HomeSort by relevance Sort by last modified time
    Searched full:tunnel (Results 126 - 150 of 487) sorted by null

1 2 3 4 56 7 8 91011>>

  /external/apache-http/src/org/apache/http/conn/routing/
HttpRoute.java 95 * @param tunnelled the tunnel type of this route, or
138 * @param tunnelled the tunnel type of this route
199 * layered over a tunnel through the proxy.
  /external/ipsec-tools/
setup.c 211 * spdadd src any protocol -P out ipsec esp/tunnel/local-remote/require;
212 * spdadd any src protocol -P in ipsec esp/tunnel/remote-local/require; */
246 /* Deal with tunnel mode. */
  /external/apache-http/src/org/apache/http/impl/client/
DefaultRequestDirector.java 648 this.log.debug("Tunnel to target created.");
659 this.log.debug("Tunnel to proxy created.");
690 * Creates a tunnel to the target server.
695 * information about the tunnel, that is left to the caller.
    [all...]
  /external/iptables/tests/
options-most.rules 12 -A INPUT -p tcp -m cluster --cluster-local-nodemask 0x00000001 --cluster-total-nodes 2 --cluster-hash-seed 0x00000001 -m cluster --cluster-local-nodemask 0x00000001 --cluster-total-nodes 2 --cluster-hash-seed 0x00000001 -m comment --comment foo -m connbytes --connbytes 1:2 --connbytes-mode packets --connbytes-dir both -m connlimit --connlimit-upto 1 --connlimit-mask 8 --connlimit-saddr -m connlimit --connlimit-above 1 --connlimit-mask 9 --connlimit-daddr -m connmark --mark 0x99 -m conntrack --ctstate INVALID --ctproto 6 --ctorigsrc fe80::/64 --ctorigdst fe80::/64 --ctreplsrc fe80::/64 --ctrepldst fe80::/64 --ctorigsrcport 12 --ctorigdstport 13 --ctreplsrcport 14 --ctrepldstport 15 --ctstatus EXPECTED --ctexpire 1:2 --ctdir REPLY -m cpu --cpu 2 -m dscp --dscp 0x04 -m dscp --dscp 0x00 -m hashlimit --hashlimit-upto 1/sec --hashlimit-burst 5 --hashlimit-mode srcip,dstip --hashlimit-name f1 --hashlimit-htable-size 64 --hashlimit-htable-max 128 --hashlimit-htable-gcinterval 60 --hashlimit-htable-expire 120 --hashlimit-srcmask 24 --hashlimit-dstmask 24 -m hashlimit --hashlimit-above 5/sec --hashlimit-burst 5 --hashlimit-name f1 -m helper --helper ftp -m iprange --src-range ::1-::2 --dst-range ::1-::2 -m ipvs --vaddr fe80::/64 --vport 1 --vdir REPLY --vmethod GATE --vportctl 21 -m length --length 1:2 -m limit --limit 1/sec -m mac --mac-source 01:02:03:04:05:06 -m mark --mark 0x1 -m physdev --physdev-in eth0 -m pkttype --pkt-type unicast -m policy --dir in --pol ipsec --strict --reqid 1 --spi 0x1 --proto esp --mode tunnel --tunnel-dst fe80::/64 --tunnel-src fe80::/64 --next --reqid 2 -m quota --quota 0 -m recent --rcheck --name DEFAULT --rsource -m socket --transparent -m string --string "foobar" --algo kmp --from 1 --to 2 --icase -m time --timestart 01:02:03 --timestop 03:04:05 --monthdays 1,2,3,4,5 --weekdays Mon,Fri,Sun --datestart 2001-02-03T04:05:06 --datestop 2012-09-08T09:06:05 --utc -m tos --tos 0xff/0x01 -m u32 --u32 "0x0=0x0" -m u32 --u32 "0x0=0x0" -m hbh -m hbh -m hl --hl-eq 1
35 -A INPUT -p tcp -m policy --dir in --pol ipsec --strict --reqid 1 --spi 0x1 --proto esp --mode tunnel --tunnel-dst fe80::/64 --tunnel-src fe80::/64 --next --reqid 2
  /external/robolectric/src/main/java/com/xtremelabs/robolectric/tester/org/apache/http/impl/client/
DefaultRequestDirector.java 665 this.log.debug("Tunnel to target created.");
