HomeSort by relevance Sort by last modified time
    Searched full:stun (Results 1 - 25 of 189) sorted by null

1 2 3 4 5 6 7 8

  /external/chromium_org/remoting/protocol/
transport.cc 17 case STUN:
18 return "stun";
libjingle_transport_factory.h 41 // |port_allocator| with STUN/Relay addresses.
  /external/chromium_org/remoting/jingle_glue/
network_settings.h 19 // Active NAT traversal using STUN and relay servers.
22 // Don't use STUN or relay servers. Accept incoming P2P connection
28 // Don't use STUN or relay servers but make outgoing connections.
jingle_info_request.cc 46 const buzz::XmlElement* stun = query->FirstNamed(buzz::QN_JINGLE_INFO_STUN); local
47 if (stun) {
49 stun->FirstNamed(buzz::QN_JINGLE_INFO_SERVER);
  /external/chromium/third_party/libjingle/source/talk/p2p/base/
stunrequest.h 33 #include "talk/p2p/base/stun.h"
41 // Manages a set of STUN requests, sending and resending until we receive a
52 // Removes a stun request that was added previously. This will happen
56 // Removes all stun requests that were added previously.
76 // Represents an individual request to be sent. The STUN message can either be
93 // Returns the STUN type of the request message.
stunserver.h 33 #include "talk/p2p/base/stun.h"
41 // Creates a STUN server, which will listen on the given socket.
43 // Removes the STUN server from the socket and deletes the socket.
52 // Handlers for the different types of STUN/TURN requests:
port.cc 204 // If this is an authenticated STUN request, then signal unknown address and
209 LOG_J(LS_ERROR, this) << "Received non-STUN packet from unknown address ("
212 // STUN message handled already
217 // connection for this port while it had STUN requests in flight, because
220 LOG_J(LS_ERROR, this) << "Received unexpected STUN message type ("
239 // STUN message, then ignore it.
258 LOG_J(LS_ERROR, this) << "Received STUN request without username from "
263 LOG_J(LS_ERROR, this) << "Received STUN request with bad local username "
277 LOG_J(LS_ERROR, this) << "Received STUN response without username from "
284 LOG_J(LS_ERROR, this) << "Received STUN response with bad local username
    [all...]
stun.h 31 // This file contains classes for dealing with the STUN and TURN protocols.
42 // These are the types of STUN & TURN messages as of last check.
59 // These are the types of attributes defined in STUN & TURN. Next to each is
114 // Records a complete STUN/TURN message. Each message consists of a type and
139 // Parses the STUN/TURN packet in the given buffer and records it here. The
143 // Writes this object into a STUN/TURN packet. Return value is true if
156 // Base class for all STUN/TURN attributes.
195 // Implements STUN/TURN attributes that record an Internet address.
223 // Implements STUN/TURN attributs that record a 32-bit integer.
248 // Implements STUN/TURN attributs that record an arbitrary byte strin
    [all...]
rawtransportchannel.cc 97 // Create an allocator that only returns stun and relay ports.
111 // The initial ports will include stun.
147 // Note about stun classification
150 // To turn this one we will have to enable a second stun address and make sure
191 // are not behind a symmetric NAT. Hence, a stun port should be sufficient.
212 // Always use the stun port. We don't classify right now so just assume it
  /external/chromium_org/third_party/libjingle/source/talk/p2p/base/
stunrequest.h 33 #include "talk/p2p/base/stun.h"
41 // Manages a set of STUN requests, sending and resending until we receive a
52 // Removes a stun request that was added previously. This will happen
56 // Removes all stun requests that were added previously.
78 // Represents an individual request to be sent. The STUN message can either be
95 // Returns the STUN type of the request message.
stunserver.h 33 #include "talk/p2p/base/stun.h"
41 // Creates a STUN server, which will listen on the given socket.
43 // Removes the STUN server from the socket and deletes the socket.
52 // Handlers for the different types of STUN/TURN requests:
stun.h 31 // This file contains classes for dealing with the STUN protocol, as specified
43 // These are the types of STUN messages defined in RFC 5389.
51 // These are all known STUN attributes, defined in RFC 5389 and elsewhere.
86 // These are the types of STUN addresses defined in RFC 5389.
88 // NB: UNDEF is not part of the STUN spec.
94 // These are the types of STUN error codes defined in RFC 5389.
114 // The mask used to determine whether a STUN message is a request/response etc.
117 // STUN Attribute header length.
127 // Following value corresponds to an earlier version of STUN from
131 // STUN Message Integrity HMAC length
    [all...]
port.cc 124 const char STUN_PORT_TYPE[] = "stun";
