/development/samples/ToyVpn/src/com/example/android/toyvpn/ |
ToyVpnService.java | 95 // tries to recreate the tunnel without shutting down everything. 100 // We try to create the tunnel for several times. The better way 133 DatagramChannel tunnel = null; local 136 // Create a DatagramChannel as the VPN tunnel. 137 tunnel = DatagramChannel.open(); 139 // Protect the tunnel before connecting to avoid loopback. 140 if (!protect(tunnel.socket())) { 141 throw new IllegalStateException("Cannot protect the tunnel"); 145 tunnel.connect(server); 148 // writing. Here we put the tunnel into non-blocking mode [all...] |
/external/android-clat/ |
ring.h | 52 int ring_create(struct tun_data *tunnel);
|
ring.c | 32 int ring_create(struct tun_data *tunnel) { 50 struct packet_ring *ring = &tunnel->ring;
|
/external/mtpd/ |
mtpd.h | 42 uint16_t tunnel; member in struct:sockaddr_pppolac::__anon19880
|
l2tp.c | 197 /* We only handle packets in our tunnel. */ 363 .local = {.tunnel = local_tunnel, .session = local_session}, 364 .remote = {.tunnel = remote_tunnel, .session = remote_session}, 415 uint16_t tunnel = 0; local 422 /* Here is the fun part. We always try to protect our tunnel and session 427 if (get_attribute_u16(ASSIGNED_TUNNEL, &tunnel) && tunnel && 429 remote_tunnel = tunnel; 437 log_print(DEBUG, "Received SCCRP without %s", tunnel ? 438 "valid challenge response" : "assigned tunnel"); [all...] |
/external/iproute2/ip/ |
Android.mk | 5 rtm_map.c iptunnel.c ip6tunnel.c tunnel.c ipneigh.c ipntable.c iplink.c \
|
Makefile | 2 rtm_map.o iptunnel.o ip6tunnel.o tunnel.o ipneigh.o ipntable.o iplink.o \
|
ipl2tp.c | 64 int tunnel:1; member in struct:l2tp_parm 204 printf("Tunnel %u, encap %s\n", 210 printf(" Peer tunnel %u\n", 222 printf("Session %u in tunnel %u\n", 224 printf(" Peer session %u, tunnel %u\n", 468 fprintf(stderr, "Usage: ip l2tp add tunnel\n"); 479 fprintf(stderr, " ip l2tp del tunnel tunnel_id ID\n"); 481 fprintf(stderr, " ip l2tp show tunnel [ tunnel_id ID ]\n"); 512 fprintf(stderr, "Unknown tunnel encapsulation \"%s\"\n", *argv); 610 } else if (strcmp(*argv, "tunnel") == 0) [all...] |
/external/iproute2/man/man8/ |
Makefile | 12 ip-netns.8 ip-ntable.8 ip-rule.8 ip-tunnel.8 ip-xfrm.8 \
|
/device/google/marlin/ |
system.prop | 141 #disable tunnel encoding 142 tunnel.audio.encode=false
|
/external/wpa_supplicant_8/src/radius/ |
radius.c | 221 { RADIUS_ATTR_TUNNEL_TYPE, "Tunnel-Type", RADIUS_ATTR_HEXDUMP }, 222 { RADIUS_ATTR_TUNNEL_MEDIUM_TYPE, "Tunnel-Medium-Type", 224 { RADIUS_ATTR_TUNNEL_PASSWORD, "Tunnel-Password", 230 { RADIUS_ATTR_TUNNEL_PRIVATE_GROUP_ID, "Tunnel-Private-Group-Id", 1441 struct radius_tunnel_attrs tunnel[RADIUS_TUNNEL_TAGS], *tun; local [all...] |
/external/iproute2/doc/ |
ip-cref.tex | 154 \item \verb|tunnel| --- tunnel over IP [all...] |
/external/autotest/server/hosts/ |
servo_host.py | 362 will be ignored, as servo call may use ssh tunnel. 375 'tunnel to go through.')
|
/prebuilts/tools/common/m2/repository/tightvnc/ |
tightvnc.jar | |
/prebuilts/tools/common/m2/repository/org/apache/httpcomponents/httpclient/4.2.1/ |
httpclient-4.2.1.jar | |
/prebuilts/tools/common/m2/repository/org/apache/httpcomponents/httpclient/4.2.6/ |
httpclient-4.2.6.jar | |
/prebuilts/tools/common/m2/repository/org/apache/httpcomponents/httpclient/4.3.2/ |
httpclient-4.3.2.jar | |
/prebuilts/tools/common/m2/repository/net/sourceforge/saxon/saxon/9.1.0.8/ |
saxon-9.1.0.8.jar | |
/prebuilts/eclipse/maven/apache-maven-3.2.1/lib/ |
wagon-http-2.6-shaded.jar | |