OLD | NEW |
1 /* | 1 /* |
2 * Copyright 2013 The WebRTC project authors. All Rights Reserved. | 2 * Copyright 2013 The WebRTC project authors. All Rights Reserved. |
3 * | 3 * |
4 * Use of this source code is governed by a BSD-style license | 4 * Use of this source code is governed by a BSD-style license |
5 * that can be found in the LICENSE file in the root of the source | 5 * that can be found in the LICENSE file in the root of the source |
6 * tree. An additional intellectual property rights grant can be found | 6 * tree. An additional intellectual property rights grant can be found |
7 * in the file PATENTS. All contributing project authors may | 7 * in the file PATENTS. All contributing project authors may |
8 * be found in the AUTHORS file in the root of the source tree. | 8 * be found in the AUTHORS file in the root of the source tree. |
9 */ | 9 */ |
10 | 10 |
(...skipping 382 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
393 for (const cricket::ContentInfo& content : | 393 for (const cricket::ContentInfo& content : |
394 session_->remote_description()->description()->contents()) { | 394 session_->remote_description()->description()->contents()) { |
395 // According to http://tools.ietf.org/html/rfc5245#section-9.2.1.1 | 395 // According to http://tools.ietf.org/html/rfc5245#section-9.2.1.1 |
396 // an answer should also contain new ICE ufrag and password if an offer | 396 // an answer should also contain new ICE ufrag and password if an offer |
397 // has been received with new ufrag and password. | 397 // has been received with new ufrag and password. |
398 request.options.transport_options[content.name].ice_restart = | 398 request.options.transport_options[content.name].ice_restart = |
399 session_->IceRestartPending(content.name); | 399 session_->IceRestartPending(content.name); |
400 // We should pass the current SSL role to the transport description | 400 // We should pass the current SSL role to the transport description |
401 // factory, if there is already an existing ongoing session. | 401 // factory, if there is already an existing ongoing session. |
402 rtc::SSLRole ssl_role; | 402 rtc::SSLRole ssl_role; |
403 if (session_->GetSslRole(content.name, &ssl_role)) { | 403 if (session_->GetSslRole(session_->GetChannel(content.name), &ssl_role)) { |
404 request.options.transport_options[content.name].prefer_passive_role = | 404 request.options.transport_options[content.name].prefer_passive_role = |
405 (rtc::SSL_SERVER == ssl_role); | 405 (rtc::SSL_SERVER == ssl_role); |
406 } | 406 } |
407 } | 407 } |
408 } | 408 } |
409 | 409 |
410 cricket::SessionDescription* desc(session_desc_factory_.CreateAnswer( | 410 cricket::SessionDescription* desc(session_desc_factory_.CreateAnswer( |
411 session_->remote_description() | 411 session_->remote_description() |
412 ? session_->remote_description()->description() | 412 ? session_->remote_description()->description() |
413 : nullptr, | 413 : nullptr, |
(...skipping 86 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
500 if (create_session_description_requests_.front().type == | 500 if (create_session_description_requests_.front().type == |
501 CreateSessionDescriptionRequest::kOffer) { | 501 CreateSessionDescriptionRequest::kOffer) { |
502 InternalCreateOffer(create_session_description_requests_.front()); | 502 InternalCreateOffer(create_session_description_requests_.front()); |
503 } else { | 503 } else { |
504 InternalCreateAnswer(create_session_description_requests_.front()); | 504 InternalCreateAnswer(create_session_description_requests_.front()); |
505 } | 505 } |
506 create_session_description_requests_.pop(); | 506 create_session_description_requests_.pop(); |
507 } | 507 } |
508 } | 508 } |
509 } // namespace webrtc | 509 } // namespace webrtc |
OLD | NEW |