/external/webrtc/talk/app/webrtc/ |
dtlsidentitystore.h | 51 // Used to receive callbacks of DTLS identity requests. 66 // This interface defines an in-memory DTLS identity store, which generates DTLS
|
webrtcsessiondescriptionfactory.cc | 44 " failed because DTLS identity request failed"; 154 // SRTP-SDES is disabled if DTLS is on. 170 LOG(LS_VERBOSE) << "DTLS-SRTP disabled."; 197 LOG(LS_VERBOSE) << "DTLS-SRTP enabled; sending DTLS identity request (key " 222 LOG(LS_VERBOSE) << "DTLS-SRTP enabled; has certificate parameter.";
|
mediaconstraintsinterface.h | 108 // Temporary pseudo-constraints used to enable DTLS-SRTP 109 static const char kEnableDtlsSrtp[]; // Enable DTLS-SRTP
|
webrtcsession_unittest.cc | 400 // |certificates| then DTLS will be enabled unless explicitly disabled by 401 // |rtc_configuration| options. When DTLS is enabled a certificate will be 457 // Successfully init with DTLS; with a certificate generated and supplied or 474 // Init with DTLS with a store that will fail to generate a certificate. 682 void VerifyNoCryptoParams(const cricket::SessionDescription* sdp, bool dtls) { 699 if (dtls) { 712 // Set the internal fake description factories to do DTLS-SRTP. [all...] |
peerconnection_unittest.cc | [all...] |
webrtcsession.cc | 83 "Called with SDP without DTLS fingerprint."; 91 "Couldn't set up DTLS-SRTP on RTP channel."; 93 "Couldn't set up DTLS-SRTP on RTCP channel."; 179 // Checks that each non-rejected content has SDES crypto keys or a DTLS 180 // fingerprint. Mismatches, such as replying with a DTLS fingerprint to SDES 206 "Session description must have DTLS fingerprint if DTLS enabled."; 213 "Session description must have SDES when DTLS disabled."; 612 // just picking the first one. The decision should be made based on the DTLS 613 // handshake. The DTLS negotiations need to know about all certificates [all...] |
webrtcsdp_unittest.cc | 119 static const char kDtlsSctp[] = "DTLS/SCTP"; 120 static const char kUdpDtlsSctp[] = "UDP/DTLS/SCTP"; 121 static const char kTcpDtlsSctp[] = "TCP/DTLS/SCTP"; 288 "m=application 9 DTLS/SCTP 5000\r\n" 297 "m=application 9 DTLS/SCTP webrtc-datachannel\r\n" 306 "m=application 9 DTLS/SCTP webrtc-datachannel\r\n" 315 "m=application 2345 DTLS/SCTP 5000\r\n" [all...] |
/external/webrtc/webrtc/base/ |
opensslstreamadapter.h | 103 // DTLS-SRTP interface 159 // Flush the input buffers by reading left bytes (for DTLS) 204 // Do DTLS or not
|
openssladapter.h | 89 // Do DTLS or not
|
ssladapter_unittest.cc | 37 return (ssl_mode == rtc::SSL_MODE_DTLS) ? "DTLS" : "TLS"; 191 // This is only for DTLS. 298 // For DTLS, call AcceptConnection() with the client's address. 398 // Basic tests: DTLS
|
opensslstreamadapter.cc | 162 // Fallback cipher for DTLS 1.2 if hardware-accelerated AES-GCM is unavailable. 605 LOG(LS_INFO) << " -- short DTLS read. flushing"; 779 // Enable read-ahead for DTLS so whole packets are read from internal BIO 780 // before parsing. This is done internally by BoringSSL for DTLS. 806 // Clear the DTLS timer 884 // Clear the DTLS timer 892 LOG(LS_INFO) << "DTLS timeout expired"; 932 // DTLS 1.2 only available starting from OpenSSL 1.0.2 [all...] |
sslstreamadapterhelper.h | 102 // Do DTLS or not
|
/external/webrtc/webrtc/p2p/base/ |
p2ptransportchannel.h | 114 // DTLS methods. 122 // Set up the ciphers to use for DTLS-SRTP. 127 // Find out which DTLS-SRTP cipher was negotiated. 130 // Find out which DTLS cipher was negotiated. 157 // Set DTLS Remote fingerprint. Must be after local identity set.
