/external/libvncserver/libvncserver/tightvnc-filetransfer/ |
filetransfermsg.c | 296 GetFileDownloadResponseMsgInBlocks(rfbClientPtr cl, rfbTightClientPtr rtcp) 301 char* path = rtcp->rcft.rcfd.fName; 305 if((rtcp->rcft.rcfd.downloadInProgress == FALSE) && (rtcp->rcft.rcfd.downloadFD == -1)) { 306 if((rtcp->rcft.rcfd.downloadFD = open(path, O_RDONLY)) == -1) { 311 rtcp->rcft.rcfd.downloadInProgress = TRUE; 313 if((rtcp->rcft.rcfd.downloadInProgress == TRUE) && (rtcp->rcft.rcfd.downloadFD != -1)) { 314 if( (numOfBytesRead = read(rtcp->rcft.rcfd.downloadFD, pBuf, SZ_RFBBLOCKSIZE)) <= 0) { 315 close(rtcp->rcft.rcfd.downloadFD) [all...] |
rfbtightserver.c | 43 rfbTightClientPtr rtcp = (rfbTightClientPtr) local 46 if(rtcp == NULL) { 51 return rtcp; 110 rfbTightClientPtr rtcp = rfbGetTightClientData(cl); local 114 if(rtcp == NULL) 130 for (i = 0; i < rtcp->nAuthCaps; i++) { 131 if (auth_type == rtcp->authCaps[i]) 134 if (i >= rtcp->nAuthCaps) { 186 rfbTightClientPtr rtcp = rfbGetTightClientData(cl); local 190 if(rtcp == NULL 497 rfbTightClientPtr rtcp = (rfbTightClientPtr) malloc(sizeof(rfbTightClientRec)); local [all...] |
handlefiletransferrequest.c | 338 HandleFileDownloadRequest(rfbClientPtr cl, rfbTightClientPtr rtcp) 377 if((n = rfbReadExact(cl, rtcp->rcft.rcfd.fName, msg.fdr.fNameSize)) <= 0) { 386 rtcp->rcft.rcfd.fName[msg.fdr.fNameSize] = '\0'; 388 if(ConvertPath(rtcp->rcft.rcfd.fName) == NULL) { 402 HandleFileDownload(cl, rtcp); 469 rfbTightClientPtr rtcp = rfbGetTightClientData(cl); local 472 if(rtcp == NULL) 478 fileDownloadMsg = GetFileDownloadResponseMsgInBlocks(cl, rtcp); 488 CloseUndoneFileTransfer(cl, rtcp); 496 } while(rtcp->rcft.rcfd.downloadInProgress == TRUE) [all...] |
/external/srtp/googlepatches/ |
vidyo-4-srtp-rtx.patch | 46 /* DAM - no RTCP key limit at present */ 85 policy.rtcp.sec_serv = sec_serv_none; /* we don't do RTCP anyway */ 88 policy.rtcp.auth_tag_len = 0; 89 policy.rtcp.sec_serv = sec_serv_none; 107 "# rtcp cipher: %s\r\n" 108 "# rtcp auth: %s\r\n" 109 "# rtcp services: %s\r\n" 127 "# rtcp cipher: %s\r\n" 128 "# rtcp auth: %s\r\n [all...] |
google-9-rdbx-leak-plug.patch | 70 stat = crypto_kernel_alloc_cipher(p->rtcp.cipher_type, 72 - p->rtcp.cipher_key_len); 73 + p->rtcp.cipher_key_len); 85 p->rtcp.auth_key_len, 86 p->rtcp.auth_tag_len); 175 * deallocate rtcp cipher, if it is not the same as that in 188 * deallocate rtcp auth function, if it is not the same as that in
|
vidyo-3-srtp-ws.patch | 805 policy.rtcp.sec_serv = sec_serv_none; /* we don't do RTCP anyway */ 808 policy.rtcp.auth_key_len = 0; 809 policy.rtcp.auth_tag_len = 0; 810 policy.rtcp.sec_serv = sec_serv_none; 829 "# rtcp cipher: %s\r\n" 830 "# rtcp auth: %s\r\n" 831 - "# rtcp services: %s\r\n", 832 + "# rtcp services: %s\r\n" 848 "# rtcp cipher: %s\r\n [all...] |
google-10-srtp-ios-fixes.pack | 25 - applied a fix to not crash when receiving a RTCP packet that had a much larger sequence number than the previous RTCP packet
|
vidyo-2-srtp-lin.patch | 56 err = crypto_policy_set_from_profile_for_rtcp(&policy.rtcp, profile);
|
/external/srtp/test/ |
rtpw.c | 315 crypto_policy_set_rtcp_default(&policy.rtcp); 319 crypto_policy_set_rtcp_default(&policy.rtcp); 323 crypto_policy_set_rtcp_default(&policy.rtcp); 336 policy.rtcp.sec_serv = sec_serv_none; /* we don't do RTCP anyway */ 368 * specification, since RTCP authentication is required. However, 381 policy.rtcp.cipher_type = NULL_CIPHER; 382 policy.rtcp.cipher_key_len = 0; 383 policy.rtcp.auth_type = NULL_AUTH; 384 policy.rtcp.auth_key_len = 0 [all...] |
srtp_driver.c | 320 crypto_policy_set_rtcp_default(&policy.rtcp); 993 "# rtcp cipher: %s\r\n" 994 "# rtcp auth: %s\r\n" 995 "# rtcp services: %s\r\n" 1019 "# rtcp cipher: %s\r\n" 1020 "# rtcp auth: %s\r\n" 1021 "# rtcp services: %s\r\n" 1182 crypto_policy_set_rtcp_default(&policy.rtcp); [all...] |
dtls_srtp_driver.c | 183 err = crypto_policy_set_from_profile_for_rtcp(&policy.rtcp, profile);
|
/external/srtp/include/ |
