HomeSort by relevance Sort by last modified time
    Searched full:dtls (Results 1 - 25 of 323) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /external/compiler-rt/lib/sanitizer_common/
sanitizer_tls_get_addr.cc 38 static __thread DTLS dtls; member in namespace:__sanitizer
40 // Make sure we properly destroy the DTLS objects:
46 static inline void DTLS_Deallocate(DTLS::DTV *dtv, uptr size) {
49 UnmapOrDie(dtv, size * sizeof(DTLS::DTV));
54 if (dtls.dtv_size >= new_size) return;
56 new_size = Max(new_size, 4096UL / sizeof(DTLS::DTV));
57 DTLS::DTV *new_dtv =
58 (DTLS::DTV *)MmapOrDie(new_size * sizeof(DTLS::DTV), "DTLS_Resize")
    [all...]
sanitizer_deadlock_detector.h 199 void ensureCurrentEpoch(DeadlockDetectorTLS<BV> *dtls) {
200 dtls->ensureCurrentEpoch(current_epoch_);
206 bool onLockBefore(DeadlockDetectorTLS<BV> *dtls, uptr cur_node) {
207 ensureCurrentEpoch(dtls);
209 return g_.isReachable(cur_idx, dtls->getLocks(current_epoch_));
212 u32 findLockContext(DeadlockDetectorTLS<BV> *dtls, uptr node) {
213 return dtls->findLockContext(nodeToIndex(node));
216 // Add cur_node to the set of locks held currently by dtls.
217 void onLockAfter(DeadlockDetectorTLS<BV> *dtls, uptr cur_node, u32 stk = 0) {
218 ensureCurrentEpoch(dtls);
    [all...]
sanitizer_tls_get_addr.h 13 // the lack of interface that would tell us about the Dynamic TLS (DTLS).
20 // Before 2.19, every DTLS chunk is allocated with __libc_memalign,
21 // which we intercept and thus know where is the DTLS.
22 // Since 2.19, DTLS chunks are allocated with __signal_safe_memalign,
36 struct DTLS {
37 // Array of DTLS chunks for the current Thread.
53 DTLS::DTV *DTLS_on_tls_get_addr(void *arg, void *res, uptr static_tls_begin,
56 DTLS *DTLS_Get();
  /external/compiler-rt/lib/sanitizer_common/tests/
sanitizer_deadlock_detector_test.cc 38 dtls.clear();
42 DeadlockDetectorTLS<BV> dtls; member in struct:ScopedDD
50 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local
76 dtls.clear();
79 EXPECT_FALSE(d.onLock(&dtls, n1));
80 EXPECT_FALSE(d.onLock(&dtls, n2));
81 d.onUnlock(&dtls, n2);
82 d.onUnlock(&dtls, n1);
84 EXPECT_FALSE(d.onLock(&dtls, n2))
141 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local
247 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local
292 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local
324 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local
351 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local
389 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local
419 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local
457 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local
    [all...]
  /external/webrtc/webrtc/p2p/base/
dtlstransportchannel.cc 137 LOG_J(LS_INFO, this) << "Ignoring identical DTLS identity";
140 LOG_J(LS_ERROR, this) << "Can't change DTLS local identity in this state";
149 LOG_J(LS_INFO, this) << "NULL DTLS identity supplied. Not doing DTLS";
164 << "while DTLS is negotiating";
209 LOG_J(LS_INFO, this) << "Ignoring identical remote DTLS fingerprint";
213 // If the other side doesn't support DTLS, turn off |dtls_active_|.
216 LOG_J(LS_INFO, this) << "Other side didn't support DTLS.";
224 LOG_J(LS_ERROR, this) << "Can't set DTLS remote settings in this state.";
228 // At this point we know we are doing DTLS
    [all...]
transportdescriptionfactory_unittest.cc 60 // If |dtls| is true, the test verifies that the finger print is not changed.
61 void TestIceRestart(bool dtls) {
62 if (dtls) {
85 VerifyUfragAndPasswordChanged(dtls, offer.get(), restart_offer.get());
93 VerifyUfragAndPasswordChanged(dtls, answer.get(), restart_answer.get());
96 void VerifyUfragAndPasswordChanged(bool dtls,
105 // If DTLS is enabled, make sure the finger print is unchanged.
