HomeSort by relevance Sort by last modified time
    Searched refs:dtls (Results 1 - 14 of 14) sorted by null

  /external/compiler-rt/lib/sanitizer_common/
sanitizer_tls_get_addr.cc 38 static __thread DTLS dtls; member in namespace:__sanitizer
40 // Make sure we properly destroy the DTLS objects:
46 static inline void DTLS_Deallocate(DTLS::DTV *dtv, uptr size) {
49 UnmapOrDie(dtv, size * sizeof(DTLS::DTV));
54 if (dtls.dtv_size >= new_size) return;
56 new_size = Max(new_size, 4096UL / sizeof(DTLS::DTV));
57 DTLS::DTV *new_dtv =
58 (DTLS::DTV *)MmapOrDie(new_size * sizeof(DTLS::DTV), "DTLS_Resize")
    [all...]
sanitizer_deadlock_detector.h 199 void ensureCurrentEpoch(DeadlockDetectorTLS<BV> *dtls) {
200 dtls->ensureCurrentEpoch(current_epoch_);
206 bool onLockBefore(DeadlockDetectorTLS<BV> *dtls, uptr cur_node) {
207 ensureCurrentEpoch(dtls);
209 return g_.isReachable(cur_idx, dtls->getLocks(current_epoch_));
212 u32 findLockContext(DeadlockDetectorTLS<BV> *dtls, uptr node) {
213 return dtls->findLockContext(nodeToIndex(node));
216 // Add cur_node to the set of locks held currently by dtls.
217 void onLockAfter(DeadlockDetectorTLS<BV> *dtls, uptr cur_node, u32 stk = 0) {
218 ensureCurrentEpoch(dtls);
    [all...]
  /external/compiler-rt/lib/sanitizer_common/tests/
sanitizer_deadlock_detector_test.cc 38 dtls.clear();
42 DeadlockDetectorTLS<BV> dtls; member in struct:ScopedDD
50 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local
76 dtls.clear();
79 EXPECT_FALSE(d.onLock(&dtls, n1));
80 EXPECT_FALSE(d.onLock(&dtls, n2));
81 d.onUnlock(&dtls, n2);
82 d.onUnlock(&dtls, n1);
84 EXPECT_FALSE(d.onLock(&dtls, n2))
141 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local
247 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local
292 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local
324 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local
351 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local
389 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local
419 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local
457 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local
    [all...]
  /external/compiler-rt/lib/msan/
msan_thread.cc 38 DTLS *dtls = DTLS_Get(); local
39 CHECK_NE(dtls, 0);
40 for (uptr i = 0; i < dtls->dtv_size; ++i)
41 __msan_unpoison((void *)(dtls->dtv[i].beg), dtls->dtv[i].size);
  /external/compiler-rt/test/asan/TestCases/Linux/
stress_dtls.c 65 uintptr_t dtls = (uintptr_t)Functions[i](); local
66 fprintf(stderr, " dtls[%03d]: %lx\n", i, dtls);
67 *(long*)dtls = 42; // check that this is writable.
  /external/webrtc/webrtc/p2p/base/
transportdescriptionfactory_unittest.cc 60 // If |dtls| is true, the test verifies that the finger print is not changed.
61 void TestIceRestart(bool dtls) {
62 if (dtls) {
85 VerifyUfragAndPasswordChanged(dtls, offer.get(), restart_offer.get());
93 VerifyUfragAndPasswordChanged(dtls, answer.get(), restart_answer.get());
96 void VerifyUfragAndPasswordChanged(bool dtls,
105 // If DTLS is enabled, make sure the finger print is unchanged.
106 if (dtls) {
143 // Test generating an offer with DTLS fails with no identity.
151 // Test updating an offer with DTLS to pick ICE
    [all...]
dtlstransportchannel.cc 137 LOG_J(LS_INFO, this) << "Ignoring identical DTLS identity";
140 LOG_J(LS_ERROR, this) << "Can't change DTLS local identity in this state";
149 LOG_J(LS_INFO, this) << "NULL DTLS identity supplied. Not doing DTLS";
164 << "while DTLS is negotiating";
209 LOG_J(LS_INFO, this) << "Ignoring identical remote DTLS fingerprint";
213 // If the other side doesn't support DTLS, turn off |dtls_active_|.
216 LOG_J(LS_INFO, this) << "Other side didn't support DTLS.";
224 LOG_J(LS_ERROR, this) << "Can't set DTLS remote settings in this state.";
228 // At this point we know we are doing DTLS
    [all...]
  /external/webrtc/webrtc/examples/peerconnection/client/
conductor.h 58 bool CreatePeerConnection(bool dtls);
conductor.cc 112 bool Conductor::CreatePeerConnection(bool dtls) {
122 if (dtls) {
267 // Recreate the peerconnection with DTLS disabled.
  /external/webrtc/talk/session/media/
channel.cc 257 // When using DTLS-SRTP, we must reset the SrtpFilter every time the transport
258 // changes and wait until the DTLS handshake is complete to set the newly
262 // DTLS-SRTP when the writable_ becomes true again.
350 << "Setting RTCP for DTLS/SRTP after SrtpFilter is active "
522 // state, setting up DTLS-SRTP context is deferred to ChannelWritable_w to
524 // TransportChannel) or when TransportChannel is attached after DTLS is
740 // b) we got SRTP packets before DTLS completed on both the RTP and RTCP
741 // channels, so we haven't yet extracted keys, even if DTLS did complete
866 // Since DTLS is applied to all channels, checking RTP should be enough.
870 // This function returns true if either DTLS-SRTP is not in us
1039 bool dtls = false; local
    [all...]
channel.h 110 // DTLS-based keying. If you turned off SRTP later, however
245 // Do the DTLS key expansion and impose it on the SRTP/SRTCP filters.
249 // Set the DTLS-SRTP cipher policy on this channel as appropriate.
280 bool* dtls,
  /external/webrtc/webrtc/base/
sslstreamadapter_unittest.cc 227 bool dtls,
243 dtls_(dtls),
851 // Basic tests: DTLS
907 // Test DTLS-SRTP with all high ciphers
925 // Test DTLS-SRTP with all low ciphers
944 // Test DTLS-SRTP with a mismatch -- should not converge
961 // Test DTLS-SRTP with each side being mixed -- should select high
    [all...]
  /external/webrtc/talk/app/webrtc/
peerconnectioninterface_unittest.cc 556 // DTLS does not work in a loopback call, so is disabled for most of the
568 bool dtls; local
571 &dtls,
572 nullptr) && dtls) {
    [all...]
webrtcsession_unittest.cc 400 // |certificates| then DTLS will be enabled unless explicitly disabled by
401 // |rtc_configuration| options. When DTLS is enabled a certificate will be
457 // Successfully init with DTLS; with a certificate generated and supplied or
474 // Init with DTLS with a store that will fail to generate a certificate.
682 void VerifyNoCryptoParams(const cricket::SessionDescription* sdp, bool dtls) {
699 if (dtls) {
712 // Set the internal fake description factories to do DTLS-SRTP.
    [all...]

Completed in 701 milliseconds