srtp.h | 58 * @brief libSRTP provides functions for protecting RTP and RTCP. See 217 crypto_policy_t rtcp; /**< SRTCP crypto policy. */ member in struct:srtp_policy_t 244 * RTCP destination transport addresses, using the RTP/SAVP (Secure 457 * structure to the SRTP default policy for RTCP protection. 462 * crypto_policy_t at location p to the SRTP default policy for RTCP 658 * structure to the appropriate value for RTCP based on an srtp_profile_t 663 * sets the crypto_policy_t at location policy to the policy for RTCP 719 * @defgroup SRTCP Secure RTCP 722 * @brief Secure RTCP functions are used to protect RTCP traffic [all...] |
srtp_priv.h | 106 * srtcp_hdr_t represents a secure rtcp header
|
/frameworks/av/media/libstagefright/rtsp/ |
ARTPConnection.cpp | 87 msg->setInt32("rtcp-socket", rtcpSocket); 98 msg->setInt32("rtcp-socket", rtcpSocket); 189 CHECK(msg->findInt32("rtcp-socket", &s)); 216 CHECK(msg->findInt32("rtcp-socket", &rtcpSocket)); 299 ALOGW("failed to receive RTP/RTCP datagram."); 322 // We have never received any RTCP packets on this stream, 352 ALOGW("failed to send RTCP receiver report (%s).", 374 ALOGV("receiving %s", receiveRTP ? "RTP" : "RTCP"); 502 notify->setInt32("first-rtcp", true); 511 // Too short to be a valid RTCP heade [all...] |
ARTPSession.cpp | 131 if (msg->findInt32("first-rtcp", &firstRTCP)) { 134 // rtcp packet.
|
ARTPSource.cpp | 180 ALOGW("RTCP buffer too small to accomodate FIR."); 218 ALOGW("RTCP buffer too small to accomodate RR.");
|
MyHandler.h | 318 // rtp/rtcp ports to poke a hole into the firewall for future incoming 319 // packets. We're going to send an RR/SDES RTCP packet to both of them. 358 ALOGE("Server picked invalid RTP/RTCP port pair %s," 359 " RTP port must be even, RTCP port must be one higher.", 380 // Make up an RR/SDES RTCP packet. 404 ALOGE("failed to poke a hole for RTCP packets"); [all...] |
/external/srtp/doc/ |
intro.txt | 249 ports for RTP and RTCP. RTCP, the RTP control protocol, is used to 260 RTP allows multiple sources to send RTP and RTCP traffic during the 283 libSRTP provides functions for protecting RTP and RTCP. RTP packets 288 functions apply security to RTCP packets. 294 needed to protect a particular RTP and RTCP stream. This datatype 300 stream context to protect the RTP and RTCP stream that it is 320 that describe the cryptograhic policies for RTP and RTCP, as well as 330 for RTP and RTCP protection, respectively. 353 crypto_policy_set_rtcp_default(&policy.rtcp); [all...] |
rfc3711.txt | 37 Real-time Transport Control Protocol (RTCP). 54 3.4. Secure RTCP . . . . . . . . . . . . . . . . . . . . . . . 15 132 RTCP (the Real-time Transport Control Protocol) [RFC3350]. 135 of RTP and RTCP streams (Section 3). SRTP defines a set of default 147 RTP sequence number for SRTP and an index number for Secure RTCP 191 * the confidentiality of the RTP and RTCP payloads, and 193 * the integrity of the entire RTP and RTCP packets, together with 198 erroneous alteration of RTCP messages could otherwise disrupt the 223 RTP/RTCP in both wired and wireless scenarios. 271 Secure RTCP (SRTCP) provides the same security services to RTCP a [all...] |
/frameworks/av/media/libstagefright/wifi-display/source/ |
PlaybackSession.h | 37 // Encapsulates the state of an RTP/RTCP session in the context of wifi
|
WifiDisplaySource.cpp | [all...] |
/external/srtp/srtp/ |
srtp.c | 84 * This function allocates the stream context, rtp and rtcp ciphers 123 * ...and now the RTCP-specific initialization - first, allocate 126 stat = crypto_kernel_alloc_cipher(p->rtcp.cipher_type, 128 p->rtcp.cipher_key_len); 134 stat = crypto_kernel_alloc_auth(p->rtcp.auth_type, 136 p->rtcp.auth_key_len, 137 p->rtcp.auth_tag_len); 196 * deallocate rtcp cipher, if it is not the same as that in 206 * deallocate rtcp auth function, if it is not the same as that in 430 debug_print(mod_srtp, "found aes_icm, generating rtcp salt", NULL) [all...] |
/external/tcpdump/ |
print-udp.c | 207 /* rtp v2 control (rtcp) */ 216 printf(" [|rtcp]"); 231 printf(" [|rtcp]"); 270 printf(" [|rtcp]");
|
/external/webrtc/src/system_wrappers/source/ |
trace_impl.cc | 222 sprintf(traceMessage, " RTP/RTCP:%5ld %5ld;", idEngine, 292 sprintf (traceMessage, " RTP/RTCP:%11ld;", idl);
|
/frameworks/av/media/libstagefright/wifi-display/rtp/ |
RTPSender.cpp | 619 // Too short to be a valid RTCP header 673 ALOGW("Unknown RTCP packet type %u of size %zu",
|