/external/iproute2/doc/ |
D | ip-tunnels.tex | 30 to create tunnel. It does not work in 2.2.0! 34 ip tunnel add MY-TUNNEL mode ipip remote 193.233.7.65 36 will create tunnel device with name \verb|MY-TUNNEL|. Now you may configure 50 to tunnel net 10.0.0.0 via router 193.233.7.65. It does not 78 Q: In 2.0.36 I used to load \verb|tunnel| device module and \verb|ipip| module. 79 I cannot find any \verb|tunnel| in 2.2! 82 and for all IPIP tunnel devices. 85 Q: \verb|traceroute| does not work over tunnel! Well, stop... It works, 88 A: Yes. By default tunnel driver copies \verb|ttl| value from 94 tunnel loops, you may append option \verb|ttl 64|, when creating tunnel [all …]
|
/external/openssh/ |
D | README.tun | 5 tunnel pseudo-device which is available on most platforms, either for 13 To enable the ssh server to accept tunnel requests from the client, you 22 (2) Server: Restrict client access and assign the tunnel 25 restrict the client to connect to a specified tunnel and to 29 tunnel="1",command="sh /etc/netstart tun1" ssh-rsa ... reyk@openbsd.org 31 (3) Client: Configure the local network tunnel interface 34 the network tunnel configuration with OpenBSD. For example, use the 36 tunnel on the client: 54 To establish tunnel forwarding for connections to a specified 64 A more complicated configuration is possible to establish a tunnel to [all …]
|
D | PROTOCOL | 136 uint32 tunnel mode 139 The "tunnel mode" parameter specifies whether the tunnel should forward 145 The "tunnel unit number" specifies the remote interface number, or may 152 over the tunnel channel by encapsulating them in SSH protocol strings
|
/external/iptables/extensions/ |
D | libxt_policy.man | 43 [\fB!\fP] \fB\-\-tunnel\-src\fP \fIaddr\fP[\fB/\fP\fImask\fP] 44 Matches the source end-point address of a tunnel mode SA. 45 Only valid with \fB\-\-mode tunnel\fP. 47 [\fB!\fP] \fB\-\-tunnel\-dst\fP \fIaddr\fP[\fB/\fP\fImask\fP] 48 Matches the destination end-point address of a tunnel mode SA. 49 Only valid with \fB\-\-mode tunnel\fP.
|
/external/chromium/third_party/libjingle/source/talk/session/tunnel/ |
D | tunnelsessionclient.cc | 157 TunnelSession* tunnel = NULL; in AcceptTunnel() local 162 tunnel = *it; in AcceptTunnel() 166 ASSERT(tunnel != NULL); in AcceptTunnel() 173 return tunnel->GetStream(); in AcceptTunnel() 186 TunnelSession* tunnel = MakeTunnelSession(session, data->thread, in OnMessage() local 188 sessions_.push_back(tunnel); in OnMessage() 191 data->stream = tunnel->GetStream(); in OnMessage()
|
/external/chromium/net/http/ |
D | http_proxy_client_socket_pool.cc | 39 bool tunnel) in HttpProxySocketParams() argument 46 http_auth_cache_(tunnel ? http_auth_cache : NULL), in HttpProxySocketParams() 47 http_auth_handler_factory_(tunnel ? http_auth_handler_factory : NULL), in HttpProxySocketParams() 48 tunnel_(tunnel) { in HttpProxySocketParams() 212 if (params_->tunnel()) { in DoSSLConnect() 264 if (using_spdy_ && params_->tunnel()) in DoSSLConnectComplete() 288 params_->tunnel(), in DoHttpProxyConnect() 317 DCHECK(params_->tunnel()); in DoSpdyProxyCreateStream()
|
D | http_proxy_client_socket_pool_unittest.cc | 121 scoped_refptr<HttpProxySocketParams> GetParams(bool tunnel) { in GetParams() argument 126 GURL(tunnel ? "https://www.google.com/" : "http://www.google.com"), in GetParams() 128 HostPortPair("www.google.com", tunnel ? 443 : 80), in GetParams() 132 tunnel)); in GetParams()
|
D | http_proxy_client_socket_pool.h | 50 bool tunnel); 69 bool tunnel() const { return tunnel_; } in tunnel() function
|
D | http_proxy_client_socket.cc | 34 bool tunnel, in HttpProxyClientSocket() argument 43 auth_(tunnel ? in HttpProxyClientSocket() 49 tunnel_(tunnel), in HttpProxyClientSocket()
|
D | http_proxy_client_socket.h | 47 bool tunnel,
|
/external/mtpd/ |
