/external/tcpdump/tests/ |
D | isakmp4.out | 7 IP 192.1.2.254.4500 > 192.1.2.23.4500: NONESP-encap: isakmp: phase 1 I ident[E] 8 IP 192.1.2.23.4500 > 192.1.2.254.4500: NONESP-encap: isakmp: phase 1 R ident[E] 9 IP 192.1.2.254.4500 > 192.1.2.23.4500: NONESP-encap: isakmp: phase 2/others I oakley-quick[E] 10 IP 192.1.2.23.4500 > 192.1.2.254.4500: NONESP-encap: isakmp: phase 2/others R oakley-quick[E] 11 IP 192.1.2.254.4500 > 192.1.2.23.4500: NONESP-encap: isakmp: phase 2/others I oakley-quick[E] 12 IP 192.1.2.254.4500 > 192.1.2.23.4500: UDP-encap: ESP(spi=0xf4dc0ae5,seq=0x1), length 132 15 IP 192.1.2.23.4500 > 192.1.2.254.4500: NONESP-encap: isakmp: phase 2/others R oakley-quick[E] 16 IP 192.1.2.254.4500 > 192.1.2.23.4500: NONESP-encap: isakmp: phase 2/others I oakley-quick[E] 17 IP 192.1.2.254.4500 > 192.1.2.23.4500: UDP-encap: ESP(spi=0xf4dc0ae5,seq=0x2), length 132 19 IP 192.1.2.254.4500 > 192.1.2.23.4500: UDP-encap: ESP(spi=0xf4dc0ae5,seq=0x3), length 132 [all …]
|
D | espudp1.out | 1 IP 192.1.2.23.4500 > 192.1.2.45.4500: UDP-encap: ESP(spi=0x12345678,seq=0x1), length 116 2 IP 192.1.2.23.4500 > 192.1.2.45.4500: UDP-encap: ESP(spi=0x12345678,seq=0x2), length 116: ip-proto… 3 IP 192.1.2.23.4500 > 192.1.2.45.4500: UDP-encap: ESP(spi=0x12345678,seq=0x3), length 116: PIMv13, l… 4 IP 192.1.2.23.4500 > 192.1.2.45.4500: UDP-encap: ESP(spi=0x12345678,seq=0x4), length 116 5 IP 192.1.2.23.4500 > 192.1.2.45.4500: UDP-encap: ESP(spi=0x12345678,seq=0x5), length 116 6 IP 192.1.2.23.4500 > 192.1.2.45.4500: UDP-encap: ESP(spi=0x12345678,seq=0x6), length 116: ip-proto… 7 IP 192.1.2.23.4500 > 192.1.2.45.4500: UDP-encap: ESP(spi=0x12345678,seq=0x7), length 116: ip-proto… 8 IP 192.1.2.23.4500 > 192.1.2.45.4500: UDP-encap: ESP(spi=0x12345678,seq=0x8), length 116: ip-proto…
|
/external/iptables/extensions/ |
D | libebt_vlan.t | 6 -p 802_1Q --vlan-encap ip;-p 802_1Q --vlan-encap 0800 -j CONTINUE;OK 7 -p 802_1Q --vlan-encap 0800 ;=;OK 8 -p 802_1Q --vlan-encap ! 0800 ;=;OK 9 -p 802_1Q --vlan-encap IPv6 ! --vlan-id 1;-p 802_1Q --vlan-id ! 1 --vlan-encap 86DD -j CONTINUE;OK 10 -p 802_1Q --vlan-id ! 1 --vlan-encap 86DD;=;OK 11 --vlan-encap ip;=;FAIL
|
D | libebt_vlan.c | 87 local.encap = strtoul(optarg, &end, 16); in brvlan_parse() 92 local.encap = ethent->e_ethertype; in brvlan_parse() 94 if (local.encap < ETH_ZLEN) in brvlan_parse() 96 vlaninfo->encap = htons(local.encap); in brvlan_parse() 119 printf("%4.4X ", ntohs(vlaninfo->encap)); in brvlan_print() 135 …vlan type %s0x%4.4x ", (vlaninfo->invflags & EBT_VLAN_ENCAP) ? "!= " : "", ntohs(vlaninfo->encap)); in brvlan_xlate()
|
D | libebt_vlan.txlate | 7 ebtables-translate -A INPUT -p 802_1Q --vlan-encap ip 10 ebtables-translate -A INPUT -p 802_1Q --vlan-encap ipv6 ! --vlan-id 1
|
/external/iproute2/ip/ |
