detect-sanitizer.cmake -- Detect supported compiler sanitizer flags
6 add_compile_options(-g3)
8 check_c_compiler_flag(-fno-omit-frame-pointer HAVE_NO_OMIT_FRAME_POINTER)
10 add_compile_options(-fno-omit-frame-pointer)
11 add_link_options(-fno-omit-frame-pointer)
13 check_c_compiler_flag(-fno-optimize-sibling-calls HAVE_NO_OPTIMIZE_SIBLING_CALLS)
15 add_compile_options(-fno-optimize-sibling-calls)
16 add_link_options(-fno-optimize-sibling-calls)
33 set(CMAKE_REQUIRED_FLAGS -fsanitize=${compile_checks})
51 pointer-compare
[all …]
/aosp_15_r20/external/rust/android-crates-io/crates/quiche/deps/boringssl/src/
DCMakeLists.txt17 # This is a dummy target which all other targets depend on (manually - see other
23 # Android-NDK CMake files reconfigure the path and so Go and Perl won't be
39 pkg_check_modules(LIBUNWIND libunwind-generic)
41 add_definitions(-DBORINGSSL_HAVE_LIBUNWIND)
59 add_definitions(-DBORINGSSL_ALLOW_CXX_RUNTIME)
66 add_definitions(-DBORINGSSL_DISPATCH_TEST)
68 # command-line, but not add_definitions.
69 set(CMAKE_ASM_NASM_FLAGS "${CMAKE_ASM_NASM_FLAGS} -DBORINGSSL_DISPATCH_TEST")
76 string(REGEX REPLACE "(^| )[/-]DNDEBUG( |$)" " " "${VAR}_RELWITHASSERTS"
81 add_definitions(-DBORINGSSL_PREFIX=${BORINGSSL_PREFIX})
[all …]
/aosp_15_r20/external/rust/crates/quiche/deps/boringssl/src/
DCMakeLists.txt17 # This is a dummy target which all other targets depend on (manually - see other
23 # Android-NDK CMake files reconfigure the path and so Go and Perl won't be
39 pkg_check_modules(LIBUNWIND libunwind-generic)
41 add_definitions(-DBORINGSSL_HAVE_LIBUNWIND)
59 add_definitions(-DBORINGSSL_ALLOW_CXX_RUNTIME)
66 add_definitions(-DBORINGSSL_DISPATCH_TEST)
68 # command-line, but not add_definitions.
69 set(CMAKE_ASM_NASM_FLAGS "${CMAKE_ASM_NASM_FLAGS} -DBORINGSSL_DISPATCH_TEST")
76 string(REGEX REPLACE "(^| )[/-]DNDEBUG( |$)" " " "${VAR}_RELWITHASSERTS"
81 add_definitions(-DBORINGSSL_PREFIX=${BORINGSSL_PREFIX})
[all …]
/aosp_15_r20/build/make/core/
H A Dconfig_sanitizers.mk29 my_global_sanitize := $(filter-out integer_overflow,$(my_global_sanitize))
30 my_global_sanitize_diag := $(filter-out integer_overflow,$(my_global_sanitize_diag))
36 my_global_sanitize := $(filter-out integer_overflow,$(my_global_sanitize))
37 my_global_sanitize_diag := $(filter-out integer_overflow,$(my_global_sanitize_diag))
40 my_global_sanitize := $(filter-out integer_overflow,$(my_global_sanitize))
41 my_global_sanitize_diag := $(filter-out integer_overflow,$(my_global_sanitize_diag))
51 my_global_sanitize := $(filter-out cfi,$(my_global_sanitize))
52 my_global_sanitize_diag := $(filter-out cfi,$(my_global_sanitize_diag))
63 my_global_sanitize := $(filter-out memtag_heap,$(my_global_sanitize))
64 my_global_sanitize_diag := $(filter-out memtag_heap,$(my_global_sanitize_diag))
[all …]
/aosp_15_r20/external/ot-br-posix/third_party/Simple-web-server/repo/tests/
H A DCMakeLists.txt2 add_compile_options(-fno-access-control)
4 add_compile_options(-Wno-thread-safety)
9 target_link_libraries(sws_io_test simple-web-server)
13 target_link_libraries(sws_parse_test simple-web-server)
20 target_link_libraries(sws_crypto_test simple-web-server)
26 target_link_libraries(status_code_test simple-web-server)
32 target_compile_options(percent_decode PRIVATE -fsanitize=address,fuzzer)
33 target_link_options(percent_decode PRIVATE -fsanitize=address,fuzzer)
34 target_link_libraries(percent_decode simple-web-server)
37 target_compile_options(query_string_parse PRIVATE -fsanitize=address,fuzzer)
[all …]
/aosp_15_r20/external/boringssl/src/
H A DCMakeLists.txt32 pkg_check_modules(LIBUNWIND libunwind-generic>=1.3.0)
34 add_definitions(-DBORINGSSL_HAVE_LIBUNWIND)
47 add_definitions(-DBORINGSSL_DISPATCH_TEST)
49 # command-line, but not add_definitions.
50 set(CMAKE_ASM_NASM_FLAGS "${CMAKE_ASM_NASM_FLAGS} -DBORINGSSL_DISPATCH_TEST")
57 string(REGEX REPLACE "(^| )[/-]DNDEBUG( |$)" " " "${VAR}_RELWITHASSERTS"
63 add_definitions(-DBORINGSSL_PREFIX=${BORINGSSL_PREFIX})
64 # CMake automatically connects include_directories to the NASM command-line,
66 set(CMAKE_ASM_NASM_FLAGS "${CMAKE_ASM_NASM_FLAGS} -DBORINGSSL_PREFIX=${BORINGSSL_PREFIX}")
74 COMMAND ${CMAKE_COMMAND} -E make_directory ${CMAKE_CURRENT_BINARY_DIR}/symbol_prefix_include
[all …]
/aosp_15_r20/external/cronet/third_party/boringssl/src/
H A DCMakeLists.txt32 pkg_check_modules(LIBUNWIND libunwind-generic>=1.3.0)
34 add_definitions(-DBORINGSSL_HAVE_LIBUNWIND)
47 add_definitions(-DBORINGSSL_DISPATCH_TEST)
49 # command-line, but not add_definitions.
50 set(CMAKE_ASM_NASM_FLAGS "${CMAKE_ASM_NASM_FLAGS} -DBORINGSSL_DISPATCH_TEST")
57 string(REGEX REPLACE "(^| )[/-]DNDEBUG( |$)" " " "${VAR}_RELWITHASSERTS"
63 add_definitions(-DBORINGSSL_PREFIX=${BORINGSSL_PREFIX})
64 # CMake automatically connects include_directories to the NASM command-line,
66 set(CMAKE_ASM_NASM_FLAGS "${CMAKE_ASM_NASM_FLAGS} -DBORINGSSL_PREFIX=${BORINGSSL_PREFIX}")
74 COMMAND ${CMAKE_COMMAND} -E make_directory ${CMAKE_CURRENT_BINARY_DIR}/symbol_prefix_include
[all …]

12345678910>>...35