Home
last modified time | relevance | path

Searched refs:tunnel (Results 1 – 25 of 54) sorted by relevance

123

/external/iproute2/doc/
Dip-tunnels.tex30 to create tunnel. It does not work in 2.2.0!
34 ip tunnel add MY-TUNNEL mode ipip remote 193.233.7.65
36 will create tunnel device with name \verb|MY-TUNNEL|. Now you may configure
50 to tunnel net 10.0.0.0 via router 193.233.7.65. It does not
78 Q: In 2.0.36 I used to load \verb|tunnel| device module and \verb|ipip| module.
79 I cannot find any \verb|tunnel| in 2.2!
82 and for all IPIP tunnel devices.
85 Q: \verb|traceroute| does not work over tunnel! Well, stop... It works,
88 A: Yes. By default tunnel driver copies \verb|ttl| value from
94 tunnel loops, you may append option \verb|ttl 64|, when creating tunnel
[all …]
/external/openssh/
DREADME.tun5 tunnel pseudo-device which is available on most platforms, either for
13 To enable the ssh server to accept tunnel requests from the client, you
22 (2) Server: Restrict client access and assign the tunnel
25 restrict the client to connect to a specified tunnel and to
29 tunnel="1",command="sh /etc/netstart tun1" ssh-rsa ... reyk@openbsd.org
31 (3) Client: Configure the local network tunnel interface
34 the network tunnel configuration with OpenBSD. For example, use the
36 tunnel on the client:
54 To establish tunnel forwarding for connections to a specified
64 A more complicated configuration is possible to establish a tunnel to
[all …]
DPROTOCOL136 uint32 tunnel mode
139 The "tunnel mode" parameter specifies whether the tunnel should forward
145 The "tunnel unit number" specifies the remote interface number, or may
152 over the tunnel channel by encapsulating them in SSH protocol strings
/external/iptables/extensions/
Dlibxt_policy.man43 [\fB!\fP] \fB\-\-tunnel\-src\fP \fIaddr\fP[\fB/\fP\fImask\fP]
44 Matches the source end-point address of a tunnel mode SA.
45 Only valid with \fB\-\-mode tunnel\fP.
47 [\fB!\fP] \fB\-\-tunnel\-dst\fP \fIaddr\fP[\fB/\fP\fImask\fP]
48 Matches the destination end-point address of a tunnel mode SA.
49 Only valid with \fB\-\-mode tunnel\fP.
/external/chromium/third_party/libjingle/source/talk/session/tunnel/
Dtunnelsessionclient.cc157 TunnelSession* tunnel = NULL; in AcceptTunnel() local
162 tunnel = *it; in AcceptTunnel()
166 ASSERT(tunnel != NULL); in AcceptTunnel()
173 return tunnel->GetStream(); in AcceptTunnel()
186 TunnelSession* tunnel = MakeTunnelSession(session, data->thread, in OnMessage() local
188 sessions_.push_back(tunnel); in OnMessage()
191 data->stream = tunnel->GetStream(); in OnMessage()
/external/chromium/net/http/
Dhttp_proxy_client_socket_pool.cc39 bool tunnel) in HttpProxySocketParams() argument
46 http_auth_cache_(tunnel ? http_auth_cache : NULL), in HttpProxySocketParams()
47 http_auth_handler_factory_(tunnel ? http_auth_handler_factory : NULL), in HttpProxySocketParams()
48 tunnel_(tunnel) { in HttpProxySocketParams()
212 if (params_->tunnel()) { in DoSSLConnect()
264 if (using_spdy_ && params_->tunnel()) in DoSSLConnectComplete()
288 params_->tunnel(), in DoHttpProxyConnect()
317 DCHECK(params_->tunnel()); in DoSpdyProxyCreateStream()
Dhttp_proxy_client_socket_pool_unittest.cc121 scoped_refptr<HttpProxySocketParams> GetParams(bool tunnel) { in GetParams() argument
126 GURL(tunnel ? "https://www.google.com/" : "http://www.google.com"), in GetParams()
128 HostPortPair("www.google.com", tunnel ? 443 : 80), in GetParams()
132 tunnel)); in GetParams()
Dhttp_proxy_client_socket_pool.h50 bool tunnel);
69 bool tunnel() const { return tunnel_; } in tunnel() function
Dhttp_proxy_client_socket.cc34 bool tunnel, in HttpProxyClientSocket() argument
43 auth_(tunnel ? in HttpProxyClientSocket()
49 tunnel_(tunnel), in HttpProxyClientSocket()
Dhttp_proxy_client_socket.h47 bool tunnel,
/external/mtpd/
