/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/include/linux/ |
xfrm.h | 21 * spi, protocol and tunnel address on output.
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/include/netinet/ |
ip6.h | 162 /* Tunnel Limit Option */
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/linux/ |
if_ether.h | 75 #define ETH_P_LINK_CTL 0x886c /* HPNA, wlan link local tunnel */
|
if_link.h | 181 If it is a "virtual interface" (f.e. tunnel), ifi_link
|
if_ppp.h | 115 __u16 session_id; /* if zero, get tunnel stats */
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/netinet/ |
ip6.h | 162 /* Tunnel Limit Option */
|
/hardware/qcom/media/mm-core/inc/ |
OMX_Core.h | 402 * components negotiated a read-only tunnel 632 /**< indicates that buffers received by an input port of a tunnel [all...] |
/external/libvncserver/x11vnc/misc/enhanced_tightvnc_viewer/ |
README | 166 tunnel with MS-Logon.) 222 (local machine). Default assumes you are using SSH tunnel. Use 694 between the tunnel being set up and the SSVNC vncviewer connecting 697 Similarly, when you disconnect the tunnel is torn down quickly and 726 time the untrusted local user can connect to the tunnel much smaller.
|
/frameworks/native/include/media/openmax/ |
OMX_Core.h | 652 /**< indicates that buffers received by an input port of a tunnel [all...] |
/hardware/qcom/media/mm-core/omxcore/inc/ |
OMX_Core.h | 623 /**< indicates that buffers received by an input port of a tunnel [all...] |
/hardware/ti/omap3/omx/system/src/openmax_il/omx_core/inc/ |
OMX_Core.h | 623 /**< indicates that buffers received by an input port of a tunnel
[all...] |
/hardware/ti/omap4-aah/domx/omx_core/inc/ |
OMX_Core.h | 640 /**< indicates that buffers received by an input port of a tunnel [all...] |
/hardware/ti/omap4xxx/domx/omx_core/inc/ |
OMX_Core.h | 623 /**< indicates that buffers received by an input port of a tunnel [all...] |
/external/ipsec-tools/src/racoon/ |
racoon.conf.5 | 658 This option is only relevant if you use NAT traversal in tunnel mode. [all...] |
/external/openssh/ |
config.h | [all...] |
config.h.in | [all...] |
auth-options.c | 55 /* "tunnel=" option. */ 358 cp = "tunnel=\"";
|
ssh.0 | 294 Tunnel 378 Requests tunnel device forwarding with the specified tun(4) 383 M-bM-^@M-^\anyM-bM-^@M-^], which uses the next available tunnel device. If 385 Tunnel and TunnelDevice directives in ssh_config(5). If the 386 Tunnel directive is unset, it is set to the default tunnel mode, [all...] |
ssh.1 | 486 .It Tunnel 628 tunnel 638 which uses the next available tunnel device. 644 .Cm Tunnel 650 .Cm Tunnel 651 directive is unset, it is set to the default tunnel mode, which is [all...] |
/external/jetty/src/java/org/eclipse/jetty/client/ |
HttpDestination.java | 364 // Establish the tunnel if needed 371 LOG.debug("Establishing tunnel to {} via {}", getAddress(), getProxy());
|
/external/tcpdump/ |
print-l2tp.c | 85 #define L2TP_AVP_ASSND_TUN_ID 9 /* Assigned Tunnel ID */ 661 TCHECK2(*ptr, 2); /* Tunnel ID */
|
/external/wpa_supplicant_8/src/ap/ |
ieee802_11_auth.c | 431 * Decode all tunnel passwords as PSK and save them into a linked list. 438 * Passphrase is NULL iff there is no i-th Tunnel-Password
|
/device/asus/flo/nfc/ |
libnfc-brcm.conf | 180 # "hwtun" (HW Tunnel)
|
/external/apache-http/src/org/apache/http/conn/routing/ |
BasicRouteDirector.java | 176 // tunnel and layering are the same, remains to check the security
|
/external/iproute2/include/linux/ |
xfrm.h | 20 * spi, protocol and tunnel address on output.
|