/external/iproute2/include/linux/ |
ip6_tunnel.h | 21 char name[IFNAMSIZ]; /* name of tunnel device */ 23 __u8 proto; /* tunnel protocol */ 24 __u8 encap_limit; /* encapsulation limit for tunnel */ 25 __u8 hop_limit; /* hop limit for tunnel */ 26 __be32 flowinfo; /* traffic class and flowlabel for tunnel */ 27 __u32 flags; /* tunnel flags */ 28 struct in6_addr laddr; /* local tunnel end-point address */ 29 struct in6_addr raddr; /* remote tunnel end-point address */
|
/prebuilt/linux-x86/toolchain/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/linux/ |
ip6_tunnel.h | 23 char name[IFNAMSIZ]; /* name of tunnel device */ 25 __u8 proto; /* tunnel protocol */ 26 __u8 encap_limit; /* encapsulation limit for tunnel */ 27 __u8 hop_limit; /* hop limit for tunnel */ 28 __be32 flowinfo; /* traffic class and flowlabel for tunnel */ 29 __u32 flags; /* tunnel flags */ 30 struct in6_addr laddr; /* local tunnel end-point address */ 31 struct in6_addr raddr; /* remote tunnel end-point address */
|
/external/iptables/extensions/ |
libip6t_policy.man | 35 .BI "--mode " "tunnel|transport" 38 .BI "--tunnel-src " "addr[/mask]" 39 Matches the source end-point address of a tunnel mode SA. 40 Only valid with --mode tunnel. 42 .BI "--tunnel-dst " "addr[/mask]" 43 Matches the destination end-point address of a tunnel mode SA. 44 Only valid with --mode tunnel.
|
libipt_policy.man | 35 .BI "--mode " "tunnel|transport" 38 .BI "--tunnel-src " "addr[/mask]" 39 Matches the source end-point address of a tunnel mode SA. 40 Only valid with --mode tunnel. 42 .BI "--tunnel-dst " "addr[/mask]" 43 Matches the destination end-point address of a tunnel mode SA. 44 Only valid with --mode tunnel.
|
libipt_policy.c | 36 "[!] --mode mode match mode (transport/tunnel)\n" 37 "[!] --tunnel-src addr/mask match tunnel source\n" 38 "[!] --tunnel-dst addr/mask match tunnel destination\n" 70 .name = "tunnel-src", 75 .name = "tunnel-dst", 123 if (strcmp(s, "tunnel") == 0) 191 "policy match: double --tunnel-src option"); 206 "policy match: double --tunnel-dst option") [all...] |
libip6t_policy.c | 37 "[!] --mode mode match mode (transport/tunnel)\n" 38 "[!] --tunnel-src addr/masklen match tunnel source\n" 39 "[!] --tunnel-dst addr/masklen match tunnel destination\n" 71 .name = "tunnel-src", 76 .name = "tunnel-dst", 163 if (strcmp(s, "tunnel") == 0) 231 "policy match: double --tunnel-src option"); 246 "policy match: double --tunnel-dst option") [all...] |
/external/iproute2/doc/ |
ip-tunnels.tex | 30 to create tunnel. It does not work in 2.2.0! 34 ip tunnel add MY-TUNNEL mode ipip remote 193.233.7.65 36 will create tunnel device with name \verb|MY-TUNNEL|. Now you may configure 39 ifconfig MY-TUNNEL 10.0.0.1 41 Certainly, if you prefer name \verb|tunl1| to \verb|MY-TUNNEL|, 50 to tunnel net 10.0.0.0 via router 193.233.7.65. It does not 78 Q: In 2.0.36 I used to load \verb|tunnel| device module and \verb|ipip| module. 79 I cannot find any \verb|tunnel| in 2.2 [all...] |
/bionic/libc/kernel/common/linux/ |
if_pppolac.h | 25 __u16 tunnel, session; member in struct:sockaddr_pppolac::__anon269
|
/prebuilt/ndk/android-ndk-r4/platforms/android-5/arch-x86/usr/include/linux/ |
if_pppolac.h | 25 __u16 tunnel, session; member in struct:sockaddr_pppolac::__anon16194
|
/prebuilt/ndk/android-ndk-r4/platforms/android-8/arch-x86/usr/include/linux/ |
if_pppolac.h | 25 __u16 tunnel, session; member in struct:sockaddr_pppolac::__anon16981
|
/external/ipsec-tools/src/racoon/samples/ |
racoon.conf.sample-natt | 31 # (i.e. the real data transported over the tunnel) would be 47 # esp/tunnel/172.16.0.1-172.16.1.1/require; 49 # esp/tunnel/172.16.1.1-172.16.0.1/require; 54 # esp/tunnel/172.16.1.1-172.16.1.3/require; 56 # esp/tunnel/172.16.1.3-172.16.1.1/require;
|
/external/ipsec-tools/src/racoon/samples/roadwarrior/client/ |
phase1-up.sh | 61 -P out ipsec esp/tunnel/${LOCAL}-${REMOTE}/require; 63 -P in ipsec esp/tunnel/${REMOTE}-${LOCAL}/require; 74 -P fwd ipsec esp/tunnel/${REMOTE}-${LOCAL}/require;
