/external/webrtc/talk/app/webrtc/ |
webrtcsession.cc | 83 "Called with SDP without DTLS fingerprint."; 91 "Couldn't set up DTLS-SRTP on RTP channel."; 93 "Couldn't set up DTLS-SRTP on RTCP channel."; 179 // Checks that each non-rejected content has SDES crypto keys or a DTLS 180 // fingerprint. Mismatches, such as replying with a DTLS fingerprint to SDES 206 "Session description must have DTLS fingerprint if DTLS enabled."; 213 "Session description must have SDES when DTLS disabled."; 612 // just picking the first one. The decision should be made based on the DTLS 613 // handshake. The DTLS negotiations need to know about all certificates [all...] |
webrtcsdp_unittest.cc | 119 static const char kDtlsSctp[] = "DTLS/SCTP"; 120 static const char kUdpDtlsSctp[] = "UDP/DTLS/SCTP"; 121 static const char kTcpDtlsSctp[] = "TCP/DTLS/SCTP"; 288 "m=application 9 DTLS/SCTP 5000\r\n" 297 "m=application 9 DTLS/SCTP webrtc-datachannel\r\n" 306 "m=application 9 DTLS/SCTP webrtc-datachannel\r\n" 315 "m=application 2345 DTLS/SCTP 5000\r\n" [all...] |
peerconnectioninterface.h | 522 // party supports DTLS 1.0 and the other DTLS 1.2, DTLS 1.0 will be used.
|
datachannel.h | 90 // Gets the first unused odd/even id based on the DTLS role. If |role| is
|
peerconnectionendtoend_unittest.cc | 263 // Verifies that DataChannel IDs are even/odd based on the DTLS roles.
|
/external/webrtc/talk/session/media/ |
channel_unittest.cc | 128 DTLS = 0x10 }; 165 if ((flags1 & DTLS) && (flags2 & DTLS)) { 176 if (flags1 & DTLS) { 182 if (flags2 & DTLS) { [all...] |
srtpfilter.h | 54 // Needed for DTLS-SRTP 106 // Used with DTLS-SRTP.
|
mediasession.cc | 77 // We always generate offers with "UDP/TLS/RTP/SAVPF" when using DTLS-SRTP, 84 const char kMediaProtocolDtlsSctp[] = "DTLS/SCTP"; 85 const char kMediaProtocolUdpDtlsSctp[] = "UDP/DTLS/SCTP"; 86 const char kMediaProtocolTcpDtlsSctp[] = "TCP/DTLS/SCTP"; 552 // |bundle_group| should be updated to use the ufrag, pwd and DTLS role of the 679 // The common cryptos are needed if any of the content does not have DTLS [all...] |
channel.h | 110 // DTLS-based keying. If you turned off SRTP later, however 245 // Do the DTLS key expansion and impose it on the SRTP/SRTCP filters. 249 // Set the DTLS-SRTP cipher policy on this channel as appropriate. 280 bool* dtls,
|
mediasession_unittest.cc | [all...] |
/external/boringssl/src/ssl/ |
internal.h | 350 // Due to DTLS's historical wire version differences and to support multiple 356 // boundaries. The set of supported versions differs between TLS and DTLS. Wire 360 // used. DTLS versions map to the corresponding TLS versions. Draft TLS 1.3 366 // a valid TLS or DTLS version, it returns false. 368 // Note this simultaneously handles both DTLS and TLS. Use one of the 616 // protocol version, so DTLS 1.0 is represented as 0x0301, not 0xffef. 707 // is_dtls_ is whether DTLS is being used with this AEAD. 730 // DTLS replay bitmap. 792 // dtls_open_record implements |tls_open_record| for DTLS. It only returns [all...] |
dtls_record.cc | 0 /* DTLS implementation written by Nagendra Modadugu 230 // simplicity, drop it and expect retransmit to handle it later; DTLS must 240 // Bad packets are silently dropped in DTLS. See section 4.2.1 of RFC 6347.
|
d1_lib.cc | 2 * DTLS implementation written by Nagendra Modadugu 78 // before failing the DTLS handshake.
|
d1_both.cc | 2 * DTLS implementation written by Nagendra Modadugu 373 // The encrypted epoch in DTLS has only one handshake message. 591 // The |add_alert| path is only used for warning alerts for now, which DTLS 665 // DTLS messages are serialized as a single fragment in |msg|.
|
dtls_method.cc | 2 * DTLS implementation written by Nagendra Modadugu
|
d1_srtp.cc | 111 DTLS code by Eric Rescorla <ekr@rtfm.com>
|
/external/webrtc/webrtc/examples/peerconnection/client/ |
conductor.cc | 112 bool Conductor::CreatePeerConnection(bool dtls) { 122 if (dtls) { 267 // Recreate the peerconnection with DTLS disabled.
|
/external/mdnsresponder/ |
PrivateDNS.txt | 85 A potential solution to this deficiency might be in using DTLS, which is 87 More investigation needs to be done to see if DTLS is suitable for
|
/external/boringssl/src/ssl/test/ |
PORTING.md | 25 runner as a TCP client even when acting as a TLS server. For DTLS,
|
/external/webrtc/webrtc/examples/peerconnection/server/ |
server_test.html | 36 // In loopback mode, if DTLS is enabled, notify the client to disable it.
|
/external/boringssl/src/include/openssl/ |
ssl.h | 181 // or DTLS connections. Whether the connections are TLS or DTLS is selected by 191 // DTLS_method is the |SSL_METHOD| used for DTLS connections. 217 // An |SSL| object represents a single TLS or DTLS connection. Although the 247 // SSL_is_dtls returns one if |ssl| is a DTLS connection and zero otherwise. 254 // In DTLS, |rbio| must be non-blocking to properly handle timeouts and 335 // In DTLS, the caller must drive retransmissions. Whenever |SSL_get_error| 338 // |DTLSv1_handle_timeout|. Note that DTLS handshake retransmissions use fresh 387 // In DTLS, neither |SSL_MODE_ACCEPT_MOVING_WRITE_BUFFER| and 447 // If signaled by a DTLS handshake, the caller must also cal [all...] |
/external/boringssl/src/ssl/test/runner/ |
conn.go | 101 // DTLS state 177 nextSeq [6]byte // next epoch's starting sequence number in DTLS 262 // Increment up to the epoch in DTLS. 292 // incEpoch resets the sequence number. In DTLS, it also increments the epoch 324 // The DTLS epoch cannot be changed. 423 // DTLS sequence numbers are explicit. [all...] |
/external/webrtc/webrtc/base/ |
openssladapter.cc | 379 // Clear the DTLS timer 456 // Clear the DTLS timer 622 LOG(LS_INFO) << "DTLS timeout expired";
|
/prebuilts/jdk/jdk9/darwin-x86/conf/security/ |
java.security | 628 # (SSL/TLS/DTLS) processing 631 # when using SSL/TLS/DTLS. This section describes the mechanism for disabling 632 # algorithms during SSL/TLS/DTLS security parameters negotiation, including 724 # parameters for Transport Layer Security (SSL/TLS/DTLS) processing. 726 # In traditional SSL/TLS/DTLS connections where finite field DHE parameters [all...] |
/prebuilts/jdk/jdk9/linux-x86/conf/security/ |
java.security | 627 # (SSL/TLS/DTLS) processing 630 # when using SSL/TLS/DTLS. This section describes the mechanism for disabling 631 # algorithms during SSL/TLS/DTLS security parameters negotiation, including 723 # parameters for Transport Layer Security (SSL/TLS/DTLS) processing. 725 # In traditional SSL/TLS/DTLS connections where finite field DHE parameters [all...] |