/external/iproute2/include/linux/ |
ip6_tunnel.h | 23 char name[IFNAMSIZ]; /* name of tunnel device */ 25 __u8 proto; /* tunnel protocol */ 26 __u8 encap_limit; /* encapsulation limit for tunnel */ 27 __u8 hop_limit; /* hop limit for tunnel */ 28 __be32 flowinfo; /* traffic class and flowlabel for tunnel */ 29 __u32 flags; /* tunnel flags */ 30 struct in6_addr laddr; /* local tunnel end-point address */ 31 struct in6_addr raddr; /* remote tunnel end-point address */
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/linux/ |
ip6_tunnel.h | 23 char name[IFNAMSIZ]; /* name of tunnel device */ 25 __u8 proto; /* tunnel protocol */ 26 __u8 encap_limit; /* encapsulation limit for tunnel */ 27 __u8 hop_limit; /* hop limit for tunnel */ 28 __be32 flowinfo; /* traffic class and flowlabel for tunnel */ 29 __u32 flags; /* tunnel flags */ 30 struct in6_addr laddr; /* local tunnel end-point address */ 31 struct in6_addr raddr; /* remote tunnel end-point address */
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/linux/ |
ip6_tunnel.h | 23 char name[IFNAMSIZ]; /* name of tunnel device */ 25 __u8 proto; /* tunnel protocol */ 26 __u8 encap_limit; /* encapsulation limit for tunnel */ 27 __u8 hop_limit; /* hop limit for tunnel */ 28 __be32 flowinfo; /* traffic class and flowlabel for tunnel */ 29 __u32 flags; /* tunnel flags */ 30 struct in6_addr laddr; /* local tunnel end-point address */ 31 struct in6_addr raddr; /* remote tunnel end-point address */
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/linux/ |
ip6_tunnel.h | 23 char name[IFNAMSIZ]; /* name of tunnel device */ 25 __u8 proto; /* tunnel protocol */ 26 __u8 encap_limit; /* encapsulation limit for tunnel */ 27 __u8 hop_limit; /* hop limit for tunnel */ 28 __be32 flowinfo; /* traffic class and flowlabel for tunnel */ 29 __u32 flags; /* tunnel flags */ 30 struct in6_addr laddr; /* local tunnel end-point address */ 31 struct in6_addr raddr; /* remote tunnel end-point address */
|
/external/iproute2/man/man8/ |
ip-tunnel.8 | 1 .TH IP\-TUNNEL 8 "20 Dec 2011" "iproute2" "Linux" 3 ip-tunnel - tunnel configuration 11 .B tunnel 16 .BR "ip tunnel" " { " add " | " change " | " del " | " show " | " prl " }" 81 .B tunnel 88 .SS ip tunnel add - add a new tunnel 89 .SS ip tunnel change - change an existing tunnel [all...] |
ip-l2tp.8 | 3 ip-l2tp - L2TPv3 static unmanaged tunnel configuration 16 .BR "ip l2tp add tunnel" 62 .BR "ip l2tp del tunnel" 74 .BR "ip l2tp show tunnel" 112 session is identified by a session_id and its parent tunnel's 113 tunnel_id. A tunnel must be created before a session can be created in 114 the tunnel. 116 When creating an L2TP tunnel, the IP address of the remote peer is 131 passed through the interface, it is carried over the L2TP tunnel to 146 To establish an unmanaged L2TP tunnel, us [all...] |
ip.8 | 17 ntable " | " tunnel " | " tuntap " | " maddr " | " mroute " | " mrule " | "\ 116 - tunnel ethernet over IP (L2TPv3). 159 .B tunnel 160 - tunnel over IP. 218 .BR ip-tunnel (8),
|
/external/android-clat/ |
