HomeSort by relevance Sort by last modified time
    Searched full:tunnel (Results 1 - 25 of 487) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /external/kernel-headers/original/uapi/linux/
ip6_tunnel.h 23 char name[IFNAMSIZ]; /* name of tunnel device */
25 __u8 proto; /* tunnel protocol */
26 __u8 encap_limit; /* encapsulation limit for tunnel */
27 __u8 hop_limit; /* hop limit for tunnel */
28 __be32 flowinfo; /* traffic class and flowlabel for tunnel */
29 __u32 flags; /* tunnel flags */
30 struct in6_addr laddr; /* local tunnel end-point address */
31 struct in6_addr raddr; /* remote tunnel end-point address */
35 char name[IFNAMSIZ]; /* name of tunnel device */
37 __u8 proto; /* tunnel protocol *
    [all...]
if_pppolac.h 29 __u16 tunnel, session; member in struct:sockaddr_pppolac::__anon11208
l2tp.h 22 * @l2tp_conn_id: connection id of tunnel
31 __u32 l2tp_conn_id; /* Connection ID of tunnel */
44 * @l2tp_conn_id: connection id of tunnel
53 __u32 l2tp_conn_id; /* Connection ID of tunnel */
  /external/iproute2/include/linux/
ip6_tunnel.h 23 char name[IFNAMSIZ]; /* name of tunnel device */
25 __u8 proto; /* tunnel protocol */
26 __u8 encap_limit; /* encapsulation limit for tunnel */
27 __u8 hop_limit; /* hop limit for tunnel */
28 __be32 flowinfo; /* traffic class and flowlabel for tunnel */
29 __u32 flags; /* tunnel flags */
30 struct in6_addr laddr; /* local tunnel end-point address */
31 struct in6_addr raddr; /* remote tunnel end-point address */
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/include/linux/
ip6_tunnel.h 21 char name[IFNAMSIZ]; /* name of tunnel device */
23 __u8 proto; /* tunnel protocol */
24 __u8 encap_limit; /* encapsulation limit for tunnel */
25 __u8 hop_limit; /* hop limit for tunnel */
26 __be32 flowinfo; /* traffic class and flowlabel for tunnel */
27 __u32 flags; /* tunnel flags */
28 struct in6_addr laddr; /* local tunnel end-point address */
29 struct in6_addr raddr; /* remote tunnel end-point address */
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/linux/
ip6_tunnel.h 23 char name[IFNAMSIZ]; /* name of tunnel device */
25 __u8 proto; /* tunnel protocol */
26 __u8 encap_limit; /* encapsulation limit for tunnel */
27 __u8 hop_limit; /* hop limit for tunnel */
28 __be32 flowinfo; /* traffic class and flowlabel for tunnel */
29 __u32 flags; /* tunnel flags */
30 struct in6_addr laddr; /* local tunnel end-point address */
31 struct in6_addr raddr; /* remote tunnel end-point address */
  /external/iproute2/man/man8/
ip-tunnel.8 1 .TH IP\-TUNNEL 8 "20 Dec 2011" "iproute2" "Linux"
3 ip-tunnel - tunnel configuration
11 .B tunnel
16 .BR "ip tunnel" " { " add " | " change " | " del " | " show " | " prl " }"
81 .B tunnel
88 .SS ip tunnel add - add a new tunnel
89 .SS ip tunnel change - change an existing tunnel
    [all...]
ip-l2tp.8 3 ip-l2tp - L2TPv3 static unmanaged tunnel configuration
16 .BR "ip l2tp add tunnel"
62 .BR "ip l2tp del tunnel"
74 .BR "ip l2tp show tunnel"
112 session is identified by a session_id and its parent tunnel's
113 tunnel_id. A tunnel must be created before a session can be created in
114 the tunnel.
116 When creating an L2TP tunnel, the IP address of the remote peer is
131 passed through the interface, it is carried over the L2TP tunnel to
146 To establish an unmanaged L2TP tunnel, us
    [all...]
ip.8 17 ntable " | " tunnel " | " tuntap " | " maddr " | " mroute " | " mrule " | "\
116 - tunnel ethernet over IP (L2TPv3).
