HomeSort by relevance Sort by last modified time
    Searched full:dtls (Results 26 - 50 of 110) sorted by null

12 3 4 5

  /external/webrtc/talk/app/webrtc/
dtlsidentitystore.h 51 // Used to receive callbacks of DTLS identity requests.
66 // This interface defines an in-memory DTLS identity store, which generates DTLS
webrtcsessiondescriptionfactory.cc 44 " failed because DTLS identity request failed";
154 // SRTP-SDES is disabled if DTLS is on.
170 LOG(LS_VERBOSE) << "DTLS-SRTP disabled.";
197 LOG(LS_VERBOSE) << "DTLS-SRTP enabled; sending DTLS identity request (key "
222 LOG(LS_VERBOSE) << "DTLS-SRTP enabled; has certificate parameter.";
mediaconstraintsinterface.h 108 // Temporary pseudo-constraints used to enable DTLS-SRTP
109 static const char kEnableDtlsSrtp[]; // Enable DTLS-SRTP
webrtcsession_unittest.cc 400 // |certificates| then DTLS will be enabled unless explicitly disabled by
401 // |rtc_configuration| options. When DTLS is enabled a certificate will be
457 // Successfully init with DTLS; with a certificate generated and supplied or
474 // Init with DTLS with a store that will fail to generate a certificate.
682 void VerifyNoCryptoParams(const cricket::SessionDescription* sdp, bool dtls) {
699 if (dtls) {
712 // Set the internal fake description factories to do DTLS-SRTP.
    [all...]
peerconnection_unittest.cc     [all...]
webrtcsession.cc 83 "Called with SDP without DTLS fingerprint.";
91 "Couldn't set up DTLS-SRTP on RTP channel.";
93 "Couldn't set up DTLS-SRTP on RTCP channel.";
179 // Checks that each non-rejected content has SDES crypto keys or a DTLS
180 // fingerprint. Mismatches, such as replying with a DTLS fingerprint to SDES
206 "Session description must have DTLS fingerprint if DTLS enabled.";
213 "Session description must have SDES when DTLS disabled.";
612 // just picking the first one. The decision should be made based on the DTLS
613 // handshake. The DTLS negotiations need to know about all certificates
    [all...]
webrtcsdp_unittest.cc 119 static const char kDtlsSctp[] = "DTLS/SCTP";
120 static const char kUdpDtlsSctp[] = "UDP/DTLS/SCTP";
121 static const char kTcpDtlsSctp[] = "TCP/DTLS/SCTP";
288 "m=application 9 DTLS/SCTP 5000\r\n"
297 "m=application 9 DTLS/SCTP webrtc-datachannel\r\n"
306 "m=application 9 DTLS/SCTP webrtc-datachannel\r\n"
315 "m=application 2345 DTLS/SCTP 5000\r\n"
    [all...]
  /external/webrtc/webrtc/base/
opensslstreamadapter.h 103 // DTLS-SRTP interface
159 // Flush the input buffers by reading left bytes (for DTLS)
204 // Do DTLS or not
openssladapter.h 89 // Do DTLS or not
ssladapter_unittest.cc 37 return (ssl_mode == rtc::SSL_MODE_DTLS) ? "DTLS" : "TLS";
191 // This is only for DTLS.
298 // For DTLS, call AcceptConnection() with the client's address.
398 // Basic tests: DTLS
opensslstreamadapter.cc 162 // Fallback cipher for DTLS 1.2 if hardware-accelerated AES-GCM is unavailable.
605 LOG(LS_INFO) << " -- short DTLS read. flushing";
779 // Enable read-ahead for DTLS so whole packets are read from internal BIO
780 // before parsing. This is done internally by BoringSSL for DTLS.
806 // Clear the DTLS timer
884 // Clear the DTLS timer
892 LOG(LS_INFO) << "DTLS timeout expired";
932 // DTLS 1.2 only available starting from OpenSSL 1.0.2
    [all...]
sslstreamadapterhelper.h 102 // Do DTLS or not
  /external/webrtc/webrtc/p2p/base/
p2ptransportchannel.h 114 // DTLS methods.
122 // Set up the ciphers to use for DTLS-SRTP.
127 // Find out which DTLS-SRTP cipher was negotiated.
130 // Find out which DTLS cipher was negotiated.
157 // Set DTLS Remote fingerprint. Must be after local identity set.
