Home
last modified time | relevance | path

Searched refs:tunnel (Results 1 – 25 of 42) sorted by relevance

12

/external/android-clat/
Dclatd.c121 void configure_tun_ip(const struct tun_data *tunnel) { in configure_tun_ip() argument
142 status = add_address(tunnel->device4, AF_INET, &Global_Clatd_Config.ipv4_local_subnet, in configure_tun_ip()
151 logmsg(ANDROID_LOG_INFO, "Using IPv4 address %s on %s", addrstr, tunnel->device4); in configure_tun_ip()
153 if((status = if_up(tunnel->device4, Global_Clatd_Config.ipv4mtu)) < 0) { in configure_tun_ip()
200 void open_sockets(struct tun_data *tunnel, uint32_t mark) { in open_sockets() argument
215 tunnel->write_fd6 = rawsock; in open_sockets()
217 tunnel->read_fd6 = ring_create(tunnel); in open_sockets()
218 if (tunnel->read_fd6 < 0) { in open_sockets()
229 int update_clat_ipv6_address(const struct tun_data *tunnel, const char *interface) { in update_clat_ipv6_address() argument
259 del_anycast_address(tunnel->write_fd6, &Global_Clatd_Config.ipv6_local_subnet); in update_clat_ipv6_address()
[all …]
Dring.c32 int ring_create(struct tun_data *tunnel) { in ring_create() argument
50 struct packet_ring *ring = &tunnel->ring; in ring_create()
Dring.h52 int ring_create(struct tun_data *tunnel);
/external/iproute2/doc/
Dip-tunnels.tex30 to create tunnel. It does not work in 2.2.0!
34 ip tunnel add MY-TUNNEL mode ipip remote 193.233.7.65
36 will create tunnel device with name \verb|MY-TUNNEL|. Now you may configure
50 to tunnel net 10.0.0.0 via router 193.233.7.65. It does not
78 Q: In 2.0.36 I used to load \verb|tunnel| device module and \verb|ipip| module.
79 I cannot find any \verb|tunnel| in 2.2!
82 and for all IPIP tunnel devices.
85 Q: \verb|traceroute| does not work over tunnel! Well, stop... It works,
88 A: Yes. By default tunnel driver copies \verb|ttl| value from
94 tunnel loops, you may append option \verb|ttl 64|, when creating tunnel
[all …]
Dip-cref.tex154 \item \verb|tunnel| --- tunnel over IP
2460 \section{{\tt ip tunnel} --- tunnel configuration}
2463 \paragraph{Abbreviations:} \verb|tunnel|, \verb|tunl|. argument
2465 \paragraph{Object:} \verb|tunnel| objects are tunnels, encapsulating argument
2472 over IP and the \verb|ip tunnel| command can be found in~\cite{IP-TUNNELS}.
2474 \subsection{{\tt ip tunnel add} --- add a new tunnel\\ argument
2475 {\tt ip tunnel change} --- change an existing tunnel\\
2476 {\tt ip tunnel delete} --- destroy a tunnel}
2488 --- select the tunnel device name.
2492 --- set the tunnel mode. Three modes are currently available:
[all …]
/external/iproute2/testsuite/tests/ip/tunnel/
Dadd_tunnel.t9 ts_ip "$0" "Add GRE tunnel over IPv4" tunnel add name $TUNNEL_NAME mode gre local 1.1.1.1 remote 2.…
10 ts_ip "$0" "Del GRE tunnel over IPv4" tunnel del $TUNNEL_NAME
12 ts_ip "$0" "Add GRE tunnel over IPv6" tunnel add name $TUNNEL_NAME mode ip6gre local dead:beef::1 r…
13 ts_ip "$0" "Del GRE tunnel over IPv6" tunnel del $TUNNEL_NAME
/external/iptables/extensions/
Dlibxt_policy.man43 [\fB!\fP] \fB\-\-tunnel\-src\fP \fIaddr\fP[\fB/\fP\fImask\fP]
44 Matches the source end-point address of a tunnel mode SA.
45 Only valid with \fB\-\-mode tunnel\fP.
47 [\fB!\fP] \fB\-\-tunnel\-dst\fP \fIaddr\fP[\fB/\fP\fImask\fP]
48 Matches the destination end-point address of a tunnel mode SA.
49 Only valid with \fB\-\-mode tunnel\fP.
/external/mtpd/
Dl2tp.c363 .local = {.tunnel = local_tunnel, .session = local_session}, in create_pppox()
364 .remote = {.tunnel = remote_tunnel, .session = remote_session}, in create_pppox()
