/development/samples/ToyVpn/server/linux/ |
ToyVpnServer.cpp | 87 int tunnel = socket(AF_INET6, SOCK_DGRAM, 0); local 89 setsockopt(tunnel, SOL_SOCKET, SO_REUSEADDR, &flag, sizeof(flag)); 91 setsockopt(tunnel, IPPROTO_IPV6, IPV6_V6ONLY, &flag, sizeof(flag)); 100 while (bind(tunnel, (sockaddr *)&addr, sizeof(addr))) { 112 int n = recvfrom(tunnel, packet, sizeof(packet), 0, 121 connect(tunnel, (sockaddr *)&addr, addrlen); 122 return tunnel; 187 // Wait for a tunnel. 188 int tunnel; local 189 while ((tunnel = get_tunnel(argv[2], argv[3])) != -1) [all...] |
/bionic/libc/kernel/common/linux/ |
if_pppolac.h | 30 __u16 tunnel, session; member in struct:sockaddr_pppolac::__anon322
|
/external/kernel-headers/original/linux/ |
if_pppolac.h | 29 __u16 tunnel, session; member in struct:sockaddr_pppolac::__anon7935
|
/prebuilts/ndk/android-ndk-r4/platforms/android-5/arch-x86/usr/include/linux/ |
if_pppolac.h | 25 __u16 tunnel, session; member in struct:sockaddr_pppolac::__anon28521
|
/prebuilts/ndk/android-ndk-r4/platforms/android-8/arch-x86/usr/include/linux/ |
if_pppolac.h | 25 __u16 tunnel, session; member in struct:sockaddr_pppolac::__anon29308
|
/external/iproute2/doc/ |
ip-tunnels.tex | 30 to create tunnel. It does not work in 2.2.0! 34 ip tunnel add MY-TUNNEL mode ipip remote 193.233.7.65 36 will create tunnel device with name \verb|MY-TUNNEL|. Now you may configure 39 ifconfig MY-TUNNEL 10.0.0.1 41 Certainly, if you prefer name \verb|tunl1| to \verb|MY-TUNNEL|, 50 to tunnel net 10.0.0.0 via router 193.233.7.65. It does not 78 Q: In 2.0.36 I used to load \verb|tunnel| device module and \verb|ipip| module. 79 I cannot find any \verb|tunnel| in 2.2 [all...] |
ip-cref.tex | 119 \item \verb|tunnel| --- tunnel over IP [all...] |
/development/samples/ToyVpn/src/com/example/android/toyvpn/ |
ToyVpnService.java | 95 // tries to recreate the tunnel without shutting down everything. 100 // We try to create the tunnel for several times. The better way 133 DatagramChannel tunnel = null; local 136 // Create a DatagramChannel as the VPN tunnel. 137 tunnel = DatagramChannel.open(); 139 // Protect the tunnel before connecting to avoid loopback. 140 if (!protect(tunnel.socket())) { 141 throw new IllegalStateException("Cannot protect the tunnel"); 145 tunnel.connect(server); 148 // writing. Here we put the tunnel into non-blocking mode [all...] |
/external/iproute2/ip/ |
Android.mk | 5 rtm_map.c iptunnel.c ip6tunnel.c tunnel.c ipneigh.c ipntable.c \
|
Makefile | 2 rtm_map.o iptunnel.o ip6tunnel.o tunnel.o ipneigh.o ipntable.o iplink.o \
|
/external/chromium/net/http/ |
http_proxy_client_socket_pool.cc | 39 bool tunnel) 46 http_auth_cache_(tunnel ? http_auth_cache : NULL), 47 http_auth_handler_factory_(tunnel ? http_auth_handler_factory : NULL), 48 tunnel_(tunnel) { 212 if (params_->tunnel()) { 264 if (using_spdy_ && params_->tunnel()) 288 params_->tunnel(), 317 DCHECK(params_->tunnel());
|
http_proxy_client_socket_pool.h | 50 bool tunnel); 69 bool tunnel() const { return tunnel_; } function in class:net::HttpProxySocketParams 95 // HttpProxyConnectJob optionally establishes a tunnel through the proxy 146 // Begins the tcp connection and the optional Http proxy tunnel. If the 150 // that the tunnel needs authentication credentials, the socket will be
|
http_proxy_client_socket.cc | 34 bool tunnel, 43 auth_(tunnel ? 49 tunnel_(tunnel), 103 // TODO(rch): figure out the right way to set up a tunnel with SPDY. 106 // create an SSL tunnel to the origin server using the CONNECT method 182 // to establish an SSL tunnel through the proxy. We can't read these 183 // bytes when establishing a tunnel because they might be controlled by
|
