/external/tcpdump/tests/ |
D | isakmp4.out | 7 … 7 00:00:00.000000 IP 192.1.2.254.4500 > 192.1.2.23.4500: NONESP-encap: isakmp: phase 1 I ident[E] 8 … 8 00:00:00.000000 IP 192.1.2.23.4500 > 192.1.2.254.4500: NONESP-encap: isakmp: phase 1 R ident[E] 9 …9 00:00:00.000000 IP 192.1.2.254.4500 > 192.1.2.23.4500: NONESP-encap: isakmp: phase 2/others I o… 10 …10 00:00:00.000000 IP 192.1.2.23.4500 > 192.1.2.254.4500: NONESP-encap: isakmp: phase 2/others R … 11 …11 00:00:00.000000 IP 192.1.2.254.4500 > 192.1.2.23.4500: NONESP-encap: isakmp: phase 2/others I … 12 …12 00:00:00.000000 IP 192.1.2.254.4500 > 192.1.2.23.4500: UDP-encap: ESP(spi=0xf4dc0ae5,seq=0x1),… 15 …15 00:00:00.000000 IP 192.1.2.23.4500 > 192.1.2.254.4500: NONESP-encap: isakmp: phase 2/others R … 16 …16 00:00:00.000000 IP 192.1.2.254.4500 > 192.1.2.23.4500: NONESP-encap: isakmp: phase 2/others I … 17 …17 00:00:00.000000 IP 192.1.2.254.4500 > 192.1.2.23.4500: UDP-encap: ESP(spi=0xf4dc0ae5,seq=0x2),… 19 …19 00:00:00.000000 IP 192.1.2.254.4500 > 192.1.2.23.4500: UDP-encap: ESP(spi=0xf4dc0ae5,seq=0x3),… [all …]
|
D | espudp1.out | 1 …1 00:00:00.000000 IP 192.1.2.23.4500 > 192.1.2.45.4500: UDP-encap: ESP(spi=0x12345678,seq=0x1), l… 2 …2 00:00:00.000000 IP 192.1.2.23.4500 > 192.1.2.45.4500: UDP-encap: ESP(spi=0x12345678,seq=0x2), l… 3 …3 00:00:00.000000 IP 192.1.2.23.4500 > 192.1.2.45.4500: UDP-encap: ESP(spi=0x12345678,seq=0x3), l… 4 …4 00:00:00.000000 IP 192.1.2.23.4500 > 192.1.2.45.4500: UDP-encap: ESP(spi=0x12345678,seq=0x4), l… 5 …5 00:00:00.000000 IP 192.1.2.23.4500 > 192.1.2.45.4500: UDP-encap: ESP(spi=0x12345678,seq=0x5), l… 6 …6 00:00:00.000000 IP 192.1.2.23.4500 > 192.1.2.45.4500: UDP-encap: ESP(spi=0x12345678,seq=0x6), l… 7 …7 00:00:00.000000 IP 192.1.2.23.4500 > 192.1.2.45.4500: UDP-encap: ESP(spi=0x12345678,seq=0x7), l… 8 …8 00:00:00.000000 IP 192.1.2.23.4500 > 192.1.2.45.4500: UDP-encap: ESP(spi=0x12345678,seq=0x8), l…
|
/external/linux-kselftest/tools/testing/selftests/bpf/progs/ |
D | test_cls_redirect.c | 378 static INLINING ret_t accept_locally(struct __sk_buff *skb, encap_headers_t *encap) in accept_locally() argument 381 sizeof(*encap) + in accept_locally() 382 sizeof(struct in_addr) * encap->unigue.hop_count; in accept_locally() 386 if (encap->gue.proto_ctype == IPPROTO_IPV6) { in accept_locally() 387 encap->eth.h_proto = bpf_htons(ETH_P_IPV6); in accept_locally() 399 static INLINING ret_t forward_with_gre(struct __sk_buff *skb, encap_headers_t *encap, in forward_with_gre() argument 405 sizeof(*encap) + in forward_with_gre() 406 sizeof(struct in_addr) * encap->unigue.hop_count; in forward_with_gre() 419 if (encap->gue.proto_ctype == IPPROTO_IPV6) { in forward_with_gre() 526 static INLINING ret_t forward_to_next_hop(struct __sk_buff *skb, encap_headers_t *encap, in forward_to_next_hop() argument [all …]
|
/external/iptables/extensions/ |
