public Sdp(IList<IUdpIceCandidate> udpIceCandidates) { UdpIceCandidates = udpIceCandidates; // Generate a cryptographically secure random user name with minimum of 24 bits of randomness which is 4 characters given the 6 bits of randomness per ICE char (alpha, digit, + and / alphabet). UserName = new RandomIceCharString(4); // Generate a cryptographically secure random password with minimum of 128 bits of randomness which is 22 characters given the 6 bits of randomness per ICE char (alpha, digit, + and / alphabet). Password = new RandomIceCharString(22); var fingerprint = new byte[] { }; CryptographicBuffer.CopyToByteArray(CryptographicBuffer.GenerateRandom(96), out fingerprint); // TODO: Make a class for this that holds the algorithm enum and bytes of the hash. sha-256 18:B6:57:DA:92:EE:45:81:65:EB… Fingerprint = new byte[96]; Setup = SdpSetup.Passive; }
public Sdp(IList <IUdpIceCandidate> udpIceCandidates) { UdpIceCandidates = udpIceCandidates; // Generate a cryptographically secure random user name with minimum of 24 bits of randomness which is 4 characters given the 6 bits of randomness per ICE char (alpha, digit, + and / alphabet). UserName = new RandomIceCharString(4); // Generate a cryptographically secure random password with minimum of 128 bits of randomness which is 22 characters given the 6 bits of randomness per ICE char (alpha, digit, + and / alphabet). Password = new RandomIceCharString(22); var fingerprint = new byte[] { }; CryptographicBuffer.CopyToByteArray(CryptographicBuffer.GenerateRandom(96), out fingerprint); // TODO: Make a class for this that holds the algorithm enum and bytes of the hash. sha-256 18:B6:57:DA:92:EE:45:81:65:EB… Fingerprint = new byte[96]; Setup = SdpSetup.Passive; }