OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
full:stun
(Results
51 - 75
of
189
) sorted by null
1
2
3
4
5
6
7
8
/external/chromium_org/third_party/libjingle/source/talk/p2p/base/
relayserver.h
40
#include "talk/p2p/base/
stun
.h"
114
// Processes the relevant
STUN
request types from the client.
168
// Sends a
STUN
message to the connected client with no wrapping.
rawtransport.h
37
// Implements a transport that only sends raw packets, no
STUN
. As a result,
relayserver.cc
63
// Sends the given
STUN
message on the given socket.
72
// Constructs a
STUN
error response and sends it on the given socket.
207
// If this did not come from an existing connection, it should be a
STUN
217
// Handle
STUN
requests to the server itself.
265
// The first packet should always be a
STUN
/ TURN packet. If it isn't, then
270
LOG(LS_WARNING) << "Dropping packet: first packet not
STUN
";
316
// Parse this into a
stun
message. Eat the message if this fails.
343
// Make sure this is a valid
STUN
request.
403
// Make sure this is a valid
STUN
request.
testturnserver.h
36
#include "talk/p2p/base/
stun
.h"
basicpacketsocketfactory.cc
36
#include "talk/p2p/base/
stun
.h"
162
// Finally, wrap that socket in a TCP or
STUN
TCP packet socket.
portallocator.h
62
// As per RFC 5245 Appendix B.1,
STUN
transactions need to be paced at certain
86
// Starts gathering
STUN
and Relay configurations.
portallocatorsessionproxy.cc
184
// prohibit sending multiple
STUN
ping messages to the
stun
server, which
stunrequest_unittest.cc
175
LOG(LS_INFO) << "
STUN
request #" << (i + 1)
194
talk_base::Thread::Current()->ProcessMessages(10000); // >
STUN
timeout
port_unittest.cc
116
// Stub port class for testing
STUN
generation and processing.
169
// in
STUN
binding requests.
489
case NAT_OPEN_CONE: return "
stun
(open cone)";
490
case NAT_ADDR_RESTRICTED: return "
stun
(addr restricted)";
491
case NAT_PORT_RESTRICTED: return "
stun
(port restricted)";
492
case NAT_SYMMETRIC: return "
stun
(symmetric)";
493
default: return "
stun
(?)";
[
all
...]
p2ptransportchannel_unittest.cc
80
// The address of the public
STUN
server.
109
// We also run a
STUN
server and a relay server on the virtual network to allow
468
// local to
stun
based on the test type.
472
// i.e. when don't match its remote type is either local or
stun
.
690
kLocalUdpToStunUdp("local", "udp", "
stun
", "udp",
691
"local", "udp", "
stun
", "udp", 1000);
699
kStunUdpToLocalUdp("
stun
", "udp", "local", "udp",
700
"local", "udp", "
stun
", "udp", 1000);
702
kStunUdpToStunUdp("
stun
", "udp", "
stun
", "udp"
[
all
...]
stun_unittest.cc
36
#include "talk/p2p/base/
stun
.h"
86
// Returns the size the
stun
message should report itself as being
95
// Sample
STUN
packets with various attributes
247
// The actual length in bytes of the invalid messages (including
STUN
header)
283
// RTCP packet, for testing we correctly ignore non
stun
packet types.
293
// Software name (request): "
STUN
test client" (without quotes)
300
static const char kRfc5769SampleMsgClientSoftware[] = "
STUN
test client";
525
// This is kIPv4TestAddress xored with the
STUN
magic cookie.
639
// Read the RFC5389 fields from the RFC5769 sample
STUN
request.
667
// Read the RFC5389 fields from the RFC5769 sample
STUN
response
[
all
...]
/external/chromium/third_party/libjingle/source/talk/p2p/base/
rawtransport.h
37
// Implements a transport that only sends raw packets, no
STUN
. As a result,
relayserver.cc
63
// Sends the given
STUN
message on the given socket.
72
// Constructs a
STUN
error response and sends it on the given socket.
205
// If this did not come from an existing connection, it should be a
STUN
215
// Handle
STUN
requests to the server itself.
266
// The first packet should always be a
STUN
/ TURN packet. If it isn't, then
271
LOG(LS_WARNING) << "Dropping packet: first packet not
STUN
";
317
// Parse this into a
stun
message.
345
// Make sure this is a valid
STUN
request.
405
// Make sure this is a valid
STUN
request.
stunserver.cc
52
// Parse the
STUN
message.
158
// TODO: Allow response addr attribute if sent from another
stun
server.
/external/chromium_org/content/browser/renderer_host/p2p/
socket_host.cc
26
// Verifies that the packet |data| has a valid
STUN
header.
socket_host_tcp.h
111
// P2PSocketHostStunTcp class provides the framing of
STUN
messages when used
/external/chromium_org/remoting/protocol/
jingle_session_manager.h
48
// JingleSessionManager will also try to query configuration of
STUN
libjingle_transport_factory.cc
249
} else if (candidate.type() == "
stun
") {
250
route.type = TransportRoute::
STUN
;
430
LOG(ERROR) << "Failed to parse
stun
server address: "
/external/chromium_org/third_party/libjingle/source/talk/app/webrtc/
portallocatorfactory.h
56
const std::vector<StunConfiguration>&
stun
,
/external/chromium_org/third_party/libjingle/source/talk/p2p/client/
autoportallocator.h
39
// This class sets the relay and
stun
servers using XmppClient.
httpportallocator.cc
107
talk_base::SocketAddress("
stun
.l.google.com", 19302));
116
talk_base::SocketAddress("
stun
.l.google.com", 19302));
144
// Creating
stun
sessions could also take time and could be done aysnc also,
146
// configs will have unresolved
stun
ips and will be discarded by the
/external/chromium_org/third_party/libjingle/source/talk/app/webrtc/objctests/
RTCPeerConnectionTest.mm
99
NSString *stunURL = @"
stun
:
stun
.l.google.com:19302";
/external/chromium_org/content/renderer/p2p/
port_allocator.cc
168
// Resolve
Stun
and Relay server addresses.
197
LOG(ERROR) << "Failed to resolve
STUN
server address "
199
// Allocating local ports on
stun
failure.
port_allocator.h
46
//
STUN
server address and port.
/external/chromium_org/remoting/jingle_glue/
xmpp_signal_strategy.h
6
//
STUN
/ICE for jingle via a direct XMPP connection.
Completed in 364 milliseconds
1
2
3
4
5
6
7
8