/prebuilts/ndk/9/platforms/android-21/arch-arm/usr/include/netinet/ |
ip6.h | 197 /* Tunnel Limit Option */
|
/prebuilts/ndk/9/platforms/android-21/arch-arm64/usr/include/netinet/ |
ip6.h | 197 /* Tunnel Limit Option */
|
/prebuilts/ndk/9/platforms/android-21/arch-mips/usr/include/netinet/ |
ip6.h | 197 /* Tunnel Limit Option */
|
/prebuilts/ndk/9/platforms/android-21/arch-mips64/usr/include/netinet/ |
ip6.h | 197 /* Tunnel Limit Option */
|
/prebuilts/ndk/9/platforms/android-21/arch-x86/usr/include/netinet/ |
ip6.h | 197 /* Tunnel Limit Option */
|
/prebuilts/ndk/9/platforms/android-21/arch-x86_64/usr/include/netinet/ |
ip6.h | 197 /* Tunnel Limit Option */
|
/prebuilts/ndk/9/platforms/android-3/arch-arm/usr/include/netinet/ |
ip6.h | 197 /* Tunnel Limit Option */
|
/prebuilts/ndk/9/platforms/android-4/arch-arm/usr/include/netinet/ |
ip6.h | 197 /* Tunnel Limit Option */
|
/prebuilts/ndk/9/platforms/android-5/arch-arm/usr/include/netinet/ |
ip6.h | 197 /* Tunnel Limit Option */
|
/prebuilts/ndk/9/platforms/android-8/arch-arm/usr/include/netinet/ |
ip6.h | 197 /* Tunnel Limit Option */
|
/prebuilts/ndk/9/platforms/android-9/arch-arm/usr/include/netinet/ |
ip6.h | 197 /* Tunnel Limit Option */
|
/prebuilts/ndk/9/platforms/android-9/arch-mips/usr/include/netinet/ |
ip6.h | 197 /* Tunnel Limit Option */
|
/prebuilts/ndk/9/platforms/android-9/arch-x86/usr/include/netinet/ |
ip6.h | 197 /* Tunnel Limit Option */
|
/external/android-clat/ |
translate.c | 108 * tun_header - tunnel header, already allocated 509 { &tun_targ, 0 }, // Tunnel header.
|
/external/jetty/src/java/org/eclipse/jetty/server/handler/ |
ConnectHandler.java | 328 * <p>Handles the authentication before setting up the tunnel to the remote server.</p> 364 * @param request the HTTP request that initiated the tunnel
|
/external/libvncserver/ |
README | 313 password. You really should tunnel through SSH. 355 has to know the plain password. You really should tunnel via ssh or use
|
/external/tcpdump/ |
print-sflow.c | 147 { SFLOW_FLOW_EXTENDED_MPLS_TUNNEL, "Extended MPLS tunnel"}, 151 { SFLOW_FLOW_EXTENDED_VLAN_TUNNEL, "Extended VLAN Tunnel"},
|
print-juniper.c | 214 { JUNIPER_IFML_VT, "VPN-Loopback-tunnel" }, 225 { JUNIPER_IFML_LT, "Logical-tunnel" }, 547 printf("ES SA, index %u, ttl %u type %s (%u), spi %u, Tunnel %s > %s, length %u\n", [all...] |
/external/toybox/toys/pending/ |
ip.c | 25 where OBJECT := {address | link | route | rule | tunnel} [all...] |
/sdk/files/typos/ |
typos-nb.txt | 440 tunell->tunnel 441 tunnell->tunnel
|
/hardware/ti/omap3/omx/video/src/openmax_il/prepost_processor/src/ |
OMX_VPP_Utils.c | [all...] |
/external/openssh/ |
serverloop.c | 1036 packet_send_debug("Unsupported tunnel device mode."); 1040 packet_send_debug("Server has rejected tunnel device " 1065 packet_send_debug("Failed to open the tunnel device."); [all...] |
sshd.0 | 388 tunnel="n" 391 tunnel. 403 tunnel="0",command="sh /etc/netstart tun0" ssh-rsa AAAA...== [all...] |
sshd.8 | 631 .It Cm tunnel="n" 636 the client requests a tunnel. 649 tunnel="0",command="sh /etc/netstart tun0" ssh-rsa AAAA...==
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_fast.c | 59 int send_new_pac; /* server triggered re-keying of Tunnel PAC */ [all...] |