HomeSort by relevance Sort by last modified time
    Searched refs:rtcp (Results 1 - 8 of 8) sorted by null

  /external/libvncserver/libvncserver/tightvnc-filetransfer/
filetransfermsg.c 296 GetFileDownloadResponseMsgInBlocks(rfbClientPtr cl, rfbTightClientPtr rtcp)
301 char* path = rtcp->rcft.rcfd.fName;
305 if((rtcp->rcft.rcfd.downloadInProgress == FALSE) && (rtcp->rcft.rcfd.downloadFD == -1)) {
306 if((rtcp->rcft.rcfd.downloadFD = open(path, O_RDONLY)) == -1) {
311 rtcp->rcft.rcfd.downloadInProgress = TRUE;
313 if((rtcp->rcft.rcfd.downloadInProgress == TRUE) && (rtcp->rcft.rcfd.downloadFD != -1)) {
314 if( (numOfBytesRead = read(rtcp->rcft.rcfd.downloadFD, pBuf, SZ_RFBBLOCKSIZE)) <= 0) {
315 close(rtcp->rcft.rcfd.downloadFD)
    [all...]
handlefiletransferrequest.c 338 HandleFileDownloadRequest(rfbClientPtr cl, rfbTightClientPtr rtcp)
377 if((n = rfbReadExact(cl, rtcp->rcft.rcfd.fName, msg.fdr.fNameSize)) <= 0) {
386 rtcp->rcft.rcfd.fName[msg.fdr.fNameSize] = '\0';
388 if(ConvertPath(rtcp->rcft.rcfd.fName) == NULL) {
402 HandleFileDownload(cl, rtcp);
469 rfbTightClientPtr rtcp = rfbGetTightClientData(cl); local
472 if(rtcp == NULL)
478 fileDownloadMsg = GetFileDownloadResponseMsgInBlocks(cl, rtcp);
488 CloseUndoneFileTransfer(cl, rtcp);
496 } while(rtcp->rcft.rcfd.downloadInProgress == TRUE)
    [all...]
rfbtightserver.c 43 rfbTightClientPtr rtcp = (rfbTightClientPtr) local
46 if(rtcp == NULL) {
51 return rtcp;
110 rfbTightClientPtr rtcp = rfbGetTightClientData(cl); local
114 if(rtcp == NULL)
130 for (i = 0; i < rtcp->nAuthCaps; i++) {
131 if (auth_type == rtcp->authCaps[i])
134 if (i >= rtcp->nAuthCaps) {
186 rfbTightClientPtr rtcp = rfbGetTightClientData(cl); local
190 if(rtcp == NULL
497 rfbTightClientPtr rtcp = (rfbTightClientPtr) malloc(sizeof(rfbTightClientRec)); local
    [all...]
  /external/srtp/test/
rtpw.c 315 crypto_policy_set_rtcp_default(&policy.rtcp);
319 crypto_policy_set_rtcp_default(&policy.rtcp);
323 crypto_policy_set_rtcp_default(&policy.rtcp);
336 policy.rtcp.sec_serv = sec_serv_none; /* we don't do RTCP anyway */
368 * specification, since RTCP authentication is required. However,
381 policy.rtcp.cipher_type = NULL_CIPHER;
382 policy.rtcp.cipher_key_len = 0;
383 policy.rtcp.auth_type = NULL_AUTH;
384 policy.rtcp.auth_key_len = 0
    [all...]
dtls_srtp_driver.c 183 err = crypto_policy_set_from_profile_for_rtcp(&policy.rtcp, profile);
srtp_driver.c 320 crypto_policy_set_rtcp_default(&policy.rtcp);
993 "# rtcp cipher: %s\r\n"
994 "# rtcp auth: %s\r\n"
995 "# rtcp services: %s\r\n"
1019 "# rtcp cipher: %s\r\n"
1020 "# rtcp auth: %s\r\n"
1021 "# rtcp services: %s\r\n"
1182 crypto_policy_set_rtcp_default(&policy.rtcp);
    [all...]
  /external/srtp/include/
srtp.h 58 * @brief libSRTP provides functions for protecting RTP and RTCP. See
217 crypto_policy_t rtcp; /**< SRTCP crypto policy. */ member in struct:srtp_policy_t
244 * RTCP destination transport addresses, using the RTP/SAVP (Secure
457 * structure to the SRTP default policy for RTCP protection.
462 * crypto_policy_t at location p to the SRTP default policy for RTCP
658 * structure to the appropriate value for RTCP based on an srtp_profile_t
663 * sets the crypto_policy_t at location policy to the policy for RTCP
719 * @defgroup SRTCP Secure RTCP
722 * @brief Secure RTCP functions are used to protect RTCP traffic
    [all...]
  /external/srtp/srtp/
srtp.c 84 * This function allocates the stream context, rtp and rtcp ciphers
123 * ...and now the RTCP-specific initialization - first, allocate
126 stat = crypto_kernel_alloc_cipher(p->rtcp.cipher_type,
128 p->rtcp.cipher_key_len);
134 stat = crypto_kernel_alloc_auth(p->rtcp.auth_type,
136 p->rtcp.auth_key_len,
137 p->rtcp.auth_tag_len);
196 * deallocate rtcp cipher, if it is not the same as that in
206 * deallocate rtcp auth function, if it is not the same as that in
430 debug_print(mod_srtp, "found aes_icm, generating rtcp salt", NULL)
    [all...]

Completed in 169 milliseconds