/external/webrtc/talk/session/media/ |
mediasession.cc | 77 // We always generate offers with "UDP/TLS/RTP/SAVPF" when using DTLS-SRTP, 84 const char kMediaProtocolDtlsSctp[] = "DTLS/SCTP"; 85 const char kMediaProtocolUdpDtlsSctp[] = "UDP/DTLS/SCTP"; 86 const char kMediaProtocolTcpDtlsSctp[] = "TCP/DTLS/SCTP"; 552 // |bundle_group| should be updated to use the ufrag, pwd and DTLS role of the 679 // The common cryptos are needed if any of the content does not have DTLS [all...] |
channel.h | 110 // DTLS-based keying. If you turned off SRTP later, however 245 // Do the DTLS key expansion and impose it on the SRTP/SRTCP filters. 249 // Set the DTLS-SRTP cipher policy on this channel as appropriate. 280 bool* dtls,
|
mediasession_unittest.cc | [all...] |
srtpfilter.cc | 174 // This function is provided separately because DTLS-SRTP behaves 178 // keys (from different DTLS handshakes), and so we need a new
|
/external/boringssl/src/include/openssl/ |
pqueue.h | 2 * DTLS implementation written by Nagendra Modadugu
|
ssl.h | 180 * or DTLS connections. Whether the connections are TLS or DTLS is selected by 190 /* DTLS_method is the |SSL_METHOD| used for DTLS connections. */ 203 * An |SSL| object represents a single TLS or DTLS connection. Although the 237 * In DTLS, if |rbio| is blocking, it must handle 280 * In DTLS, if the read |BIO| is non-blocking, the caller must drive 283 * the next retry, call |DTLSv1_handle_timeout|. Note that DTLS handshake 333 * In DTLS, neither |SSL_MODE_ACCEPT_MOVING_WRITE_BUFFER| and 400 * If signaled by a DTLS handshake, the caller must also call 471 /* SSL_set_mtu sets the |ssl|'s MTU in DTLS to |mtu|. It returns one on succes [all...] |
/external/boringssl/src/ssl/ |
d1_meth.c | 2 * DTLS implementation written by Nagendra Modadugu
|
d1_both.c | 2 * DTLS implementation written by Nagendra Modadugu 431 * the DTLS side. */ 491 * permitted in a DTLS handshake message for |ssl|. The minimum is 16KB, but may 521 /* TODO(davidben): dtls1_read_bytes is the wrong abstraction for DTLS. There 718 /* DTLS renegotiation is unsupported, so only epochs 0 (NULL cipher) and 1
|
ssl_stat.c | 277 /* DTLS */ 462 /* DTLS */
|
d1_srtp.c | 111 DTLS code by Eric Rescorla <ekr@rtfm.com>
|
/external/boringssl/src/ssl/pqueue/ |
pqueue.c | 2 * DTLS implementation written by Nagendra Modadugu
|
/external/srtp/test/ |
dtls_srtp_driver.c | 4 * test driver for DTLS-SRTP functions
|
/external/webrtc/webrtc/examples/peerconnection/server/ |
server_test.html | 36 // In loopback mode, if DTLS is enabled, notify the client to disable it.
|
/external/boringssl/src/ssl/test/runner/ |
handshake_client.go | 119 // Don't advertise non-DTLS cipher suites on DTLS. 241 // HelloVerifyRequest SHOULD be always DTLS 243 return errors.New("dtls: bad HelloVerifyRequest version") 961 // This is somewhat hacky. DTLS hashes a slightly different format.
|
conn.go | 82 // DTLS state 151 nextSeq [6]byte // next epoch's starting sequence number in DTLS 200 // Increment up to the epoch in DTLS. 230 // incEpoch resets the sequence number. In DTLS, it also increments the epoch 262 // The DTLS epoch cannot be changed. 360 // DTLS sequence numbers are explicit. 1065 // skipPacket processes all the DTLS records in packet. It updates 1111 return errors.New("tls: TimeoutSchedule may only be set in DTLS") [all...] |
handshake_server.go | 148 // be always DTLS 1.0 155 return false, errors.New("dtls: short read from Rand: " + err.Error()) 173 return false, errors.New("dtls: invalid cookie") 186 return false, errors.New("dtls: retransmitted ClientHello does not match") 1019 // This is somewhat hacky. DTLS hashes a slightly different format.
|
/external/boringssl/src/ |
PORTING.md | 117 * There is no support for renegotiation in DTLS.
|
/external/boringssl/src/ssl/test/ |
test_config.cc | 48 { "-dtls", &TestConfig::is_dtls },
|
bssl_shim.cc | 844 // The DTLS retransmit logic silently ignores write failures. So the test 903 // The DTLS retransmit logic silently ignores write failures. So the test [all...] |
/external/webrtc/talk/app/webrtc/ |
peerconnectioninterface.h | 522 // party supports DTLS 1.0 and the other DTLS 1.2, DTLS 1.0 will be used.
|
datachannel.h | 90 // Gets the first unused odd/even id based on the DTLS role. If |role| is
|
peerconnectionendtoend_unittest.cc | 263 // Verifies that DataChannel IDs are even/odd based on the DTLS roles.
|
/external/webrtc/webrtc/base/ |
openssladapter.cc | 379 // Clear the DTLS timer 456 // Clear the DTLS timer 622 LOG(LS_INFO) << "DTLS timeout expired";
|
/external/webrtc/talk/app/webrtc/test/ |
testsdpstrings.h | 79 "m=application 45536 SCTP/DTLS 5000\r\n"
|
/external/webrtc/webrtc/p2p/base/ |
transport.h | 283 // transport description, such as the ICE role to use, and whether DTLS
|