|
phase1-down.sh | 69 -P out ipsec esp/tunnel/${LOCAL}-${REMOTE}/require; 71 -P in ipsec esp/tunnel/${REMOTE}-${LOCAL}/require;
|
/external/kernel-headers/original/linux/ |
if_pppolac.h | 31 __u16 tunnel, session; member in struct:sockaddr_pppolac::__anon4683
|
/external/ipsec-tools/src/libipsec/ |
test-policy.c | 65 { 1, "in ipsec ah/tunnel" }, 67 { 1, "out ipsec ah/tunnel/" }, 69 { 0, "in ipsec esp/tunnel/::1-::2" }, 70 { 1, "in ipsec esp/tunnel/10.0.0.1-::2" }, 71 { 0, "in ipsec esp/tunnel/::1-::2/require" }, 74 { 1, "in ipsec ah/transport esp/tunnel" }, 75 { 0, "in ipsec ah/transport esp/tunnel/::1-::1" }, 78 esp / tunnel / ::1-::2" }, 80 ah/transport/::1-::2 esp/tunnel/::3-::4/use ah/transport/::5-::6/require 81 ah/transport/::1-::2 esp/tunnel/::3-::4/use ah/transport/::5-::6/requir [all...] |
/external/tcpdump/ |
print-radius.c | 32 * "RADIUS Accounting Modifications for Tunnel Protocol Support" 35 * "RADIUS Attributes for Tunnel Protocol Support" 250 "Tunnel-Start", 251 "Tunnel-Stop", 252 "Tunnel-Reject", 253 "Tunnel-Link-Start", 254 "Tunnel-Link-Stop", 255 "Tunnel-Link-Reject", 288 /* Tunnel-Type Attribute standard values */ 304 /* Tunnel-Medium-Type Attribute standard values * [all...] |
/external/apache-http/src/org/apache/http/conn/ |
ManagedClientConnection.java | 123 * Indicates that a tunnel to the target has been established. 130 * This is not the case anymore, you can establish a tunnel without 133 * @param secure <code>true</code> if the tunnel should be considered 145 * Indicates that a tunnel to an intermediate proxy has been established. 152 * @param next the proxy to which the tunnel was established. 154 * the tunnel was established, but the new end point 155 * of the tunnel. The tunnel does <i>not</i> yet 157 * to indicate an end-to-end tunnel.
|
/external/apache-http/src/org/apache/http/conn/routing/ |
HttpRouteDirector.java | 63 /** Step: tunnel through proxy to target. */ 66 /** Step: tunnel through proxy to other proxy. */ 69 /** Step: layer protocol (over tunnel). */
|
RouteInfo.java | 67 * Protocols can only be layered over a tunnel to the target, or 140 * Obtains the tunnel type of this route. 163 * In the presence of proxies, only layering over an end-to-end tunnel 174 * In the presence of proxies, only layering over an end-to-end tunnel
|
/external/ipsec-tools/src/racoon/ |
localconf.h | 112 * the SPD in KAME expresses AH transport + ESP tunnel. 114 * But lots of implementation interprets AH tunnel + ESP 115 * tunnel in this case. racoon has changed the format,
|
/external/mtpd/ |
l2tp.c | 192 /* We only handle packets in our tunnel. */ 362 .local = {.tunnel = local_tunnel, .session = local_session}, 363 .remote = {.tunnel = remote_tunnel, .session = remote_session}, 414 uint16_t tunnel = 0; local 421 /* Here is the fun part. We always try to protect our tunnel and session 426 if (get_attribute_u16(ASSIGNED_TUNNEL, &tunnel) && tunnel 428 remote_tunnel = tunnel; 436 log_print(DEBUG, "Received SCCRP without %s", tunnel ? 437 "valid challenge response" : "assigned tunnel"); [all...] |
/frameworks/base/vpn/java/android/net/vpn/ |
L2tpProfile.java | 37 * Enables/disables the secret for authenticating tunnel connection.
|
PptpProfile.java | 35 * Enables/disables the encryption for PPTP tunnel.
|
/external/apache-http/src/org/apache/http/impl/conn/ |
AbstractPoolEntry.java | 189 * The tunnel has to be established outside by sending a CONNECT 192 * @param secure <code>true</code> if the tunnel should be 226 * The tunnel has to be established outside by sending a CONNECT 229 * @param next the proxy to which the tunnel was established. 233 * @param secure <code>true</code> if the tunnel should be 265 * Layers a protocol on top of an established tunnel. 287 ("Protocol layering without a tunnel not supported.");
|
/external/wpa_supplicant/ |
eap_gtc.c | 34 wpa_printf(MSG_DEBUG, "EAP-GTC: EAP-FAST tunnel - use prefix " 79 * reporting with EAP-GTC inside EAP-FAST tunnel. */
|