HomeSort by relevance Sort by last modified time
    Searched full:tunnel (Results 176 - 200 of 454) sorted by null

1 2 3 4 5 6 78 91011>>

  /external/wpa_supplicant_8/src/eap_server/
eap_server_gtc.c 33 wpa_printf(MSG_DEBUG, "EAP-GTC: EAP-FAST tunnel - use prefix "
  /external/wpa_supplicant_8/src/tls/
tlsv1_client.c 262 * tlsv1_client_encrypt - Encrypt data into TLS tunnel
271 * send data in the encrypted tunnel.
295 * tlsv1_client_decrypt - Decrypt data from TLS tunnel
304 * receive data from the encrypted tunnel.
  /external/wpa_supplicant_8/wpa_supplicant/
eap_testing.txt 134 client authentication followed by TNC inside the tunnel
361 - uses tunneled EAP-Success, expects reply in tunnel or TLS ACK, sends MPPE
367 - uses tunneled EAP-Success, expects reply in tunnel or TLS ACK, sends MPPE
389 - uses tunneled EAP-Success, expects reply in tunnel or TLS ACK, sends MPPE
  /frameworks/base/services/java/com/android/server/connectivity/
Nat464Xlat.java 153 // Although the clat interface is a point-to-point tunnel, we don't
  /frameworks/native/cmds/ip-up-vpn/
ip-up-vpn.c 62 * and maybe add a host route to protect the tunnel. PPP-based VPN already
  /hardware/qcom/media/mm-core/inc/
qc_omx_component.h 115 // Component Tunnel Request
OMX_Core.h 623 /**< indicates that buffers received by an input port of a tunnel
    [all...]
  /hardware/qcom/media/mm-core/omxcore/inc/
qc_omx_component.h 115 // Component Tunnel Request
OMX_Core.h 623 /**< indicates that buffers received by an input port of a tunnel
    [all...]
  /hardware/ti/omap4xxx/domx/omx_proxy_component/omx_sample/src/
omx_proxy_sample.c 36 * the OpenMAX1.1 DOMX Framework Tunnel Proxy component.
  /prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/linux/
if_ppp.h 115 __u16 session_id; /* if zero, get tunnel stats */
xfrm.h 21 * spi, protocol and tunnel address on output.
  /prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/netinet/
ip6.h 162 /* Tunnel Limit Option */
  /prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/linux/
if_ppp.h 115 __u16 session_id; /* if zero, get tunnel stats */
xfrm.h 21 * spi, protocol and tunnel address on output.
  /prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/netinet/
ip6.h 162 /* Tunnel Limit Option */
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/linux/
if_ppp.h 115 __u16 session_id; /* if zero, get tunnel stats */
xfrm.h 21 * spi, protocol and tunnel address on output.
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/netinet/
ip6.h 162 /* Tunnel Limit Option */
  /frameworks/native/include/media/openmax/
OMX_Core.h 640 /**< indicates that buffers received by an input port of a tunnel
    [all...]
  /hardware/samsung_slsi/exynos5/exynos_omx/openmax/exynos_omx/include/khronos/
OMX_Core.h 623 /**< indicates that buffers received by an input port of a tunnel
    [all...]
  /hardware/ti/omap3/omx/system/src/openmax_il/omx_core/inc/
OMX_Core.h 623 /**< indicates that buffers received by an input port of a tunnel
    [all...]
  /hardware/ti/omap4xxx/domx/omx_core/inc/
OMX_Core.h 623 /**< indicates that buffers received by an input port of a tunnel
    [all...]
  /external/ipsec-tools/src/racoon/
racoon.conf.5 658 This option is only relevant if you use NAT traversal in tunnel mode.
    [all...]
  /external/openssh/
config.h     [all...]

Completed in 2877 milliseconds

1 2 3 4 5 6 78 91011>>