/bionic/libc/kernel/common/linux/ |
if_pppolac.h | 30 __u16 tunnel, session; member in struct:sockaddr_pppolac::__anon412
|
/external/kernel-headers/original/linux/ |
if_pppolac.h | 29 __u16 tunnel, session; member in struct:sockaddr_pppolac::__anon19987
|
/prebuilts/ndk/4/platforms/android-5/arch-x86/usr/include/linux/ |
if_pppolac.h | 25 __u16 tunnel, session; member in struct:sockaddr_pppolac::__anon42653
|
/prebuilts/ndk/4/platforms/android-8/arch-x86/usr/include/linux/ |
if_pppolac.h | 25 __u16 tunnel, session; member in struct:sockaddr_pppolac::__anon43440
|
/development/samples/ToyVpn/server/linux/ |
ToyVpnServer.cpp | 87 int tunnel = socket(AF_INET6, SOCK_DGRAM, 0); local 89 setsockopt(tunnel, SOL_SOCKET, SO_REUSEADDR, &flag, sizeof(flag)); 91 setsockopt(tunnel, IPPROTO_IPV6, IPV6_V6ONLY, &flag, sizeof(flag)); 100 while (bind(tunnel, (sockaddr *)&addr, sizeof(addr))) { 112 int n = recvfrom(tunnel, packet, sizeof(packet), 0, 121 connect(tunnel, (sockaddr *)&addr, addrlen); 122 return tunnel; 187 // Wait for a tunnel. 188 int tunnel; local 189 while ((tunnel = get_tunnel(argv[2], argv[3])) != -1) [all...] |
/external/qemu/target-i386/ |
hax-i386.h | 34 struct hax_tunnel *tunnel; member in struct:hax_vcpu_state
|
/external/iproute2/doc/ |
ip-cref.tex | 119 \item \verb|tunnel| --- tunnel over IP [all...] |
/development/samples/ToyVpn/src/com/example/android/toyvpn/ |
ToyVpnService.java | 95 // tries to recreate the tunnel without shutting down everything. 100 // We try to create the tunnel for several times. The better way 133 DatagramChannel tunnel = null; local 136 // Create a DatagramChannel as the VPN tunnel. 137 tunnel = DatagramChannel.open(); 139 // Protect the tunnel before connecting to avoid loopback. 140 if (!protect(tunnel.socket())) { 141 throw new IllegalStateException("Cannot protect the tunnel"); 145 tunnel.connect(server); 148 // writing. Here we put the tunnel into non-blocking mode [all...] |
/external/android-clat/ |
clatd.c | 79 * tries to open the tunnel device 118 * tunnel - tun device data 120 void deconfigure_tun_ipv6(const struct tun_data *tunnel) { 123 status = if_route(tunnel->device6, AF_INET6, &Global_Clatd_Config.ipv6_local_subnet, 133 * tunnel - tun device data 135 void configure_tun_ipv6(const struct tun_data *tunnel) { 138 status = if_route(tunnel->device6, AF_INET6, &Global_Clatd_Config.ipv6_local_subnet, 148 * tunnel - tun device data 150 void interface_poll(const struct tun_data *tunnel) { 168 deconfigure_tun_ipv6(tunnel); 383 struct tun_data tunnel; local [all...] |
/external/chromium/net/http/ |
http_proxy_client_socket_pool.h | 50 bool tunnel); 69 bool tunnel() const { return tunnel_; } function in class:net::HttpProxySocketParams 95 // HttpProxyConnectJob optionally establishes a tunnel through the proxy 146 // Begins the tcp connection and the optional Http proxy tunnel. If the 150 // that the tunnel needs authentication credentials, the socket will be
|
/external/chromium/third_party/libjingle/source/talk/session/tunnel/ |
tunnelsessionclient.cc | 42 const std::string NS_TUNNEL("http://www.google.com/talk/tunnel"); 45 const std::string CN_TUNNEL("tunnel"); 157 TunnelSession* tunnel = NULL; local 162 tunnel = *it; 166 ASSERT(tunnel != NULL); 173 return tunnel->GetStream(); 186 TunnelSession* tunnel = MakeTunnelSession(session, data->thread, local 188 sessions_.push_back(tunnel); 191 data->stream = tunnel->GetStream();
|
/external/chromium_org/net/http/ |
http_proxy_client_socket_pool.h | 54 bool tunnel); 73 bool tunnel() const { return tunnel_; } function in class:net::HttpProxySocketParams 94 // HttpProxyConnectJob optionally establishes a tunnel through the proxy 146 // Begins the tcp connection and the optional Http proxy tunnel. If the 150 // that the tunnel needs authentication credentials, the socket will be
|
/external/chromium_org/third_party/libjingle/source/talk/session/tunnel/ |
tunnelsessionclient.cc | 42 const char NS_TUNNEL[] = "http://www.google.com/talk/tunnel"; 45 const char CN_TUNNEL[] = "tunnel"; 161 TunnelSession* tunnel = NULL; local 166 tunnel = *it; 170 ASSERT(tunnel != NULL); 177 return tunnel->GetStream(); 195 TunnelSession* tunnel = MakeTunnelSession(session, data->thread, local 197 sessions_.push_back(tunnel); 199 data->stream = tunnel->GetStream();
|
/external/chromium_org/chrome/browser/devtools/ |
port_forwarding_controller.cc | 560 SocketTunnel* tunnel = new SocketTunnel(location, local 564 base::Bind(&SocketTunnel::Start, base::Unretained(tunnel)));
|
/external/iproute2/ip/ |
ipl2tp.c | 63 int tunnel:1; member in struct:l2tp_parm 229 printf("Tunnel %u, encap %s\n", 235 printf(" Peer tunnel %u\n", 247 printf("Session %u in tunnel %u\n", 249 printf(" Peer session %u, tunnel %u\n", 486 fprintf(stderr, "Usage: ip l2tp add tunnel\n"); 496 fprintf(stderr, " ip l2tp del tunnel tunnel_id ID\n"); 498 fprintf(stderr, " ip l2tp show tunnel [ tunnel_id ID ]\n"); 524 fprintf(stderr, "Unknown tunnel encapsulation.\n"); 608 } else if (strcmp(*argv, "tunnel") == 0) [all...] |
/external/mtpd/ |
l2tp.c | 196 /* We only handle packets in our tunnel. */ 362 .local = {.tunnel = local_tunnel, .session = local_session}, 363 .remote = {.tunnel = remote_tunnel, .session = remote_session}, 414 uint16_t tunnel = 0; local 421 /* Here is the fun part. We always try to protect our tunnel and session 426 if (get_attribute_u16(ASSIGNED_TUNNEL, &tunnel) && tunnel && 428 remote_tunnel = tunnel; 436 log_print(DEBUG, "Received SCCRP without %s", tunnel ? 437 "valid challenge response" : "assigned tunnel"); [all...] |
/external/wpa_supplicant_8/src/radius/ |
radius.c | 218 { RADIUS_ATTR_TUNNEL_TYPE, "Tunnel-Type", RADIUS_ATTR_HEXDUMP }, 219 { RADIUS_ATTR_TUNNEL_MEDIUM_TYPE, "Tunnel-Medium-Type", 221 { RADIUS_ATTR_TUNNEL_PASSWORD, "Tunnel-Password", 227 { RADIUS_ATTR_TUNNEL_PRIVATE_GROUP_ID, "Tunnel-Private-Group-Id", 1339 struct radius_tunnel_attrs tunnel[RADIUS_TUNNEL_TAGS], *tun; local [all...] |