/external/compiler-rt/lib/msan/ |
msan_thread.cc | 38 DTLS *dtls = DTLS_Get(); local 39 CHECK_NE(dtls, 0); 40 for (uptr i = 0; i < dtls->dtv_size; ++i) 41 __msan_unpoison((void *)(dtls->dtv[i].beg), dtls->dtv[i].size);
|
/external/compiler-rt/test/asan/TestCases/Linux/ |
stress_dtls.c | 65 uintptr_t dtls = (uintptr_t)Functions[i](); local 66 fprintf(stderr, " dtls[%03d]: %lx\n", i, dtls); 67 *(long*)dtls = 42; // check that this is writable.
|
/external/compiler-rt/lib/sanitizer_common/ |
sanitizer_tls_get_addr.cc | 38 static __thread DTLS dtls; member in namespace:__sanitizer 40 // Make sure we properly destroy the DTLS objects: 46 static inline void DTLS_Deallocate(DTLS::DTV *dtv, uptr size) { 49 UnmapOrDie(dtv, size * sizeof(DTLS::DTV)); 54 if (dtls.dtv_size >= new_size) return; 56 new_size = Max(new_size, 4096UL / sizeof(DTLS::DTV)); 57 DTLS::DTV *new_dtv = 58 (DTLS::DTV *)MmapOrDie(new_size * sizeof(DTLS::DTV), "DTLS_Resize") [all...] |
/external/compiler-rt/lib/sanitizer_common/tests/ |
sanitizer_deadlock_detector_test.cc | 38 dtls.clear(); 42 DeadlockDetectorTLS<BV> dtls; member in struct:ScopedDD 50 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local 76 dtls.clear(); 79 EXPECT_FALSE(d.onLock(&dtls, n1)); 80 EXPECT_FALSE(d.onLock(&dtls, n2)); 81 d.onUnlock(&dtls, n2); 82 d.onUnlock(&dtls, n1); 84 EXPECT_FALSE(d.onLock(&dtls, n2)) 141 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local 247 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local 292 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local 324 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local 351 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local 389 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local 419 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local 457 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local [all...] |
/external/boringssl/src/ssl/test/runner/ |
runner.go | 120 dtls 159 // expectedSRTPProtectionProfile is the DTLS-SRTP profile that 217 // to replay every write it makes in DTLS tests. 250 if test.protocol == dtls { 262 isDatagram: test.protocol == dtls, 293 if test.protocol == dtls { 300 if test.protocol == dtls { 442 if test.protocol == dtls { 443 return fmt.Errorf("messageLen < 0 not supported for DTLS tests") 479 if test.protocol == dtls { 119 dtls const [all...] |
/external/webrtc/talk/app/webrtc/ |
peerconnectioninterface_unittest.cc | 556 // DTLS does not work in a loopback call, so is disabled for most of the 568 bool dtls; local 571 &dtls, 572 nullptr) && dtls) { [all...] |
/external/webrtc/talk/session/media/ |
channel.cc | 257 // When using DTLS-SRTP, we must reset the SrtpFilter every time the transport 258 // changes and wait until the DTLS handshake is complete to set the newly 262 // DTLS-SRTP when the writable_ becomes true again. 350 << "Setting RTCP for DTLS/SRTP after SrtpFilter is active " 522 // state, setting up DTLS-SRTP context is deferred to ChannelWritable_w to 524 // TransportChannel) or when TransportChannel is attached after DTLS is 740 // b) we got SRTP packets before DTLS completed on both the RTP and RTCP 741 // channels, so we haven't yet extracted keys, even if DTLS did complete 866 // Since DTLS is applied to all channels, checking RTP should be enough. 870 // This function returns true if either DTLS-SRTP is not in us 1039 bool dtls = false; local [all...] |