D | iproute_lwtunnel.c | 139 static void print_encap_seg6(FILE *fp, struct rtattr *encap) in print_encap_seg6() argument 144 parse_rtattr_nested(tb, SEG6_IPTUNNEL_MAX, encap); in print_encap_seg6() 195 static void print_encap_seg6local(FILE *fp, struct rtattr *encap) in print_encap_seg6local() argument 201 parse_rtattr_nested(tb, SEG6_LOCAL_MAX, encap); in print_encap_seg6local() 243 static void print_encap_mpls(FILE *fp, struct rtattr *encap) in print_encap_mpls() argument 247 parse_rtattr_nested(tb, MPLS_IPTUNNEL_MAX, encap); in print_encap_mpls() 257 static void print_encap_ip(FILE *fp, struct rtattr *encap) in print_encap_ip() argument 261 parse_rtattr_nested(tb, LWTUNNEL_IP_MAX, encap); in print_encap_ip() 308 static void print_encap_ila(FILE *fp, struct rtattr *encap) in print_encap_ila() argument 312 parse_rtattr_nested(tb, ILA_ATTR_MAX, encap); in print_encap_ila() [all …]
|
D | ipl2tp.c | 47 enum l2tp_encap_type encap; member 109 addattr16(&req.n, 1024, L2TP_ATTR_ENCAP_TYPE, p->encap); in create_tunnel() 121 if (p->encap == L2TP_ENCAPTYPE_UDP) { in create_tunnel() 225 p->encap == L2TP_ENCAPTYPE_UDP ? "UDP" : in print_tunnel() 226 p->encap == L2TP_ENCAPTYPE_IP ? "IP" : "??"); in print_tunnel() 236 if (p->encap == L2TP_ENCAPTYPE_UDP) { in print_tunnel() 316 p->encap = rta_getattr_u16(attrs[L2TP_ATTR_ENCAP_TYPE]); in get_response() 539 p->encap = L2TP_ENCAPTYPE_IP; in parse_args() 541 p->encap = L2TP_ENCAPTYPE_UDP; in parse_args() 747 if (p.encap == L2TP_ENCAPTYPE_UDP) { in do_add()
|
D | iproute_lwtunnel.h | 6 struct rtattr *encap);
|
D | xfrm_state.c | 375 struct xfrm_encap_tmpl encap; in xfrm_state_modify() local 378 xfrm_encap_type_parse(&encap.encap_type, &argc, &argv); in xfrm_state_modify() 380 if (get_be16(&encap.encap_sport, *argv, 0)) in xfrm_state_modify() 383 if (get_be16(&encap.encap_dport, *argv, 0)) in xfrm_state_modify() 387 memcpy(&encap.encap_oa, &oa.data, sizeof(encap.encap_oa)); in xfrm_state_modify() 389 (void *)&encap, sizeof(encap)); in xfrm_state_modify()
|
/external/linux-kselftest/tools/testing/selftests/net/ |
D | pmtu.sh | 288 encap="${3}" 317 …cmd ${ns_a} ip link add ${encap}_a type ${type} ${mode} local ${a_addr} remote ${b_addr} encap ${e… 320 …cmd ${ns_b} ip link add ${encap}_b type ${type} ${mode} local ${b_addr} remote ${a_addr} encap ${e… 323 run_cmd ${ns_a} ip addr add ${tunnel4_a_addr}/${tunnel4_mask} dev ${encap}_a 324 run_cmd ${ns_b} ip addr add ${tunnel4_b_addr}/${tunnel4_mask} dev ${encap}_b 326 run_cmd ${ns_a} ip addr add ${tunnel6_a_addr}/${tunnel6_mask} dev ${encap}_a 327 run_cmd ${ns_b} ip addr add ${tunnel6_b_addr}/${tunnel6_mask} dev ${encap}_b 330 run_cmd ${ns_a} ip link set ${encap}_a up 331 run_cmd ${ns_b} ip link set ${encap}_b up 834 encap=${3} [all …]
|
D | l2tp.sh | 150 encap ip local 10.1.1.1 remote 10.1.2.1 160 encap ip local 10.1.2.1 remote 10.1.1.1 179 encap ip local 2001:db8:1::1 remote 2001:db8:2::1 189 encap ip local 2001:db8:2::1 remote 2001:db8:1::1
|
/external/scapy/scapy/contrib/ |
D | macsec.uts | 10 = MACsec - basic encap - encrypted 13 m = sa.encap(p) 28 m = sa.encap(p) 44 m = sa.encap(p) 62 m = sa.encap(p) 70 = MACsec - basic encap - integrity only 73 m = sa.encap(p) 88 m = sa.encap(p) 105 m = sa.encap(p) 123 m = sa.encap(p) [all …]
|
D | macsec.py | 97 def encap(self, pkt): member in MACsecSA
|
/external/linux-kselftest/tools/testing/selftests/bpf/ |