106 if (dtls) {
143 // Test generating an offer with DTLS fails with no identity.
151 // Test updating an offer with DTLS to pick ICE
    [all...]
dtlstransportchannel.h 56 // This class provides a DTLS SSLStreamAdapter inside a TransportChannel-style
70 // channel_ via OnReadPacket() is checked for whether it is DTLS
77 // downward_ or directly to channel_, depending on whether DTLS is
102 // support DTLS.
105 // Called to send a packet (via DTLS, if turned on).
126 // Set up the ciphers to use for DTLS-SRTP. If this method is not called
127 // before DTLS starts, or |ciphers| is empty, SRTP keys won't be negotiated.
131 // Find out which DTLS-SRTP cipher was negotiated
137 // Find out which DTLS cipher was negotiated
140 // Once DTLS has been established, this method retrieves the certificate i
    [all...]
transportchannel.h 36 // crypto provided by the transport (e.g. DTLS)
50 // transport and a DTLS transport. They need to be separated apart.
82 // Emitted whenever DTLS-SRTP is setup which will require setting up a new
105 // Is DTLS active?
111 // Sets up the ciphers to use for DTLS-SRTP. TODO(guoweis): Make this pure
119 // Finds out which DTLS-SRTP cipher was negotiated.
123 // Finds out which DTLS cipher was negotiated.
127 // Gets the local RTCCertificate used for DTLS.
167 // Sets the DTLS state, signaling if necessary.
dtlstransportchannel_unittest.cc 73 "dtls content name", nullptr, certificate_));
109 // Offer DTLS if we have an identity; pass in a remote fingerprint only if
110 // both sides support DTLS.
118 // Allow any DTLS configuration to be specified (including invalid ones).
161 // If remote if the offerer and has no DTLS support, answer will be
255 // against, and make sure that it doesn't look like DTLS.
261 // Only set the bypass flag if we've activated DTLS.
338 // Only DTLS-SRTP packets should have the bypass flag set.
351 // Hook into the raw packet stream to make sure DTLS packets are encrypted.
360 // Check that non-handshake packets are DTLS data or SRTP bypass
    [all...]
transportdescriptionfactory.cc 75 // The offer supports DTLS, so answer with DTLS, as long as we support it.
78 // Setting DTLS role to active.
87 // We require DTLS, but the other side didn't offer it. Fail.
dtlstransport.h 130 // if the answerer uses setup:passive, then the DTLS handshake will
132 // latency. setup:active allows the answer and the DTLS handshake to
134 // party is active MUST initiate a DTLS handshake by sending a
188 "Local fingerprint supplied when caller didn't offer DTLS.",
191 // We are not doing DTLS
226 // initiates DTLS setup.
transportchannelimpl.h 87 // DTLS methods
91 // Set DTLS Remote fingerprint. Must be after local identity set.
  /external/compiler-rt/lib/msan/
msan_thread.cc 38 DTLS *dtls = DTLS_Get(); local
39 CHECK_NE(dtls, 0);
40 for (uptr i = 0; i < dtls->dtv_size; ++i)
41 __msan_unpoison((void *)(dtls->dtv[i].beg), dtls->dtv[i].size);
  /external/compiler-rt/lib/lsan/
lsan_thread.h 21 struct DTLS;
37 DTLS *dtls() { return dtls_; } function in class:__lsan::ThreadContext
43 DTLS *dtls_;
lsan_thread.cc 66 DTLS *dtls; member in struct:__lsan::OnStartedArgs
77 dtls_ = args->dtls;
99 args.dtls = DTLS_Get();
141 uptr *cache_end, DTLS **dtls) {
151 *dtls = context->dtls();
  /external/boringssl/src/ssl/test/runner/
dtls.go 5 // DTLS implementation.
