HomeSort by relevance Sort by last modified time
    Searched refs:tunnel (Results 1 - 24 of 24) sorted by null

  /development/samples/ToyVpn/server/linux/
ToyVpnServer.cpp 87 int tunnel = socket(AF_INET6, SOCK_DGRAM, 0); local
89 setsockopt(tunnel, SOL_SOCKET, SO_REUSEADDR, &flag, sizeof(flag));
91 setsockopt(tunnel, IPPROTO_IPV6, IPV6_V6ONLY, &flag, sizeof(flag));
100 while (bind(tunnel, (sockaddr *)&addr, sizeof(addr))) {
112 int n = recvfrom(tunnel, packet, sizeof(packet), 0,
121 connect(tunnel, (sockaddr *)&addr, addrlen);
122 return tunnel;
187 // Wait for a tunnel.
188 int tunnel; local
189 while ((tunnel = get_tunnel(argv[2], argv[3])) != -1)
    [all...]
  /bionic/libc/kernel/common/linux/
if_pppolac.h 30 __u16 tunnel, session; member in struct:sockaddr_pppolac::__anon332
  /external/kernel-headers/original/linux/
if_pppolac.h 29 __u16 tunnel, session; member in struct:sockaddr_pppolac::__anon8477
  /prebuilts/ndk/4/platforms/android-5/arch-x86/usr/include/linux/
if_pppolac.h 25 __u16 tunnel, session; member in struct:sockaddr_pppolac::__anon29220
  /prebuilts/ndk/4/platforms/android-8/arch-x86/usr/include/linux/
if_pppolac.h 25 __u16 tunnel, session; member in struct:sockaddr_pppolac::__anon30007
  /external/iproute2/doc/
ip-tunnels.tex 30 to create tunnel. It does not work in 2.2.0!
34 ip tunnel add MY-TUNNEL mode ipip remote 193.233.7.65
36 will create tunnel device with name \verb|MY-TUNNEL|. Now you may configure
39 ifconfig MY-TUNNEL 10.0.0.1
41 Certainly, if you prefer name \verb|tunl1| to \verb|MY-TUNNEL|,
50 to tunnel net 10.0.0.0 via router 193.233.7.65. It does not
78 Q: In 2.0.36 I used to load \verb|tunnel| device module and \verb|ipip| module.
79 I cannot find any \verb|tunnel| in 2.2
    [all...]
ip-cref.tex 119 \item \verb|tunnel| --- tunnel over IP
    [all...]
  /development/samples/ToyVpn/src/com/example/android/toyvpn/
ToyVpnService.java 95 // tries to recreate the tunnel without shutting down everything.
100 // We try to create the tunnel for several times. The better way
133 DatagramChannel tunnel = null; local
136 // Create a DatagramChannel as the VPN tunnel.
137 tunnel = DatagramChannel.open();
139 // Protect the tunnel before connecting to avoid loopback.
140 if (!protect(tunnel.socket())) {
141 throw new IllegalStateException("Cannot protect the tunnel");
145 tunnel.connect(server);
148 // writing. Here we put the tunnel into non-blocking mode
    [all...]
  /external/iproute2/ip/
Android.mk 5 rtm_map.c iptunnel.c ip6tunnel.c tunnel.c ipneigh.c ipntable.c \
Makefile 2 rtm_map.o iptunnel.o ip6tunnel.o tunnel.o ipneigh.o ipntable.o iplink.o \
  /external/chromium/net/http/
http_proxy_client_socket_pool.cc 39 bool tunnel)
46 http_auth_cache_(tunnel ? http_auth_cache : NULL),
47 http_auth_handler_factory_(tunnel ? http_auth_handler_factory : NULL),
48 tunnel_(tunnel) {
212 if (params_->tunnel()) {
264 if (using_spdy_ && params_->tunnel())
288 params_->tunnel(),
317 DCHECK(params_->tunnel());
http_proxy_client_socket_pool.h 50 bool tunnel);
69 bool tunnel() const { return tunnel_; } function in class:net::HttpProxySocketParams
95 // HttpProxyConnectJob optionally establishes a tunnel through the proxy
146 // Begins the tcp connection and the optional Http proxy tunnel. If the
150 // that the tunnel needs authentication credentials, the socket will be
http_proxy_client_socket.cc 34 bool tunnel,
43 auth_(tunnel ?
49 tunnel_(tunnel),
103 // TODO(rch): figure out the right way to set up a tunnel with SPDY.
106 // create an SSL tunnel to the origin server using the CONNECT method
182 // to establish an SSL tunnel through the proxy. We can't read these
183 // bytes when establishing a tunnel because they might be controlled by
http_proxy_client_socket.h 38 // by the time Connect() is called. If tunnel is true then on Connect()
39 // this socket will establish an Http tunnel.