159 .B tunnel
160 - tunnel over IP.
218 .BR ip-tunnel (8),
  /external/kernel-headers/original/uapi/linux/netfilter/
xt_l2tp.h 13 __u32 tid; /* tunnel id */
21 XT_L2TP_TID = (1 << 0), /* match L2TP tunnel id */
  /external/iproute2/doc/
ip-tunnels.tex 30 to create tunnel. It does not work in 2.2.0!
34 ip tunnel add MY-TUNNEL mode ipip remote 193.233.7.65
36 will create tunnel device with name \verb|MY-TUNNEL|. Now you may configure
39 ifconfig MY-TUNNEL 10.0.0.1
41 Certainly, if you prefer name \verb|tunl1| to \verb|MY-TUNNEL|,
50 to tunnel net 10.0.0.0 via router 193.233.7.65. It does not
78 Q: In 2.0.36 I used to load \verb|tunnel| device module and \verb|ipip| module.
79 I cannot find any \verb|tunnel| in 2.2
    [all...]
  /external/android-clat/
clatd.c 118 * configures the ipv4 and ipv6 addresses on the tunnel interface
119 * tunnel - tun device data
121 void configure_tun_ip(const struct tun_data *tunnel) {
142 status = add_address(tunnel->device4, AF_INET, &Global_Clatd_Config.ipv4_local_subnet,
151 logmsg(ANDROID_LOG_INFO, "Using IPv4 address %s on %s", addrstr, tunnel->device4);
153 if((status = if_up(tunnel->device4, Global_Clatd_Config.ipv4mtu)) < 0) {
197 * tunnel - tun device data
200 void open_sockets(struct tun_data *tunnel, uint32_t mark) {
215 tunnel->write_fd6 = rawsock;
217 tunnel->read_fd6 = ring_create(tunnel)
437 struct tun_data tunnel; local
    [all...]
  /external/openssh/
README.tun 5 tunnel pseudo-device which is available on most platforms, either for
13 To enable the ssh server to accept tunnel requests from the client, you
22 (2) Server: Restrict client access and assign the tunnel
25 restrict the client to connect to a specified tunnel and to
29 tunnel="1",command="sh /etc/netstart tun1" ssh-rsa ... reyk@openbsd.org
31 (3) Client: Configure the local network tunnel interface
34 the network tunnel configuration with OpenBSD. For example, use the
36 tunnel on the client:
54 To establish tunnel forwarding for connections to a specified
59 Tunnel ye
    [all...]
  /external/iptables/extensions/
libxt_policy.man 43 [\fB!\fP] \fB\-\-tunnel\-src\fP \fIaddr\fP[\fB/\fP\fImask\fP]
44 Matches the source end-point address of a tunnel mode SA.
45 Only valid with \fB\-\-mode tunnel\fP.
47 [\fB!\fP] \fB\-\-tunnel\-dst\fP \fIaddr\fP[\fB/\fP\fImask\fP]
48 Matches the destination end-point address of a tunnel mode SA.
49 Only valid with \fB\-\-mode tunnel\fP.
libxt_policy.c 40 "[!] --mode mode match mode (transport/tunnel)\n"
41 "[!] --tunnel-src addr/mask match tunnel source\n"
42 "[!] --tunnel-dst addr/mask match tunnel destination\n"
54 {.name = "tunnel-src", .id = O_TUNNELSRC, .type = XTTYPE_HOSTMASK,
56 {.name = "tunnel-dst", .id = O_TUNNELDST, .type = XTTYPE_HOSTMASK,
89 if (strcmp(s, "tunnel") == 0)
129 "policy match: double --tunnel-src option");
139 "policy match: double --tunnel-dst option")
    [all...]
  /development/samples/ToyVpn/src/com/example/android/toyvpn/
ToyVpnService.java 95 // tries to recreate the tunnel without shutting down everything.
