/external/chromium_org/remoting/protocol/ |
transport.cc | 17 case STUN: 18 return "stun";
|
libjingle_transport_factory.h | 41 // |port_allocator| with STUN/Relay addresses.
|
/external/chromium_org/remoting/jingle_glue/ |
network_settings.h | 19 // Active NAT traversal using STUN and relay servers. 22 // Don't use STUN or relay servers. Accept incoming P2P connection 28 // Don't use STUN or relay servers but make outgoing connections.
|
jingle_info_request.cc | 46 const buzz::XmlElement* stun = query->FirstNamed(buzz::QN_JINGLE_INFO_STUN); local 47 if (stun) { 49 stun->FirstNamed(buzz::QN_JINGLE_INFO_SERVER);
|
/external/chromium/third_party/libjingle/source/talk/p2p/base/ |
stunrequest.h | 33 #include "talk/p2p/base/stun.h" 41 // Manages a set of STUN requests, sending and resending until we receive a 52 // Removes a stun request that was added previously. This will happen 56 // Removes all stun requests that were added previously. 76 // Represents an individual request to be sent. The STUN message can either be 93 // Returns the STUN type of the request message.
|
stunserver.h | 33 #include "talk/p2p/base/stun.h" 41 // Creates a STUN server, which will listen on the given socket. 43 // Removes the STUN server from the socket and deletes the socket. 52 // Handlers for the different types of STUN/TURN requests:
|
port.cc | 204 // If this is an authenticated STUN request, then signal unknown address and 209 LOG_J(LS_ERROR, this) << "Received non-STUN packet from unknown address (" 212 // STUN message handled already 217 // connection for this port while it had STUN requests in flight, because 220 LOG_J(LS_ERROR, this) << "Received unexpected STUN message type (" 239 // STUN message, then ignore it. 258 LOG_J(LS_ERROR, this) << "Received STUN request without username from " 263 LOG_J(LS_ERROR, this) << "Received STUN request with bad local username " 277 LOG_J(LS_ERROR, this) << "Received STUN response without username from " 284 LOG_J(LS_ERROR, this) << "Received STUN response with bad local username [all...] |
stun.h | 31 // This file contains classes for dealing with the STUN and TURN protocols. 42 // These are the types of STUN & TURN messages as of last check. 59 // These are the types of attributes defined in STUN & TURN. Next to each is 114 // Records a complete STUN/TURN message. Each message consists of a type and 139 // Parses the STUN/TURN packet in the given buffer and records it here. The 143 // Writes this object into a STUN/TURN packet. Return value is true if 156 // Base class for all STUN/TURN attributes. 195 // Implements STUN/TURN attributes that record an Internet address. 223 // Implements STUN/TURN attributs that record a 32-bit integer. 248 // Implements STUN/TURN attributs that record an arbitrary byte strin [all...] |
rawtransportchannel.cc | 97 // Create an allocator that only returns stun and relay ports. 111 // The initial ports will include stun. 147 // Note about stun classification 150 // To turn this one we will have to enable a second stun address and make sure 191 // are not behind a symmetric NAT. Hence, a stun port should be sufficient. 212 // Always use the stun port. We don't classify right now so just assume it
|
/external/chromium_org/third_party/libjingle/source/talk/p2p/base/ |
stunrequest.h | 33 #include "talk/p2p/base/stun.h" 41 // Manages a set of STUN requests, sending and resending until we receive a 52 // Removes a stun request that was added previously. This will happen 56 // Removes all stun requests that were added previously. 78 // Represents an individual request to be sent. The STUN message can either be 95 // Returns the STUN type of the request message.
