/external/kernel-headers/original/uapi/linux/ |
H A D | if_pppolac.h | 29 __u16 tunnel, session; member in struct:sockaddr_pppolac::__anon6885
|
/external/android-clat/ |
H A D | ring.c | 32 int ring_create(struct tun_data *tunnel) { argument 50 struct packet_ring *ring = &tunnel->ring;
|
H A D | clatd.c | 118 * configures the ipv4 and ipv6 addresses on the tunnel interface 119 * tunnel - tun device data 121 void configure_tun_ip(const struct tun_data *tunnel) { argument 142 status = add_address(tunnel->device4, AF_INET, &Global_Clatd_Config.ipv4_local_subnet, 151 logmsg(ANDROID_LOG_INFO, "Using IPv4 address %s on %s", addrstr, tunnel->device4); 153 if((status = if_up(tunnel->device4, Global_Clatd_Config.ipv4mtu)) < 0) { 197 * tunnel - tun device data 200 void open_sockets(struct tun_data *tunnel, uint32_t mark) { argument 215 tunnel->write_fd6 = rawsock; 217 tunnel 229 update_clat_ipv6_address(const struct tun_data *tunnel, const char *interface) argument 284 configure_interface(const char *uplink_interface, const char *plat_prefix, struct tun_data *tunnel, unsigned net_id) argument 374 event_loop(struct tun_data *tunnel) argument 437 struct tun_data tunnel; local [all...] |
/external/iproute2/doc/ |
H A D | ip-cref.tex | 119 \item \verb|tunnel| --- tunnel over IP 2378 \section{{\tt ip tunnel} --- tunnel configuration} 2381 \paragraph{Abbreviations:} \verb|tunnel|, \verb|tunl|. 2383 \paragraph{Object:} \verb|tunnel| objects are tunnels, encapsulating 2390 over IP and the \verb|ip tunnel| command can be found in~\cite{IP-TUNNELS}. 2392 \subsection{{\tt ip tunnel add} --- add a new tunnel\\ 2393 {\tt ip tunnel chang [all...] |
/external/mtpd/ |
H A D | mtpd.h | 42 uint16_t tunnel; member in struct:sockaddr_pppolac::__anon12877
|
H A D | l2tp.c | 197 /* We only handle packets in our tunnel. */ 363 .local = {.tunnel = local_tunnel, .session = local_session}, 364 .remote = {.tunnel = remote_tunnel, .session = remote_session}, 415 uint16_t tunnel = 0; local 422 /* Here is the fun part. We always try to protect our tunnel and session 427 if (get_attribute_u16(ASSIGNED_TUNNEL, &tunnel) && tunnel && 429 remote_tunnel = tunnel; 437 log_print(DEBUG, "Received SCCRP without %s", tunnel ? 438 "valid challenge response" : "assigned tunnel"); [all...] |
/external/iproute2/ip/ |
H A D | ipl2tp.c | 63 int tunnel:1; member in struct:l2tp_parm 235 printf(" Peer tunnel %u\n", 247 printf("Session %u in tunnel %u\n", 249 printf(" Peer session %u, tunnel %u\n", 486 fprintf(stderr, "Usage: ip l2tp add tunnel\n"); 496 fprintf(stderr, " ip l2tp del tunnel tunnel_id ID\n"); 498 fprintf(stderr, " ip l2tp show tunnel [ tunnel_id ID ]\n"); 524 fprintf(stderr, "Unknown tunnel encapsulation.\n"); 608 } else if (strcmp(*argv, "tunnel") == 0) { 609 p->tunnel [all...] |
/external/wpa_supplicant_8/hostapd/src/radius/ |
H A D | radius.c | 1426 * radius_msg_get_vlanid - Parse RADIUS attributes for VLAN tunnel information 1428 * Returns: VLAN ID for the first tunnel configuration or 0 if none is found 1432 struct radius_tunnel_attrs tunnel[RADIUS_TUNNEL_TAGS], *tun; local 1439 os_memset(&tunnel, 0, sizeof(tunnel)); 1450 tun = &tunnel[0]; 1452 tun = &tunnel[data[0]]; 1483 tun = &tunnel[i];
|
/external/wpa_supplicant_8/src/radius/ |
H A D | radius.c | 1426 * radius_msg_get_vlanid - Parse RADIUS attributes for VLAN tunnel information 1428 * Returns: VLAN ID for the first tunnel configuration or 0 if none is found 1432 struct radius_tunnel_attrs tunnel[RADIUS_TUNNEL_TAGS], *tun; local 1439 os_memset(&tunnel, 0, sizeof(tunnel)); 1450 tun = &tunnel[0]; 1452 tun = &tunnel[data[0]]; 1483 tun = &tunnel[i];
|
/external/wpa_supplicant_8/wpa_supplicant/src/radius/ |
H A D | radius.c | 1426 * radius_msg_get_vlanid - Parse RADIUS attributes for VLAN tunnel information 1428 * Returns: VLAN ID for the first tunnel configuration or 0 if none is found 1432 struct radius_tunnel_attrs tunnel[RADIUS_TUNNEL_TAGS], *tun; local 1439 os_memset(&tunnel, 0, sizeof(tunnel)); 1450 tun = &tunnel[0]; 1452 tun = &tunnel[data[0]]; 1483 tun = &tunnel[i];
|