clatd.c | 79 * tries to open the tunnel device 118 * tunnel - tun device data 120 void deconfigure_tun_ipv6(const struct tun_data *tunnel) { 123 status = if_route(tunnel->device6, AF_INET6, &Global_Clatd_Config.ipv6_local_subnet, 133 * tunnel - tun device data 135 void configure_tun_ipv6(const struct tun_data *tunnel) { 138 status = if_route(tunnel->device6, AF_INET6, &Global_Clatd_Config.ipv6_local_subnet, 148 * tunnel - tun device data 150 void interface_poll(const struct tun_data *tunnel) { 168 deconfigure_tun_ipv6(tunnel); 383 struct tun_data tunnel; local [all...] |
/external/iproute2/doc/ |
ip-tunnels.tex | 30 to create tunnel. It does not work in 2.2.0! 34 ip tunnel add MY-TUNNEL mode ipip remote 193.233.7.65 36 will create tunnel device with name \verb|MY-TUNNEL|. Now you may configure 39 ifconfig MY-TUNNEL 10.0.0.1 41 Certainly, if you prefer name \verb|tunl1| to \verb|MY-TUNNEL|, 50 to tunnel net 10.0.0.0 via router 193.233.7.65. It does not 78 Q: In 2.0.36 I used to load \verb|tunnel| device module and \verb|ipip| module. 79 I cannot find any \verb|tunnel| in 2.2 [all...] |
/external/openssh/ |
README.tun | 5 tunnel pseudo-device which is available on most platforms, either for 13 To enable the ssh server to accept tunnel requests from the client, you 22 (2) Server: Restrict client access and assign the tunnel 25 restrict the client to connect to a specified tunnel and to 29 tunnel="1",command="sh /etc/netstart tun1" ssh-rsa ... reyk@openbsd.org 31 (3) Client: Configure the local network tunnel interface 34 the network tunnel configuration with OpenBSD. For example, use the 36 tunnel on the client: 54 To establish tunnel forwarding for connections to a specified 59 Tunnel ye [all...] |
/external/iptables/extensions/ |
libxt_policy.man | 43 [\fB!\fP] \fB\-\-tunnel\-src\fP \fIaddr\fP[\fB/\fP\fImask\fP] 44 Matches the source end-point address of a tunnel mode SA. 45 Only valid with \fB\-\-mode tunnel\fP. 47 [\fB!\fP] \fB\-\-tunnel\-dst\fP \fIaddr\fP[\fB/\fP\fImask\fP] 48 Matches the destination end-point address of a tunnel mode SA. 49 Only valid with \fB\-\-mode tunnel\fP.
|
/development/samples/ToyVpn/src/com/example/android/toyvpn/ |
ToyVpnService.java | 95 // tries to recreate the tunnel without shutting down everything. 100 // We try to create the tunnel for several times. The better way 133 DatagramChannel tunnel = null; local 136 // Create a DatagramChannel as the VPN tunnel. 137 tunnel = DatagramChannel.open(); 139 // Protect the tunnel before connecting to avoid loopback. 140 if (!protect(tunnel.socket())) { 141 throw new IllegalStateException("Cannot protect the tunnel"); 145 tunnel.connect(server); 148 // writing. Here we put the tunnel into non-blocking mode [all...] |
/development/samples/ToyVpn/server/linux/ |
ToyVpnServer.cpp | 87 int tunnel = socket(AF_INET6, SOCK_DGRAM, 0); local 89 setsockopt(tunnel, SOL_SOCKET, SO_REUSEADDR, &flag, sizeof(flag)); 91 setsockopt(tunnel, IPPROTO_IPV6, IPV6_V6ONLY, &flag, sizeof(flag)); 100 while (bind(tunnel, (sockaddr *)&addr, sizeof(addr))) { 112 int n = recvfrom(tunnel, packet, sizeof(packet), 0, 121 connect(tunnel, (sockaddr *)&addr, addrlen); 122 return tunnel; 187 // Wait for a tunnel. 188 int tunnel; local 189 while ((tunnel = get_tunnel(argv[2], argv[3])) != -1) [all...] |
/external/chromium/net/http/ |
http_proxy_utils.h | 17 // The HTTP CONNECT method for establishing a tunnel connection is documented
|
/external/chromium_org/net/http/ |