D | libebt_vlan.t | 6 -p 802_1Q --vlan-encap ip;-p 802_1Q --vlan-encap 0800 -j CONTINUE;OK 7 -p 802_1Q --vlan-encap 0800 ;=;OK 8 -p 802_1Q --vlan-encap ! 0800 ;=;OK 9 -p 802_1Q --vlan-encap IPv6 ! --vlan-id 1;-p 802_1Q --vlan-id ! 1 --vlan-encap 86DD -j CONTINUE;OK 10 -p 802_1Q --vlan-id ! 1 --vlan-encap 86DD;=;OK 11 --vlan-encap ip;=;FAIL
|
D | libebt_vlan.c | 87 local.encap = strtoul(optarg, &end, 16); in brvlan_parse() 92 local.encap = ethent->e_ethertype; in brvlan_parse() 94 if (local.encap < ETH_ZLEN) in brvlan_parse() 96 vlaninfo->encap = htons(local.encap); in brvlan_parse() 119 printf("%4.4X ", ntohs(vlaninfo->encap)); in brvlan_print() 135 …vlan type %s0x%4.4x ", (vlaninfo->invflags & EBT_VLAN_ENCAP) ? "!= " : "", ntohs(vlaninfo->encap)); in brvlan_xlate()
|
D | libebt_vlan.txlate | 7 ebtables-translate -A INPUT -p 802_1Q --vlan-encap ip 10 ebtables-translate -A INPUT -p 802_1Q --vlan-encap ipv6 ! --vlan-id 1
|
/external/iproute2/ip/ |
D | iproute_lwtunnel.c | 139 static void print_encap_seg6(FILE *fp, struct rtattr *encap) in print_encap_seg6() argument 144 parse_rtattr_nested(tb, SEG6_IPTUNNEL_MAX, encap); in print_encap_seg6() 195 static void print_encap_seg6local(FILE *fp, struct rtattr *encap) in print_encap_seg6local() argument 201 parse_rtattr_nested(tb, SEG6_LOCAL_MAX, encap); in print_encap_seg6local() 243 static void print_encap_mpls(FILE *fp, struct rtattr *encap) in print_encap_mpls() argument 247 parse_rtattr_nested(tb, MPLS_IPTUNNEL_MAX, encap); in print_encap_mpls() 257 static void print_encap_ip(FILE *fp, struct rtattr *encap) in print_encap_ip() argument 261 parse_rtattr_nested(tb, LWTUNNEL_IP_MAX, encap); in print_encap_ip() 308 static void print_encap_ila(FILE *fp, struct rtattr *encap) in print_encap_ila() argument 312 parse_rtattr_nested(tb, ILA_ATTR_MAX, encap); in print_encap_ila() [all …]
|
D | ipl2tp.c | 47 enum l2tp_encap_type encap; member 109 addattr16(&req.n, 1024, L2TP_ATTR_ENCAP_TYPE, p->encap); in create_tunnel() 121 if (p->encap == L2TP_ENCAPTYPE_UDP) { in create_tunnel() 225 p->encap == L2TP_ENCAPTYPE_UDP ? "UDP" : in print_tunnel() 226 p->encap == L2TP_ENCAPTYPE_IP ? "IP" : "??"); in print_tunnel() 236 if (p->encap == L2TP_ENCAPTYPE_UDP) { in print_tunnel() 316 p->encap = rta_getattr_u16(attrs[L2TP_ATTR_ENCAP_TYPE]); in get_response() 539 p->encap = L2TP_ENCAPTYPE_IP; in parse_args() 541 p->encap = L2TP_ENCAPTYPE_UDP; in parse_args() 747 if (p.encap == L2TP_ENCAPTYPE_UDP) { in do_add()
|
D | iproute_lwtunnel.h | 6 struct rtattr *encap);
|
/external/libnl/lib/route/ |
D | nexthop_encap.c | 46 struct nlattr *encap; in nh_encap_build_msg() local 56 encap = nla_nest_start(msg, RTA_ENCAP); in nh_encap_build_msg() 57 if (!encap) in nh_encap_build_msg() 64 nla_nest_end(msg, encap); in nh_encap_build_msg() 72 int nh_encap_parse_msg(struct nlattr *encap, struct nlattr *encap_type, in nh_encap_parse_msg() argument 92 return lwtunnel_encap_types[e_type].ops->parse_msg(encap, rtnh); in nh_encap_parse_msg()
