- 06 Jan, 2023 8 commits
-
-
Ole André Vadla Ravnås authored
This fixes compilation on e.g. macOS and FreeBSD, where it is missing.
-
Olivier Crête authored
-
Olivier Crête authored
-
Olivier Crête authored
Setting it as a int makes meson abort.
-
Olivier Crête authored
-
Philippe Normand authored
The meson build already required 1.x so this has been dead code for a while now.
-
Olivier Crête authored
It was already set at creation time, so all we got was a warning.
-
James Westman authored
nice_address_to_string expects an already-allocated string, which is not great for introspection. Adds nice_address_to_string_dup, which does the same thing, but returns a newly allocated string.
-
- 04 Jan, 2023 4 commits
-
-
Olivier Crête authored
-
Olivier Crête authored
Even if the TCP candidates are disabled.
-
Olivier Crête authored
This should enable having servers that do both IPv4 and IPv6. And ideally should make life easier for app developers.
-
Olivier Crête authored
This should enable having servers that do both IPv4 and IPv6. And ideally should make life easier for app developers.
-
- 19 Nov, 2022 1 commit
-
-
Mathieu Duponchelle authored
The checks were reversed, requiring for instance a non-relay candidate for calling nice_candidate_relay_address()
-
- 06 Nov, 2022 1 commit
-
-
Olivier Crête authored
-
- 17 Oct, 2022 6 commits
-
-
Olivier Crête authored
-
Olivier Crête authored
-
Patrick Griffis authored
This is useful for accurately testing code coverage. You can use this with: meson configure -Db_coverage=true meson test ninja coverage
-
Olivier Crête authored
-
Olivier Crête authored
-
Olivier Crête authored
Limit the number of stored incoming checks based on the property limiting the number of total connectivity checks instead of using the fixed limit on the number of remote candidates.
-
- 29 Jul, 2022 1 commit
-
-
Olivier Crête authored
-
- 25 Jul, 2022 1 commit
-
-
Olivier Crête authored
This will find some interface that has the address and will not work correctly if multiple interfaces have the same address. But in any case, nothing in libnice expects that and we would need to break the API to make that work.
-
- 01 Jun, 2022 1 commit
-
-
Olivier Crête authored
Bug reported and fix suggested by Masato Takahashi Fixes #164
-
- 26 May, 2022 7 commits
-
-
Olivier Crête authored
-
Olivier Crête authored
This should make the library more easily usable for bindings
-
Johan Sternerup authored
One use case for this is adding an ALPN header which is a MUST requirement when a HTTP proxy is used in WebRTC (see RFC8835, section 3.4).
-
Andrey Skryabin authored
Conncheck: renomination: set use_candidate for pending check on early inbound STUN with NOMINATION attr
-
Andrey Skryabin authored
-
Tim-Philipp Müller authored
0.1.18.1 should not satisfy a check for 0.1.19, especially not for libraries that release once a year at best. If someone needs more control they should do a feature check for the symbol in the headers or lib.
-
Tim-Philipp Müller authored
Install a nice-version.h so that the version defines are available. https://gitlab.freedesktop.org/libnice/libnice/-/merge_requests/232
-
- 20 May, 2022 1 commit
-
-
Andrey Skryabin authored
-
- 09 May, 2022 1 commit
-
-
Philippe Normand authored
Can be useful to know which STUN server was used to discover the given candidate.
-
- 05 May, 2022 2 commits
-
-
Philippe Normand authored
-
Philippe Normand authored
-
- 03 May, 2022 4 commits
-
-
Olivier Crête authored
There is a codepath where it can be used without being filled. Found by coverity.
-
Olivier Crête authored
-
Olivier Crête authored
-
Philippe Normand authored
Can be useful to know which TURN server is being used as relay server for a given candidate.
-
- 20 Apr, 2022 1 commit
-
-
Olivier Crête authored
It's possible that the callback will be called synchronously during the close function, in this case, we need to be ready to the last reference to the agent to be dropped in this callback. This fix was suggested by Fabrice Bellet Fixes #153
-
- 06 Apr, 2022 1 commit
-
-
Johan Sternerup authored
If we have gathered a host IP-address that is link-local we should never try to use it for anything else than trying to match it with another link-local address. Some routers seem to have problems with traffic from link-local addresses destined at external IP-addresses. By definition link-local addresses should stay local so there's no reason to access STUN/TURN from it or try to form a candidate with another address that is not link-local.
-