0eb15ed7b806125774bd13fb214aeb403e2c6857 |
|
17-Dec-2015 |
kwiberg <kwiberg@webrtc.org> |
Don't call the Pass methods of rtc::Buffer, rtc::scoped_ptr, and rtc::ScopedVector We can now use std::move instead! This CL leaves the Pass methods in place; a follow-up CL will add deprecation annotations to them. Review URL: https://codereview.webrtc.org/1460043002 Cr-Commit-Position: refs/heads/master@{#11064}
/external/webrtc/talk/app/webrtc/test/fakedtlsidentitystore.h
|
1218d7ad2fac035376914bd0649fe99e657b33d3 |
|
05-Dec-2015 |
Guo-wei Shieh <guoweis@webrtc.org> |
Allow remote fingerprint update during a call Changes include the following 1. modify FakeDtlsIdentityStore to support alternate certificate so we could have a different fingerprint in test case. 2. dtlstransportchannel can accept a new fingerprint and trigger DTLS handshake. 3. #2 will trigger new signal on the media side to reset SRTP context. Only reset SRTP context when we are using DTLS (not SDES). 4. Test cases for caller or callee are transfees. TBR=pthatcher@webrtc.org BUG=webrtc:3618 This is a reland of https://codereview.webrtc.org/1453523002 Review URL: https://codereview.webrtc.org/1505573002 . Cr-Commit-Position: refs/heads/master@{#10903}
/external/webrtc/talk/app/webrtc/test/fakedtlsidentitystore.h
|
86aaa4be8de8f49f91faeefbfd1a23f312898dd2 |
|
05-Dec-2015 |
Guo-wei Shieh <guoweis@webrtc.org> |
Revert "Allow remote fingerprint update during a call" This reverts commit 9c38c2d33fa6d794704d53b18f39d5235439fe63. This commit somehow is different from what I have in my local copy. Revert and will recommit. TBR=pthatcher@webrtc.org BUG=3618 Review URL: https://codereview.webrtc.org/1494373004 . Cr-Commit-Position: refs/heads/master@{#10902}
/external/webrtc/talk/app/webrtc/test/fakedtlsidentitystore.h
|
9c38c2d33fa6d794704d53b18f39d5235439fe63 |
|
05-Dec-2015 |
Guo-wei Shieh <guoweis@webrtc.org> |
Allow remote fingerprint update during a call Changes include the following 1. modify FakeDtlsIdentityStore to support alternate certificate so we could have a different fingerprint in test case. 2. dtlstransportchannel can accept a new fingerprint and trigger DTLS handshake. 3. #2 will trigger new signal on the media side to reset SRTP context. Only reset SRTP context when we are using DTLS (not SDES). 4. Test cases for caller or callee are transfees. BUG=webrtc:3618 R=pthatcher@webrtc.org Review URL: https://codereview.webrtc.org/1453523002 . Cr-Commit-Position: refs/heads/master@{#10901}
/external/webrtc/talk/app/webrtc/test/fakedtlsidentitystore.h
|
91d6edef35e7275879c30ce16ecb8b6dc73c6e4a |
|
17-Sep-2015 |
henrikg <henrikg@webrtc.org> |
Add RTC_ prefix to (D)CHECKs and related macros. We must remove dependency on Chromium, i.e. we can't use Chromium's base/logging.h. That means we need to define these macros in WebRTC also when doing Chromium builds. And this causes redefinition. Alternative solutions: * Check if we already have defined e.g. CHECK, and don't define them in that case. This makes us depend on include order in Chromium, which is not acceptable. * Don't allow using the macros in WebRTC headers. Error prone since if someone adds it there by mistake it may compile fine, but later break if a header in added or order is changed in Chromium. That will be confusing and hard to enforce. * Ensure that headers that are included by an embedder don't include our macros. This would require some heavy refactoring to be maintainable and enforcable. * Changes in Chromium for this is obviously not an option. BUG=chromium:468375 NOTRY=true Review URL: https://codereview.webrtc.org/1335923002 Cr-Commit-Position: refs/heads/master@{#9964}
/external/webrtc/talk/app/webrtc/test/fakedtlsidentitystore.h
|
87713d0fe6fb9c86abe501bdf3d26ef4287ee617 |
|
25-Aug-2015 |
Henrik Boström <hbos@webrtc.org> |
RTCCertificates added to RTCConfiguration, used by WebRtcSession/-DescriptionFactory. This CL allows you to, having generated one or more RTCCertificates, supply them to RTCConfiguration for CreatePeerConnection use. This means an SSLIdentity does not have to be generated with a DtlsIdentityStore[Interface/Impl] as part of the CreatePeerConnection steps because the certificate contains all the necessary information. To create an RTCCertificate you have to do the identity generation yourself though. But you could reuse the same RTCCertificate for multiple connections. BUG=webrtc:4927 R=tommi@webrtc.org, torbjorng@webrtc.org Review URL: https://codereview.webrtc.org/1288033009 . Cr-Commit-Position: refs/heads/master@{#9774}
/external/webrtc/talk/app/webrtc/test/fakedtlsidentitystore.h
|
5e56c5927e097f095aef2e9f7be49fd3d59221e1 |
|
11-Aug-2015 |
Henrik Boström <hbos@webrtc.org> |
DtlsIdentityStoreInterface added and the implementation is called DtlsIdentityStoreImpl (previously named without the -Impl bit and without an interface). DtlsIdentityStoreImpl is updated to take KeyType into account, something which will be relevant after this CL lands: https://codereview.webrtc.org/1189583002 The DtlsIdentityService[Interface] classes are about to be removed (to be removed when Chromium no longer implements and uses the interface). This was an unnecessary layer of complexity. The FakeIdentityService is now instead a FakeDtlsIdentityStore. Where a service was previously passed around, a store is now passed around. Identity generation is now commonly performed using DtlsIdentityStoreInterface. Previously, if a service was not specified, WebRtcSessionDescriptionFactory could fall back on its own generation code. Now, a store has to be provided for generation to occur. For more information about the steps being taken to land this without breaking Chromium, see referenced bug. BUG=webrtc:4899 R=magjed@webrtc.org, tommi@webrtc.org Review URL: https://codereview.webrtc.org/1176383004 . Cr-Commit-Position: refs/heads/master@{#9696}
/external/webrtc/talk/app/webrtc/test/fakedtlsidentitystore.h
|