HomeSort by relevance Sort by last modified time
    Searched refs:dtls (Results 1 - 24 of 24) sorted by null

  /external/compiler-rt/lib/sanitizer_common/
sanitizer_tls_get_addr.cc 38 static __thread DTLS dtls; member in namespace:__sanitizer
40 // Make sure we properly destroy the DTLS objects:
46 static inline void DTLS_Deallocate(DTLS::DTV *dtv, uptr size) {
49 UnmapOrDie(dtv, size * sizeof(DTLS::DTV));
54 if (dtls.dtv_size >= new_size) return;
56 new_size = Max(new_size, 4096UL / sizeof(DTLS::DTV));
57 DTLS::DTV *new_dtv =
58 (DTLS::DTV *)MmapOrDie(new_size * sizeof(DTLS::DTV), "DTLS_Resize")
    [all...]
sanitizer_deadlock_detector.h 199 void ensureCurrentEpoch(DeadlockDetectorTLS<BV> *dtls) {
200 dtls->ensureCurrentEpoch(current_epoch_);
206 bool onLockBefore(DeadlockDetectorTLS<BV> *dtls, uptr cur_node) {
207 ensureCurrentEpoch(dtls);
209 return g_.isReachable(cur_idx, dtls->getLocks(current_epoch_));
212 u32 findLockContext(DeadlockDetectorTLS<BV> *dtls, uptr node) {
213 return dtls->findLockContext(nodeToIndex(node));
216 // Add cur_node to the set of locks held currently by dtls.
217 void onLockAfter(DeadlockDetectorTLS<BV> *dtls, uptr cur_node, u32 stk = 0) {
218 ensureCurrentEpoch(dtls);
    [all...]
  /external/compiler-rt/lib/sanitizer_common/tests/
sanitizer_deadlock_detector_test.cc 38 dtls.clear();
42 DeadlockDetectorTLS<BV> dtls; member in struct:ScopedDD
50 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local
76 dtls.clear();
79 EXPECT_FALSE(d.onLock(&dtls, n1));
80 EXPECT_FALSE(d.onLock(&dtls, n2));
81 d.onUnlock(&dtls, n2);
82 d.onUnlock(&dtls, n1);
84 EXPECT_FALSE(d.onLock(&dtls, n2))
141 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local
247 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local
292 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local
324 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local
351 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local
389 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local
419 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local
457 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local
    [all...]
  /external/compiler-rt/lib/msan/
msan_thread.cc 38 DTLS *dtls = DTLS_Get(); local
39 CHECK_NE(dtls, 0);
40 for (uptr i = 0; i < dtls->dtv_size; ++i)
41 __msan_unpoison((void *)(dtls->dtv[i].beg), dtls->dtv[i].size);
  /external/compiler-rt/test/asan/TestCases/Linux/
stress_dtls.c 65 uintptr_t dtls = (uintptr_t)Functions[i](); local
66 fprintf(stderr, " dtls[%03d]: %lx\n", i, dtls);
67 *(long*)dtls = 42; // check that this is writable.
  /external/compiler-rt/lib/lsan/
lsan_thread.cc 66 DTLS *dtls; member in struct:__lsan::OnStartedArgs
77 dtls_ = args->dtls;
99 args.dtls = DTLS_Get();
141 uptr *cache_end, DTLS **dtls) {
151 *dtls = context->dtls();
lsan_thread.h 21 struct DTLS;
37 DTLS *dtls() { return dtls_; } function in class:__lsan::ThreadContext
43 DTLS *dtls_;
lsan_common.cc 197 DTLS *dtls; local
200 &cache_begin, &cache_end, &dtls);
260 if (dtls) {
261 for (uptr j = 0; j < dtls->dtv_size; ++j) {
262 uptr dtls_beg = dtls->dtv[j].beg;
263 uptr dtls_end = dtls_beg + dtls->dtv[j].size;
265 LOG_THREADS("DTLS %zu at %p-%p.\n", j, dtls_beg, dtls_end);
266 ScanRangeForPointers(dtls_beg, dtls_end, frontier, "DTLS",
lsan_common.h 34 struct DTLS;
156 uptr *cache_end, DTLS **dtls);
  /external/webrtc/webrtc/p2p/base/
transportdescriptionfactory_unittest.cc 60 // If |dtls| is true, the test verifies that the finger print is not changed.
61 void TestIceRestart(bool dtls) {
62 if (dtls) {
85 VerifyUfragAndPasswordChanged(dtls, offer.get(), restart_offer.get());
93 VerifyUfragAndPasswordChanged(dtls, answer.get(), restart_answer.get());
96 void VerifyUfragAndPasswordChanged(bool dtls,
105 // If DTLS is enabled, make sure the finger print is unchanged.
106 if (dtls) {
143 // Test generating an offer with DTLS fails with no identity.
151 // Test updating an offer with DTLS to pick ICE
    [all...]
dtlstransportchannel.cc 137 LOG_J(LS_INFO, this) << "Ignoring identical DTLS identity";
140 LOG_J(LS_ERROR, this) << "Can't change DTLS local identity in this state";
149 LOG_J(LS_INFO, this) << "NULL DTLS identity supplied. Not doing DTLS";
164 << "while DTLS is negotiating";
209 LOG_J(LS_INFO, this) << "Ignoring identical remote DTLS fingerprint";
213 // If the other side doesn't support DTLS, turn off |dtls_active_|.