100 // We try to create the tunnel for several times. The better way
133 DatagramChannel tunnel = null; local
136 // Create a DatagramChannel as the VPN tunnel.
137 tunnel = DatagramChannel.open();
139 // Protect the tunnel before connecting to avoid loopback.
140 if (!protect(tunnel.socket())) {
141 throw new IllegalStateException("Cannot protect the tunnel");
145 tunnel.connect(server);
148 // writing. Here we put the tunnel into non-blocking mode
    [all...]
  /development/samples/ToyVpn/server/linux/
ToyVpnServer.cpp 87 int tunnel = socket(AF_INET6, SOCK_DGRAM, 0); local
89 setsockopt(tunnel, SOL_SOCKET, SO_REUSEADDR, &flag, sizeof(flag));
91 setsockopt(tunnel, IPPROTO_IPV6, IPV6_V6ONLY, &flag, sizeof(flag));
100 while (bind(tunnel, (sockaddr *)&addr, sizeof(addr))) {
112 int n = recvfrom(tunnel, packet, sizeof(packet), 0,
121 connect(tunnel, (sockaddr *)&addr, addrlen);
122 return tunnel;
187 // Wait for a tunnel.
188 int tunnel; local
189 while ((tunnel = get_tunnel(argv[2], argv[3])) != -1)
    [all...]
  /prebuilts/ndk/4/platforms/android-5/arch-x86/usr/include/linux/
if_pppolac.h 25 __u16 tunnel, session; member in struct:sockaddr_pppolac::__anon37613
  /prebuilts/ndk/4/platforms/android-8/arch-x86/usr/include/linux/
if_pppolac.h 25 __u16 tunnel, session; member in struct:sockaddr_pppolac::__anon38400
  /external/ipsec-tools/src/racoon/samples/
racoon.conf.sample-natt 31 # (i.e. the real data transported over the tunnel) would be
47 # esp/tunnel/172.16.0.1-172.16.1.1/require;
49 # esp/tunnel/172.16.1.1-172.16.0.1/require;
54 # esp/tunnel/172.16.1.1-172.16.1.3/require;
56 # esp/tunnel/172.16.1.3-172.16.1.1/require;
  /external/openssh/openbsd-compat/
port-tun.c 40 * This is the portable version of the SSH tunnel forwarding, it
51 * System-specific tunnel open function
66 debug("%s: failed to open tunnel control interface: %s",
84 debug("%s: invalid tunnel id %x: %s", __func__,
92 debug("%s: failed to configure tunnel (mode %d): %s", __func__,
98 debug("%s: tunnel mode %d fd %d", __func__, mode, fd);
135 /* Open the tunnel device */
147 debug("%s: invalid tunnel %u\n", __func__, tun);
157 /* Turn on tunnel headers */
170 /* Set the tunnel device operation mode *
    [all...]
  /external/ipsec-tools/src/racoon/samples/roadwarrior/client/
phase1-up.sh 61 -P out ipsec esp/tunnel/${LOCAL}-${REMOTE}/require;
63 -P in ipsec esp/tunnel/${REMOTE}-${LOCAL}/require;
74 -P fwd ipsec esp/tunnel/${REMOTE}-${LOCAL}/require;
  /external/iproute2/ip/
tunnel.c 39 #include "tunnel.h"
77 fprintf(stderr, "get tunnel %s failed: %s\n", basedev,
98 fprintf(stderr, "add tunnel %s failed: %s\n", ifr.ifr_name,
119 fprintf(stderr, "delete tunnel %s failed: %s\n",
  /external/libvncserver/
TODO 24 IO function ptr exists; now explain how to tunnel and implement a
  /external/lldb/test/pexpect-2.4/examples/
ssh_tunnel.py 3 """This starts an SSH tunnel to a given host. If the SSH process ever dies then
56 print 'restarting tunnel'
59 print 'tunnel OK'
61 # print 'tunnel OK'

Completed in 758 milliseconds

1 2 3 4 5 6 7 8 91011>>