/external/kernel-headers/original/linux/ |
H A D | if_pppolac.h | 29 __u16 tunnel, session; member in struct:sockaddr_pppolac::__anon7518
|
/external/qemu/target-i386/ |
H A D | hax-i386.h | 34 struct hax_tunnel *tunnel; member in struct:hax_vcpu_state
|
/external/iproute2/doc/ |
H A D | ip-cref.tex | 119 \item \verb|tunnel| --- tunnel over IP 2343 \section{{\tt ip tunnel} --- tunnel configuration} 2346 \paragraph{Abbreviations:} \verb|tunnel|, \verb|tunl|. 2348 \paragraph{Object:} \verb|tunnel| objects are tunnels, encapsulating 2355 over IP and the \verb|ip tunnel| command can be found in~\cite{IP-TUNNELS}. 2357 \subsection{{\tt ip tunnel add} --- add a new tunnel\\ 2358 {\tt ip tunnel chang [all...] |
/external/chromium/net/http/ |
H A D | http_proxy_client_socket.cc | 34 bool tunnel, 43 auth_(tunnel ? 49 tunnel_(tunnel), 103 // TODO(rch): figure out the right way to set up a tunnel with SPDY. 106 // create an SSL tunnel to the origin server using the CONNECT method 182 // to establish an SSL tunnel through the proxy. We can't read these 183 // bytes when establishing a tunnel because they might be controlled by 26 HttpProxyClientSocket( ClientSocketHandle* transport_socket, const GURL& request_url, const std::string& user_agent, const HostPortPair& endpoint, const HostPortPair& proxy_server, HttpAuthCache* http_auth_cache, HttpAuthHandlerFactory* http_auth_handler_factory, bool tunnel, bool using_spdy, bool is_https_proxy) argument
|
H A D | http_proxy_client_socket_pool.h | 50 bool tunnel); 69 bool tunnel() const { return tunnel_; } function in class:net::HttpProxySocketParams 95 // HttpProxyConnectJob optionally establishes a tunnel through the proxy 146 // Begins the tcp connection and the optional Http proxy tunnel. If the 150 // that the tunnel needs authentication credentials, the socket will be
|
H A D | http_proxy_client_socket_pool_unittest.cc | 121 scoped_refptr<HttpProxySocketParams> GetParams(bool tunnel) { argument 126 GURL(tunnel ? "https://www.google.com/" : "http://www.google.com"), 128 HostPortPair("www.google.com", tunnel ? 443 : 80), 132 tunnel));
|
H A D | http_proxy_client_socket_pool.cc | 39 bool tunnel) 46 http_auth_cache_(tunnel ? http_auth_cache : NULL), 47 http_auth_handler_factory_(tunnel ? http_auth_handler_factory : NULL), 48 tunnel_(tunnel) { 212 if (params_->tunnel()) { 264 if (using_spdy_ && params_->tunnel()) 288 params_->tunnel(), 317 DCHECK(params_->tunnel()); 30 HttpProxySocketParams( const scoped_refptr<TransportSocketParams>& transport_params, const scoped_refptr<SSLSocketParams>& ssl_params, const GURL& request_url, const std::string& user_agent, HostPortPair endpoint, HttpAuthCache* http_auth_cache, HttpAuthHandlerFactory* http_auth_handler_factory, SpdySessionPool* spdy_session_pool, bool tunnel) argument
|
/external/chromium/third_party/libjingle/source/talk/session/tunnel/ |
H A D | tunnelsessionclient.cc | 42 const std::string NS_TUNNEL("http://www.google.com/talk/tunnel"); 45 const std::string CN_TUNNEL("tunnel"); 157 TunnelSession* tunnel = NULL; local 162 tunnel = *it; 166 ASSERT(tunnel != NULL); 173 return tunnel->GetStream(); 186 TunnelSession* tunnel = MakeTunnelSession(session, data->thread, local 188 sessions_.push_back(tunnel); 191 data->stream = tunnel->GetStream();
|
/external/mtpd/ |
H A D | l2tp.c | 196 /* We only handle packets in our tunnel. */ 362 .local = {.tunnel = local_tunnel, .session = local_session}, 363 .remote = {.tunnel = remote_tunnel, .session = remote_session}, 414 uint16_t tunnel = 0; local 421 /* Here is the fun part. We always try to protect our tunnel and session 426 if (get_attribute_u16(ASSIGNED_TUNNEL, &tunnel) && tunnel && 428 remote_tunnel = tunnel; 436 log_print(DEBUG, "Received SCCRP without %s", tunnel ? 437 "valid challenge response" : "assigned tunnel"); [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/radius/ |
H A D | radius.c | 1170 * radius_msg_get_vlanid - Parse RADIUS attributes for VLAN tunnel information 1172 * Returns: VLAN ID for the first tunnel configuration of -1 if none is found 1176 struct radius_tunnel_attrs tunnel[RADIUS_TUNNEL_TAGS], *tun; local 1183 os_memset(&tunnel, 0, sizeof(tunnel)); 1192 tun = &tunnel[0]; 1194 tun = &tunnel[data[0]]; 1225 tun = &tunnel[i];
|
/external/wpa_supplicant_8/hostapd/src/radius/ |
H A D | radius.c | 1333 * radius_msg_get_vlanid - Parse RADIUS attributes for VLAN tunnel information 1335 * Returns: VLAN ID for the first tunnel configuration of -1 if none is found 1339 struct radius_tunnel_attrs tunnel[RADIUS_TUNNEL_TAGS], *tun; local 1346 os_memset(&tunnel, 0, sizeof(tunnel)); 1357 tun = &tunnel[0]; 1359 tun = &tunnel[data[0]]; 1390 tun = &tunnel[i];
|
/external/wpa_supplicant_8/src/radius/ |
H A D | radius.c | 1333 * radius_msg_get_vlanid - Parse RADIUS attributes for VLAN tunnel information 1335 * Returns: VLAN ID for the first tunnel configuration of -1 if none is found 1339 struct radius_tunnel_attrs tunnel[RADIUS_TUNNEL_TAGS], *tun; local 1346 os_memset(&tunnel, 0, sizeof(tunnel)); 1357 tun = &tunnel[0]; 1359 tun = &tunnel[data[0]]; 1390 tun = &tunnel[i];
|
/external/wpa_supplicant_8/wpa_supplicant/src/radius/ |
H A D | radius.c | 1333 * radius_msg_get_vlanid - Parse RADIUS attributes for VLAN tunnel information 1335 * Returns: VLAN ID for the first tunnel configuration of -1 if none is found 1339 struct radius_tunnel_attrs tunnel[RADIUS_TUNNEL_TAGS], *tun; local 1346 os_memset(&tunnel, 0, sizeof(tunnel)); 1357 tun = &tunnel[0]; 1359 tun = &tunnel[data[0]]; 1390 tun = &tunnel[i];
|