/external/compiler-rt/lib/sanitizer_common/ |
sanitizer_tls_get_addr.cc | 38 static __thread DTLS dtls; member in namespace:__sanitizer 40 // Make sure we properly destroy the DTLS objects: 46 static inline void DTLS_Deallocate(DTLS::DTV *dtv, uptr size) { 49 UnmapOrDie(dtv, size * sizeof(DTLS::DTV)); 54 if (dtls.dtv_size >= new_size) return; 56 new_size = Max(new_size, 4096UL / sizeof(DTLS::DTV)); 57 DTLS::DTV *new_dtv = 58 (DTLS::DTV *)MmapOrDie(new_size * sizeof(DTLS::DTV), "DTLS_Resize") [all...] |
sanitizer_deadlock_detector.h | 199 void ensureCurrentEpoch(DeadlockDetectorTLS<BV> *dtls) { 200 dtls->ensureCurrentEpoch(current_epoch_); 206 bool onLockBefore(DeadlockDetectorTLS<BV> *dtls, uptr cur_node) { 207 ensureCurrentEpoch(dtls); 209 return g_.isReachable(cur_idx, dtls->getLocks(current_epoch_)); 212 u32 findLockContext(DeadlockDetectorTLS<BV> *dtls, uptr node) { 213 return dtls->findLockContext(nodeToIndex(node)); 216 // Add cur_node to the set of locks held currently by dtls. 217 void onLockAfter(DeadlockDetectorTLS<BV> *dtls, uptr cur_node, u32 stk = 0) { 218 ensureCurrentEpoch(dtls); [all...] |
sanitizer_tls_get_addr.h | 13 // the lack of interface that would tell us about the Dynamic TLS (DTLS). 20 // Before 2.19, every DTLS chunk is allocated with __libc_memalign, 21 // which we intercept and thus know where is the DTLS. 22 // Since 2.19, DTLS chunks are allocated with __signal_safe_memalign, 36 struct DTLS { 37 // Array of DTLS chunks for the current Thread. 53 DTLS::DTV *DTLS_on_tls_get_addr(void *arg, void *res, uptr static_tls_begin, 56 DTLS *DTLS_Get();
|
/external/compiler-rt/lib/sanitizer_common/tests/ |
sanitizer_deadlock_detector_test.cc | 38 dtls.clear(); 42 DeadlockDetectorTLS<BV> dtls; member in struct:ScopedDD 50 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local 76 dtls.clear(); 79 EXPECT_FALSE(d.onLock(&dtls, n1)); 80 EXPECT_FALSE(d.onLock(&dtls, n2)); 81 d.onUnlock(&dtls, n2); 82 d.onUnlock(&dtls, n1); 84 EXPECT_FALSE(d.onLock(&dtls, n2)) 141 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local 247 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local 292 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local 324 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local 351 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local 389 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local 419 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local 457 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local [all...] |
/external/webrtc/webrtc/p2p/base/ |
dtlstransportchannel.cc | 137 LOG_J(LS_INFO, this) << "Ignoring identical DTLS identity"; 140 LOG_J(LS_ERROR, this) << "Can't change DTLS local identity in this state"; 149 LOG_J(LS_INFO, this) << "NULL DTLS identity supplied. Not doing DTLS"; 164 << "while DTLS is negotiating"; 209 LOG_J(LS_INFO, this) << "Ignoring identical remote DTLS fingerprint"; 213 // If the other side doesn't support DTLS, turn off |dtls_active_|. 216 LOG_J(LS_INFO, this) << "Other side didn't support DTLS."; 224 LOG_J(LS_ERROR, this) << "Can't set DTLS remote settings in this state."; 228 // At this point we know we are doing DTLS [all...] |
transportdescriptionfactory_unittest.cc | 60 // If |dtls| is true, the test verifies that the finger print is not changed. 61 void TestIceRestart(bool dtls) { 62 if (dtls) { 85 VerifyUfragAndPasswordChanged(dtls, offer.get(), restart_offer.get()); 93 VerifyUfragAndPasswordChanged(dtls, answer.get(), restart_answer.get()); 96 void VerifyUfragAndPasswordChanged(bool dtls, 105 // If DTLS is enabled, make sure the finger print is unchanged. 106 if (dtls) { 143 // Test generating an offer with DTLS fails with no identity. 151 // Test updating an offer with DTLS to pick ICE [all...] |
