HomeSort by relevance Sort by last modified time
    Searched full:stun (Results 51 - 75 of 189) sorted by null

1 23 4 5 6 7 8

  /external/chromium_org/third_party/libjingle/source/talk/p2p/base/
relayserver.h 40 #include "talk/p2p/base/stun.h"
114 // Processes the relevant STUN request types from the client.
168 // Sends a STUN message to the connected client with no wrapping.
rawtransport.h 37 // Implements a transport that only sends raw packets, no STUN. As a result,
relayserver.cc 63 // Sends the given STUN message on the given socket.
72 // Constructs a STUN error response and sends it on the given socket.
207 // If this did not come from an existing connection, it should be a STUN
217 // Handle STUN requests to the server itself.
265 // The first packet should always be a STUN / TURN packet. If it isn't, then
270 LOG(LS_WARNING) << "Dropping packet: first packet not STUN";
316 // Parse this into a stun message. Eat the message if this fails.
343 // Make sure this is a valid STUN request.
403 // Make sure this is a valid STUN request.
testturnserver.h 36 #include "talk/p2p/base/stun.h"
basicpacketsocketfactory.cc 36 #include "talk/p2p/base/stun.h"
162 // Finally, wrap that socket in a TCP or STUN TCP packet socket.
portallocator.h 62 // As per RFC 5245 Appendix B.1, STUN transactions need to be paced at certain
86 // Starts gathering STUN and Relay configurations.
portallocatorsessionproxy.cc 184 // prohibit sending multiple STUN ping messages to the stun server, which
stunrequest_unittest.cc 175 LOG(LS_INFO) << "STUN request #" << (i + 1)
194 talk_base::Thread::Current()->ProcessMessages(10000); // > STUN timeout
port_unittest.cc 116 // Stub port class for testing STUN generation and processing.
169 // in STUN binding requests.
489 case NAT_OPEN_CONE: return "stun(open cone)";
490 case NAT_ADDR_RESTRICTED: return "stun(addr restricted)";
491 case NAT_PORT_RESTRICTED: return "stun(port restricted)";
492 case NAT_SYMMETRIC: return "stun(symmetric)";
493 default: return "stun(?)";
    [all...]
p2ptransportchannel_unittest.cc 80 // The address of the public STUN server.
109 // We also run a STUN server and a relay server on the virtual network to allow
468 // local to stun based on the test type.
472 // i.e. when don't match its remote type is either local or stun.
690 kLocalUdpToStunUdp("local", "udp", "stun", "udp",
691 "local", "udp", "stun", "udp", 1000);
699 kStunUdpToLocalUdp("stun", "udp", "local", "udp",
700 "local", "udp", "stun", "udp", 1000);
702 kStunUdpToStunUdp("stun", "udp", "stun", "udp"
    [all...]
stun_unittest.cc 36 #include "talk/p2p/base/stun.h"
86 // Returns the size the stun message should report itself as being
95 // Sample STUN packets with various attributes
247 // The actual length in bytes of the invalid messages (including STUN header)
283 // RTCP packet, for testing we correctly ignore non stun packet types.
293 // Software name (request): "STUN test client" (without quotes)
300 static const char kRfc5769SampleMsgClientSoftware[] = "STUN test client";
525 // This is kIPv4TestAddress xored with the STUN magic cookie.
639 // Read the RFC5389 fields from the RFC5769 sample STUN request.
667 // Read the RFC5389 fields from the RFC5769 sample STUN response
    [all...]
  /external/chromium/third_party/libjingle/source/talk/p2p/base/
rawtransport.h 37 // Implements a transport that only sends raw packets, no STUN. As a result,
relayserver.cc 63 // Sends the given STUN message on the given socket.
72 // Constructs a STUN error response and sends it on the given socket.
205 // If this did not come from an existing connection, it should be a STUN
215 // Handle STUN requests to the server itself.
266 // The first packet should always be a STUN / TURN packet. If it isn't, then
271 LOG(LS_WARNING) << "Dropping packet: first packet not STUN";
317 // Parse this into a stun message.
345 // Make sure this is a valid STUN request.
405 // Make sure this is a valid STUN request.
stunserver.cc 52 // Parse the STUN message.
158 // TODO: Allow response addr attribute if sent from another stun server.
  /external/chromium_org/content/browser/renderer_host/p2p/
socket_host.cc 26 // Verifies that the packet |data| has a valid STUN header.
socket_host_tcp.h 111 // P2PSocketHostStunTcp class provides the framing of STUN messages when used
  /external/chromium_org/remoting/protocol/
jingle_session_manager.h 48 // JingleSessionManager will also try to query configuration of STUN
libjingle_transport_factory.cc 249 } else if (candidate.type() == "stun") {
250 route.type = TransportRoute::STUN;
430 LOG(ERROR) << "Failed to parse stun server address: "
  /external/chromium_org/third_party/libjingle/source/talk/app/webrtc/
portallocatorfactory.h 56 const std::vector<StunConfiguration>& stun,
  /external/chromium_org/third_party/libjingle/source/talk/p2p/client/
autoportallocator.h 39 // This class sets the relay and stun servers using XmppClient.
httpportallocator.cc 107 talk_base::SocketAddress("stun.l.google.com", 19302));
116 talk_base::SocketAddress("stun.l.google.com", 19302));
144 // Creating stun sessions could also take time and could be done aysnc also,
146 // configs will have unresolved stun ips and will be discarded by the
  /external/chromium_org/third_party/libjingle/source/talk/app/webrtc/objctests/
RTCPeerConnectionTest.mm 99 NSString *stunURL = @"stun:stun.l.google.com:19302";
  /external/chromium_org/content/renderer/p2p/
port_allocator.cc 168 // Resolve Stun and Relay server addresses.
197 LOG(ERROR) << "Failed to resolve STUN server address "
199 // Allocating local ports on stun failure.
port_allocator.h 46 // STUN server address and port.
  /external/chromium_org/remoting/jingle_glue/
xmpp_signal_strategy.h 6 // STUN/ICE for jingle via a direct XMPP connection.

Completed in 364 milliseconds

1 23 4 5 6 7 8