415 uint16_t tunnel = 0; in l2tp_process() local
427 if (get_attribute_u16(ASSIGNED_TUNNEL, &tunnel) && tunnel && in l2tp_process()
429 remote_tunnel = tunnel; in l2tp_process()
437 log_print(DEBUG, "Received SCCRP without %s", tunnel ? in l2tp_process()
440 return tunnel ? -CHALLENGE_FAILED : -PROTOCOL_ERROR; in l2tp_process()
Dmtpd.h42 uint16_t tunnel; member
/external/ipsec-tools/src/racoon/samples/
Dracoon.conf.sample-natt31 # (i.e. the real data transported over the tunnel) would be
47 # esp/tunnel/172.16.0.1-172.16.1.1/require;
49 # esp/tunnel/172.16.1.1-172.16.0.1/require;
54 # esp/tunnel/172.16.1.1-172.16.1.3/require;
56 # esp/tunnel/172.16.1.3-172.16.1.1/require;
/external/iproute2/ip/
Dipl2tp.c64 int tunnel:1; member
611 p->tunnel = 1; in parse_args()
636 if (!p.tunnel && !p.session) in do_add()
649 if ((p.tunnel) && (p.peer_tunnel_id == 0)) in do_add()
652 if (p.tunnel) { in do_add()
686 if (!p.tunnel && !p.session) in do_del()
689 if ((p.tunnel) && (p.tunnel_id == 0)) in do_del()
710 if (!p->tunnel && !p->session) in do_show()
DAndroid.mk5 rtm_map.c iptunnel.c ip6tunnel.c tunnel.c ipneigh.c ipntable.c iplink.c \
DMakefile2 rtm_map.o iptunnel.o ip6tunnel.o tunnel.o ipneigh.o ipntable.o iplink.o \
/external/curl/tests/data/
Dtest107818 Server: test tunnel 2000
74 Server: test tunnel 2000
Dtest8350 HTTP over proxy-tunnel with site authentication
Dtest142850 HTTP over proxy-tunnel with --proxy-header and --header
/external/kernel-headers/original/uapi/linux/
Dif_pppolac.h29 __u16 tunnel, session; member
/external/iptables/tests/
Doptions-most.rules12 …ol ipsec --strict --reqid 1 --spi 0x1 --proto esp --mode tunnel --tunnel-dst fe80::/64 --tunnel-sr…
35 …ol ipsec --strict --reqid 1 --spi 0x1 --proto esp --mode tunnel --tunnel-dst fe80::/64 --tunnel-sr…
/external/ipsec-tools/src/racoon/
DTODO121 - End-to-GW tunnel long lived security associations
125 - Client End-to-End through client-to-GW tunnel SA, initiate from
126 client for tunnel, then initiation both ways for end-to-end
/external/libvncserver/
DTODO27 IO function ptr exists; now explain how to tunnel and implement a
/external/iproute2/man/man8/
DMakefile12 ip-netns.8 ip-ntable.8 ip-rule.8 ip-tunnel.8 ip-xfrm.8 \
/external/wpa_supplicant_8/hostapd/
Dhostapd.eap_user15 # is transmitted only within the encrypted tunnel in phase 2. If non-anonymous
45 # EAP-TTLS supports both EAP and non-EAP authentication inside the tunnel.
/external/wpa_supplicant_8/src/radius/
Dradius.c1441 struct radius_tunnel_attrs tunnel[RADIUS_TUNNEL_TAGS], *tun; in radius_msg_get_vlanid() local
1449 os_memset(&tunnel, 0, sizeof(tunnel)); in radius_msg_get_vlanid()
1463 tun = &tunnel[0]; in radius_msg_get_vlanid()
1465 tun = &tunnel[data[0]]; in radius_msg_get_vlanid()
1512 tun = &tunnel[i]; in radius_msg_get_vlanid()
/external/libvncserver/webclients/java-applet/ssl/
DREADME23 This SSL applet should work with any VNC viewer that has an SSL tunnel in
24 front of it. It has been tested on x11vnc and using the stunnel tunnel
62 SSL tunnel. stunnel(8) must be installed and available in PATH.
325 *MODIFIES* the VNC protocol when active (it is not a pure tunnel).
/external/wpa_supplicant_8/wpa_supplicant/
Deap_testing.txt134 client authentication followed by TNC inside the tunnel
361 - uses tunneled EAP-Success, expects reply in tunnel or TLS ACK, sends MPPE
367 - uses tunneled EAP-Success, expects reply in tunnel or TLS ACK, sends MPPE
389 - uses tunneled EAP-Success, expects reply in tunnel or TLS ACK, sends MPPE

12