|
/external/libnl/lib/xfrm/ |
D | sa.c | 118 if (sa->encap) { in xfrm_sa_free_data() 119 if (sa->encap->encap_oa) in xfrm_sa_free_data() 120 nl_addr_put(sa->encap->encap_oa); in xfrm_sa_free_data() 121 free(sa->encap); in xfrm_sa_free_data() 147 dst->encap = NULL; in xfrm_sa_clone() 197 if (src->encap) { in xfrm_sa_clone() 199 if ((dst->encap = calloc (1, len)) == NULL) in xfrm_sa_clone() 201 memcpy ((void *)dst->encap, (void *)src->encap, len); in xfrm_sa_clone() 269 diff |= XFRM_SA_DIFF(ENCAP,((a->encap->encap_type != b->encap->encap_type) || in xfrm_sa_compare() 270 (a->encap->encap_sport != b->encap->encap_sport) || in xfrm_sa_compare() [all …]
|
/external/scapy/scapy/contrib/ |
D | macsec.uts | 10 = MACsec - basic encap - encrypted 13 m = sa.encap(p) 28 m = sa.encap(p) 44 m = sa.encap(p) 62 m = sa.encap(p) 70 = MACsec - basic encap - integrity only 73 m = sa.encap(p) 88 m = sa.encap(p) 105 m = sa.encap(p) 123 m = sa.encap(p) [all …]
|
/external/linux-kselftest/tools/testing/selftests/net/ |
D | pmtu.sh | 395 encap="${3}" 424 …cmd ${ns_a} ip link add ${encap}_a type ${type} ${mode} local ${a_addr} remote ${b_addr} encap ${e… 427 …cmd ${ns_b} ip link add ${encap}_b type ${type} ${mode} local ${b_addr} remote ${a_addr} encap ${e… 430 run_cmd ${ns_a} ip addr add ${tunnel4_a_addr}/${tunnel4_mask} dev ${encap}_a 431 run_cmd ${ns_b} ip addr add ${tunnel4_b_addr}/${tunnel4_mask} dev ${encap}_b 433 run_cmd ${ns_a} ip addr add ${tunnel6_a_addr}/${tunnel6_mask} dev ${encap}_a 434 run_cmd ${ns_b} ip addr add ${tunnel6_b_addr}/${tunnel6_mask} dev ${encap}_b 437 run_cmd ${ns_a} ip link set ${encap}_a up 438 run_cmd ${ns_b} ip link set ${encap}_b up 660 encap=${4} [all …]
|
D | ioam6.sh | 217 ip -netns ioam-tmp-node route add db02::/64 encap ioam6 mode inline \ 491 ip -netns ioam-node-alpha route change db01::/64 encap ioam6 mode $mode \ 511 ip -netns ioam-node-alpha route change db01::/64 encap ioam6 mode $mode \ 537 ip -netns ioam-node-alpha route change db01::/64 encap ioam6 mode $mode \ 576 ip -netns ioam-node-alpha route change db01::/64 encap ioam6 mode $mode \ 606 ip -netns ioam-node-alpha route change db01::/64 encap ioam6 mode $mode \ 626 ip -netns ioam-node-alpha route change db01::/64 encap ioam6 mode $mode \ 652 ip -netns ioam-node-alpha route change db01::/64 encap ioam6 mode $mode \ 681 ip -netns ioam-node-alpha route change db01::/64 encap ioam6 mode $mode \ 705 ip -netns ioam-node-alpha route change db01::/64 encap ioam6 mode $mode \ [all …]
|
D | srv6_end_dt46_l3vpn_test.sh | 347 encap seg6 mode encap segs ${vpn_sid} dev veth0 349 encap seg6 mode encap segs ${vpn_sid} dev veth0 356 encap seg6local action End.DT46 vrftable ${tid} dev vrf-${tid}
|