|
/external/boringssl/src/ssl/test/runner/ |
common.go | 192 SRTPProtectionProfile uint16 // the negotiated DTLS-SRTP protection profile 377 // protection profiles to offer in DTLS-SRTP. 455 // SkipHelloVerifyRequest causes a DTLS server to skip the 507 // never be fragmented. For DTLS, it is the maximum handshake fragment 508 // size, not record size; DTLS allows multiple handshake fragments in a 610 // to the sequence number of outgoing packets. For both TLS and DTLS, 612 // ignored so that the DTLS epoch cannot be changed. 679 // DTLS to overlap and be sent in the wrong order. It also causes 685 // messages in DTLS to redundantly both fragment the message 698 // handshake fragments in DTLS to have the wrong message type [all...] |
/system/netd/server/ |
StrictController.cpp | 89 // Look for IPv4 TCP/UDP connections with TLS/DTLS header 101 // Look for IPv6 TCP/UDP connections with TLS/DTLS header. The IPv6 header 117 // Handle TCP/UDP payloads that didn't match TLS/DTLS filters above,
|
/external/boringssl/src/ssl/ |
d1_lib.c | 2 * DTLS implementation written by Nagendra Modadugu 82 * before failing the DTLS handshake. */ 113 /* Set the version to the highest version for DTLS. This controls the initial 156 /* DTLS does not support stream ciphers. The NULL cipher is rejected because
|
dtls_record.c | 0 /* DTLS implementation written by Nagendra Modadugu 208 * simplicity, drop it and expect retransmit to handle it later; DTLS must 219 /* Bad packets are silently dropped in DTLS. See section 4.2.1 of RFC 6347. 256 /* DTLS renegotiation is unsupported, so only epochs 0 (NULL cipher) and 1
|
d1_pkt.c | 0 /* DTLS implementation written by Nagendra Modadugu 179 /* Impossible in DTLS. */ 216 /* Bidirectional shutdown doesn't make sense for an unordered transport. DTLS 230 * If we don't have stored data to work from, read a DTLS record first (possibly 422 * post-CCS handshake record. DTLS resets handshake message numbers on each 498 /* There should never be a pending write buffer in DTLS. One can't write half
|
internal.h | 293 * |direction|. |version| is the normalized protocol version, so DTLS 1.0 is 333 /* DTLS replay bitmap. */ 388 /* dtls_open_record implements |tls_open_record| for DTLS. It never returns 429 /* dtls_seal_record implements |tls_seal_record| for DTLS. |use_epoch| selects 583 * long. For DTLS, it reads a new packet and ignores |len|. It returns one on 586 * It is an error to call |ssl_read_buffer_extend_to| in DTLS when the buffer is 619 * one on success and <= 0 on error. For DTLS, whether or not the write 736 /* Check if an SSL structure is using DTLS */ [all...] |
/external/webrtc/webrtc/examples/peerconnection/client/ |
conductor.h | 58 bool CreatePeerConnection(bool dtls);
|
conductor.cc | 112 bool Conductor::CreatePeerConnection(bool dtls) { 122 if (dtls) { 267 // Recreate the peerconnection with DTLS disabled.
|
/external/webrtc/webrtc/examples/objc/AppRTCDemo/tests/ |
ARDAppClientTest.mm | 259 // TODO(tkchin): Figure out why DTLS-SRTP constraint causes thread assertion 274 // TODO(tkchin): Figure out why DTLS-SRTP constraint causes thread assertion
|
/external/webrtc/talk/session/media/ |
channel_unittest.cc | 128 DTLS = 0x10 }; 165 if ((flags1 & DTLS) && (flags2 & DTLS)) { 176 if (flags1 & DTLS) { 182 if (flags2 & DTLS) { [all...] |
srtpfilter.h | 54 // Needed for DTLS-SRTP 106 // Used with DTLS-SRTP.
|
/external/mdnsresponder/ |
PrivateDNS.txt | 85 A potential solution to this deficiency might be in using DTLS, which is 87 More investigation needs to be done to see if DTLS is suitable for
|