HomeSort by relevance Sort by last modified time
    Searched full:dtls (Results 51 - 75 of 110) sorted by null

1 23 4 5

  /external/webrtc/talk/session/media/
mediasession.cc 77 // We always generate offers with "UDP/TLS/RTP/SAVPF" when using DTLS-SRTP,
84 const char kMediaProtocolDtlsSctp[] = "DTLS/SCTP";
85 const char kMediaProtocolUdpDtlsSctp[] = "UDP/DTLS/SCTP";
86 const char kMediaProtocolTcpDtlsSctp[] = "TCP/DTLS/SCTP";
552 // |bundle_group| should be updated to use the ufrag, pwd and DTLS role of the
679 // The common cryptos are needed if any of the content does not have DTLS
    [all...]
channel.h 110 // DTLS-based keying. If you turned off SRTP later, however
245 // Do the DTLS key expansion and impose it on the SRTP/SRTCP filters.
249 // Set the DTLS-SRTP cipher policy on this channel as appropriate.
280 bool* dtls,
mediasession_unittest.cc     [all...]
srtpfilter.cc 174 // This function is provided separately because DTLS-SRTP behaves
178 // keys (from different DTLS handshakes), and so we need a new
  /external/boringssl/src/include/openssl/
pqueue.h 2 * DTLS implementation written by Nagendra Modadugu
ssl.h 180 * or DTLS connections. Whether the connections are TLS or DTLS is selected by
190 /* DTLS_method is the |SSL_METHOD| used for DTLS connections. */
203 * An |SSL| object represents a single TLS or DTLS connection. Although the
237 * In DTLS, if |rbio| is blocking, it must handle
280 * In DTLS, if the read |BIO| is non-blocking, the caller must drive
283 * the next retry, call |DTLSv1_handle_timeout|. Note that DTLS handshake
333 * In DTLS, neither |SSL_MODE_ACCEPT_MOVING_WRITE_BUFFER| and
400 * If signaled by a DTLS handshake, the caller must also call
471 /* SSL_set_mtu sets the |ssl|'s MTU in DTLS to |mtu|. It returns one on succes
    [all...]
  /external/boringssl/src/ssl/
d1_meth.c 2 * DTLS implementation written by Nagendra Modadugu
d1_both.c 2 * DTLS implementation written by Nagendra Modadugu
431 * the DTLS side. */
491 * permitted in a DTLS handshake message for |ssl|. The minimum is 16KB, but may
521 /* TODO(davidben): dtls1_read_bytes is the wrong abstraction for DTLS. There
718 /* DTLS renegotiation is unsupported, so only epochs 0 (NULL cipher) and 1
ssl_stat.c 277 /* DTLS */
462 /* DTLS */
d1_srtp.c 111 DTLS code by Eric Rescorla <ekr@rtfm.com>
  /external/boringssl/src/ssl/pqueue/
pqueue.c 2 * DTLS implementation written by Nagendra Modadugu
  /external/srtp/test/
dtls_srtp_driver.c 4 * test driver for DTLS-SRTP functions
  /external/webrtc/webrtc/examples/peerconnection/server/
server_test.html 36 // In loopback mode, if DTLS is enabled, notify the client to disable it.
  /external/boringssl/src/ssl/test/runner/
handshake_client.go 119 // Don't advertise non-DTLS cipher suites on DTLS.
241 // HelloVerifyRequest SHOULD be always DTLS
243 return errors.New("dtls: bad HelloVerifyRequest version")
961 // This is somewhat hacky. DTLS hashes a slightly different format.
conn.go 82 // DTLS state
151 nextSeq [6]byte // next epoch's starting sequence number in DTLS
200 // Increment up to the epoch in DTLS.
230 // incEpoch resets the sequence number. In DTLS, it also increments the epoch
262 // The DTLS epoch cannot be changed.
360 // DTLS sequence numbers are explicit.
1065 // skipPacket processes all the DTLS records in packet. It updates
1111 return errors.New("tls: TimeoutSchedule may only be set in DTLS")
    [all...]
handshake_server.go 148 // be always DTLS 1.0
155 return false, errors.New("dtls: short read from Rand: " + err.Error())
173 return false, errors.New("dtls: invalid cookie")
186 return false, errors.New("dtls: retransmitted ClientHello does not match")
1019 // This is somewhat hacky. DTLS hashes a slightly different format.
  /external/boringssl/src/
PORTING.md 117 * There is no support for renegotiation in DTLS.
  /external/boringssl/src/ssl/test/
test_config.cc 48 { "-dtls", &TestConfig::is_dtls },
bssl_shim.cc 844 // The DTLS retransmit logic silently ignores write failures. So the test
903 // The DTLS retransmit logic silently ignores write failures. So the test
    [all...]
  /external/webrtc/talk/app/webrtc/
peerconnectioninterface.h 522 // party supports DTLS 1.0 and the other DTLS 1.2, DTLS 1.0 will be used.
datachannel.h 90 // Gets the first unused odd/even id based on the DTLS role. If |role| is
peerconnectionendtoend_unittest.cc 263 // Verifies that DataChannel IDs are even/odd based on the DTLS roles.
  /external/webrtc/webrtc/base/
openssladapter.cc 379 // Clear the DTLS timer
456 // Clear the DTLS timer
622 LOG(LS_INFO) << "DTLS timeout expired";
  /external/webrtc/talk/app/webrtc/test/
testsdpstrings.h 79 "m=application 45536 SCTP/DTLS 5000\r\n"
  /external/webrtc/webrtc/p2p/base/
transport.h 283 // transport description, such as the ICE role to use, and whether DTLS

Completed in 357 milliseconds

1 23 4 5