/external/chromium_org/third_party/libjingle/source/talk/p2p/base/ |
H A D | transportdescriptionfactory_unittest.cc | 75 // If |dtls| is true, the test verifies that the finger print is not changed. 76 void TestIceRestart(bool dtls) { argument 77 if (dtls) { 100 VerifyUfragAndPasswordChanged(dtls, offer.get(), restart_offer.get()); 108 VerifyUfragAndPasswordChanged(dtls, answer.get(), restart_answer.get()); 111 void VerifyUfragAndPasswordChanged(bool dtls, argument 121 if (dtls) {
|
H A D | dtlstransportchannel.cc | 529 void DtlsTransportChannelWrapper::OnDtlsEvent(rtc::StreamInterface* dtls, argument 532 ASSERT(dtls == dtls_.get());
|
/external/compiler-rt/lib/msan/ |
H A D | msan_thread.cc | 38 DTLS *dtls = DTLS_Get(); local 39 for (uptr i = 0; i < dtls->dtv_size; ++i) 40 __msan_unpoison((void *)(dtls->dtv[i].beg), dtls->dtv[i].size);
|
/external/compiler-rt/lib/sanitizer_common/ |
H A D | sanitizer_tls_get_addr.cc | 38 static __thread DTLS dtls; member in namespace:__sanitizer 54 if (dtls.dtv_size >= new_size) return; 61 VPrintf(2, "__tls_get_addr: DTLS_Resize %p %zd\n", &dtls, num_live_dtls); 63 uptr old_dtv_size = dtls.dtv_size; 64 DTLS::DTV *old_dtv = dtls.dtv; 66 internal_memcpy(new_dtv, dtls.dtv, dtls.dtv_size * sizeof(DTLS::DTV)); 67 dtls.dtv = new_dtv; 68 dtls.dtv_size = new_size; 75 VPrintf(2, "__tls_get_addr: DTLS_Destroy %p %zd\n", &dtls, dtl [all...] |
H A D | sanitizer_deadlock_detector.h | 195 void ensureCurrentEpoch(DeadlockDetectorTLS<BV> *dtls) { argument 196 dtls->ensureCurrentEpoch(current_epoch_); 202 bool onLockBefore(DeadlockDetectorTLS<BV> *dtls, uptr cur_node) { argument 203 ensureCurrentEpoch(dtls); 205 return g_.isReachable(cur_idx, dtls->getLocks(current_epoch_)); 208 u32 findLockContext(DeadlockDetectorTLS<BV> *dtls, uptr node) { argument 209 return dtls->findLockContext(nodeToIndex(node)); 212 // Add cur_node to the set of locks held currently by dtls. 213 void onLockAfter(DeadlockDetectorTLS<BV> *dtls, uptr cur_node, u32 stk = 0) { argument 214 ensureCurrentEpoch(dtls); 221 hasAllEdges(DeadlockDetectorTLS<BV> *dtls, uptr cur_node) argument 240 addEdges(DeadlockDetectorTLS<BV> *dtls, uptr cur_node, u32 stk, int unique_tid) argument 277 onLock(DeadlockDetectorTLS<BV> *dtls, uptr cur_node, u32 stk = 0) argument 290 onTryLock(DeadlockDetectorTLS<BV> *dtls, uptr cur_node, u32 stk = 0) argument 300 onFirstLock(DeadlockDetectorTLS<BV> *dtls, uptr node, u32 stk = 0) argument 312 findPathToLock(DeadlockDetectorTLS<BV> *dtls, uptr cur_node, uptr *path, uptr path_size) argument 327 onUnlock(DeadlockDetectorTLS<BV> *dtls, uptr node) argument 336 onLockFast(DeadlockDetectorTLS<BV> *dtls, uptr node, u32 stk = 0) argument 344 isHeld(DeadlockDetectorTLS<BV> *dtls, uptr node) const argument [all...] |
/external/compiler-rt/test/asan/TestCases/Linux/ |
H A D | stress_dtls.c | 64 uintptr_t dtls = (uintptr_t)Functions[i](); local 65 fprintf(stderr, " dtls[%03d]: %lx\n", i, dtls); 66 *(long*)dtls = 42; // check that this is writable.
|
/external/compiler-rt/lib/sanitizer_common/tests/ |
H A D | sanitizer_deadlock_detector_test.cc | 38 dtls.clear(); 42 DeadlockDetectorTLS<BV> dtls; member in struct:ScopedDD 50 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local 76 dtls.clear(); 79 EXPECT_FALSE(d.onLock(&dtls, n1)); 80 EXPECT_FALSE(d.onLock(&dtls, n2)); 81 d.onUnlock(&dtls, n2); 82 d.onUnlock(&dtls, n1); 84 EXPECT_FALSE(d.onLock(&dtls, n 141 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local 247 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local 292 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local 324 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local 351 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local 389 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local 419 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local 457 DeadlockDetectorTLS<BV> &dtls = sdd.dtls; local [all...] |
/external/chromium_org/third_party/libjingle/source/talk/examples/call/ |
H A D | call_main.cc | 235 DEFINE_string(dtls, "disable", 279 std::string dtls = FLAG_dtls; local 426 if (!GetSecurePolicy(dtls, &dtls_policy)) {
|
/external/chromium_org/third_party/libjingle/source/talk/app/webrtc/ |
H A D | peerconnectioninterface_unittest.cc | 266 bool dtls; local 269 &dtls, 270 NULL) && dtls) {
|
H A D | webrtcsession_unittest.cc | 464 void VerifyNoCryptoParams(const cricket::SessionDescription* sdp, bool dtls) { argument 481 if (dtls) {
|
/external/chromium_org/third_party/webrtc/base/ |
H A D | sslstreamadapter_unittest.cc | 161 bool dtls) : 171 damage_(false), dtls_(dtls), 159 SSLStreamAdapterTestBase(const std::string& client_cert_pem, const std::string& client_private_key_pem, bool dtls) argument
|
/external/chromium_org/third_party/libjingle/source/talk/session/media/ |
H A D | channel.cc | 872 // |dtls| will be set to true if DTLS is active for transport channel and 875 bool* dtls, 877 *dtls = transport_channel_->IsDtlsActive(); 878 if (*dtls && !cryptos.empty()) { 931 bool dtls = false; local 932 ret = CheckSrtpConfig(cryptos, &dtls, error_desc); 940 if (!dtls) { 947 if (!dtls) { 954 if (!dtls) { 874 CheckSrtpConfig(const std::vector<CryptoParams>& cryptos, bool* dtls, std::string* error_desc) argument
|