676 this.log.debug("Tunnel to proxy created.");
707 * Creates a tunnel to the target server.
712 * information about the tunnel, that is left to the caller.
    [all...]
  /external/libvncserver/x11vnc/misc/enhanced_tightvnc_viewer/bin/
ssvnc 25 It sets up an SSL or SSH tunnel to the remote VNC Server and then
27 you have specified) to use that encrypted tunnel to connect to the VNC
  /external/iproute2/doc/
ip-cref.tex 119 \item \verb|tunnel| --- tunnel over IP
    [all...]
  /external/clang/test/SemaTemplate/
overload-candidates.cpp 106 // FIXME: It would be nice to tunnel the 'disabled by enable_if' diagnostic through here.
  /external/iproute2/include/linux/
if_ether.h 75 #define ETH_P_LINK_CTL 0x886c /* HPNA, wlan link local tunnel */
if_link.h 182 If it is a "virtual interface" (f.e. tunnel), ifi_link
  /external/ipsec-tools/src/libipsec/
policy_token.l 132 tunnel { yylval.num = IPSEC_MODE_TUNNEL; return(MODE); }
  /external/jetty/src/java/org/eclipse/jetty/server/
ServletRequestHttpWrapper.java 37 /** Class to tunnel a ServletRequest via a HttpServletRequest
  /external/kernel-headers/original/uapi/linux/
if_ether.h 76 #define ETH_P_LINK_CTL 0x886c /* HPNA, wlan link local tunnel */
ppp-ioctl.h 69 __u16 session_id; /* if zero, get tunnel stats */
  /external/openssh/
README.platform 53 Nevertheless, tunnel support is known to work with Darwin 8 and
  /external/wpa_supplicant_8/src/crypto/
tls.h 406 * tls_connection_encrypt - Encrypt data into TLS tunnel
413 * send data in the encrypted tunnel. The caller is responsible for freeing the
421 * tls_connection_decrypt - Decrypt data from TLS tunnel
428 * receive data from the encrypted tunnel. The caller is responsible for
  /external/wpa_supplicant_8/src/eap_server/
eap_server_gtc.c 33 wpa_printf(MSG_DEBUG, "EAP-GTC: EAP-FAST tunnel - use prefix "
  /external/wpa_supplicant_8/src/tls/
tlsv1_client.c 262 * tlsv1_client_encrypt - Encrypt data into TLS tunnel
271 * send data in the encrypted tunnel.
295 * tlsv1_client_decrypt - Decrypt data from TLS tunnel
304 * receive data from the encrypted tunnel.
  /external/wpa_supplicant_8/wpa_supplicant/
eap_testing.txt 134 client authentication followed by TNC inside the tunnel
361 - uses tunneled EAP-Success, expects reply in tunnel or TLS ACK, sends MPPE
367 - uses tunneled EAP-Success, expects reply in tunnel or TLS ACK, sends MPPE
389 - uses tunneled EAP-Success, expects reply in tunnel or TLS ACK, sends MPPE
  /frameworks/native/cmds/ip-up-vpn/
ip-up-vpn.c 63 * and maybe add a host route to protect the tunnel. PPP-based VPN already
  /hardware/qcom/media/mm-core/inc/
qc_omx_component.h 115 // Component Tunnel Request
  /hardware/qcom/media/mm-core/omxcore/inc/
qc_omx_component.h 115 // Component Tunnel Request
  /hardware/ti/omap4-aah/domx/omx_proxy_component/omx_sample/src/
omx_proxy_sample.c 36 * the OpenMAX1.1 DOMX Framework Tunnel Proxy component.
  /hardware/ti/omap4xxx/domx/omx_proxy_component/omx_sample/src/
omx_proxy_sample.c 36 * the OpenMAX1.1 DOMX Framework Tunnel Proxy component.
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/include/linux/
if_ppp.h 115 __u16 session_id; /* if zero, get tunnel stats */

Completed in 237 milliseconds

1 2 3 4 56 7 8 91011>>