OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
refs:NAT
(Results
1 - 13
of
13
) sorted by null
/external/chromium_org/third_party/libjingle/source/talk/base/
nattypes.h
33
/* Identifies each type of
NAT
that can be simulated. */
41
// Implements the rules for each specific type of
NAT
.
42
class
NAT
{
44
virtual ~
NAT
() { }
46
// Determines whether this
NAT
uses both source and destination address when
50
// Determines whether this
NAT
drops packets received from a different IP
54
// Determines whether this
NAT
drops packets received from a different port
58
// Returns an implementation of the given type of
NAT
.
59
static
NAT
* Create(NATType type);
nattypes.cc
34
class SymmetricNAT : public
NAT
{
41
class OpenConeNAT : public
NAT
{
48
class AddressRestrictedNAT : public
NAT
{
55
class PortRestrictedNAT : public
NAT
{
62
NAT
*
NAT
::Create(NATType type) {
natserver.h
43
//
NAT
. The
NAT
server maintains a hashtable of the routes that it knows
46
explicit RouteCmp(
NAT
*
nat
);
54
// Changes how addresses are compared based on the filtering rules of the
NAT
.
56
explicit AddrCmp(
NAT
*
nat
);
64
// Implements the
NAT
device. It listens for packets on the internal network,
93
TransEntry(const SocketAddressPair& r, AsyncUDPSocket* s,
NAT
*
nat
);
[
all
...]
natserver.cc
34
RouteCmp::RouteCmp(
NAT
*
nat
) : symmetric(
nat
->IsSymmetric()) {
57
AddrCmp::AddrCmp(
NAT
*
nat
)
58
: use_ip(
nat
->FiltersIP()), use_port(
nat
->FiltersPort()) {
87
nat_ =
NAT
::Create(type);
143
// Allow the
NAT
to reject this packet.
146
<< " was filtered out by the
NAT
."
[
all
...]
/external/chromium_org/third_party/webrtc/base/
nattypes.h
16
/* Identifies each type of
NAT
that can be simulated. */
24
// Implements the rules for each specific type of
NAT
.
25
class
NAT
{
27
virtual ~
NAT
() { }
29
// Determines whether this
NAT
uses both source and destination address when
33
// Determines whether this
NAT
drops packets received from a different IP
37
// Determines whether this
NAT
drops packets received from a different port
41
// Returns an implementation of the given type of
NAT
.
42
static
NAT
* Create(NATType type);
nattypes.cc
17
class SymmetricNAT : public
NAT
{
24
class OpenConeNAT : public
NAT
{
31
class AddressRestrictedNAT : public
NAT
{
38
class PortRestrictedNAT : public
NAT
{
45
NAT
*
NAT
::Create(NATType type) {
natserver.h
26
//
NAT
. The
NAT
server maintains a hashtable of the routes that it knows
29
explicit RouteCmp(
NAT
*
nat
);
37
// Changes how addresses are compared based on the filtering rules of the
NAT
.
39
explicit AddrCmp(
NAT
*
nat
);
47
// Implements the
NAT
device. It listens for packets on the internal network,
76
TransEntry(const SocketAddressPair& r, AsyncUDPSocket* s,
NAT
*
nat
);
[
all
...]
natserver.cc
17
RouteCmp::RouteCmp(
NAT
*
nat
) : symmetric(
nat
->IsSymmetric()) {
40
AddrCmp::AddrCmp(
NAT
*
nat
)
41
: use_ip(
nat
->FiltersIP()), use_port(
nat
->FiltersPort()) {
70
nat_ =
NAT
::Create(type);
126
// Allow the
NAT
to reject this packet.
129
<< " was filtered out by the
NAT
."
[
all
...]
/external/chromium_org/remoting/webapp/
host_session.js
64
* for notification of changes to the
NAT
traversal policy.
host_screen.js
337
* Callback to show or hide the
NAT
traversal warning when the policy changes.
338
* @param {boolean} enabled True if
NAT
traversal is enabled.
343
var natBox = document.getElementById('
nat
-box');
/external/iproute2/doc/
ip-cref.tex
[
all
...]
/external/mdnsresponder/mDNSCore/
mDNSEmbeddedAPI.h
347
mStatus_NATPortMappingUnsupported = -65564, //
NAT
doesn't support
NAT
-PMP or UPnP
348
mStatus_NATPortMappingDisabled = -65565, //
NAT
supports
NAT
-PMP or UPnP but it's disabled by the administrator
[
all
...]
uDNS.c
416
#pragma mark -
NAT
Traversal
481
LogInfo("Received external IP address %.4a from
NAT
", &ExtAddr);
483
LogMsg("Double
NAT
(external
NAT
gateway address %.4a is also a private RFC 1918 address)", &ExtAddr);
566
LogMsg("Error! Tried to add a
NAT
traversal that's already in the active list: request %p Prot %d Int %d TTL %d",
599
if (!m->NATTraversals) // If this is our first
NAT
request, kick off an address request too
656
if (err) LogMsg("Legacy
NAT
Traversal - unmap request failed with error %d", err);
733
// Normally, after going through the
NAT
gateway, the source address of our outgoing TCP connection is the same as ExternalAddress,
736
// LLQ server to send events to us directly at port 5353 on that address, instead of at our mapped external
NAT
port.
[
all
...]
Completed in 312 milliseconds