/external/compiler-rt/lib/sanitizer_common/ |
sanitizer_tls_get_addr.cc | 38 static __thread DTLS dtls; member in namespace:__sanitizer 40 // Make sure we properly destroy the DTLS objects: 46 static inline void DTLS_Deallocate(DTLS::DTV *dtv, uptr size) { 49 UnmapOrDie(dtv, size * sizeof(DTLS::DTV)); 54 if (dtls.dtv_size >= new_size) return; 56 new_size = Max(new_size, 4096UL / sizeof(DTLS::DTV)); 57 DTLS::DTV *new_dtv = 58 (DTLS::DTV *)MmapOrDie(new_size * sizeof(DTLS::DTV), "DTLS_Resize") [all...] |
sanitizer_deadlock_detector.h | 195 void ensureCurrentEpoch(DeadlockDetectorTLS<BV> *dtls) { 196 dtls->ensureCurrentEpoch(current_epoch_); 202 bool onLockBefore(DeadlockDetectorTLS<BV> *dtls, uptr cur_node) { 203 ensureCurrentEpoch(dtls); 205 return g_.isReachable(cur_idx, dtls->getLocks(current_epoch_)); 208 u32 findLockContext(DeadlockDetectorTLS<BV> *dtls, uptr node) { 209 return dtls->findLockContext(nodeToIndex(node)); 212 // Add cur_node to the set of locks held currently by dtls. 213 void onLockAfter(DeadlockDetectorTLS<BV> *dtls, uptr cur_node, u32 stk = 0) { 214 ensureCurrentEpoch(dtls); [all...] |
/external/compiler-rt/lib/sanitizer_common/tests/ |
sanitizer_deadlock_detector_test.cc | 38 dtls.clear(); 42 DeadlockDetectorTLS<BV> dtls; member in struct:ScopedDD 50 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local 76 dtls.clear(); 79 EXPECT_FALSE(d.onLock(&dtls, n1)); 80 EXPECT_FALSE(d.onLock(&dtls, n2)); 81 d.onUnlock(&dtls, n2); 82 d.onUnlock(&dtls, n1); 84 EXPECT_FALSE(d.onLock(&dtls, n2)) 141 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local 247 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local 292 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local 324 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local 351 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local 389 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local 419 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local 457 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local [all...] |
/external/compiler-rt/lib/msan/ |
msan_thread.cc | 38 DTLS *dtls = DTLS_Get(); local 39 for (uptr i = 0; i < dtls->dtv_size; ++i) 40 __msan_unpoison((void *)(dtls->dtv[i].beg), dtls->dtv[i].size);
|
/external/compiler-rt/test/asan/TestCases/Linux/ |
stress_dtls.c | 64 uintptr_t dtls = (uintptr_t)Functions[i](); local 65 fprintf(stderr, " dtls[%03d]: %lx\n", i, dtls); 66 *(long*)dtls = 42; // check that this is writable.
|
/external/chromium_org/third_party/libjingle/source/talk/p2p/base/ |
transportdescriptionfactory_unittest.cc | 75 // If |dtls| is true, the test verifies that the finger print is not changed. 76 void TestIceRestart(bool dtls) { 77 if (dtls) { 100 VerifyUfragAndPasswordChanged(dtls, offer.get(), restart_offer.get()); 108 VerifyUfragAndPasswordChanged(dtls, answer.get(), restart_answer.get()); 111 void VerifyUfragAndPasswordChanged(bool dtls, 120 // If DTLS is enabled, make sure the finger print is unchanged. 121 if (dtls) { 160 // Test generating a hybrid offer with DTLS. 178 // Test generating a hybrid offer with DTLS fails with no identity [all...] |
dtlstransportchannel.cc | 149 LOG_J(LS_ERROR, this) << "Error re-initializing DTLS"; 162 LOG_J(LS_INFO, this) << "Ignoring identical DTLS identity"; 165 LOG_J(LS_ERROR, this) << "Can't change DTLS local identity in this state"; 174 LOG_J(LS_INFO, this) << "NULL DTLS identity supplied. Not doing DTLS"; 218 LOG_J(LS_INFO, this) << "Ignoring identical remote DTLS fingerprint"; 226 LOG_J(LS_ERROR, this) << "Can't set DTLS remote settings in this state."; 231 LOG_J(LS_INFO, this) << "Other side didn't support DTLS."; 236 // At this point we know we are doing DTLS 263 LOG_J(LS_ERROR, this) << "Failed to create DTLS adapter." [all...] |
/external/chromium_org/third_party/libjingle/source/talk/examples/call/ |
call_main.cc | 235 DEFINE_string(dtls, "disable", 236 "Select DTLS transport encryption: disable, enable, require."); 279 std::string dtls = FLAG_dtls; local 426 if (!GetSecurePolicy(dtls, &dtls_policy)) { 427 Print("Invalid DTLS policy. Must be enable, disable, or require.\n"); 433 Print("Failed to generate identity for DTLS.\n");
|
/external/chromium_org/third_party/libjingle/source/talk/session/media/ |
channel.cc | 603 // b) we got SRTP packets before DTLS completed on both the RTP and RTCP 604 // channels, so we haven't yet extracted keys, even if DTLS did complete 714 // If we're doing DTLS-SRTP, now is the time. 718 "Couldn't set up DTLS-SRTP on RTP channel."; 731 "Couldn't set up DTLS-SRTP on RTCP channel"; 764 // This function returns true if either DTLS-SRTP is not in use 765 // *or* DTLS-SRTP is successfully set up. 772 // No DTLS 779 LOG(LS_ERROR) << "No DTLS-SRTP selected cipher"; 783 LOG(LS_INFO) << "Installing keys from DTLS-SRTP on 931 bool dtls = false; local [all...] |
channel.h | 102 // DTLS-based keying. If you turned off SRTP later, however 291 // Do the DTLS key expansion and impose it on the SRTP/SRTCP filters. 294 // Set the DTLS-SRTP cipher policy on this channel as appropriate. 334 bool* dtls,
|
/external/chromium_org/third_party/libjingle/source/talk/app/webrtc/ |
peerconnectioninterface_unittest.cc | 262 // DTLS does not work in a loopback call, so is disabled for most of the 266 bool dtls; local 269 &dtls, 270 NULL) && dtls) { [all...] |
webrtcsession_unittest.cc | 464 void VerifyNoCryptoParams(const cricket::SessionDescription* sdp, bool dtls) { 481 if (dtls) { 494 // Set the internal fake description factories to do DTLS-SRTP. [all...] |
/external/chromium_org/third_party/webrtc/base/ |
sslstreamadapter_unittest.cc | 161 bool dtls) : 171 damage_(false), dtls_(dtls), 727 // Basic tests: DTLS 783 // Test DTLS-SRTP with all high ciphers 801 // Test DTLS-SRTP with all low ciphers 820 // Test DTLS-SRTP with a mismatch -- should not converge 837 // Test DTLS-SRTP with each side being mixed -- should select high
|