HomeSort by relevance Sort by last modified time
    Searched full:rtcp (Results 1 - 25 of 29) sorted by null

1 2

  /external/libvncserver/libvncserver/tightvnc-filetransfer/
filetransfermsg.c 296 GetFileDownloadResponseMsgInBlocks(rfbClientPtr cl, rfbTightClientPtr rtcp)
301 char* path = rtcp->rcft.rcfd.fName;
305 if((rtcp->rcft.rcfd.downloadInProgress == FALSE) && (rtcp->rcft.rcfd.downloadFD == -1)) {
306 if((rtcp->rcft.rcfd.downloadFD = open(path, O_RDONLY)) == -1) {
311 rtcp->rcft.rcfd.downloadInProgress = TRUE;
313 if((rtcp->rcft.rcfd.downloadInProgress == TRUE) && (rtcp->rcft.rcfd.downloadFD != -1)) {
314 if( (numOfBytesRead = read(rtcp->rcft.rcfd.downloadFD, pBuf, SZ_RFBBLOCKSIZE)) <= 0) {
315 close(rtcp->rcft.rcfd.downloadFD)
    [all...]
rfbtightserver.c 43 rfbTightClientPtr rtcp = (rfbTightClientPtr) local
46 if(rtcp == NULL) {
51 return rtcp;
110 rfbTightClientPtr rtcp = rfbGetTightClientData(cl); local
114 if(rtcp == NULL)
130 for (i = 0; i < rtcp->nAuthCaps; i++) {
131 if (auth_type == rtcp->authCaps[i])
134 if (i >= rtcp->nAuthCaps) {
186 rfbTightClientPtr rtcp = rfbGetTightClientData(cl); local
190 if(rtcp == NULL
497 rfbTightClientPtr rtcp = (rfbTightClientPtr) malloc(sizeof(rfbTightClientRec)); local
    [all...]
handlefiletransferrequest.c 338 HandleFileDownloadRequest(rfbClientPtr cl, rfbTightClientPtr rtcp)
377 if((n = rfbReadExact(cl, rtcp->rcft.rcfd.fName, msg.fdr.fNameSize)) <= 0) {
386 rtcp->rcft.rcfd.fName[msg.fdr.fNameSize] = '\0';
388 if(ConvertPath(rtcp->rcft.rcfd.fName) == NULL) {
402 HandleFileDownload(cl, rtcp);
469 rfbTightClientPtr rtcp = rfbGetTightClientData(cl); local
472 if(rtcp == NULL)
478 fileDownloadMsg = GetFileDownloadResponseMsgInBlocks(cl, rtcp);
488 CloseUndoneFileTransfer(cl, rtcp);
496 } while(rtcp->rcft.rcfd.downloadInProgress == TRUE)
    [all...]
  /external/srtp/googlepatches/
vidyo-4-srtp-rtx.patch 46 /* DAM - no RTCP key limit at present */
85 policy.rtcp.sec_serv = sec_serv_none; /* we don't do RTCP anyway */
88 policy.rtcp.auth_tag_len = 0;
89 policy.rtcp.sec_serv = sec_serv_none;
107 "# rtcp cipher: %s\r\n"
108 "# rtcp auth: %s\r\n"
109 "# rtcp services: %s\r\n"
127 "# rtcp cipher: %s\r\n"
128 "# rtcp auth: %s\r\n
    [all...]
google-9-rdbx-leak-plug.patch 70 stat = crypto_kernel_alloc_cipher(p->rtcp.cipher_type,
72 - p->rtcp.cipher_key_len);
73 + p->rtcp.cipher_key_len);
85 p->rtcp.auth_key_len,
86 p->rtcp.auth_tag_len);
175 * deallocate rtcp cipher, if it is not the same as that in
188 * deallocate rtcp auth function, if it is not the same as that in
vidyo-3-srtp-ws.patch 805 policy.rtcp.sec_serv = sec_serv_none; /* we don't do RTCP anyway */
808 policy.rtcp.auth_key_len = 0;
809 policy.rtcp.auth_tag_len = 0;
810 policy.rtcp.sec_serv = sec_serv_none;
829 "# rtcp cipher: %s\r\n"
830 "# rtcp auth: %s\r\n"
831 - "# rtcp services: %s\r\n",
832 + "# rtcp services: %s\r\n"
848 "# rtcp cipher: %s\r\n
    [all...]
google-10-srtp-ios-fixes.pack 25 - applied a fix to not crash when receiving a RTCP packet that had a much larger sequence number than the previous RTCP packet
vidyo-2-srtp-lin.patch 56 err = crypto_policy_set_from_profile_for_rtcp(&policy.rtcp, profile);
  /external/srtp/test/
rtpw.c 315 crypto_policy_set_rtcp_default(&policy.rtcp);
319 crypto_policy_set_rtcp_default(&policy.rtcp);
323 crypto_policy_set_rtcp_default(&policy.rtcp);
336 policy.rtcp.sec_serv = sec_serv_none; /* we don't do RTCP anyway */
368 * specification, since RTCP authentication is required. However,
381 policy.rtcp.cipher_type = NULL_CIPHER;
382 policy.rtcp.cipher_key_len = 0;
383 policy.rtcp.auth_type = NULL_AUTH;
384 policy.rtcp.auth_key_len = 0
    [all...]
srtp_driver.c 320 crypto_policy_set_rtcp_default(&policy.rtcp);
993 "# rtcp cipher: %s\r\n"
994 "# rtcp auth: %s\r\n"
995 "# rtcp services: %s\r\n"
1019 "# rtcp cipher: %s\r\n"
1020 "# rtcp auth: %s\r\n"
1021 "# rtcp services: %s\r\n"
1182 crypto_policy_set_rtcp_default(&policy.rtcp);
    [all...]
dtls_srtp_driver.c 183 err = crypto_policy_set_from_profile_for_rtcp(&policy.rtcp, profile);
  /external/srtp/include/
srtp.h 58 * @brief libSRTP provides functions for protecting RTP and RTCP. See
217 crypto_policy_t rtcp; /**< SRTCP crypto policy. */ member in struct:srtp_policy_t