152 // etc.), and STUN or TURN server. If any of these are different,
291 // If this is an authenticated STUN request, then signal unknown address and
296 LOG_J(LS_ERROR, this) << "Received non-STUN packet from unknown address ("
299 // STUN message handled already
311 // pruned a connection for this port while it had STUN requests in flight,
315 LOG_J(LS_ERROR, this) << "Received unexpected STUN message type ("
353 // Don't bother parsing the packet if we can tell it's not STUN.
354 // In ICE mode, all STUN packets will have a valid fingerprint.
360 // STUN message, then ignore it
    [all...]
stunport.cc 35 #include "talk/p2p/base/stun.h"
44 // Handles a binding request sent to the STUN server.
189 // Sending binding request to the STUN server if address is available to
190 // prepare STUN candidate.
253 // Look for a response from the STUN server.
275 // We will keep pinging the stun server to make sure our NAT pin-hole stays
277 // TODO: Support multiple stun servers, or make ResolveStunAddress find a
302 LOG_J(LS_WARNING, this) << "StunPort: stun host lookup received error "
318 // address then discarding the stun address.
319 // Setting related address before STUN candidate is added. For STU
    [all...]
rawtransportchannel.cc 99 // Create an allocator that only returns stun and relay ports.
100 // Use empty string for ufrag and pwd here. There won't be any STUN or relay
117 // The initial ports will include stun.
153 // Note about stun classification
156 // To turn this one we will have to enable a second stun address and make sure
192 // are not behind a symmetric NAT. Hence, a stun port should be sufficient.
207 // Always use the stun port. We don't classify right now so just assume it
stunport.h 133 // This method will send STUN binding request if STUN server address is set.
140 // DNS resolution of the STUN server.
148 // Sends STUN requests to the server.
200 // UDPPort will set these to local udp, updating these to STUN.
stunport_unittest.cc 44 // Tests connecting a StunPort to a fake STUN server (cricket::StunServer)
106 // Test that we can create a STUN port
109 EXPECT_EQ("stun", port()->Type());
113 // Test that we can get an address from a STUN server.
134 // Test that we can get an address from a STUN server specified by a hostname.
asyncstuntcpsocket.cc 34 #include "talk/p2p/base/stun.h"
81 // Accepts only complete STUN/ChannelData packets.
104 // STUN packet - First 4 bytes. Total header size is 20 bytes.
106 // |0 0| STUN Message Type | Message Length |
115 // We need at least 4 bytes to read the STUN or ChannelData packet length.
149 // STUN message.
  /external/chromium_org/content/browser/renderer_host/p2p/
socket_host_udp.cc 148 bool stun = GetStunPacketType(&*data.begin(), data.size(), &type); local
149 if (stun && IsRequestOrResponse(type)) {
151 } else if (!stun || type == STUN_DATA_INDICATION) {
154 << " before STUN binding is finished.";
176 bool stun = GetStunPacketType(&*data.begin(), data.size(), &type); local
177 if (!stun || type == STUN_DATA_INDICATION) {
179 << " before STUN binding is finished.";
socket_host_tcp.cc 250 bool stun = GetStunPacketType(&*data.begin(), data.size(), &type); local
251 if (stun && IsRequestOrResponse(type)) {
253 } else if (!stun || type == STUN_DATA_INDICATION) {
256 << " before STUN binding is finished. "
283 bool stun = GetStunPacketType(&*data.begin(), data.size(), &type); local
284 if (!stun || type == STUN_DATA_INDICATION) {
286 << " before STUN binding is finished.";
455 // Each packet is expected to have header (STUN/TURN ChannelData), where
467 // Accepts only complete STUN/TURN packets.
492 // Both stun and turn had length at offset 2
    [all...]
  /external/chromium_org/third_party/libjingle/source/talk/app/webrtc/
portallocatorfactory.cc 58 const std::vector<StunConfiguration>& stun,
62 for (StunIt stun_it = stun.begin(); stun_it != stun.end(); ++stun_it) {
  /external/chromium_org/third_party/libjingle/source/talk/xmpp/
jingleinfotask.cc 112 const XmlElement *stun = query->FirstNamed(QN_JINGLE_INFO_STUN); local
113 if (stun) {
114 for (const XmlElement *server = stun->FirstNamed(QN_JINGLE_INFO_SERVER);
  /external/chromium_org/third_party/libjingle/source/talk/examples/peerconnection/client/
defaults.cc 60 return GetEnvVarOrDefault("WEBRTC_CONNECT", "stun:stun.l.google.com:19302");
  /external/chromium/third_party/libjingle/source/
README 80 Libjingle also builds two server tools, a relay server and a STUN server. The
82 could not be established. The STUN Server implements the STUN protocol for
85 client to use this relay server and this STUN server
  /external/chromium_org/remoting/client/plugin/
pepper_port_allocator.h 20 // * PepperPortAllocator resolves STUN DNS names and passes IP

Completed in 828 milliseconds

1 2 3 4 5 6 7 8