/external/libvncserver/libvncserver/tightvnc-filetransfer/ |
filetransfermsg.c | 296 GetFileDownloadResponseMsgInBlocks(rfbClientPtr cl, rfbTightClientPtr rtcp) 301 char* path = rtcp->rcft.rcfd.fName; 305 if((rtcp->rcft.rcfd.downloadInProgress == FALSE) && (rtcp->rcft.rcfd.downloadFD == -1)) { 306 if((rtcp->rcft.rcfd.downloadFD = open(path, O_RDONLY)) == -1) { 311 rtcp->rcft.rcfd.downloadInProgress = TRUE; 313 if((rtcp->rcft.rcfd.downloadInProgress == TRUE) && (rtcp->rcft.rcfd.downloadFD != -1)) { 314 if( (numOfBytesRead = read(rtcp->rcft.rcfd.downloadFD, pBuf, SZ_RFBBLOCKSIZE)) <= 0) { 315 close(rtcp->rcft.rcfd.downloadFD) [all...] |
handlefiletransferrequest.c | 338 HandleFileDownloadRequest(rfbClientPtr cl, rfbTightClientPtr rtcp) 377 if((n = rfbReadExact(cl, rtcp->rcft.rcfd.fName, msg.fdr.fNameSize)) <= 0) { 386 rtcp->rcft.rcfd.fName[msg.fdr.fNameSize] = '\0'; 388 if(ConvertPath(rtcp->rcft.rcfd.fName) == NULL) { 402 HandleFileDownload(cl, rtcp); 469 rfbTightClientPtr rtcp = rfbGetTightClientData(cl); local 472 if(rtcp == NULL) 478 fileDownloadMsg = GetFileDownloadResponseMsgInBlocks(cl, rtcp); 488 CloseUndoneFileTransfer(cl, rtcp); 496 } while(rtcp->rcft.rcfd.downloadInProgress == TRUE) [all...] |
rfbtightserver.c | 43 rfbTightClientPtr rtcp = (rfbTightClientPtr) local 46 if(rtcp == NULL) { 51 return rtcp; 110 rfbTightClientPtr rtcp = rfbGetTightClientData(cl); local 114 if(rtcp == NULL) 130 for (i = 0; i < rtcp->nAuthCaps; i++) { 131 if (auth_type == rtcp->authCaps[i]) 134 if (i >= rtcp->nAuthCaps) { 186 rfbTightClientPtr rtcp = rfbGetTightClientData(cl); local 190 if(rtcp == NULL 497 rfbTightClientPtr rtcp = (rfbTightClientPtr) malloc(sizeof(rfbTightClientRec)); local [all...] |
/external/srtp/test/ |
rtpw.c | 315 crypto_policy_set_rtcp_default(&policy.rtcp); 319 crypto_policy_set_rtcp_default(&policy.rtcp); 323 crypto_policy_set_rtcp_default(&policy.rtcp); 336 policy.rtcp.sec_serv = sec_serv_none; /* we don't do RTCP anyway */ 368 * specification, since RTCP authentication is required. However, 381 policy.rtcp.cipher_type = NULL_CIPHER; 382 policy.rtcp.cipher_key_len = 0; 383 policy.rtcp.auth_type = NULL_AUTH; 384 policy.rtcp.auth_key_len = 0 [all...] |
dtls_srtp_driver.c | 183 err = crypto_policy_set_from_profile_for_rtcp(&policy.rtcp, profile);
|
srtp_driver.c | 320 crypto_policy_set_rtcp_default(&policy.rtcp); 993 "# rtcp cipher: %s\r\n" 994 "# rtcp auth: %s\r\n" 995 "# rtcp services: %s\r\n" 1019 "# rtcp cipher: %s\r\n" 1020 "# rtcp auth: %s\r\n" 1021 "# rtcp services: %s\r\n" 1182 crypto_policy_set_rtcp_default(&policy.rtcp); [all...] |
/external/srtp/include/ |
srtp.h | 58 * @brief libSRTP provides functions for protecting RTP and RTCP. See 217 crypto_policy_t rtcp; /**< SRTCP crypto policy. */ member in struct:srtp_policy_t 244 * RTCP destination transport addresses, using the RTP/SAVP (Secure 457 * structure to the SRTP default policy for RTCP protection. 462 * crypto_policy_t at location p to the SRTP default policy for RTCP 658 * structure to the appropriate value for RTCP based on an srtp_profile_t 663 * sets the crypto_policy_t at location policy to the policy for RTCP 719 * @defgroup SRTCP Secure RTCP 722 * @brief Secure RTCP functions are used to protect RTCP traffic [all...] |
/external/srtp/srtp/ |
srtp.c | 84 * This function allocates the stream context, rtp and rtcp ciphers 123 * ...and now the RTCP-specific initialization - first, allocate 126 stat = crypto_kernel_alloc_cipher(p->rtcp.cipher_type, 128 p->rtcp.cipher_key_len); 134 stat = crypto_kernel_alloc_auth(p->rtcp.auth_type, 136 p->rtcp.auth_key_len, 137 p->rtcp.auth_tag_len); 196 * deallocate rtcp cipher, if it is not the same as that in 206 * deallocate rtcp auth function, if it is not the same as that in 430 debug_print(mod_srtp, "found aes_icm, generating rtcp salt", NULL) [all...] |