HomeSort by relevance Sort by last modified time
    Searched refs:NAT (Results 1 - 11 of 11) sorted by null

  /external/webrtc/webrtc/base/
nattypes.h 16 /* Identifies each type of NAT that can be simulated. */
24 // Implements the rules for each specific type of NAT.
25 class NAT {
27 virtual ~NAT() { }
29 // Determines whether this NAT uses both source and destination address when
33 // Determines whether this NAT drops packets received from a different IP
37 // Determines whether this NAT drops packets received from a different port
41 // Returns an implementation of the given type of NAT.
42 static NAT* Create(NATType type);
nattypes.cc 17 class SymmetricNAT : public NAT {
24 class OpenConeNAT : public NAT {
31 class AddressRestrictedNAT : public NAT {
38 class PortRestrictedNAT : public NAT {
45 NAT* NAT::Create(NATType type) {
natserver.h 27 // NAT. The NAT server maintains a hashtable of the routes that it knows
30 explicit RouteCmp(NAT* nat);
38 // Changes how addresses are compared based on the filtering rules of the NAT.
40 explicit AddrCmp(NAT* nat);
48 // Implements the NAT device. It listens for packets on the internal network,
51 // TCP connections initiated from the internal side of the NAT server are
52 // also supported, by making a connection to the NAT server's TCP address an
    [all...]
natserver.cc 18 RouteCmp::RouteCmp(NAT* nat) : symmetric(nat->IsSymmetric()) {
41 AddrCmp::AddrCmp(NAT* nat)
42 : use_ip(nat->FiltersIP()), use_port(nat->FiltersPort()) {
68 // a TCP connection to the NAT server.
131 nat_ = NAT::Create(type);
189 // Allow the NAT to reject this packet
    [all...]
  /external/libcxx/test/std/thread/thread.mutex/thread.lock/thread.lock.scoped/
types.pass.cpp 27 struct NAT {};
33 auto test_typedef(...) -> NAT;
37 return !std::is_same<decltype(test_typedef<LG>(0)), NAT>::value;
  /prebuilts/ndk/r16/sources/cxx-stl/llvm-libc++/test/std/thread/thread.mutex/thread.lock/thread.lock.scoped/
types.pass.cpp 27 struct NAT {};
33 auto test_typedef(...) -> NAT;
37 return !std::is_same<decltype(test_typedef<LG>(0)), NAT>::value;
  /external/curl/docs/cmdline-opts/
ftp-ssl-ccc.d 9 unencrypted. This allows NAT routers to follow the FTP transaction. The
  /external/iptables/iptables/
nft.h 12 #define NAT 4
nft.c 414 [NAT] = {
415 .name = "nat",
419 .type = "nat",
425 .type = "nat",
431 .type = "nat",
437 .type = "nat",
499 [NAT] = {
500 .name = "nat",
    [all...]
  /external/mdnsresponder/mDNSCore/
mDNSEmbeddedAPI.h 358 mStatus_NATPortMappingUnsupported = -65564, // NAT doesn't support NAT-PMP or UPnP
359 mStatus_NATPortMappingDisabled = -65565, // NAT supports NAT-PMP or UPnP but it's disabled by the administrator
    [all...]
uDNS.c 416 #pragma mark - NAT Traversal
481 LogInfo("Received external IP address %.4a from NAT", &ExtAddr);
483 LogMsg("Double NAT (external NAT gateway address %.4a is also a private RFC 1918 address)", &ExtAddr);
566 LogMsg("Error! Tried to add a NAT traversal that's already in the active list: request %p Prot %d Int %d TTL %d",
599 if (!m->NATTraversals) // If this is our first NAT request, kick off an address request too
656 if (err) LogMsg("Legacy NAT Traversal - unmap request failed with error %d", err);
733 // Normally, after going through the NAT gateway, the source address of our outgoing TCP connection is the same as ExternalAddress,
736 // LLQ server to send events to us directly at port 5353 on that address, instead of at our mapped external NAT port.
    [all...]

Completed in 751 milliseconds