/external/wpa_supplicant_8/src/eap_server/ |
eap_server_gtc.c | 33 wpa_printf(MSG_DEBUG, "EAP-GTC: EAP-FAST tunnel - use prefix "
|
/external/wpa_supplicant_8/src/tls/ |
tlsv1_client.c | 262 * tlsv1_client_encrypt - Encrypt data into TLS tunnel 271 * send data in the encrypted tunnel. 295 * tlsv1_client_decrypt - Decrypt data from TLS tunnel 304 * receive data from the encrypted tunnel.
|
/external/wpa_supplicant_8/wpa_supplicant/ |
eap_testing.txt | 134 client authentication followed by TNC inside the tunnel 361 - uses tunneled EAP-Success, expects reply in tunnel or TLS ACK, sends MPPE 367 - uses tunneled EAP-Success, expects reply in tunnel or TLS ACK, sends MPPE 389 - uses tunneled EAP-Success, expects reply in tunnel or TLS ACK, sends MPPE
|
/frameworks/base/services/java/com/android/server/connectivity/ |
Nat464Xlat.java | 153 // Although the clat interface is a point-to-point tunnel, we don't
|
/frameworks/native/cmds/ip-up-vpn/ |
ip-up-vpn.c | 62 * and maybe add a host route to protect the tunnel. PPP-based VPN already
|
/hardware/qcom/media/mm-core/inc/ |
qc_omx_component.h | 115 // Component Tunnel Request
|
OMX_Core.h | 623 /**< indicates that buffers received by an input port of a tunnel [all...] |
/hardware/qcom/media/mm-core/omxcore/inc/ |
qc_omx_component.h | 115 // Component Tunnel Request
|
OMX_Core.h | 623 /**< indicates that buffers received by an input port of a tunnel [all...] |
/hardware/ti/omap4xxx/domx/omx_proxy_component/omx_sample/src/ |
omx_proxy_sample.c | 36 * the OpenMAX1.1 DOMX Framework Tunnel Proxy component.
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/linux/ |
if_ppp.h | 115 __u16 session_id; /* if zero, get tunnel stats */
|
xfrm.h | 21 * spi, protocol and tunnel address on output.
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/netinet/ |
ip6.h | 162 /* Tunnel Limit Option */
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/linux/ |
if_ppp.h | 115 __u16 session_id; /* if zero, get tunnel stats */
|
xfrm.h | 21 * spi, protocol and tunnel address on output.
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/netinet/ |
ip6.h | 162 /* Tunnel Limit Option */
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/linux/ |
if_ppp.h | 115 __u16 session_id; /* if zero, get tunnel stats */
|
xfrm.h | 21 * spi, protocol and tunnel address on output.
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/netinet/ |
ip6.h | 162 /* Tunnel Limit Option */
|
/frameworks/native/include/media/openmax/ |
OMX_Core.h | 640 /**< indicates that buffers received by an input port of a tunnel [all...] |
/hardware/samsung_slsi/exynos5/exynos_omx/openmax/exynos_omx/include/khronos/ |
OMX_Core.h | 623 /**< indicates that buffers received by an input port of a tunnel [all...] |
/hardware/ti/omap3/omx/system/src/openmax_il/omx_core/inc/ |
OMX_Core.h | 623 /**< indicates that buffers received by an input port of a tunnel
[all...] |
/hardware/ti/omap4xxx/domx/omx_core/inc/ |
OMX_Core.h | 623 /**< indicates that buffers received by an input port of a tunnel [all...] |
/external/ipsec-tools/src/racoon/ |
racoon.conf.5 | 658 This option is only relevant if you use NAT traversal in tunnel mode. [all...] |
/external/openssh/ |
config.h | [all...] |