HomeSort by relevance Sort by last modified time
    Searched full:dtls (Results 51 - 75 of 323) sorted by null

1 23 4 5 6 7 8 91011>>

  /external/webrtc/talk/app/webrtc/
webrtcsession.cc 83 "Called with SDP without DTLS fingerprint.";
91 "Couldn't set up DTLS-SRTP on RTP channel.";
93 "Couldn't set up DTLS-SRTP on RTCP channel.";
179 // Checks that each non-rejected content has SDES crypto keys or a DTLS
180 // fingerprint. Mismatches, such as replying with a DTLS fingerprint to SDES
206 "Session description must have DTLS fingerprint if DTLS enabled.";
213 "Session description must have SDES when DTLS disabled.";
612 // just picking the first one. The decision should be made based on the DTLS
613 // handshake. The DTLS negotiations need to know about all certificates
    [all...]
webrtcsdp_unittest.cc 119 static const char kDtlsSctp[] = "DTLS/SCTP";
120 static const char kUdpDtlsSctp[] = "UDP/DTLS/SCTP";
121 static const char kTcpDtlsSctp[] = "TCP/DTLS/SCTP";
288 "m=application 9 DTLS/SCTP 5000\r\n"
297 "m=application 9 DTLS/SCTP webrtc-datachannel\r\n"
306 "m=application 9 DTLS/SCTP webrtc-datachannel\r\n"
315 "m=application 2345 DTLS/SCTP 5000\r\n"
    [all...]
peerconnectioninterface.h 522 // party supports DTLS 1.0 and the other DTLS 1.2, DTLS 1.0 will be used.
datachannel.h 90 // Gets the first unused odd/even id based on the DTLS role. If |role| is
peerconnectionendtoend_unittest.cc 263 // Verifies that DataChannel IDs are even/odd based on the DTLS roles.
  /external/webrtc/talk/session/media/
channel_unittest.cc 128 DTLS = 0x10 };
165 if ((flags1 & DTLS) && (flags2 & DTLS)) {
176 if (flags1 & DTLS) {
182 if (flags2 & DTLS) {
    [all...]
srtpfilter.h 54 // Needed for DTLS-SRTP
106 // Used with DTLS-SRTP.
mediasession.cc 77 // We always generate offers with "UDP/TLS/RTP/SAVPF" when using DTLS-SRTP,
84 const char kMediaProtocolDtlsSctp[] = "DTLS/SCTP";
85 const char kMediaProtocolUdpDtlsSctp[] = "UDP/DTLS/SCTP";
86 const char kMediaProtocolTcpDtlsSctp[] = "TCP/DTLS/SCTP";
552 // |bundle_group| should be updated to use the ufrag, pwd and DTLS role of the
679 // The common cryptos are needed if any of the content does not have DTLS
    [all...]
channel.h 110 // DTLS-based keying. If you turned off SRTP later, however
245 // Do the DTLS key expansion and impose it on the SRTP/SRTCP filters.
249 // Set the DTLS-SRTP cipher policy on this channel as appropriate.
280 bool* dtls,
mediasession_unittest.cc     [all...]
  /external/boringssl/src/ssl/
internal.h 350 // Due to DTLS's historical wire version differences and to support multiple
356 // boundaries. The set of supported versions differs between TLS and DTLS. Wire
360 // used. DTLS versions map to the corresponding TLS versions. Draft TLS 1.3
366 // a valid TLS or DTLS version, it returns false.
368 // Note this simultaneously handles both DTLS and TLS. Use one of the
616 // protocol version, so DTLS 1.0 is represented as 0x0301, not 0xffef.
707 // is_dtls_ is whether DTLS is being used with this AEAD.
730 // DTLS replay bitmap.
792 // dtls_open_record implements |tls_open_record| for DTLS. It only returns
    [all...]
dtls_record.cc 0 /* DTLS implementation written by Nagendra Modadugu
230 // simplicity, drop it and expect retransmit to handle it later; DTLS must
240 // Bad packets are silently dropped in DTLS. See section 4.2.1 of RFC 6347.