244 * RTCP destination transport addresses, using the RTP/SAVP (Secure
457 * structure to the SRTP default policy for RTCP protection.
462 * crypto_policy_t at location p to the SRTP default policy for RTCP
658 * structure to the appropriate value for RTCP based on an srtp_profile_t
663 * sets the crypto_policy_t at location policy to the policy for RTCP
719 * @defgroup SRTCP Secure RTCP
722 * @brief Secure RTCP functions are used to protect RTCP traffic
    [all...]
srtp_priv.h 106 * srtcp_hdr_t represents a secure rtcp header
  /frameworks/av/media/libstagefright/rtsp/
ARTPConnection.cpp 87 msg->setInt32("rtcp-socket", rtcpSocket);
98 msg->setInt32("rtcp-socket", rtcpSocket);
189 CHECK(msg->findInt32("rtcp-socket", &s));
216 CHECK(msg->findInt32("rtcp-socket", &rtcpSocket));
299 ALOGW("failed to receive RTP/RTCP datagram.");
322 // We have never received any RTCP packets on this stream,
352 ALOGW("failed to send RTCP receiver report (%s).",
374 ALOGV("receiving %s", receiveRTP ? "RTP" : "RTCP");
502 notify->setInt32("first-rtcp", true);
511 // Too short to be a valid RTCP heade
    [all...]
ARTPSession.cpp 131 if (msg->findInt32("first-rtcp", &firstRTCP)) {
134 // rtcp packet.
ARTPSource.cpp 180 ALOGW("RTCP buffer too small to accomodate FIR.");
218 ALOGW("RTCP buffer too small to accomodate RR.");
MyHandler.h 318 // rtp/rtcp ports to poke a hole into the firewall for future incoming
319 // packets. We're going to send an RR/SDES RTCP packet to both of them.
358 ALOGE("Server picked invalid RTP/RTCP port pair %s,"
359 " RTP port must be even, RTCP port must be one higher.",
380 // Make up an RR/SDES RTCP packet.
404 ALOGE("failed to poke a hole for RTCP packets");
    [all...]
  /external/srtp/doc/
intro.txt 249 ports for RTP and RTCP. RTCP, the RTP control protocol, is used to
260 RTP allows multiple sources to send RTP and RTCP traffic during the
283 libSRTP provides functions for protecting RTP and RTCP. RTP packets
288 functions apply security to RTCP packets.
294 needed to protect a particular RTP and RTCP stream. This datatype
300 stream context to protect the RTP and RTCP stream that it is
320 that describe the cryptograhic policies for RTP and RTCP, as well as
330 for RTP and RTCP protection, respectively.
353 crypto_policy_set_rtcp_default(&policy.rtcp);
    [all...]
rfc3711.txt 37 Real-time Transport Control Protocol (RTCP).
54 3.4. Secure RTCP . . . . . . . . . . . . . . . . . . . . . . . 15
132 RTCP (the Real-time Transport Control Protocol) [RFC3350].
135 of RTP and RTCP streams (Section 3). SRTP defines a set of default
147 RTP sequence number for SRTP and an index number for Secure RTCP
191 * the confidentiality of the RTP and RTCP payloads, and
193 * the integrity of the entire RTP and RTCP packets, together with
198 erroneous alteration of RTCP messages could otherwise disrupt the
223 RTP/RTCP in both wired and wireless scenarios.
271 Secure RTCP (SRTCP) provides the same security services to RTCP a
    [all...]
  /frameworks/av/media/libstagefright/wifi-display/source/
PlaybackSession.h 37 // Encapsulates the state of an RTP/RTCP session in the context of wifi
WifiDisplaySource.cpp     [all...]
  /external/srtp/srtp/
srtp.c 84 * This function allocates the stream context, rtp and rtcp ciphers
123 * ...and now the RTCP-specific initialization - first, allocate
126 stat = crypto_kernel_alloc_cipher(p->rtcp.cipher_type,
128 p->rtcp.cipher_key_len);
134 stat = crypto_kernel_alloc_auth(p->rtcp.auth_type,
136 p->rtcp.auth_key_len,
137 p->rtcp.auth_tag_len);
196 * deallocate rtcp cipher, if it is not the same as that in
206 * deallocate rtcp auth function, if it is not the same as that in
430 debug_print(mod_srtp, "found aes_icm, generating rtcp salt", NULL)
    [all...]
  /external/tcpdump/
print-udp.c 207 /* rtp v2 control (rtcp) */
216 printf(" [|rtcp]");
231 printf(" [|rtcp]");
270 printf(" [|rtcp]");
  /external/webrtc/src/system_wrappers/source/
trace_impl.cc 222 sprintf(traceMessage, " RTP/RTCP:%5ld %5ld;", idEngine,
292 sprintf (traceMessage, " RTP/RTCP:%11ld;", idl);
  /frameworks/av/media/libstagefright/wifi-display/rtp/
RTPSender.cpp 619 // Too short to be a valid RTCP header
673 ALOGW("Unknown RTCP packet type %u of size %zu",

Completed in 288 milliseconds

1 2