HomeSort by relevance Sort by last modified time
    Searched full:tunnel (Results 101 - 125 of 454) sorted by null

1 2 3 45 6 7 8 91011>>

  /prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/linux/
if_arp.h 62 #define ARPHRD_TUNNEL 768 /* IPIP tunnel */
63 #define ARPHRD_TUNNEL6 769 /* IP6IP6 tunnel */
  /prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/linux/
if_arp.h 62 #define ARPHRD_TUNNEL 768 /* IPIP tunnel */
63 #define ARPHRD_TUNNEL6 769 /* IP6IP6 tunnel */
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/linux/
if_arp.h 62 #define ARPHRD_TUNNEL 768 /* IPIP tunnel */
63 #define ARPHRD_TUNNEL6 769 /* IP6IP6 tunnel */
  /external/apache-http/src/org/apache/http/conn/routing/
RouteTracker.java 73 /** Whether the route is layered over a tunnel. */
154 throw new IllegalStateException("No tunnel unless connected.");
157 throw new IllegalStateException("No tunnel without proxy.");
178 throw new IllegalStateException("No tunnel unless connected.");
181 throw new IllegalStateException("No proxy tunnel without proxy.");
package.html 45 might be put on top of the tunnel.
  /external/wpa_supplicant_8/src/tls/
tlsv1_server.c 189 * tlsv1_server_encrypt - Encrypt data into TLS tunnel
198 * send data in the encrypted tunnel.
222 * tlsv1_server_decrypt - Decrypt data from TLS tunnel
226 * @out_data: Pointer to output buffer (decrypted data from TLS tunnel)
231 * receive data from the encrypted tunnel.
  /frameworks/base/core/java/android/net/
VpnService.java 51 * over a tunnel.
81 * <li>Create a tunnel to the remote server and negotiate the network
85 * <li>Process and exchange packets between the tunnel and the returned
88 * shut down the tunnel gracefully.</li>
158 * outside of VPN. For example, a VPN tunnel should protect itself if its
  /hardware/qcom/media/mm-core/inc/
OMX_Component.h 428 requirements and constraints for the tunnel.
435 the tunnel step provided by the output port
449 Handle of the component to tunnel with. This is the component
455 tunnel with.
457 Pointer to the tunnel setup structure. When nPort is an output port
  /hardware/qcom/media/mm-core/omxcore/inc/
OMX_Component.h 428 requirements and constraints for the tunnel.
435 the tunnel step provided by the output port
449 Handle of the component to tunnel with. This is the component
455 tunnel with.
457 Pointer to the tunnel setup structure. When nPort is an output port
  /hardware/samsung_slsi/exynos5/exynos_omx/openmax/exynos_omx/include/khronos/
OMX_Component.h 428 requirements and constraints for the tunnel.
435 the tunnel step provided by the output port
449 Handle of the component to tunnel with. This is the component
455 tunnel with.
457 Pointer to the tunnel setup structure. When nPort is an output port
  /hardware/ti/omap3/omx/system/src/openmax_il/omx_core/inc/
OMX_Component.h 428 requirements and constraints for the tunnel.
435 the tunnel step provided by the output port
449 Handle of the component to tunnel with. This is the component
455 tunnel with.
457 Pointer to the tunnel setup structure. When nPort is an output port
  /hardware/ti/omap4xxx/domx/omx_core/inc/
OMX_Component.h 428 requirements and constraints for the tunnel.
435 the tunnel step provided by the output port
449 Handle of the component to tunnel with. This is the component
455 tunnel with.
457 Pointer to the tunnel setup structure. When nPort is an output port
  /external/qemu/target-i386/
hax-all.c 220 dprint("Invalid HAX tunnel size \n");
227 /* vcpu and tunnel will be closed automatically */
472 struct hax_tunnel *ht = vcpu->tunnel;
509 vcpu->tunnel->user_event_pending = 1;
527 struct hax_tunnel *ht = vcpu->tunnel;
1078 env->hax_vcpu->tunnel->user_event_pending = 0;
1079 env->hax_vcpu->tunnel->ready_for_interrupt_injection = 0;
hax-windows.c 366 dprint("Failed to setup the hax tunnel\n");
372 dprint("Invalid hax tunnel size %x\n", info.size);
376 vcpu->tunnel = (struct hax_tunnel *)(info.va);
  /external/chromium_org/net/http/
http_stream_factory.h 102 // proxy tunnel establishment. For the tunnel case, we were unable to
106 // For the non-tunnel case, the caller will discover the authentication
  /external/android-clat/
translate.h 63 void translate_packet(const struct tun_data *tunnel, struct tun_pi *tun_header, const char *packet,
  /external/chromium/net/base/
load_states.h 33 // This state indicates that we're in the process of establishing a tunnel
  /external/chromium/net/http/
http_proxy_client_socket_pool_unittest.cc 121 scoped_refptr<HttpProxySocketParams> GetParams(bool tunnel) {
126 GURL(tunnel ? "https://www.google.com/" : "http://www.google.com"),
128 HostPortPair("www.google.com", tunnel ? 443 : 80),
132 tunnel));
  /external/chromium/third_party/libjingle/
libjingle.gyp 415 'source/talk/session/tunnel/pseudotcpchannel.cc',
416 'source/talk/session/tunnel/pseudotcpchannel.h',
417 'source/talk/session/tunnel/tunnelsessionclient.cc',
418 'source/talk/session/tunnel/tunnelsessionclient.h',
  /external/ganymed-ssh2/examples/
PortForwarding.java 86 * through the secure tunnel to the library, which in turn will forward the connection
  /external/iproute2/ip/
ip6tunnel.c 38 #include "tunnel.h"
50 fprintf(stderr, "Usage: ip -f inet6 tunnel { add | change | del | show } [ NAME ]\n");
131 fprintf(stderr,"Cannot guess tunnel mode.\n");
422 fprintf(stderr, "Command \"%s\" is unknown, try \"ip -f inet6 tunnel help\".\n", *argv);
  /external/tcpdump/
print-lspping.c 253 * | IPv4 tunnel end point address |
255 * | Must Be Zero | Tunnel ID |
257 * | Extended Tunnel ID |
259 * | IPv4 tunnel sender address |
278 * | IPv6 tunnel end point address |
283 * | Must Be Zero | Tunnel ID |
285 * | Extended Tunnel ID |
290 * | IPv6 tunnel sender address |
667 printf("\n\t tunnel end-point %s, tunnel sender %s, lsp-id 0x%04x"
    [all...]
  /external/wpa_supplicant_8/src/crypto/
tls.h 380 * tls_connection_encrypt - Encrypt data into TLS tunnel
387 * send data in the encrypted tunnel. The caller is responsible for freeing the
395 * tls_connection_decrypt - Decrypt data from TLS tunnel
402 * receive data from the encrypted tunnel. The caller is responsible for
  /external/wpa_supplicant_8/src/eap_peer/
eap_tls_common.h 52 * phase2 - Whether this TLS connection is used in EAP phase 2 (tunnel)
  /hardware/samsung_slsi/exynos5/exynos_omx/openmax/exynos_omx/component/common/
Exynos_OMX_Baseport.h 164 /* Tunnel Info */

Completed in 1124 milliseconds

1 2 3 45 6 7 8 91011>>