Home | History | Annotate | Download | only in base

Lines Matching full:stun

72 // The address of the public STUN server.
120 // We also run a STUN server and a relay server on the virtual network to allow
454 // local to stun based on the test type.
458 // i.e. when don't match its remote type is either local or stun.
787 kLocalUdpToStunUdp("local", "udp", "stun", "udp",
788 "local", "udp", "stun", "udp", 1000);
796 kStunUdpToLocalUdp("stun", "udp", "local", "udp",
797 "local", "udp", "stun", "udp", 1000);
799 kStunUdpToStunUdp("stun", "udp", "stun", "udp",
800 "stun", "udp", "stun", "udp", 1000);
802 kPrflxUdpToStunUdp("prflx", "udp", "stun", "udp",
965 // a "stun" (should be peer-reflexive eventually) candidate will be created for
1153 // Test that we properly create a connection on a STUN ping from unknown address
1197 // Test that we properly create a connection on a STUN ping from unknown address
1500 // to interesting behavior because the STUN server will only give out the
1530 "prflx", "udp", "stun", "udp", "stun", "udp", "prflx", "udp", 1000));
1944 // Create a minimal STUN message with prflx priority.
2017 // If a stun request with use-candidate attribute arrives, the receiving
2062 // A minimal STUN message with prflx priority.
2165 // Now another STUN message with an unknown address and use_candidate will