/prebuilts/sdk/4/ |
framework.aidl | 33 interface android.net.vpn.IVpnService;
|
/prebuilts/sdk/5/ |
framework.aidl | 36 interface android.net.vpn.IVpnService;
|
/external/chromium/net/base/ |
ssl_false_start_blacklist.txt | 174 apo-vpn-02.apotex.com 229 aus-vpn.amd.com [all...] |
/frameworks/base/docs/html/about/versions/ |
android-1.6-highlights.jd | 93 <h3 id="VPN">VPN, 802.1x</h3> 95 <p>A new Virtual Private Network (VPN) control panel in Settings allows users 99 <li>L2TP/IPSEC pre-shared key based VPN</li> 100 <li>L2TP/IPsec certificate based VPN</li> 101 <li>L2TP only VPN</li> 102 <li>PPTP only VPN</li>
|
/external/chromium_org/chromeos/network/onc/ |
onc_validator.cc | 558 using namespace vpn; 562 if (FieldExistsAndHasNoValidValue(*result, vpn::kType, kValidTypes)) 565 bool allRequiredExist = RequireField(*result, vpn::kType); 567 result->GetStringWithoutPathExpansion(vpn::kType, &type); 591 FieldExistsAndHasNoValidValue(*result, vpn::kClientCertType, 601 allRequiredExist &= RequireField(*result, vpn::kClientCertType) & 605 result->GetStringWithoutPathExpansion(vpn::kClientCertType, &cert_type); 611 allRequiredExist &= RequireField(*result, vpn::kClientCertPattern); 613 allRequiredExist &= RequireField(*result, vpn::kClientCertRef); 634 FieldExistsAndHasNoValidValue(*result, vpn::kClientCertType [all...] |
onc_constants.cc | 48 const char kVPN[] = "VPN"; 56 const char kVPN[] = "VPN"; 201 namespace vpn { namespace in namespace:chromeos::onc 215 } // namespace vpn
|
onc_merger.h | 26 // dispensable fields (e.g. in a network with type: "WiFi", the field "VPN" is
|
onc_normalizer.h | 46 void NormalizeVPN(base::DictionaryValue* vpn);
|
onc_translator_onc_to_shill.cc | 116 if (it.key() == vpn::kSaveCredentials || 121 // Shill wants all Provider/VPN fields to be strings. 130 onc_object_->GetStringWithoutPathExpansion(vpn::kType, &type); 176 // Shill doesn't allow setting the name for non-VPN networks.
|
/external/chromium/chrome/browser/chromeos/status/ |
network_menu.cc | 166 VirtualNetwork* vpn = cros->FindVirtualNetworkByPath(service_path); local 167 if (vpn) { 169 if (vpn->connecting_or_connected()) { 176 if (vpn->NeedMoreInfoToConnect()) { 177 ShowNetworkConfigView(new NetworkConfigView(vpn)); 180 cros->ConnectToVirtualNetwork(vpn); 187 LOG(WARNING) << "VPN does not exist to connect to: " << service_path; 659 // VPN only applies if there's a connected underlying network. 673 const VirtualNetwork* vpn = virtual_networks[i]; local 674 if (vpn->connecting()) [all...] |
/external/chromium_org/chrome/browser/chromeos/cros/ |
network_library_impl_base.cc | 23 #include "crypto/nss_util.h" // crypto::GetTPMTokenInfo() for 802.1X and VPN. 605 void NetworkLibraryImplBase::ConnectToVirtualNetwork(VirtualNetwork* vpn) { 606 NetworkConnectStartVPN(vpn); 633 void NetworkLibraryImplBase::NetworkConnectStartVPN(VirtualNetwork* vpn) { 634 // shill needs the TPM PIN for some VPN networks to access client 640 vpn->SetCertificateSlotAndPin(tpm_slot, tpm_pin); 642 NetworkConnectStart(vpn, PROFILE_NONE); 824 VirtualNetwork* vpn) { 826 if (vpn->name() != data.service_name) { 828 << vpn->name() << " != " << data.service_name [all...] |
network_library_impl_stub.cc | 199 vpn1->set_username("VPN User 1"); 206 vpn2->set_username("VPN User 2"); 225 vpn_cert_pattern->set_name("Fake VPN CertPattern"); 246 " \"Type\": \"VPN\"," 248 " \"VPN\": {" 570 VirtualNetwork* vpn = new VirtualNetwork(service_name); local 571 vpn->set_name(service_name); 572 vpn->set_server_hostname(server_hostname); 573 vpn->set_provider_type(provider_type); 574 AddNetwork(vpn); [all...] |
/external/chromium_org/chrome/browser/resources/options/chromeos/ |
internet_detail.css | 48 #vpn-tab td { 52 #vpn-tab .option-value:not(input) {
|
/packages/apps/Settings/src/com/android/settings/vpn2/ |
VpnSettings.java | 69 private static final String EXTRA_PICK_LOCKDOWN = "android.net.vpn.PICK_LOCKDOWN"; 107 inflater.inflate(R.menu.vpn, menu); 114 // Hide lockdown VPN on devices that require IMS authentication 240 mKeyStore.put(Credentials.VPN + profile.key, profile.encode(), KeyStore.UID_SELF, 309 mKeyStore.delete(Credentials.VPN + mSelectedKey); 457 * Dialog to configure always-on VPN. 549 final String[] keys = keyStore.saw(Credentials.VPN); 553 key, keyStore.get(Credentials.VPN + key));
|
/prebuilts/sdk/10/ |
framework.aidl | 42 interface android.net.vpn.IVpnService;
|
/prebuilts/sdk/11/ |
framework.aidl | 42 interface android.net.vpn.IVpnService;
|
/prebuilts/sdk/12/ |
framework.aidl | 42 interface android.net.vpn.IVpnService;
|
/prebuilts/sdk/13/ |
framework.aidl | 42 interface android.net.vpn.IVpnService;
|
/prebuilts/sdk/6/ |
framework.aidl | 37 interface android.net.vpn.IVpnService;
|
/prebuilts/sdk/7/ |
framework.aidl | 37 interface android.net.vpn.IVpnService;
|
/prebuilts/sdk/8/ |
framework.aidl | 39 interface android.net.vpn.IVpnService;
|
/prebuilts/sdk/9/ |
framework.aidl | 43 interface android.net.vpn.IVpnService;
|
/external/chromium_org/chromeos/test/data/network/ |
invalid_settings_with_repairs.json | 206 "toplevel-with-vpn": { 210 "Type": "VPN", 212 "VPN": {
|
/external/openssh/ |
README.tun | 4 OpenSSH contains support for VPN tunneling using the tun(4) network 123 could be wireless networks or administrative VPN tunnels. 127 Protocol (IPSec) for robust and permanent VPN connections and to
|
/external/chromium_org/chromeos/docs/ |
onc_spec.html | 24 Bluetooth/WiFi-Direct, and VPN connections in a single file format, in order 204 Describes Wi-Fi, Ethernet, VPN, and wireless connections. 319 <dt class="field">VPN</dt> 323 <span class="value">VPN</span>, otherwise ignored) 324 <span class="type">VPN</span> 326 VPN settings. 350 and <span class="value">VPN</span>. 560 <h1>VPN networks</h1> 569 For VPN connections, <span class="field">Type</span> must be set 570 to <span class="value">VPN</span> and th [all...] |