D | l2tp.c | 362 .local = {.tunnel = local_tunnel, .session = local_session}, in create_pppox() 363 .remote = {.tunnel = remote_tunnel, .session = remote_session}, in create_pppox() 414 uint16_t tunnel = 0; in l2tp_process() local 426 if (get_attribute_u16(ASSIGNED_TUNNEL, &tunnel) && tunnel && in l2tp_process() 428 remote_tunnel = tunnel; in l2tp_process() 436 log_print(DEBUG, "Received SCCRP without %s", tunnel ? in l2tp_process() 439 return tunnel ? -CHALLENGE_FAILED : -PROTOCOL_ERROR; in l2tp_process()
|
/external/ipsec-tools/src/racoon/samples/ |
D | racoon.conf.sample-natt | 31 # (i.e. the real data transported over the tunnel) would be 47 # esp/tunnel/172.16.0.1-172.16.1.1/require; 49 # esp/tunnel/172.16.1.1-172.16.0.1/require; 54 # esp/tunnel/172.16.1.1-172.16.1.3/require; 56 # esp/tunnel/172.16.1.3-172.16.1.1/require;
|
/external/kernel-headers/original/linux/ |
D | if_pppolac.h | 29 __u16 tunnel, session; member
|
/external/iptables/tests/ |
D | options-most.rules | 13 …ol ipsec --strict --reqid 1 --spi 0x1 --proto esp --mode tunnel --tunnel-dst fe80::/64 --tunnel-sr… 36 …ol ipsec --strict --reqid 1 --spi 0x1 --proto esp --mode tunnel --tunnel-dst fe80::/64 --tunnel-sr…
|
/external/iproute2/ip/ |
D | Android.mk | 5 rtm_map.c iptunnel.c ip6tunnel.c tunnel.c ipneigh.c ipntable.c \
|
D | Makefile | 2 rtm_map.o iptunnel.o ip6tunnel.o tunnel.o ipneigh.o ipntable.o iplink.o \
|
/external/ipsec-tools/src/racoon/ |
D | TODO | 121 - End-to-GW tunnel long lived security associations 125 - Client End-to-End through client-to-GW tunnel SA, initiate from 126 client for tunnel, then initiation both ways for end-to-end
|
/external/qemu/target-i386/ |
D | hax-i386.h | 34 struct hax_tunnel *tunnel; member
|
D | hax-all.c | 472 struct hax_tunnel *ht = vcpu->tunnel; in hax_vcpu_interrupt() 509 vcpu->tunnel->user_event_pending = 1; in hax_raise_event() 527 struct hax_tunnel *ht = vcpu->tunnel; in hax_vcpu_hax_exec() 1078 env->hax_vcpu->tunnel->user_event_pending = 0; in hax_reset_vcpu_state() 1079 env->hax_vcpu->tunnel->ready_for_interrupt_injection = 0; in hax_reset_vcpu_state()
|
/external/chromium/third_party/libjingle/source/talk/ |
D | libjingle.scons | 161 "session/tunnel/pseudotcpchannel.cc", 162 "session/tunnel/tunnelsessionclient.cc", 163 "session/tunnel/securetunnelsessionclient.cc",
|
/external/wpa_supplicant_6/wpa_supplicant/src/radius/ |
D | radius.c | 1176 struct radius_tunnel_attrs tunnel[RADIUS_TUNNEL_TAGS], *tun; in radius_msg_get_vlanid() local 1183 os_memset(&tunnel, 0, sizeof(tunnel)); in radius_msg_get_vlanid() 1192 tun = &tunnel[0]; in radius_msg_get_vlanid() 1194 tun = &tunnel[data[0]]; in radius_msg_get_vlanid() 1225 tun = &tunnel[i]; in radius_msg_get_vlanid()
|
/external/wpa_supplicant_8/hostapd/ |
D | hostapd.eap_user | 15 # is transmitted only within the encrypted tunnel in phase 2. If non-anonymous 45 # EAP-TTLS supports both EAP and non-EAP authentication inside the tunnel.
|
/external/wpa_supplicant_8/src/radius/ |
D | radius.c | 1339 struct radius_tunnel_attrs tunnel[RADIUS_TUNNEL_TAGS], *tun; in radius_msg_get_vlanid() local 1346 os_memset(&tunnel, 0, sizeof(tunnel)); in radius_msg_get_vlanid() 1357 tun = &tunnel[0]; in radius_msg_get_vlanid() 1359 tun = &tunnel[data[0]]; in radius_msg_get_vlanid() 1390 tun = &tunnel[i]; in radius_msg_get_vlanid()
|
/external/chromium/third_party/libjingle/ |
D | libjingle.gyp | 415 'source/talk/session/tunnel/pseudotcpchannel.cc', 416 'source/talk/session/tunnel/pseudotcpchannel.h', 417 'source/talk/session/tunnel/tunnelsessionclient.cc', 418 'source/talk/session/tunnel/tunnelsessionclient.h',
|
/external/wpa_supplicant_6/wpa_supplicant/ |
D | eap_testing.txt | 134 client authentication followed by TNC inside the tunnel 361 - uses tunneled EAP-Success, expects reply in tunnel or TLS ACK, sends MPPE 367 - uses tunneled EAP-Success, expects reply in tunnel or TLS ACK, sends MPPE 389 - uses tunneled EAP-Success, expects reply in tunnel or TLS ACK, sends MPPE
|