/development/samples/ToyVpn/server/linux/ |
ToyVpnServer.cpp | 87 int tunnel = socket(AF_INET6, SOCK_DGRAM, 0); local 89 setsockopt(tunnel, SOL_SOCKET, SO_REUSEADDR, &flag, sizeof(flag)); 91 setsockopt(tunnel, IPPROTO_IPV6, IPV6_V6ONLY, &flag, sizeof(flag)); 100 while (bind(tunnel, (sockaddr *)&addr, sizeof(addr))) { 112 int n = recvfrom(tunnel, packet, sizeof(packet), 0, 121 connect(tunnel, (sockaddr *)&addr, addrlen); 122 return tunnel; 187 // Wait for a tunnel. 188 int tunnel; local 189 while ((tunnel = get_tunnel(argv[2], argv[3])) != -1) [all...] |
/external/mtpd/ |
mtpd.h | 42 uint16_t tunnel; member in struct:sockaddr_pppolac::__anon30712
|
l2tp.c | 197 /* We only handle packets in our tunnel. */ 363 .local = {.tunnel = local_tunnel, .session = local_session}, 364 .remote = {.tunnel = remote_tunnel, .session = remote_session}, 415 uint16_t tunnel = 0; local 422 /* Here is the fun part. We always try to protect our tunnel and session 427 if (get_attribute_u16(ASSIGNED_TUNNEL, &tunnel) && tunnel && 429 remote_tunnel = tunnel; 437 log_print(DEBUG, "Received SCCRP without %s", tunnel ? 438 "valid challenge response" : "assigned tunnel"); [all...] |
/external/android-clat/ |
clatd.c | 118 * configures the ipv4 and ipv6 addresses on the tunnel interface 119 * tunnel - tun device data 121 void configure_tun_ip(const struct tun_data *tunnel) { 142 status = add_address(tunnel->device4, AF_INET, &Global_Clatd_Config.ipv4_local_subnet, 151 logmsg(ANDROID_LOG_INFO, "Using IPv4 address %s on %s", addrstr, tunnel->device4); 153 if((status = if_up(tunnel->device4, Global_Clatd_Config.ipv4mtu)) < 0) { 197 * tunnel - tun device data 200 void open_sockets(struct tun_data *tunnel, uint32_t mark) { 215 tunnel->write_fd6 = rawsock; 217 tunnel->read_fd6 = ring_create(tunnel) 446 struct tun_data tunnel; local [all...] |
/external/iproute2/ip/ |
ipl2tp.c | 66 unsigned int tunnel:1; member in struct:l2tp_parm 223 printf("Tunnel %u, encap %s\n", 233 printf(" Peer tunnel %u\n", 264 printf("Session %u in tunnel %u\n", 266 printf(" Peer session %u, tunnel %u\n", 492 fprintf(stderr, "Usage: ip l2tp add tunnel\n" 507 " ip l2tp del tunnel tunnel_id ID\n" 509 " ip l2tp show tunnel [ tunnel_id ID ]\n" 543 fprintf(stderr, "Unknown tunnel encapsulation \"%s\"\n", *argv); 698 } else if (strcmp(*argv, "tunnel") == 0) [all...] |
/frameworks/base/core/java/android/net/ |
IpSecManager.java | 521 * Remove a Tunnel Mode IPsec Transform from a {@link Network}. This must be used as part of 523 * all traffic that cannot be routed to the Tunnel's outbound interface. If that interface is 526 * <p>TODO: Update javadoc for tunnel mode APIs at the same time the APIs are re-worked. 529 * @param transform a Tunnel Mode IPsec Transform that has been previously applied to the given 714 * <p>IpSecTunnelInterface objects track tunnel interfaces that serve as [all...] |
/external/wpa_supplicant_8/src/radius/ |
radius.c | 221 { RADIUS_ATTR_TUNNEL_TYPE, "Tunnel-Type", RADIUS_ATTR_HEXDUMP }, 222 { RADIUS_ATTR_TUNNEL_MEDIUM_TYPE, "Tunnel-Medium-Type", 224 { RADIUS_ATTR_TUNNEL_PASSWORD, "Tunnel-Password", 230 { RADIUS_ATTR_TUNNEL_PRIVATE_GROUP_ID, "Tunnel-Private-Group-Id", 1453 struct radius_tunnel_attrs tunnel[RADIUS_TUNNEL_TAGS], *tun; local [all...] |
/prebuilts/tools/common/m2/repository/tightvnc/ |
tightvnc.jar | |
/prebuilts/tools/common/m2/repository/net/sf/saxon/Saxon-HE/9.8.0-5/ |
Saxon-HE-9.8.0-5.jar | |
/prebuilts/tools/common/m2/repository/org/apache/httpcomponents/httpclient/4.2.1/ |
httpclient-4.2.1.jar | |
/prebuilts/tools/common/m2/repository/org/apache/httpcomponents/httpclient/4.2.6/ |
httpclient-4.2.6.jar | |
/external/annotation-tools/asmx/test/lib/ |
saxon7.jar | |
/prebuilts/tools/common/m2/repository/org/apache/httpcomponents/httpclient/4.3.2/ |
httpclient-4.3.2.jar | |
/prebuilts/tools/common/m2/repository/org/apache/httpcomponents/httpclient/4.5.2/ |
httpclient-4.5.2.jar | |
/prebuilts/tools/common/m2/repository/net/sourceforge/saxon/saxon/9.1.0.8/ |
saxon-9.1.0.8.jar | |