HomeSort by relevance Sort by last modified time
    Searched defs:dtls (Results 1 - 11 of 11) sorted by null

  /external/compiler-rt/lib/lsan/
lsan_thread.h 21 struct DTLS;
37 DTLS *dtls() { return dtls_; } function in class:__lsan::ThreadContext
43 DTLS *dtls_;
lsan_thread.cc 66 DTLS *dtls; member in struct:__lsan::OnStartedArgs
77 dtls_ = args->dtls;
99 args.dtls = DTLS_Get();
141 uptr *cache_end, DTLS **dtls) {
151 *dtls = context->dtls();
lsan_common.cc 197 DTLS *dtls; local
200 &cache_begin, &cache_end, &dtls);
260 if (dtls) {
261 for (uptr j = 0; j < dtls->dtv_size; ++j) {
262 uptr dtls_beg = dtls->dtv[j].beg;
263 uptr dtls_end = dtls_beg + dtls->dtv[j].size;
265 LOG_THREADS("DTLS %zu at %p-%p.\n", j, dtls_beg, dtls_end);
266 ScanRangeForPointers(dtls_beg, dtls_end, frontier, "DTLS",
  /external/compiler-rt/lib/msan/
msan_thread.cc 38 DTLS *dtls = DTLS_Get(); local
39 CHECK_NE(dtls, 0);
40 for (uptr i = 0; i < dtls->dtv_size; ++i)
41 __msan_unpoison((void *)(dtls->dtv[i].beg), dtls->dtv[i].size);
  /external/compiler-rt/test/asan/TestCases/Linux/
stress_dtls.c 65 uintptr_t dtls = (uintptr_t)Functions[i](); local
66 fprintf(stderr, " dtls[%03d]: %lx\n", i, dtls);
67 *(long*)dtls = 42; // check that this is writable.
  /external/compiler-rt/lib/sanitizer_common/
sanitizer_tls_get_addr.cc 38 static __thread DTLS dtls; member in namespace:__sanitizer
40 // Make sure we properly destroy the DTLS objects:
46 static inline void DTLS_Deallocate(DTLS::DTV *dtv, uptr size) {
49 UnmapOrDie(dtv, size * sizeof(DTLS::DTV));
54 if (dtls.dtv_size >= new_size) return;
56 new_size = Max(new_size, 4096UL / sizeof(DTLS::DTV));
57 DTLS::DTV *new_dtv =
58 (DTLS::DTV *)MmapOrDie(new_size * sizeof(DTLS::DTV), "DTLS_Resize")
    [all...]
  /external/compiler-rt/lib/asan/
asan_thread.h 27 struct DTLS;
74 DTLS *dtls() { return dtls_; } function in class:__asan::AsanThread
154 DTLS *dtls_;
  /external/compiler-rt/lib/sanitizer_common/tests/
sanitizer_deadlock_detector_test.cc 38 dtls.clear();
42 DeadlockDetectorTLS<BV> dtls; member in struct:ScopedDD
50 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local
76 dtls.clear();
79 EXPECT_FALSE(d.onLock(&dtls, n1));
80 EXPECT_FALSE(d.onLock(&dtls, n2));
81 d.onUnlock(&dtls, n2);
82 d.onUnlock(&dtls, n1);
84 EXPECT_FALSE(d.onLock(&dtls, n2))
141 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local
247 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local
292 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local
324 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local
351 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local
389 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local
419 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local
457 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local
    [all...]
  /external/boringssl/src/ssl/test/runner/
runner.go 271 if protocol == dtls {
312 dtls
351 // expectedSRTPProtectionProfile is the DTLS-SRTP profile that
419 // to replay every write it makes in DTLS tests.
535 if test.protocol == dtls {
547 isDatagram: test.protocol == dtls,
585 if test.protocol == dtls {
592 if test.protocol == dtls {
757 if test.protocol == dtls {
758 return fmt.Errorf("messageLen < 0 not supported for DTLS tests"
311 dtls const
    [all...]
  /external/webrtc/talk/app/webrtc/
peerconnectioninterface_unittest.cc 556 // DTLS does not work in a loopback call, so is disabled for most of the
568 bool dtls; local
571 &dtls,
572 nullptr) && dtls) {
    [all...]
  /external/webrtc/talk/session/media/
channel.cc 257 // When using DTLS-SRTP, we must reset the SrtpFilter every time the transport
258 // changes and wait until the DTLS handshake is complete to set the newly
262 // DTLS-SRTP when the writable_ becomes true again.
350 << "Setting RTCP for DTLS/SRTP after SrtpFilter is active "
522 // state, setting up DTLS-SRTP context is deferred to ChannelWritable_w to
524 // TransportChannel) or when TransportChannel is attached after DTLS is
740 // b) we got SRTP packets before DTLS completed on both the RTP and RTCP
741 // channels, so we haven't yet extracted keys, even if DTLS did complete
866 // Since DTLS is applied to all channels, checking RTP should be enough.
870 // This function returns true if either DTLS-SRTP is not in us
1039 bool dtls = false; local
    [all...]

Completed in 7492 milliseconds