dtlstransportchannel.h | 56 // This class provides a DTLS SSLStreamAdapter inside a TransportChannel-style 70 // channel_ via OnReadPacket() is checked for whether it is DTLS 77 // downward_ or directly to channel_, depending on whether DTLS is 102 // support DTLS. 105 // Called to send a packet (via DTLS, if turned on). 126 // Set up the ciphers to use for DTLS-SRTP. If this method is not called 127 // before DTLS starts, or |ciphers| is empty, SRTP keys won't be negotiated. 131 // Find out which DTLS-SRTP cipher was negotiated 137 // Find out which DTLS cipher was negotiated 140 // Once DTLS has been established, this method retrieves the certificate i [all...] |
transportchannel.h | 36 // crypto provided by the transport (e.g. DTLS) 50 // transport and a DTLS transport. They need to be separated apart. 82 // Emitted whenever DTLS-SRTP is setup which will require setting up a new 105 // Is DTLS active? 111 // Sets up the ciphers to use for DTLS-SRTP. TODO(guoweis): Make this pure 119 // Finds out which DTLS-SRTP cipher was negotiated. 123 // Finds out which DTLS cipher was negotiated. 127 // Gets the local RTCCertificate used for DTLS. 167 // Sets the DTLS state, signaling if necessary.
|
dtlstransportchannel_unittest.cc | 73 "dtls content name", nullptr, certificate_)); 109 // Offer DTLS if we have an identity; pass in a remote fingerprint only if 110 // both sides support DTLS. 118 // Allow any DTLS configuration to be specified (including invalid ones). 161 // If remote if the offerer and has no DTLS support, answer will be 255 // against, and make sure that it doesn't look like DTLS. 261 // Only set the bypass flag if we've activated DTLS. 338 // Only DTLS-SRTP packets should have the bypass flag set. 351 // Hook into the raw packet stream to make sure DTLS packets are encrypted. 360 // Check that non-handshake packets are DTLS data or SRTP bypass [all...] |
transportdescriptionfactory.cc | 75 // The offer supports DTLS, so answer with DTLS, as long as we support it. 78 // Setting DTLS role to active. 87 // We require DTLS, but the other side didn't offer it. Fail.
|
dtlstransport.h | 130 // if the answerer uses setup:passive, then the DTLS handshake will 132 // latency. setup:active allows the answer and the DTLS handshake to 134 // party is active MUST initiate a DTLS handshake by sending a 188 "Local fingerprint supplied when caller didn't offer DTLS.", 191 // We are not doing DTLS 226 // initiates DTLS setup.
|
transportchannelimpl.h | 87 // DTLS methods 91 // Set DTLS Remote fingerprint. Must be after local identity set.
|
/external/compiler-rt/lib/msan/ |
msan_thread.cc | 38 DTLS *dtls = DTLS_Get(); local 39 CHECK_NE(dtls, 0); 40 for (uptr i = 0; i < dtls->dtv_size; ++i) 41 __msan_unpoison((void *)(dtls->dtv[i].beg), dtls->dtv[i].size);
|
/external/compiler-rt/lib/lsan/ |
lsan_thread.h | 21 struct DTLS; 37 DTLS *dtls() { return dtls_; } function in class:__lsan::ThreadContext 43 DTLS *dtls_;
|
lsan_thread.cc | 66 DTLS *dtls; member in struct:__lsan::OnStartedArgs 77 dtls_ = args->dtls; 99 args.dtls = DTLS_Get(); 141 uptr *cache_end, DTLS **dtls) { 151 *dtls = context->dtls();
|
/external/boringssl/src/ssl/test/runner/ |
dtls.go | 5 // DTLS implementation. 7 // NOTE: This is a not even a remotely production-quality DTLS 44 return 0, nil, fmt.Errorf("dtls: exceeded maximum packet length") 52 // A real DTLS implementation should be tolerant of errors, 56 return 0, nil, errors.New("dtls: failed to read record header") 67 return 0, nil, c.in.setErrorLocked(fmt.Errorf("dtls: received record with version %x when expecting version %x", vers, c.wireVersion)) 73 return 0, nil, c.in.setErrorLocked(fmt.Errorf("dtls: received record with version %x when expecting version %x", vers, expect)) 85 return 0, nil, c.in.setErrorLocked(fmt.Errorf("dtls: bad epoch")) 89 return 0, nil, c.in.setErrorLocked(fmt.Errorf("dtls: bad sequence number")) 95 return 0, nil, c.in.setErrorLocked(fmt.Errorf("dtls: oversized record received with length %d", n) [all...] |
/external/compiler-rt/test/asan/TestCases/Linux/ |
stress_dtls.c | 65 uintptr_t dtls = (uintptr_t)Functions[i](); local 66 fprintf(stderr, " dtls[%03d]: %lx\n", i, dtls); 67 *(long*)dtls = 42; // check that this is writable.