D | srv6_end_dt4_l3vpn_test.sh | 300 encap seg6 mode encap segs ${vpn_sid} dev veth0 307 encap seg6local action End.DT4 vrftable ${tid} dev vrf-${tid}
|
D | l2tp.sh | 150 encap ip local 10.1.1.1 remote 10.1.2.1 160 encap ip local 10.1.2.1 remote 10.1.1.1 179 encap ip local 2001:db8:1::1 remote 2001:db8:2::1 189 encap ip local 2001:db8:2::1 remote 2001:db8:1::1
|
D | srv6_end_dt6_l3vpn_test.sh | 308 encap seg6 mode encap segs ${vpn_sid} dev veth0 315 encap seg6local action End.DT6 vrftable ${tid} dev vrf-${tid}
|
/external/perfetto/src/traced/probes/ftrace/test/data/android_raven_AOSP.MASTER_5.10.43/events/l2tp/register_tunnel/ |
D | format | 14 field:enum l2tp_encap_type encap; offset:44; size:4; signed:0; 16 … "%s: type=%s encap=%s version=L2TPv%d tid=%u ptid=%u fd=%d", REC->name, REC->fd > 0 ? "managed" :…
|
/external/linux-kselftest/tools/testing/selftests/bpf/prog_tests/ |
D | cls_redirect.c | 249 static void encap_init(encap_headers_t *encap, uint8_t hop_count, uint8_t proto) in encap_init() argument 253 *encap = (encap_headers_t){ in encap_init() 279 encap_headers_t encap; in build_input() local 292 encap_init(&encap, test->hops == ONE_HOP ? 1 : 0, proto); in build_input() 293 p = mempcpy(p, &encap, sizeof(encap)); in build_input()
|
/external/linux-kselftest/tools/testing/selftests/bpf/ |
D | test_lwt_ip_encap.sh | 367 ip -netns ${NS1} route add ${IPv4_DST} encap bpf xmit obj \ 369 ip -netns ${NS1} -6 route add ${IPv6_DST} encap bpf xmit obj \ 372 ip -netns ${NS1} route add ${IPv4_DST} encap bpf xmit obj \ 374 ip -netns ${NS1} -6 route add ${IPv6_DST} encap bpf xmit obj \ 425 ip -netns ${NS2} route add ${IPv4_DST} encap bpf in obj \ 427 ip -netns ${NS2} -6 route add ${IPv6_DST} encap bpf in obj \ 430 ip -netns ${NS2} route add ${IPv4_DST} encap bpf in obj \ 432 ip -netns ${NS2} -6 route add ${IPv6_DST} encap bpf in obj \
|
D | test_lwt_seg6local.sh | 114 ip netns exec ns2 ip -6 route add fb00::6 encap bpf in obj test_lwt_seg6local.o sec encap_srh dev v… 118 ip netns exec ns3 ip -6 route add fd00::1 encap seg6local action End.BPF endpoint obj test_lwt_seg6… 120 ip netns exec ns4 ip -6 route add fd00::2 encap seg6local action End.BPF endpoint obj test_lwt_seg6… 125 ip netns exec ns5 ip -6 route add fd00::3 encap seg6local action End.BPF endpoint obj test_lwt_seg6…
|
/external/linux-kselftest/tools/testing/selftests/net/forwarding/ |
D | ipip_lib.sh | 336 local encap=$1; shift 341 check_fail $? "ping $encap should not pass with size 1800" 348 log_test "ping $encap packet size 1800 after MTU change"
|
/external/kernel-headers/original/uapi/linux/netfilter_bridge/ |
D | ebt_vlan.h | 16 __be16 encap; /* VLAN Encapsulated frame code {0-65535} */ member
|
/external/libnl/include/netlink-private/route/ |
D | nexthop-encap.h | 23 int nh_encap_parse_msg(struct nlattr *encap, struct nlattr *encap_type,
|