  /external/boringssl/src/ssl/test/runner/
common.go 192 SRTPProtectionProfile uint16 // the negotiated DTLS-SRTP protection profile
377 // protection profiles to offer in DTLS-SRTP.
455 // SkipHelloVerifyRequest causes a DTLS server to skip the
507 // never be fragmented. For DTLS, it is the maximum handshake fragment
508 // size, not record size; DTLS allows multiple handshake fragments in a
610 // to the sequence number of outgoing packets. For both TLS and DTLS,
612 // ignored so that the DTLS epoch cannot be changed.
679 // DTLS to overlap and be sent in the wrong order. It also causes
685 // messages in DTLS to redundantly both fragment the message
698 // handshake fragments in DTLS to have the wrong message type
    [all...]
  /system/netd/server/
StrictController.cpp 89 // Look for IPv4 TCP/UDP connections with TLS/DTLS header
101 // Look for IPv6 TCP/UDP connections with TLS/DTLS header. The IPv6 header
117 // Handle TCP/UDP payloads that didn't match TLS/DTLS filters above,
  /external/boringssl/src/ssl/
d1_lib.c 2 * DTLS implementation written by Nagendra Modadugu
82 * before failing the DTLS handshake. */
113 /* Set the version to the highest version for DTLS. This controls the initial
156 /* DTLS does not support stream ciphers. The NULL cipher is rejected because
dtls_record.c 0 /* DTLS implementation written by Nagendra Modadugu
208 * simplicity, drop it and expect retransmit to handle it later; DTLS must
219 /* Bad packets are silently dropped in DTLS. See section 4.2.1 of RFC 6347.
256 /* DTLS renegotiation is unsupported, so only epochs 0 (NULL cipher) and 1
d1_pkt.c 0 /* DTLS implementation written by Nagendra Modadugu
179 /* Impossible in DTLS. */
216 /* Bidirectional shutdown doesn't make sense for an unordered transport. DTLS
230 * If we don't have stored data to work from, read a DTLS record first (possibly
422 * post-CCS handshake record. DTLS resets handshake message numbers on each
498 /* There should never be a pending write buffer in DTLS. One can't write half
internal.h 293 * |direction|. |version| is the normalized protocol version, so DTLS 1.0 is
333 /* DTLS replay bitmap. */
388 /* dtls_open_record implements |tls_open_record| for DTLS. It never returns
429 /* dtls_seal_record implements |tls_seal_record| for DTLS. |use_epoch| selects
583 * long. For DTLS, it reads a new packet and ignores |len|. It returns one on
586 * It is an error to call |ssl_read_buffer_extend_to| in DTLS when the buffer is
619 * one on success and <= 0 on error. For DTLS, whether or not the write
736 /* Check if an SSL structure is using DTLS */
    [all...]
  /external/webrtc/webrtc/examples/peerconnection/client/
conductor.h 58 bool CreatePeerConnection(bool dtls);
conductor.cc 112 bool Conductor::CreatePeerConnection(bool dtls) {
122 if (dtls) {
267 // Recreate the peerconnection with DTLS disabled.
  /external/webrtc/webrtc/examples/objc/AppRTCDemo/tests/
ARDAppClientTest.mm 259 // TODO(tkchin): Figure out why DTLS-SRTP constraint causes thread assertion
274 // TODO(tkchin): Figure out why DTLS-SRTP constraint causes thread assertion
  /external/webrtc/talk/session/media/
channel_unittest.cc 128 DTLS = 0x10 };
165 if ((flags1 & DTLS) && (flags2 & DTLS)) {
176 if (flags1 & DTLS) {
182 if (flags2 & DTLS) {
    [all...]
srtpfilter.h 54 // Needed for DTLS-SRTP
106 // Used with DTLS-SRTP.
  /external/mdnsresponder/
PrivateDNS.txt 85 A potential solution to this deficiency might be in using DTLS, which is
87 More investigation needs to be done to see if DTLS is suitable for

Completed in 682 milliseconds

12 3 4 5