D | test_lwt_ip_encap.sh | 364 ip -netns ${NS1} route add ${IPv4_DST} encap bpf xmit obj \ 366 ip -netns ${NS1} -6 route add ${IPv6_DST} encap bpf xmit obj \ 369 ip -netns ${NS1} route add ${IPv4_DST} encap bpf xmit obj \ 371 ip -netns ${NS1} -6 route add ${IPv6_DST} encap bpf xmit obj \ 422 ip -netns ${NS2} route add ${IPv4_DST} encap bpf in obj \ 424 ip -netns ${NS2} -6 route add ${IPv6_DST} encap bpf in obj \ 427 ip -netns ${NS2} route add ${IPv4_DST} encap bpf in obj \ 429 ip -netns ${NS2} -6 route add ${IPv6_DST} encap bpf in obj \
|
D | test_lwt_seg6local.sh | 114 ip netns exec ns2 ip -6 route add fb00::6 encap bpf in obj test_lwt_seg6local.o sec encap_srh dev v… 118 ip netns exec ns3 ip -6 route add fd00::1 encap seg6local action End.BPF endpoint obj test_lwt_seg6… 120 ip netns exec ns4 ip -6 route add fd00::2 encap seg6local action End.BPF endpoint obj test_lwt_seg6… 125 ip netns exec ns5 ip -6 route add fd00::3 encap seg6local action End.BPF endpoint obj test_lwt_seg6…
|
/external/linux-kselftest/tools/testing/selftests/net/forwarding/ |
D | ipip_lib.sh | 336 local encap=$1; shift 341 check_fail $? "ping $encap should not pass with size 1800" 348 log_test "ping $encap packet size 1800 after MTU change"
|
/external/kernel-headers/original/uapi/linux/netfilter_bridge/ |
D | ebt_vlan.h | 16 __be16 encap; /* VLAN Encapsulated frame code {0-65535} */ member
|
/external/ltp/testcases/network/mpls/ |
D | mpls02.sh | 32 ROD ip route add $ip_rmt/$mask encap mpls 50 via inet$TST_IPV6 $(tst_ipaddr rhost)
|
D | mpls_lib.sh | 62 ROD ip route add $ip_rmt/$mask encap mpls $label dev ltp_v0
|
/external/dnsmasq/src/ |
D | rfc2131.c | 110 static void do_encap_opts(struct dhcp_opt* opts, int encap, int flag, struct dhcp_packet* mess, 1558 static void do_encap_opts(struct dhcp_opt* opt, int encap, int flag, struct dhcp_packet* mess, in do_encap_opts() argument 1571 p = free_space(mess, end, encap, enc_len); in do_encap_opts() 1584 if (enc_len != 0 && (p = free_space(mess, end, encap, enc_len + 1))) { in do_encap_opts() 1965 if ((o->flags & DHOPT_ENCAPSULATE) && opt->u.encap == o->u.encap) { in do_options() 1968 (o->flags & DHOPT_FORCE || in_list(req_options, o->u.encap))) { in do_options() 1976 do_encap_opts(config_opts, opt->u.encap, DHOPT_ENCAP_MATCH, mess, end, null_term); in do_options()
|
D | dnsmasq.h | 467 int encap; member
|
/external/dnsmasq/ |
D | dnsmasq.conf.example | 347 #dhcp-option=encap:175, 1, 5b # priority code 348 #dhcp-option=encap:175, 176, 1b # no-proxydhcp 349 #dhcp-option=encap:175, 177, string # bus-id 350 #dhcp-option=encap:175, 189, 1b # BIOS drive code 351 #dhcp-option=encap:175, 190, user # iSCSI username 352 #dhcp-option=encap:175, 191, pass # iSCSI password
|
D | CHANGELOG | 194 dhcp-option = encap:175, 190, "iscsi-client0" 195 dhcp-option = encap:175, 191, "iscsi-client0-secret"
|
/external/honggfuzz/examples/linux_kernel_ip/ |
D | linux-kernel-4.10.0.patch | 144 /* Verify checksum before giving to encap */
|
/external/iproute2/doc/actions/ |
D | ifb-README | 112 ifb0 Link encap:Ethernet HWaddr 00:00:00:00:00:00
|