/external/android-clat/ |
D | clatd.c | 121 void configure_tun_ip(const struct tun_data *tunnel) { in configure_tun_ip() argument 142 status = add_address(tunnel->device4, AF_INET, &Global_Clatd_Config.ipv4_local_subnet, in configure_tun_ip() 151 logmsg(ANDROID_LOG_INFO, "Using IPv4 address %s on %s", addrstr, tunnel->device4); in configure_tun_ip() 153 if((status = if_up(tunnel->device4, Global_Clatd_Config.ipv4mtu)) < 0) { in configure_tun_ip() 200 void open_sockets(struct tun_data *tunnel, uint32_t mark) { in open_sockets() argument 215 tunnel->write_fd6 = rawsock; in open_sockets() 217 tunnel->read_fd6 = ring_create(tunnel); in open_sockets() 218 if (tunnel->read_fd6 < 0) { in open_sockets() 229 int update_clat_ipv6_address(const struct tun_data *tunnel, const char *interface) { in update_clat_ipv6_address() argument 259 del_anycast_address(tunnel->write_fd6, &Global_Clatd_Config.ipv6_local_subnet); in update_clat_ipv6_address() [all …]
|
D | ring.c | 32 int ring_create(struct tun_data *tunnel) { in ring_create() argument 50 struct packet_ring *ring = &tunnel->ring; in ring_create()
|
D | ring.h | 52 int ring_create(struct tun_data *tunnel);
|
/external/iproute2/doc/ |
D | ip-tunnels.tex | 30 to create tunnel. It does not work in 2.2.0! 34 ip tunnel add MY-TUNNEL mode ipip remote 193.233.7.65 36 will create tunnel device with name \verb|MY-TUNNEL|. Now you may configure 50 to tunnel net 10.0.0.0 via router 193.233.7.65. It does not 78 Q: In 2.0.36 I used to load \verb|tunnel| device module and \verb|ipip| module. 79 I cannot find any \verb|tunnel| in 2.2! 82 and for all IPIP tunnel devices. 85 Q: \verb|traceroute| does not work over tunnel! Well, stop... It works, 88 A: Yes. By default tunnel driver copies \verb|ttl| value from 94 tunnel loops, you may append option \verb|ttl 64|, when creating tunnel [all …]
|
D | ip-cref.tex | 154 \item \verb|tunnel| --- tunnel over IP 2460 \section{{\tt ip tunnel} --- tunnel configuration} 2463 \paragraph{Abbreviations:} \verb|tunnel|, \verb|tunl|. argument 2465 \paragraph{Object:} \verb|tunnel| objects are tunnels, encapsulating argument 2472 over IP and the \verb|ip tunnel| command can be found in~\cite{IP-TUNNELS}. 2474 \subsection{{\tt ip tunnel add} --- add a new tunnel\\ argument 2475 {\tt ip tunnel change} --- change an existing tunnel\\ 2476 {\tt ip tunnel delete} --- destroy a tunnel} 2488 --- select the tunnel device name. 2492 --- set the tunnel mode. Three modes are currently available: [all …]
|
/external/iproute2/testsuite/tests/ip/tunnel/ |
D | add_tunnel.t | 9 ts_ip "$0" "Add GRE tunnel over IPv4" tunnel add name $TUNNEL_NAME mode gre local 1.1.1.1 remote 2.… 10 ts_ip "$0" "Del GRE tunnel over IPv4" tunnel del $TUNNEL_NAME 12 ts_ip "$0" "Add GRE tunnel over IPv6" tunnel add name $TUNNEL_NAME mode ip6gre local dead:beef::1 r… 13 ts_ip "$0" "Del GRE tunnel over IPv6" tunnel del $TUNNEL_NAME
|
/external/iptables/extensions/ |
D | libxt_policy.man | 43 [\fB!\fP] \fB\-\-tunnel\-src\fP \fIaddr\fP[\fB/\fP\fImask\fP] 44 Matches the source end-point address of a tunnel mode SA. 45 Only valid with \fB\-\-mode tunnel\fP. 47 [\fB!\fP] \fB\-\-tunnel\-dst\fP \fIaddr\fP[\fB/\fP\fImask\fP] 48 Matches the destination end-point address of a tunnel mode SA. 49 Only valid with \fB\-\-mode tunnel\fP.