|
stunserver.h | 33 #include "talk/p2p/base/stun.h" 41 // Creates a STUN server, which will listen on the given socket. 43 // Removes the STUN server from the socket and deletes the socket. 52 // Handlers for the different types of STUN/TURN requests:
|
stun.h | 31 // This file contains classes for dealing with the STUN protocol, as specified 43 // These are the types of STUN messages defined in RFC 5389. 51 // These are all known STUN attributes, defined in RFC 5389 and elsewhere. 86 // These are the types of STUN addresses defined in RFC 5389. 88 // NB: UNDEF is not part of the STUN spec. 94 // These are the types of STUN error codes defined in RFC 5389. 114 // The mask used to determine whether a STUN message is a request/response etc. 117 // STUN Attribute header length. 127 // Following value corresponds to an earlier version of STUN from 131 // STUN Message Integrity HMAC length [all...] |
port.cc | 124 const char STUN_PORT_TYPE[] = "stun"; 152 // etc.), and STUN or TURN server. If any of these are different, 291 // If this is an authenticated STUN request, then signal unknown address and 296 LOG_J(LS_ERROR, this) << "Received non-STUN packet from unknown address (" 299 // STUN message handled already 311 // pruned a connection for this port while it had STUN requests in flight, 315 LOG_J(LS_ERROR, this) << "Received unexpected STUN message type (" 353 // Don't bother parsing the packet if we can tell it's not STUN. 354 // In ICE mode, all STUN packets will have a valid fingerprint. 360 // STUN message, then ignore it [all...] |
stunport.cc | 35 #include "talk/p2p/base/stun.h" 44 // Handles a binding request sent to the STUN server. 189 // Sending binding request to the STUN server if address is available to 190 // prepare STUN candidate. 253 // Look for a response from the STUN server. 275 // We will keep pinging the stun server to make sure our NAT pin-hole stays 277 // TODO: Support multiple stun servers, or make ResolveStunAddress find a 302 LOG_J(LS_WARNING, this) << "StunPort: stun host lookup received error " 318 // address then discarding the stun address. 319 // Setting related address before STUN candidate is added. For STU [all...] |
rawtransportchannel.cc | 99 // Create an allocator that only returns stun and relay ports. 100 // Use empty string for ufrag and pwd here. There won't be any STUN or relay 117 // The initial ports will include stun. 153 // Note about stun classification 156 // To turn this one we will have to enable a second stun address and make sure 192 // are not behind a symmetric NAT. Hence, a stun port should be sufficient. 207 // Always use the stun port. We don't classify right now so just assume it
|
stunport.h | 133 // This method will send STUN binding request if STUN server address is set. 140 // DNS resolution of the STUN server. 148 // Sends STUN requests to the server. 200 // UDPPort will set these to local udp, updating these to STUN.
|
stunport_unittest.cc | 44 // Tests connecting a StunPort to a fake STUN server (cricket::StunServer) 106 // Test that we can create a STUN port 109 EXPECT_EQ("stun", port()->Type()); 113 // Test that we can get an address from a STUN server. 134 // Test that we can get an address from a STUN server specified by a hostname.
|
asyncstuntcpsocket.cc | 34 #include "talk/p2p/base/stun.h" 81 // Accepts only complete STUN/ChannelData packets. 104 // STUN packet - First 4 bytes. Total header size is 20 bytes. 106 // |0 0| STUN Message Type | Message Length | 115 // We need at least 4 bytes to read the STUN or ChannelData packet length. 149 // STUN message.
|
/external/chromium_org/content/browser/renderer_host/p2p/ |
socket_host_udp.cc | 148 bool stun = GetStunPacketType(&*data.begin(), data.size(), &type); local 149 if (stun && IsRequestOrResponse(type)) { 151 } else if (!stun || type == STUN_DATA_INDICATION) { 154 << " before STUN binding is finished."; 176 bool stun = GetStunPacketType(&*data.begin(), data.size(), &type); local 177 if (!stun || type == STUN_DATA_INDICATION) { 179 << " before STUN binding is finished.";
|
socket_host_tcp.cc | 250 bool stun = GetStunPacketType(&*data.begin(), data.size(), &type); local 251 if (stun && IsRequestOrResponse(type)) { 253 } else if (!stun || type == STUN_DATA_INDICATION) { 256 << " before STUN binding is finished. " 283 bool stun = GetStunPacketType(&*data.begin(), data.size(), &type); local 284 if (!stun || type == STUN_DATA_INDICATION) { 286 << " before STUN binding is finished."; 455 // Each packet is expected to have header (STUN/TURN ChannelData), where 467 // Accepts only complete STUN/TURN packets. 492 // Both stun and turn had length at offset 2 [all...] |
/external/chromium_org/third_party/libjingle/source/talk/app/webrtc/ |
portallocatorfactory.cc | 58 const std::vector<StunConfiguration>& stun, 62 for (StunIt stun_it = stun.begin(); stun_it != stun.end(); ++stun_it) {
|
/external/chromium_org/third_party/libjingle/source/talk/xmpp/ |
jingleinfotask.cc | 112 const XmlElement *stun = query->FirstNamed(QN_JINGLE_INFO_STUN); local 113 if (stun) { 114 for (const XmlElement *server = stun->FirstNamed(QN_JINGLE_INFO_SERVER);
|
/external/chromium_org/third_party/libjingle/source/talk/examples/peerconnection/client/ |
defaults.cc | 60 return GetEnvVarOrDefault("WEBRTC_CONNECT", "stun:stun.l.google.com:19302");
|
/external/chromium/third_party/libjingle/source/ |
README | 80 Libjingle also builds two server tools, a relay server and a STUN server. The 82 could not be established. The STUN Server implements the STUN protocol for 85 client to use this relay server and this STUN server
|
/external/chromium_org/remoting/client/plugin/ |
pepper_port_allocator.h | 20 // * PepperPortAllocator resolves STUN DNS names and passes IP
|