Dl2tp.c362 .local = {.tunnel = local_tunnel, .session = local_session}, in create_pppox()
363 .remote = {.tunnel = remote_tunnel, .session = remote_session}, in create_pppox()
414 uint16_t tunnel = 0; in l2tp_process() local
426 if (get_attribute_u16(ASSIGNED_TUNNEL, &tunnel) && tunnel && in l2tp_process()
428 remote_tunnel = tunnel; in l2tp_process()
436 log_print(DEBUG, "Received SCCRP without %s", tunnel ? in l2tp_process()
439 return tunnel ? -CHALLENGE_FAILED : -PROTOCOL_ERROR; in l2tp_process()
/external/ipsec-tools/src/racoon/samples/
Dracoon.conf.sample-natt31 # (i.e. the real data transported over the tunnel) would be
47 # esp/tunnel/172.16.0.1-172.16.1.1/require;
49 # esp/tunnel/172.16.1.1-172.16.0.1/require;
54 # esp/tunnel/172.16.1.1-172.16.1.3/require;
56 # esp/tunnel/172.16.1.3-172.16.1.1/require;
/external/kernel-headers/original/linux/
Dif_pppolac.h29 __u16 tunnel, session; member
/external/iptables/tests/
Doptions-most.rules13 …ol ipsec --strict --reqid 1 --spi 0x1 --proto esp --mode tunnel --tunnel-dst fe80::/64 --tunnel-sr…
36 …ol ipsec --strict --reqid 1 --spi 0x1 --proto esp --mode tunnel --tunnel-dst fe80::/64 --tunnel-sr…
/external/iproute2/ip/
DAndroid.mk5 rtm_map.c iptunnel.c ip6tunnel.c tunnel.c ipneigh.c ipntable.c \
DMakefile2 rtm_map.o iptunnel.o ip6tunnel.o tunnel.o ipneigh.o ipntable.o iplink.o \
/external/ipsec-tools/src/racoon/
DTODO121 - End-to-GW tunnel long lived security associations
125 - Client End-to-End through client-to-GW tunnel SA, initiate from
126 client for tunnel, then initiation both ways for end-to-end
/external/qemu/target-i386/
Dhax-i386.h34 struct hax_tunnel *tunnel; member
Dhax-all.c472 struct hax_tunnel *ht = vcpu->tunnel; in hax_vcpu_interrupt()
509 vcpu->tunnel->user_event_pending = 1; in hax_raise_event()
527 struct hax_tunnel *ht = vcpu->tunnel; in hax_vcpu_hax_exec()
1078 env->hax_vcpu->tunnel->user_event_pending = 0; in hax_reset_vcpu_state()
1079 env->hax_vcpu->tunnel->ready_for_interrupt_injection = 0; in hax_reset_vcpu_state()
/external/chromium/third_party/libjingle/source/talk/
Dlibjingle.scons161 "session/tunnel/pseudotcpchannel.cc",
162 "session/tunnel/tunnelsessionclient.cc",
163 "session/tunnel/securetunnelsessionclient.cc",
/external/wpa_supplicant_6/wpa_supplicant/src/radius/
Dradius.c1176 struct radius_tunnel_attrs tunnel[RADIUS_TUNNEL_TAGS], *tun; in radius_msg_get_vlanid() local
1183 os_memset(&tunnel, 0, sizeof(tunnel)); in radius_msg_get_vlanid()
1192 tun = &tunnel[0]; in radius_msg_get_vlanid()
1194 tun = &tunnel[data[0]]; in radius_msg_get_vlanid()
1225 tun = &tunnel[i]; in radius_msg_get_vlanid()
/external/wpa_supplicant_8/hostapd/
Dhostapd.eap_user15 # is transmitted only within the encrypted tunnel in phase 2. If non-anonymous
45 # EAP-TTLS supports both EAP and non-EAP authentication inside the tunnel.
/external/wpa_supplicant_8/src/radius/
Dradius.c1339 struct radius_tunnel_attrs tunnel[RADIUS_TUNNEL_TAGS], *tun; in radius_msg_get_vlanid() local
1346 os_memset(&tunnel, 0, sizeof(tunnel)); in radius_msg_get_vlanid()
1357 tun = &tunnel[0]; in radius_msg_get_vlanid()
1359 tun = &tunnel[data[0]]; in radius_msg_get_vlanid()
1390 tun = &tunnel[i]; in radius_msg_get_vlanid()
/external/chromium/third_party/libjingle/
Dlibjingle.gyp415 'source/talk/session/tunnel/pseudotcpchannel.cc',
416 'source/talk/session/tunnel/pseudotcpchannel.h',
417 'source/talk/session/tunnel/tunnelsessionclient.cc',
418 'source/talk/session/tunnel/tunnelsessionclient.h',
/external/wpa_supplicant_6/wpa_supplicant/
Deap_testing.txt134 client authentication followed by TNC inside the tunnel
361 - uses tunneled EAP-Success, expects reply in tunnel or TLS ACK, sends MPPE
367 - uses tunneled EAP-Success, expects reply in tunnel or TLS ACK, sends MPPE
389 - uses tunneled EAP-Success, expects reply in tunnel or TLS ACK, sends MPPE

123