public Sdp(IList<IUdpIceCandidate> udpIceCandidates)
    {
      UdpIceCandidates = udpIceCandidates;

      // Generate a cryptographically secure random user name with minimum of 24 bits of randomness which is 4 characters given the 6 bits of randomness per ICE char (alpha, digit, + and / alphabet).
      UserName = new RandomIceCharString(4);

      // Generate a cryptographically secure random password with minimum of 128 bits of randomness which is 22 characters given the 6 bits of randomness per ICE char (alpha, digit, + and / alphabet).
      Password = new RandomIceCharString(22);

      var fingerprint = new byte[] { };
      CryptographicBuffer.CopyToByteArray(CryptographicBuffer.GenerateRandom(96), out fingerprint);

      // TODO: Make a class for this that holds the algorithm enum and bytes of the hash. sha-256 18:B6:57:DA:92:EE:45:81:65:EB…
      Fingerprint = new byte[96];

      Setup = SdpSetup.Passive;
    }
Example #2
0
        public Sdp(IList <IUdpIceCandidate> udpIceCandidates)
        {
            UdpIceCandidates = udpIceCandidates;

            // Generate a cryptographically secure random user name with minimum of 24 bits of randomness which is 4 characters given the 6 bits of randomness per ICE char (alpha, digit, + and / alphabet).
            UserName = new RandomIceCharString(4);

            // Generate a cryptographically secure random password with minimum of 128 bits of randomness which is 22 characters given the 6 bits of randomness per ICE char (alpha, digit, + and / alphabet).
            Password = new RandomIceCharString(22);

            var fingerprint = new byte[] { };

            CryptographicBuffer.CopyToByteArray(CryptographicBuffer.GenerateRandom(96), out fingerprint);

            // TODO: Make a class for this that holds the algorithm enum and bytes of the hash. sha-256 18:B6:57:DA:92:EE:45:81:65:EB…
            Fingerprint = new byte[96];

            Setup = SdpSetup.Passive;
        }