/external/openssh/openbsd-compat/ |
port-tun.c | 43 * SSH_TUN_LINUX Use the (newer) Linux tun/tap device 44 * SSH_TUN_FREEBSD Use the FreeBSD tun/tap device 58 sys_tun_open(int tun, int mode) 64 if ((fd = open("/dev/net/tun", O_RDWR)) == -1) { 77 name = "tun%d"; 81 if (tun != SSH_TUNID_ANY) { 82 if (tun > SSH_TUNID_MAX) { 84 tun, strerror(errno)); 87 snprintf(ifr.ifr_name, sizeof(ifr.ifr_name), name, tun); 96 if (tun == SSH_TUNID_ANY [all...] |
/frameworks/base/services/jni/ |
com_android_server_connectivity_Vpn.cpp | 58 int tun = open("/dev/tun", O_RDWR | O_NONBLOCK); local 65 if (ioctl(tun, TUNSETIFF, &ifr4)) { 66 ALOGE("Cannot allocate TUN: %s", strerror(errno)); 84 return tun; 87 close(tun); 91 static int get_interface_name(char *name, int tun) 94 if (ioctl(tun, TUNGETIFF, &ifr4)) { 327 int tun = create_interface(mtu); local 328 if (tun < 0) [all...] |
/external/openssh/ |
misc.c | 250 int tun; local 261 tun = a2tun(sp, NULL); 263 return (*remote == SSH_TUNID_ERR ? *remote : tun); 269 tun = strtonum(s, 0, SSH_TUNID_MAX, &errstr); 273 return (tun); 647 tun_open(int tun, int mode) 650 return (sys_tun_open(tun, mode)); 657 if (tun <= SSH_TUNID_MAX) { 658 snprintf(name, sizeof(name), "/dev/tun%d", tun); [all...] |
auth-options.c | 359 char *tun = NULL; local 361 tun = xmalloc(strlen(opts) + 1); 366 tun[i++] = *opts++; 373 xfree(tun); 377 tun[i] = '\0'; 378 forced_tun_device = a2tun(tun, NULL); 379 xfree(tun); 381 debug("%.100s, line %lu: invalid tun device", 383 auth_debug_add("%.100s, line %lu: invalid tun device", 388 auth_debug_add("Forced tun device: %d", forced_tun_device) [all...] |
serverloop.c | 974 int mode, tun; local 992 tun = packet_get_int(); 994 if (tun != SSH_TUNID_ANY && forced_tun_device != tun) 996 tun = forced_tun_device; 998 sock = tun_open(tun, mode); 1001 c = channel_new("tun", SSH_CHANNEL_OPEN, sock, sock, -1, 1002 CHAN_TCP_WINDOW_DEFAULT, CHAN_TCP_PACKET_DEFAULT, 0, "tun", 1); 1067 } else if (strcmp(ctype, "tun@openssh.com") == 0) { [all...] |
Android.mk | 23 openbsd-compat/port-tun.c openbsd-compat/setproctitle.c \
|
/external/wpa_supplicant_6/wpa_supplicant/src/radius/ |
radius.c | 1176 struct radius_tunnel_attrs tunnel[RADIUS_TUNNEL_TAGS], *tun; local 1192 tun = &tunnel[0]; 1194 tun = &tunnel[data[0]]; 1200 tun->tag_used++; 1201 tun->type = WPA_GET_BE24(data + 1); 1206 tun->tag_used++; 1207 tun->medium_type = WPA_GET_BE24(data + 1); 1218 tun->tag_used++; 1219 tun->vlanid = atoi(buf); 1225 tun = &tunnel[i] [all...] |
/external/wpa_supplicant_8/src/radius/ |
radius.c | 1339 struct radius_tunnel_attrs tunnel[RADIUS_TUNNEL_TAGS], *tun; local [all...] |
/external/libppp/src/ |
ip.c | 79 #include "tun.h" 910 struct tun_data tun; local 915 if (nb > sizeof tun.data) { 917 l->name, nb, (int)(sizeof tun.data)); 921 mbuf_Read(bp, tun.data, nb); 924 if (PacketCheck(bundle, af, tun.data, nb, &bundle->filter.in, 929 if (!FilterCheck(tun.data, af, &bundle->filter.alive, &alivesecs)) { 936 tun.header.family = htonl(af); 937 nb += sizeof tun - sizeof tun.data [all...] |
Makefile | 12 tcpmss.c throughput.c timer.c tty.c tun.c udp.c vjcomp.c
|
bundle.c | 90 #include "tun.h" 311 * If it's an LCP and we're in multilink mode, adjust our tun 552 struct tun_data tun; local 558 data = (u_char *)&tun; 559 sz = sizeof tun; 561 data = tun.data; 562 sz = sizeof tun.data; 565 /* something to read from tun */ 574 n -= sz - sizeof tun.data; 580 af = ntohl(tun.header.family) [all...] |
/external/ipsec-tools/ |
main.c | 108 int tun = open("/dev/tun", 0); local 118 if (ioctl(tun, TUNSETIFF, &ifr)) { 119 do_plog(LLV_ERROR, "Cannot allocate TUN: %s\n", strerror(errno));
|
/external/openssh/contrib/cygwin/ |
Makefile | 51 $(INSTALL) -m 644 $(srcdir)/README.tun $(DESTDIR)$(sshdocdir)/README.tun
|
/frameworks/base/services/java/com/android/server/connectivity/ |
Vpn.java | 278 ParcelFileDescriptor tun = ParcelFileDescriptor.adoptFd(jniCreate(config.mtu)); local 281 String interfaze = jniGetName(tun.getFd()); 302 IoUtils.closeQuietly(tun); 321 return tun; 442 private native String jniGetName(int tun); [all...] |