7 // NOTE: This is a not even a remotely production-quality DTLS
44 return 0, nil, fmt.Errorf("dtls: exceeded maximum packet length")
52 // A real DTLS implementation should be tolerant of errors,
56 return 0, nil, errors.New("dtls: failed to read record header")
67 return 0, nil, c.in.setErrorLocked(fmt.Errorf("dtls: received record with version %x when expecting version %x", vers, c.wireVersion))
73 return 0, nil, c.in.setErrorLocked(fmt.Errorf("dtls: received record with version %x when expecting version %x", vers, expect))
85 return 0, nil, c.in.setErrorLocked(fmt.Errorf("dtls: bad epoch"))
89 return 0, nil, c.in.setErrorLocked(fmt.Errorf("dtls: bad sequence number"))
95 return 0, nil, c.in.setErrorLocked(fmt.Errorf("dtls: oversized record received with length %d", n)
    [all...]
  /external/compiler-rt/test/asan/TestCases/Linux/
stress_dtls.c 65 uintptr_t dtls = (uintptr_t)Functions[i](); local
66 fprintf(stderr, " dtls[%03d]: %lx\n", i, dtls);
67 *(long*)dtls = 42; // check that this is writable.
  /external/compiler-rt/test/msan/
dtls_test.c 25 fprintf(stderr, "stack: %p dtls: %p\n", &x, x);
31 fprintf(stderr, "stack: %p dtls: %p\n", &x, x);
  /external/compiler-rt/test/tsan/
dtls.c 20 fprintf(stderr, "stack: %p dtls: %p\n", &x, x);
28 fprintf(stderr, "stack: %p dtls: %p\n", &x, x);
  /external/webrtc/talk/app/webrtc/
webrtcsessiondescriptionfactory.h 49 // DTLS identity request callback class.
84 // the async DTLS identity generation for WebRtcSession.
85 // It queues the create offer/answer request until the DTLS identity
91 // Construct with DTLS disabled.
97 // Construct with DTLS enabled using the specified |dtls_identity_store| to
106 // Construct with DTLS enabled using the specified (already generated)
dtlsidentitystore.cc 181 LOG(LS_VERBOSE) << "Using a free DTLS identity.";
226 LOG(LS_VERBOSE) << "A free DTLS identity was saved.";
228 LOG(LS_WARNING) << "Failed to generate DTLS identity (preemptively).";
232 LOG(LS_VERBOSE) << "A DTLS identity is returned to an observer.";
235 LOG(LS_WARNING) << "Failed to generate DTLS identity.";
  /external/webrtc/webrtc/base/
sslstreamadapter.h 38 // Given the DTLS-SRTP protection profile ID, as defined in
105 // Do DTLS or TLS
110 // DTLS 1.0 and the other DTLS 1.2, DTLS 1.0 will be used.
183 // DTLS-SRTP interface
sslstreamadapter_unittest.cc 227 bool dtls,
243 dtls_(dtls),
851 // Basic tests: DTLS
907 // Test DTLS-SRTP with all high ciphers
925 // Test DTLS-SRTP with all low ciphers
944 // Test DTLS-SRTP with a mismatch -- should not converge
961 // Test DTLS-SRTP with each side being mixed -- should select high
    [all...]
  /external/compiler-rt/lib/asan/
asan_thread.h 27 struct DTLS;
74 DTLS *dtls() { return dtls_; } function in class:__asan::AsanThread
154 DTLS *dtls_;
  /external/webrtc/talk/session/media/
channel.cc 257 // When using DTLS-SRTP, we must reset the SrtpFilter every time the transport
258 // changes and wait until the DTLS handshake is complete to set the newly
262 // DTLS-SRTP when the writable_ becomes true again.
350 << "Setting RTCP for DTLS/SRTP after SrtpFilter is active "
522 // state, setting up DTLS-SRTP context is deferred to ChannelWritable_w to
524 // TransportChannel) or when TransportChannel is attached after DTLS is
740 // b) we got SRTP packets before DTLS completed on both the RTP and RTCP
741 // channels, so we haven't yet extracted keys, even if DTLS did complete
866 // Since DTLS is applied to all channels, checking RTP should be enough.
870 // This function returns true if either DTLS-SRTP is not in us
1039 bool dtls = false; local
    [all...]

Completed in 829 milliseconds

1 2 3 4 5 6 7 8 91011>>