proxy_client_socket.h | 57 // The HTTP CONNECT method for establishing a tunnel connection is documented 66 // When an auth challenge (407 response) is received during tunnel 77 // When a redirect (e.g. 302 response) is received during tunnel 80 // false, the response should be discarded and tunnel construction should
|
/prebuilts/ndk/4/platforms/android-5/arch-x86/usr/include/linux/ |
if_pppolac.h | 25 __u16 tunnel, session; member in struct:sockaddr_pppolac::__anon42653
|
/prebuilts/ndk/4/platforms/android-8/arch-x86/usr/include/linux/ |
if_pppolac.h | 25 __u16 tunnel, session; member in struct:sockaddr_pppolac::__anon43440
|
/external/chromium/third_party/libjingle/source/talk/session/tunnel/ |
securetunnelsessionclient.h | 32 // tunnel stream into an SSLStreamAdapter. 41 #include "talk/session/tunnel/tunnelsessionclient.h" 114 // provides the actual tunnel stream and handles state changes. 116 // tunnel stream into an SSLStreamAdapter. 122 // designated to interact with the tunnel stream. 129 // Returns the stream that implements the actual P2P tunnel. 144 // Our role in requesting the tunnel: INITIATOR or 151 // This is the stream representing the usable tunnel endpoint. It's
|
/external/chromium_org/third_party/libjingle/source/talk/session/tunnel/ |
securetunnelsessionclient.h | 32 // tunnel stream into an SSLStreamAdapter. 41 #include "talk/session/tunnel/tunnelsessionclient.h" 114 // provides the actual tunnel stream and handles state changes. 116 // tunnel stream into an SSLStreamAdapter. 122 // designated to interact with the tunnel stream. 129 // Returns the stream that implements the actual P2P tunnel. 144 // Our role in requesting the tunnel: INITIATOR or 151 // This is the stream representing the usable tunnel endpoint. It's
|
/external/ipsec-tools/src/racoon/samples/ |
racoon.conf.sample-natt | 31 # (i.e. the real data transported over the tunnel) would be 47 # esp/tunnel/172.16.0.1-172.16.1.1/require; 49 # esp/tunnel/172.16.1.1-172.16.0.1/require; 54 # esp/tunnel/172.16.1.1-172.16.1.3/require; 56 # esp/tunnel/172.16.1.3-172.16.1.1/require;
|
/external/openssh/openbsd-compat/ |
port-tun.c | 39 * This is the portable version of the SSH tunnel forwarding, it 50 * System-specific tunnel open function 65 debug("%s: failed to open tunnel control interface: %s", 83 debug("%s: invalid tunnel id %x: %s", __func__, 91 debug("%s: failed to configure tunnel (mode %d): %s", __func__, 97 debug("%s: tunnel mode %d fd %d", __func__, mode, fd); 134 /* Open the tunnel device */ 146 debug("%s: invalid tunnel %u\n", __func__, tun); 156 /* Turn on tunnel headers */ 169 /* Set the tunnel device operation mode * [all...] |
/external/ipsec-tools/src/racoon/samples/roadwarrior/client/ |
phase1-up.sh | 61 -P out ipsec esp/tunnel/${LOCAL}-${REMOTE}/require; 63 -P in ipsec esp/tunnel/${REMOTE}-${LOCAL}/require; 74 -P fwd ipsec esp/tunnel/${REMOTE}-${LOCAL}/require;
|
/external/chromium_org/jingle/glue/ |
resolving_client_socket_factory.h | 22 // resolve host names and tunnel through proxies.
|
/external/iproute2/ip/ |
Android.mk | 5 rtm_map.c iptunnel.c ip6tunnel.c tunnel.c ipneigh.c ipntable.c iplink.c \
|
tunnel.c | 39 #include "tunnel.h" 77 fprintf(stderr, "get tunnel %s failed: %s\n", basedev, 98 fprintf(stderr, "add tunnel %s failed: %s\n", ifr.ifr_name, 119 fprintf(stderr, "delete tunnel %s failed: %s\n",
|