|
/external/compiler-rt/test/msan/ |
dtls_test.c | 25 fprintf(stderr, "stack: %p dtls: %p\n", &x, x); 31 fprintf(stderr, "stack: %p dtls: %p\n", &x, x);
|
/external/compiler-rt/test/tsan/ |
dtls.c | 20 fprintf(stderr, "stack: %p dtls: %p\n", &x, x); 28 fprintf(stderr, "stack: %p dtls: %p\n", &x, x);
|
/external/webrtc/talk/app/webrtc/ |
webrtcsessiondescriptionfactory.h | 49 // DTLS identity request callback class. 84 // the async DTLS identity generation for WebRtcSession. 85 // It queues the create offer/answer request until the DTLS identity 91 // Construct with DTLS disabled. 97 // Construct with DTLS enabled using the specified |dtls_identity_store| to 106 // Construct with DTLS enabled using the specified (already generated)
|
dtlsidentitystore.cc | 181 LOG(LS_VERBOSE) << "Using a free DTLS identity."; 226 LOG(LS_VERBOSE) << "A free DTLS identity was saved."; 228 LOG(LS_WARNING) << "Failed to generate DTLS identity (preemptively)."; 232 LOG(LS_VERBOSE) << "A DTLS identity is returned to an observer."; 235 LOG(LS_WARNING) << "Failed to generate DTLS identity.";
|
/external/webrtc/webrtc/base/ |
sslstreamadapter.h | 38 // Given the DTLS-SRTP protection profile ID, as defined in 105 // Do DTLS or TLS 110 // DTLS 1.0 and the other DTLS 1.2, DTLS 1.0 will be used. 183 // DTLS-SRTP interface
|
sslstreamadapter_unittest.cc | 227 bool dtls, 243 dtls_(dtls), 851 // Basic tests: DTLS 907 // Test DTLS-SRTP with all high ciphers 925 // Test DTLS-SRTP with all low ciphers 944 // Test DTLS-SRTP with a mismatch -- should not converge 961 // Test DTLS-SRTP with each side being mixed -- should select high [all...] |
/external/compiler-rt/lib/asan/ |
asan_thread.h | 27 struct DTLS; 74 DTLS *dtls() { return dtls_; } function in class:__asan::AsanThread 154 DTLS *dtls_;
|
/external/webrtc/talk/session/media/ |
channel.cc | 257 // When using DTLS-SRTP, we must reset the SrtpFilter every time the transport 258 // changes and wait until the DTLS handshake is complete to set the newly 262 // DTLS-SRTP when the writable_ becomes true again. 350 << "Setting RTCP for DTLS/SRTP after SrtpFilter is active " 522 // state, setting up DTLS-SRTP context is deferred to ChannelWritable_w to 524 // TransportChannel) or when TransportChannel is attached after DTLS is 740 // b) we got SRTP packets before DTLS completed on both the RTP and RTCP 741 // channels, so we haven't yet extracted keys, even if DTLS did complete 866 // Since DTLS is applied to all channels, checking RTP should be enough. 870 // This function returns true if either DTLS-SRTP is not in us 1039 bool dtls = false; local [all...] |