/external/compiler-rt/lib/sanitizer_common/ |
sanitizer_tls_get_addr.cc | 38 static __thread DTLS dtls; member in namespace:__sanitizer 40 // Make sure we properly destroy the DTLS objects: 46 static inline void DTLS_Deallocate(DTLS::DTV *dtv, uptr size) { 49 UnmapOrDie(dtv, size * sizeof(DTLS::DTV)); 54 if (dtls.dtv_size >= new_size) return; 56 new_size = Max(new_size, 4096UL / sizeof(DTLS::DTV)); 57 DTLS::DTV *new_dtv = 58 (DTLS::DTV *)MmapOrDie(new_size * sizeof(DTLS::DTV), "DTLS_Resize") [all...] |
sanitizer_deadlock_detector.h | 199 void ensureCurrentEpoch(DeadlockDetectorTLS<BV> *dtls) { 200 dtls->ensureCurrentEpoch(current_epoch_); 206 bool onLockBefore(DeadlockDetectorTLS<BV> *dtls, uptr cur_node) { 207 ensureCurrentEpoch(dtls); 209 return g_.isReachable(cur_idx, dtls->getLocks(current_epoch_)); 212 u32 findLockContext(DeadlockDetectorTLS<BV> *dtls, uptr node) { 213 return dtls->findLockContext(nodeToIndex(node)); 216 // Add cur_node to the set of locks held currently by dtls. 217 void onLockAfter(DeadlockDetectorTLS<BV> *dtls, uptr cur_node, u32 stk = 0) { 218 ensureCurrentEpoch(dtls); [all...] |
/external/compiler-rt/lib/sanitizer_common/tests/ |
sanitizer_deadlock_detector_test.cc | 38 dtls.clear(); 42 DeadlockDetectorTLS<BV> dtls; member in struct:ScopedDD 50 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local 76 dtls.clear(); 79 EXPECT_FALSE(d.onLock(&dtls, n1)); 80 EXPECT_FALSE(d.onLock(&dtls, n2)); 81 d.onUnlock(&dtls, n2); 82 d.onUnlock(&dtls, n1); 84 EXPECT_FALSE(d.onLock(&dtls, n2)) 141 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local 247 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local 292 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local 324 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local 351 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local 389 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local 419 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local 457 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local [all...] |
/external/compiler-rt/lib/msan/ |
msan_thread.cc | 38 DTLS *dtls = DTLS_Get(); local 39 CHECK_NE(dtls, 0); 40 for (uptr i = 0; i < dtls->dtv_size; ++i) 41 __msan_unpoison((void *)(dtls->dtv[i].beg), dtls->dtv[i].size);
|
/external/compiler-rt/test/asan/TestCases/Linux/ |
stress_dtls.c | 65 uintptr_t dtls = (uintptr_t)Functions[i](); local 66 fprintf(stderr, " dtls[%03d]: %lx\n", i, dtls); 67 *(long*)dtls = 42; // check that this is writable.
|
/external/webrtc/webrtc/p2p/base/ |
transportdescriptionfactory_unittest.cc | 60 // If |dtls| is true, the test verifies that the finger print is not changed. 61 void TestIceRestart(bool dtls) { 62 if (dtls) { 85 VerifyUfragAndPasswordChanged(dtls, offer.get(), restart_offer.get()); 93 VerifyUfragAndPasswordChanged(dtls, answer.get(), restart_answer.get()); 96 void VerifyUfragAndPasswordChanged(bool dtls, 105 // If DTLS is enabled, make sure the finger print is unchanged. 106 if (dtls) { 143 // Test generating an offer with DTLS fails with no identity. 151 // Test updating an offer with DTLS to pick ICE [all...] |
dtlstransportchannel.cc | 137 LOG_J(LS_INFO, this) << "Ignoring identical DTLS identity"; 140 LOG_J(LS_ERROR, this) << "Can't change DTLS local identity in this state"; 149 LOG_J(LS_INFO, this) << "NULL DTLS identity supplied. Not doing DTLS"; 164 << "while DTLS is negotiating"; 209 LOG_J(LS_INFO, this) << "Ignoring identical remote DTLS fingerprint"; 213 // If the other side doesn't support DTLS, turn off |dtls_active_|. 216 LOG_J(LS_INFO, this) << "Other side didn't support DTLS."; 224 LOG_J(LS_ERROR, this) << "Can't set DTLS remote settings in this state."; 228 // At this point we know we are doing DTLS [all...] |
/external/webrtc/webrtc/examples/peerconnection/client/ |
conductor.h | 58 bool CreatePeerConnection(bool dtls);
|
conductor.cc | 112 bool Conductor::CreatePeerConnection(bool dtls) { 122 if (dtls) { 267 // Recreate the peerconnection with DTLS disabled.
|
/external/webrtc/talk/session/media/ |
channel.cc | 257 // When using DTLS-SRTP, we must reset the SrtpFilter every time the transport 258 // changes and wait until the DTLS handshake is complete to set the newly 262 // DTLS-SRTP when the writable_ becomes true again. 350 << "Setting RTCP for DTLS/SRTP after SrtpFilter is active " 522 // state, setting up DTLS-SRTP context is deferred to ChannelWritable_w to 524 // TransportChannel) or when TransportChannel is attached after DTLS is 740 // b) we got SRTP packets before DTLS completed on both the RTP and RTCP 741 // channels, so we haven't yet extracted keys, even if DTLS did complete 866 // Since DTLS is applied to all channels, checking RTP should be enough. 870 // This function returns true if either DTLS-SRTP is not in us 1039 bool dtls = false; local [all...] |
channel.h | 110 // DTLS-based keying. If you turned off SRTP later, however 245 // Do the DTLS key expansion and impose it on the SRTP/SRTCP filters. 249 // Set the DTLS-SRTP cipher policy on this channel as appropriate. 280 bool* dtls,
|
/external/webrtc/webrtc/base/ |
sslstreamadapter_unittest.cc | 227 bool dtls, 243 dtls_(dtls), 851 // Basic tests: DTLS 907 // Test DTLS-SRTP with all high ciphers 925 // Test DTLS-SRTP with all low ciphers 944 // Test DTLS-SRTP with a mismatch -- should not converge 961 // Test DTLS-SRTP with each side being mixed -- should select high [all...] |
/external/webrtc/talk/app/webrtc/ |
peerconnectioninterface_unittest.cc | 556 // DTLS does not work in a loopback call, so is disabled for most of the 568 bool dtls; local 571 &dtls, 572 nullptr) && dtls) { [all...] |
webrtcsession_unittest.cc | 400 // |certificates| then DTLS will be enabled unless explicitly disabled by 401 // |rtc_configuration| options. When DTLS is enabled a certificate will be 457 // Successfully init with DTLS; with a certificate generated and supplied or 474 // Init with DTLS with a store that will fail to generate a certificate. 682 void VerifyNoCryptoParams(const cricket::SessionDescription* sdp, bool dtls) { 699 if (dtls) { 712 // Set the internal fake description factories to do DTLS-SRTP. [all...] |