HomeSort by relevance Sort by last modified time
    Searched refs:dtls (Results 1 - 13 of 13) sorted by null

  /external/compiler-rt/lib/sanitizer_common/
sanitizer_tls_get_addr.cc 38 static __thread DTLS dtls; member in namespace:__sanitizer
40 // Make sure we properly destroy the DTLS objects:
46 static inline void DTLS_Deallocate(DTLS::DTV *dtv, uptr size) {
49 UnmapOrDie(dtv, size * sizeof(DTLS::DTV));
54 if (dtls.dtv_size >= new_size) return;
56 new_size = Max(new_size, 4096UL / sizeof(DTLS::DTV));
57 DTLS::DTV *new_dtv =
58 (DTLS::DTV *)MmapOrDie(new_size * sizeof(DTLS::DTV), "DTLS_Resize")
    [all...]
sanitizer_deadlock_detector.h 195 void ensureCurrentEpoch(DeadlockDetectorTLS<BV> *dtls) {
196 dtls->ensureCurrentEpoch(current_epoch_);
202 bool onLockBefore(DeadlockDetectorTLS<BV> *dtls, uptr cur_node) {
203 ensureCurrentEpoch(dtls);
205 return g_.isReachable(cur_idx, dtls->getLocks(current_epoch_));
208 u32 findLockContext(DeadlockDetectorTLS<BV> *dtls, uptr node) {
209 return dtls->findLockContext(nodeToIndex(node));
212 // Add cur_node to the set of locks held currently by dtls.
213 void onLockAfter(DeadlockDetectorTLS<BV> *dtls, uptr cur_node, u32 stk = 0) {
214 ensureCurrentEpoch(dtls);
    [all...]
  /external/compiler-rt/lib/sanitizer_common/tests/
sanitizer_deadlock_detector_test.cc 38 dtls.clear();
42 DeadlockDetectorTLS<BV> dtls; member in struct:ScopedDD
50 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local
76 dtls.clear();
79 EXPECT_FALSE(d.onLock(&dtls, n1));
80 EXPECT_FALSE(d.onLock(&dtls, n2));
81 d.onUnlock(&dtls, n2);
82 d.onUnlock(&dtls, n1);
84 EXPECT_FALSE(d.onLock(&dtls, n2))
141 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local
247 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local
292 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local
324 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local
351 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local
389 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local
419 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local
457 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local
    [all...]
  /external/compiler-rt/lib/msan/
msan_thread.cc 38 DTLS *dtls = DTLS_Get(); local
39 for (uptr i = 0; i < dtls->dtv_size; ++i)
40 __msan_unpoison((void *)(dtls->dtv[i].beg), dtls->dtv[i].size);
  /external/compiler-rt/test/asan/TestCases/Linux/
stress_dtls.c 64 uintptr_t dtls = (uintptr_t)Functions[i](); local
65 fprintf(stderr, " dtls[%03d]: %lx\n", i, dtls);
66 *(long*)dtls = 42; // check that this is writable.
  /external/chromium_org/third_party/libjingle/source/talk/p2p/base/
transportdescriptionfactory_unittest.cc 75 // If |dtls| is true, the test verifies that the finger print is not changed.
76 void TestIceRestart(bool dtls) {
77 if (dtls) {
100 VerifyUfragAndPasswordChanged(dtls, offer.get(), restart_offer.get());
108 VerifyUfragAndPasswordChanged(dtls, answer.get(), restart_answer.get());
111 void VerifyUfragAndPasswordChanged(bool dtls,
120 // If DTLS is enabled, make sure the finger print is unchanged.
121 if (dtls) {
160 // Test generating a hybrid offer with DTLS.
178 // Test generating a hybrid offer with DTLS fails with no identity
    [all...]
dtlstransportchannel.cc 149 LOG_J(LS_ERROR, this) << "Error re-initializing DTLS";
162 LOG_J(LS_INFO, this) << "Ignoring identical DTLS identity";
165 LOG_J(LS_ERROR, this) << "Can't change DTLS local identity in this state";
174 LOG_J(LS_INFO, this) << "NULL DTLS identity supplied. Not doing DTLS";
218 LOG_J(LS_INFO, this) << "Ignoring identical remote DTLS fingerprint";
226 LOG_J(LS_ERROR, this) << "Can't set DTLS remote settings in this state.";
231 LOG_J(LS_INFO, this) << "Other side didn't support DTLS.";
236 // At this point we know we are doing DTLS
263 LOG_J(LS_ERROR, this) << "Failed to create DTLS adapter."
    [all...]
  /external/chromium_org/third_party/libjingle/source/talk/examples/call/
call_main.cc 235 DEFINE_string(dtls, "disable",
236 "Select DTLS transport encryption: disable, enable, require.");
279 std::string dtls = FLAG_dtls; local
426 if (!GetSecurePolicy(dtls, &dtls_policy)) {
427 Print("Invalid DTLS policy. Must be enable, disable, or require.\n");
433 Print("Failed to generate identity for DTLS.\n");
  /external/chromium_org/third_party/libjingle/source/talk/session/media/
channel.cc 603 // b) we got SRTP packets before DTLS completed on both the RTP and RTCP
604 // channels, so we haven't yet extracted keys, even if DTLS did complete
714 // If we're doing DTLS-SRTP, now is the time.
718 "Couldn't set up DTLS-SRTP on RTP channel.";
731 "Couldn't set up DTLS-SRTP on RTCP channel";
764 // This function returns true if either DTLS-SRTP is not in use
765 // *or* DTLS-SRTP is successfully set up.
772 // No DTLS
779 LOG(LS_ERROR) << "No DTLS-SRTP selected cipher";
783 LOG(LS_INFO) << "Installing keys from DTLS-SRTP on
931 bool dtls = false; local
    [all...]
channel.h 102 // DTLS-based keying. If you turned off SRTP later, however
291 // Do the DTLS key expansion and impose it on the SRTP/SRTCP filters.
294 // Set the DTLS-SRTP cipher policy on this channel as appropriate.
334 bool* dtls,
  /external/chromium_org/third_party/libjingle/source/talk/app/webrtc/
peerconnectioninterface_unittest.cc 262 // DTLS does not work in a loopback call, so is disabled for most of the
266 bool dtls; local
269 &dtls,
270 NULL) && dtls) {
    [all...]
webrtcsession_unittest.cc 464 void VerifyNoCryptoParams(const cricket::SessionDescription* sdp, bool dtls) {
481 if (dtls) {
494 // Set the internal fake description factories to do DTLS-SRTP.
    [all...]
  /external/chromium_org/third_party/webrtc/base/
sslstreamadapter_unittest.cc 161 bool dtls) :
171 damage_(false), dtls_(dtls),
727 // Basic tests: DTLS
783 // Test DTLS-SRTP with all high ciphers
801 // Test DTLS-SRTP with all low ciphers
820 // Test DTLS-SRTP with a mismatch -- should not converge
837 // Test DTLS-SRTP with each side being mixed -- should select high

Completed in 205 milliseconds