|
/external/mtpd/ |
D | l2tp.c | 363 .local = {.tunnel = local_tunnel, .session = local_session}, in create_pppox() 364 .remote = {.tunnel = remote_tunnel, .session = remote_session}, in create_pppox() 415 uint16_t tunnel = 0; in l2tp_process() local 427 if (get_attribute_u16(ASSIGNED_TUNNEL, &tunnel) && tunnel && in l2tp_process() 429 remote_tunnel = tunnel; in l2tp_process() 437 log_print(DEBUG, "Received SCCRP without %s", tunnel ? in l2tp_process() 440 return tunnel ? -CHALLENGE_FAILED : -PROTOCOL_ERROR; in l2tp_process()
|
D | mtpd.h | 42 uint16_t tunnel; member
|
/external/ipsec-tools/src/racoon/samples/ |
D | racoon.conf.sample-natt | 31 # (i.e. the real data transported over the tunnel) would be 47 # esp/tunnel/172.16.0.1-172.16.1.1/require; 49 # esp/tunnel/172.16.1.1-172.16.0.1/require; 54 # esp/tunnel/172.16.1.1-172.16.1.3/require; 56 # esp/tunnel/172.16.1.3-172.16.1.1/require;
|
/external/iproute2/ip/ |
D | ipl2tp.c | 64 int tunnel:1; member 611 p->tunnel = 1; in parse_args() 636 if (!p.tunnel && !p.session) in do_add() 649 if ((p.tunnel) && (p.peer_tunnel_id == 0)) in do_add() 652 if (p.tunnel) { in do_add() 686 if (!p.tunnel && !p.session) in do_del() 689 if ((p.tunnel) && (p.tunnel_id == 0)) in do_del() 710 if (!p->tunnel && !p->session) in do_show()
|
D | Android.mk | 5 rtm_map.c iptunnel.c ip6tunnel.c tunnel.c ipneigh.c ipntable.c iplink.c \
|
D | Makefile | 2 rtm_map.o iptunnel.o ip6tunnel.o tunnel.o ipneigh.o ipntable.o iplink.o \
|
/external/curl/tests/data/ |
D | test1078 | 18 Server: test tunnel 2000 74 Server: test tunnel 2000
|
D | test83 | 50 HTTP over proxy-tunnel with site authentication
|
D | test1428 | 50 HTTP over proxy-tunnel with --proxy-header and --header
|
/external/kernel-headers/original/uapi/linux/ |
D | if_pppolac.h | 29 __u16 tunnel, session; member
|
/external/iptables/tests/ |
D | options-most.rules | 12 …ol ipsec --strict --reqid 1 --spi 0x1 --proto esp --mode tunnel --tunnel-dst fe80::/64 --tunnel-sr… 35 …ol ipsec --strict --reqid 1 --spi 0x1 --proto esp --mode tunnel --tunnel-dst fe80::/64 --tunnel-sr…
|
/external/ipsec-tools/src/racoon/ |
D | TODO | 121 - End-to-GW tunnel long lived security associations 125 - Client End-to-End through client-to-GW tunnel SA, initiate from 126 client for tunnel, then initiation both ways for end-to-end
|
/external/libvncserver/ |
D | TODO | 27 IO function ptr exists; now explain how to tunnel and implement a
|
/external/iproute2/man/man8/ |
D | Makefile | 12 ip-netns.8 ip-ntable.8 ip-rule.8 ip-tunnel.8 ip-xfrm.8 \
|
/external/wpa_supplicant_8/hostapd/ |
D | hostapd.eap_user | 15 # is transmitted only within the encrypted tunnel in phase 2. If non-anonymous 45 # EAP-TTLS supports both EAP and non-EAP authentication inside the tunnel.
|
/external/wpa_supplicant_8/src/radius/ |
D | radius.c | 1441 struct radius_tunnel_attrs tunnel[RADIUS_TUNNEL_TAGS], *tun; in radius_msg_get_vlanid() local 1449 os_memset(&tunnel, 0, sizeof(tunnel)); in radius_msg_get_vlanid() 1463 tun = &tunnel[0]; in radius_msg_get_vlanid() 1465 tun = &tunnel[data[0]]; in radius_msg_get_vlanid() 1512 tun = &tunnel[i]; in radius_msg_get_vlanid()
|
/external/libvncserver/webclients/java-applet/ssl/ |
D | README | 23 This SSL applet should work with any VNC viewer that has an SSL tunnel in 24 front of it. It has been tested on x11vnc and using the stunnel tunnel 62 SSL tunnel. stunnel(8) must be installed and available in PATH. 325 *MODIFIES* the VNC protocol when active (it is not a pure tunnel).
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | eap_testing.txt | 134 client authentication followed by TNC inside the tunnel 361 - uses tunneled EAP-Success, expects reply in tunnel or TLS ACK, sends MPPE 367 - uses tunneled EAP-Success, expects reply in tunnel or TLS ACK, sends MPPE 389 - uses tunneled EAP-Success, expects reply in tunnel or TLS ACK, sends MPPE
|