http_proxy_client_socket.h | 38 // by the time Connect() is called. If tunnel is true then on Connect() 39 // this socket will establish an Http tunnel. 47 bool tunnel,
|
http_proxy_client_socket_pool_unittest.cc | 121 scoped_refptr<HttpProxySocketParams> GetParams(bool tunnel) { 126 GURL(tunnel ? "https://www.google.com/" : "http://www.google.com"), 128 HostPortPair("www.google.com", tunnel ? 443 : 80), 132 tunnel));
|
/external/mtpd/ |
l2tp.c | 196 /* We only handle packets in our tunnel. */ 362 .local = {.tunnel = local_tunnel, .session = local_session}, 363 .remote = {.tunnel = remote_tunnel, .session = remote_session}, 414 uint16_t tunnel = 0; local 421 /* Here is the fun part. We always try to protect our tunnel and session 426 if (get_attribute_u16(ASSIGNED_TUNNEL, &tunnel) && tunnel && 428 remote_tunnel = tunnel; 436 log_print(DEBUG, "Received SCCRP without %s", tunnel ? 437 "valid challenge response" : "assigned tunnel"); [all...] |
/external/qemu/target-i386/ |
hax-i386.h | 34 struct hax_tunnel *tunnel; member in struct:hax_vcpu_state
|
hax-all.c | 220 dprint("Invalid HAX tunnel size \n"); 227 /* vcpu and tunnel will be closed automatically */ 472 struct hax_tunnel *ht = vcpu->tunnel; 509 vcpu->tunnel->user_event_pending = 1; 527 struct hax_tunnel *ht = vcpu->tunnel; 1078 env->hax_vcpu->tunnel->user_event_pending = 0; 1079 env->hax_vcpu->tunnel->ready_for_interrupt_injection = 0;
|
hax-darwin.c | 244 dprint("Failed to setup the hax tunnel\n"); 250 dprint("Invalid hax tunnel size %x\n", info.size); 255 vcpu->tunnel = (struct hax_tunnel *)(info.va);
|
hax-windows.c | 366 dprint("Failed to setup the hax tunnel\n"); 372 dprint("Invalid hax tunnel size %x\n", info.size); 376 vcpu->tunnel = (struct hax_tunnel *)(info.va);
|
/external/chromium/third_party/libjingle/source/talk/session/tunnel/ |
tunnelsessionclient.cc | 42 const std::string NS_TUNNEL("http://www.google.com/talk/tunnel"); 45 const std::string CN_TUNNEL("tunnel"); 157 TunnelSession* tunnel = NULL; local 162 tunnel = *it; 166 ASSERT(tunnel != NULL); 173 return tunnel->GetStream(); 186 TunnelSession* tunnel = MakeTunnelSession(session, data->thread, local 188 sessions_.push_back(tunnel); 191 data->stream = tunnel->GetStream();
|
/external/chromium/third_party/libjingle/source/talk/ |
libjingle.scons | 161 "session/tunnel/pseudotcpchannel.cc", 162 "session/tunnel/tunnelsessionclient.cc", 163 "session/tunnel/securetunnelsessionclient.cc",
|
/external/wpa_supplicant_6/wpa_supplicant/src/radius/ |
radius.c | 173 { RADIUS_ATTR_TUNNEL_TYPE, "Tunnel-Type", RADIUS_ATTR_HEXDUMP }, 174 { RADIUS_ATTR_TUNNEL_MEDIUM_TYPE, "Tunnel-Medium-Type", 180 { RADIUS_ATTR_TUNNEL_PRIVATE_GROUP_ID, "Tunnel-Private-Group-Id", 1163 int type; /* Tunnel-Type */ 1164 int medium_type; /* Tunnel-Medium-Type */ 1170 * radius_msg_get_vlanid - Parse RADIUS attributes for VLAN tunnel information 1172 * Returns: VLAN ID for the first tunnel configuration of -1 if none is found 1176 struct radius_tunnel_attrs tunnel[RADIUS_TUNNEL_TAGS], *tun; local 1183 os_memset(&tunnel, 0, sizeof(tunnel)); [all...] |
/external/wpa_supplicant_8/src/radius/ |
radius.c | 212 { RADIUS_ATTR_TUNNEL_TYPE, "Tunnel-Type", RADIUS_ATTR_HEXDUMP }, 213 { RADIUS_ATTR_TUNNEL_MEDIUM_TYPE, "Tunnel-Medium-Type", 215 { RADIUS_ATTR_TUNNEL_PASSWORD, "Tunnel-Password", 221 { RADIUS_ATTR_TUNNEL_PRIVATE_GROUP_ID, "Tunnel-Private-Group-Id", 1200 int type; /* Tunnel-Type */ 1201 int medium_type; /* Tunnel-Medium-Type */ 1207 * radius_msg_get_vlanid - Parse RADIUS attributes for VLAN tunnel information 1209 * Returns: VLAN ID for the first tunnel configuration of -1 if none is found 1213 struct radius_tunnel_attrs tunnel[RADIUS_TUNNEL_TAGS], *tun; local 1220 os_memset(&tunnel, 0, sizeof(tunnel)) [all...] |