47 bool tunnel,
http_proxy_client_socket_pool_unittest.cc 121 scoped_refptr<HttpProxySocketParams> GetParams(bool tunnel) {
126 GURL(tunnel ? "https://www.google.com/" : "http://www.google.com"),
128 HostPortPair("www.google.com", tunnel ? 443 : 80),
132 tunnel));
  /external/mtpd/
l2tp.c 196 /* We only handle packets in our tunnel. */
362 .local = {.tunnel = local_tunnel, .session = local_session},
363 .remote = {.tunnel = remote_tunnel, .session = remote_session},
414 uint16_t tunnel = 0; local
421 /* Here is the fun part. We always try to protect our tunnel and session
426 if (get_attribute_u16(ASSIGNED_TUNNEL, &tunnel) && tunnel &&
428 remote_tunnel = tunnel;
436 log_print(DEBUG, "Received SCCRP without %s", tunnel ?
437 "valid challenge response" : "assigned tunnel");
    [all...]
  /external/qemu/target-i386/
hax-i386.h 34 struct hax_tunnel *tunnel; member in struct:hax_vcpu_state
hax-all.c 220 dprint("Invalid HAX tunnel size \n");
227 /* vcpu and tunnel will be closed automatically */
472 struct hax_tunnel *ht = vcpu->tunnel;
509 vcpu->tunnel->user_event_pending = 1;
527 struct hax_tunnel *ht = vcpu->tunnel;
1078 env->hax_vcpu->tunnel->user_event_pending = 0;
1079 env->hax_vcpu->tunnel->ready_for_interrupt_injection = 0;
hax-darwin.c 244 dprint("Failed to setup the hax tunnel\n");
250 dprint("Invalid hax tunnel size %x\n", info.size);
255 vcpu->tunnel = (struct hax_tunnel *)(info.va);
hax-windows.c 366 dprint("Failed to setup the hax tunnel\n");
372 dprint("Invalid hax tunnel size %x\n", info.size);
376 vcpu->tunnel = (struct hax_tunnel *)(info.va);
  /external/chromium/third_party/libjingle/source/talk/session/tunnel/
tunnelsessionclient.cc 42 const std::string NS_TUNNEL("http://www.google.com/talk/tunnel");
45 const std::string CN_TUNNEL("tunnel");
157 TunnelSession* tunnel = NULL; local
162 tunnel = *it;
166 ASSERT(tunnel != NULL);
173 return tunnel->GetStream();
186 TunnelSession* tunnel = MakeTunnelSession(session, data->thread, local
188 sessions_.push_back(tunnel);
191 data->stream = tunnel->GetStream();
  /external/chromium/third_party/libjingle/source/talk/
libjingle.scons 161 "session/tunnel/pseudotcpchannel.cc",
162 "session/tunnel/tunnelsessionclient.cc",
163 "session/tunnel/securetunnelsessionclient.cc",
  /external/wpa_supplicant_6/wpa_supplicant/src/radius/
radius.c 173 { RADIUS_ATTR_TUNNEL_TYPE, "Tunnel-Type", RADIUS_ATTR_HEXDUMP },
174 { RADIUS_ATTR_TUNNEL_MEDIUM_TYPE, "Tunnel-Medium-Type",
180 { RADIUS_ATTR_TUNNEL_PRIVATE_GROUP_ID, "Tunnel-Private-Group-Id",
1163 int type; /* Tunnel-Type */
1164 int medium_type; /* Tunnel-Medium-Type */
1170 * radius_msg_get_vlanid - Parse RADIUS attributes for VLAN tunnel information
1172 * Returns: VLAN ID for the first tunnel configuration of -1 if none is found
1176 struct radius_tunnel_attrs tunnel[RADIUS_TUNNEL_TAGS], *tun; local
1183 os_memset(&tunnel, 0, sizeof(tunnel));
    [all...]
  /external/wpa_supplicant_8/src/radius/
radius.c 218 { RADIUS_ATTR_TUNNEL_TYPE, "Tunnel-Type", RADIUS_ATTR_HEXDUMP },
219 { RADIUS_ATTR_TUNNEL_MEDIUM_TYPE, "Tunnel-Medium-Type",
221 { RADIUS_ATTR_TUNNEL_PASSWORD, "Tunnel-Password",
227 { RADIUS_ATTR_TUNNEL_PRIVATE_GROUP_ID, "Tunnel-Private-Group-Id",
1339 struct radius_tunnel_attrs tunnel[RADIUS_TUNNEL_TAGS], *tun; local
    [all...]

Completed in 529 milliseconds