216 LOG_J(LS_INFO, this) << "Other side didn't support DTLS.";
224 LOG_J(LS_ERROR, this) << "Can't set DTLS remote settings in this state.";
228 // At this point we know we are doing DTLS
    [all...]
  /external/boringssl/src/ssl/test/runner/
dtls.go 5 // DTLS implementation.
7 // NOTE: This is a not even a remotely production-quality DTLS
44 return 0, nil, fmt.Errorf("dtls: exceeded maximum packet length")
52 // A real DTLS implementation should be tolerant of errors,
56 return 0, nil, errors.New("dtls: failed to read record header")
67 return 0, nil, c.in.setErrorLocked(fmt.Errorf("dtls: received record with version %x when expecting version %x", vers, c.wireVersion))
73 return 0, nil, c.in.setErrorLocked(fmt.Errorf("dtls: received record with version %x when expecting version %x", vers, expect))
85 return 0, nil, c.in.setErrorLocked(fmt.Errorf("dtls: bad epoch"))
89 return 0, nil, c.in.setErrorLocked(fmt.Errorf("dtls: bad sequence number"))
95 return 0, nil, c.in.setErrorLocked(fmt.Errorf("dtls: oversized record received with length %d", n)
    [all...]
runner.go 418 if protocol == dtls {
467 dtls
512 // expectedSRTPProtectionProfile is the DTLS-SRTP profile that
581 // to replay every write it makes in DTLS tests.
713 if test.protocol == dtls {
725 isDatagram: test.protocol == dtls,
766 if test.protocol == dtls {
773 if test.protocol == dtls {
466 dtls const
    [all...]
handshake_server.go 162 // be always DTLS 1.0
169 return errors.New("dtls: short read from Rand: " + err.Error())
187 return errors.New("dtls: invalid cookie")
200 return errors.New("dtls: retransmitted ClientHello does not match")
    [all...]
handshake_client.go 505 // HelloVerifyRequest SHOULD be always DTLS
507 return errors.New("dtls: bad HelloVerifyRequest version")
    [all...]
  /external/webrtc/webrtc/examples/peerconnection/client/
conductor.h 58 bool CreatePeerConnection(bool dtls);
conductor.cc 112 bool Conductor::CreatePeerConnection(bool dtls) {
122 if (dtls) {
267 // Recreate the peerconnection with DTLS disabled.
  /external/compiler-rt/lib/asan/
asan_thread.cc 400 uptr *cache_end, DTLS **dtls) {
410 *dtls = t->dtls();
asan_thread.h 27 struct DTLS;
74 DTLS *dtls() { return dtls_; } function in class:__asan::AsanThread
154 DTLS *dtls_;
  /external/webrtc/talk/session/media/
channel.cc 257 // When using DTLS-SRTP, we must reset the SrtpFilter every time the transport
258 // changes and wait until the DTLS handshake is complete to set the newly
262 // DTLS-SRTP when the writable_ becomes true again.
350 << "Setting RTCP for DTLS/SRTP after SrtpFilter is active "
522 // state, setting up DTLS-SRTP context is deferred to ChannelWritable_w to
524 // TransportChannel) or when TransportChannel is attached after DTLS is
740 // b) we got SRTP packets before DTLS completed on both the RTP and RTCP
741 // channels, so we haven't yet extracted keys, even if DTLS did complete
866 // Since DTLS is applied to all channels, checking RTP should be enough.
870 // This function returns true if either DTLS-SRTP is not in us
1039 bool dtls = false; local
    [all...]
channel.h 110 // DTLS-based keying. If you turned off SRTP later, however
245 // Do the DTLS key expansion and impose it on the SRTP/SRTCP filters.
249 // Set the DTLS-SRTP cipher policy on this channel as appropriate.
280 bool* dtls,
  /external/webrtc/webrtc/base/
sslstreamadapter_unittest.cc 227 bool dtls,
243 dtls_(dtls),
851 // Basic tests: DTLS
907 // Test DTLS-SRTP with all high ciphers
925 // Test DTLS-SRTP with all low ciphers
944 // Test DTLS-SRTP with a mismatch -- should not converge
961 // Test DTLS-SRTP with each side being mixed -- should select high
    [all...]
  /external/webrtc/talk/app/webrtc/
peerconnectioninterface_unittest.cc 556 // DTLS does not work in a loopback call, so is disabled for most of the
568 bool dtls; local
571 &dtls,
572 nullptr) && dtls) {
    [all...]
webrtcsession_unittest.cc 400 // |certificates| then DTLS will be enabled unless explicitly disabled by
401 // |rtc_configuration| options. When DTLS is enabled a certificate will be
457 // Successfully init with DTLS; with a certificate generated and supplied or
474 // Init with DTLS with a store that will fail to generate a certificate.
682 void VerifyNoCryptoParams(const cricket::SessionDescription* sdp, bool dtls) {
699 if (dtls) {
712 // Set the internal fake description factories to do DTLS-SRTP.
    [all...]

Completed in 830 milliseconds