d1_lib.cc 2 * DTLS implementation written by Nagendra Modadugu
78 // before failing the DTLS handshake.
d1_both.cc 2 * DTLS implementation written by Nagendra Modadugu
373 // The encrypted epoch in DTLS has only one handshake message.
591 // The |add_alert| path is only used for warning alerts for now, which DTLS
665 // DTLS messages are serialized as a single fragment in |msg|.
dtls_method.cc 2 * DTLS implementation written by Nagendra Modadugu
d1_srtp.cc 111 DTLS code by Eric Rescorla <ekr@rtfm.com>
  /external/webrtc/webrtc/examples/peerconnection/client/
conductor.cc 112 bool Conductor::CreatePeerConnection(bool dtls) {
122 if (dtls) {
267 // Recreate the peerconnection with DTLS disabled.
  /external/mdnsresponder/
PrivateDNS.txt 85 A potential solution to this deficiency might be in using DTLS, which is
87 More investigation needs to be done to see if DTLS is suitable for
  /external/boringssl/src/ssl/test/
PORTING.md 25 runner as a TCP client even when acting as a TLS server. For DTLS,
  /external/webrtc/webrtc/examples/peerconnection/server/
server_test.html 36 // In loopback mode, if DTLS is enabled, notify the client to disable it.
  /external/boringssl/src/include/openssl/
ssl.h 181 // or DTLS connections. Whether the connections are TLS or DTLS is selected by
191 // DTLS_method is the |SSL_METHOD| used for DTLS connections.
217 // An |SSL| object represents a single TLS or DTLS connection. Although the
247 // SSL_is_dtls returns one if |ssl| is a DTLS connection and zero otherwise.
254 // In DTLS, |rbio| must be non-blocking to properly handle timeouts and
335 // In DTLS, the caller must drive retransmissions. Whenever |SSL_get_error|
338 // |DTLSv1_handle_timeout|. Note that DTLS handshake retransmissions use fresh
387 // In DTLS, neither |SSL_MODE_ACCEPT_MOVING_WRITE_BUFFER| and
447 // If signaled by a DTLS handshake, the caller must also cal
    [all...]
  /external/boringssl/src/ssl/test/runner/
conn.go 101 // DTLS state
177 nextSeq [6]byte // next epoch's starting sequence number in DTLS
262 // Increment up to the epoch in DTLS.
292 // incEpoch resets the sequence number. In DTLS, it also increments the epoch
324 // The DTLS epoch cannot be changed.
423 // DTLS sequence numbers are explicit.
    [all...]
  /external/webrtc/webrtc/base/
openssladapter.cc 379 // Clear the DTLS timer
456 // Clear the DTLS timer
622 LOG(LS_INFO) << "DTLS timeout expired";
  /prebuilts/jdk/jdk9/darwin-x86/conf/security/
java.security 628 # (SSL/TLS/DTLS) processing
631 # when using SSL/TLS/DTLS. This section describes the mechanism for disabling
632 # algorithms during SSL/TLS/DTLS security parameters negotiation, including
724 # parameters for Transport Layer Security (SSL/TLS/DTLS) processing.
726 # In traditional SSL/TLS/DTLS connections where finite field DHE parameters
    [all...]
  /prebuilts/jdk/jdk9/linux-x86/conf/security/
java.security 627 # (SSL/TLS/DTLS) processing
630 # when using SSL/TLS/DTLS. This section describes the mechanism for disabling
631 # algorithms during SSL/TLS/DTLS security parameters negotiation, including
723 # parameters for Transport Layer Security (SSL/TLS/DTLS) processing.
725 # In traditional SSL/TLS/DTLS connections where finite field DHE parameters
    [all...]

Completed in 1758 milliseconds

1 23 4 5 6 7 8 91011>>