HomeSort by relevance Sort by last modified time
    Searched full:vpn (Results 126 - 150 of 647) sorted by null

1 2 3 4 56 7 8 91011>>

  /prebuilts/sdk/4/
framework.aidl 33 interface android.net.vpn.IVpnService;
  /prebuilts/sdk/5/
framework.aidl 36 interface android.net.vpn.IVpnService;
  /external/chromium/net/base/
ssl_false_start_blacklist.txt 174 apo-vpn-02.apotex.com
229 aus-vpn.amd.com
    [all...]
  /frameworks/base/docs/html/about/versions/
android-1.6-highlights.jd 93 <h3 id="VPN">VPN, 802.1x</h3>
95 <p>A new Virtual Private Network (VPN) control panel in Settings allows users
99 <li>L2TP/IPSEC pre-shared key based VPN</li>
100 <li>L2TP/IPsec certificate based VPN</li>
101 <li>L2TP only VPN</li>
102 <li>PPTP only VPN</li>
  /external/chromium_org/chromeos/network/onc/
onc_validator.cc 558 using namespace vpn;
562 if (FieldExistsAndHasNoValidValue(*result, vpn::kType, kValidTypes))
565 bool allRequiredExist = RequireField(*result, vpn::kType);
567 result->GetStringWithoutPathExpansion(vpn::kType, &type);
591 FieldExistsAndHasNoValidValue(*result, vpn::kClientCertType,
601 allRequiredExist &= RequireField(*result, vpn::kClientCertType) &
605 result->GetStringWithoutPathExpansion(vpn::kClientCertType, &cert_type);
611 allRequiredExist &= RequireField(*result, vpn::kClientCertPattern);
613 allRequiredExist &= RequireField(*result, vpn::kClientCertRef);
634 FieldExistsAndHasNoValidValue(*result, vpn::kClientCertType
    [all...]
onc_constants.cc 48 const char kVPN[] = "VPN";
56 const char kVPN[] = "VPN";
201 namespace vpn { namespace in namespace:chromeos::onc
215 } // namespace vpn
onc_merger.h 26 // dispensable fields (e.g. in a network with type: "WiFi", the field "VPN" is
onc_normalizer.h 46 void NormalizeVPN(base::DictionaryValue* vpn);
onc_translator_onc_to_shill.cc 116 if (it.key() == vpn::kSaveCredentials ||
121 // Shill wants all Provider/VPN fields to be strings.
130 onc_object_->GetStringWithoutPathExpansion(vpn::kType, &type);
176 // Shill doesn't allow setting the name for non-VPN networks.
  /external/chromium/chrome/browser/chromeos/status/
network_menu.cc 166 VirtualNetwork* vpn = cros->FindVirtualNetworkByPath(service_path); local
167 if (vpn) {
169 if (vpn->connecting_or_connected()) {
176 if (vpn->NeedMoreInfoToConnect()) {
177 ShowNetworkConfigView(new NetworkConfigView(vpn));
180 cros->ConnectToVirtualNetwork(vpn);
187 LOG(WARNING) << "VPN does not exist to connect to: " << service_path;
659 // VPN only applies if there's a connected underlying network.
673 const VirtualNetwork* vpn = virtual_networks[i]; local
674 if (vpn->connecting())
    [all...]
  /external/chromium_org/chrome/browser/chromeos/cros/
network_library_impl_base.cc 23 #include "crypto/nss_util.h" // crypto::GetTPMTokenInfo() for 802.1X and VPN.
605 void NetworkLibraryImplBase::ConnectToVirtualNetwork(VirtualNetwork* vpn) {
606 NetworkConnectStartVPN(vpn);
633 void NetworkLibraryImplBase::NetworkConnectStartVPN(VirtualNetwork* vpn) {
634 // shill needs the TPM PIN for some VPN networks to access client
640 vpn->SetCertificateSlotAndPin(tpm_slot, tpm_pin);
642 NetworkConnectStart(vpn, PROFILE_NONE);
824 VirtualNetwork* vpn) {
826 if (vpn->name() != data.service_name) {
828 << vpn->name() << " != " << data.service_name
    [all...]
network_library_impl_stub.cc 199 vpn1->set_username("VPN User 1");
206 vpn2->set_username("VPN User 2");
225 vpn_cert_pattern->set_name("Fake VPN CertPattern");
246 " \"Type\": \"VPN\","
248 " \"VPN\": {"
570 VirtualNetwork* vpn = new VirtualNetwork(service_name); local
571 vpn->set_name(service_name);
572 vpn->set_server_hostname(server_hostname);
573 vpn->set_provider_type(provider_type);
574 AddNetwork(vpn);
    [all...]
  /external/chromium_org/chrome/browser/resources/options/chromeos/
internet_detail.css 48 #vpn-tab td {
52 #vpn-tab .option-value:not(input) {
  /packages/apps/Settings/src/com/android/settings/vpn2/
VpnSettings.java 69 private static final String EXTRA_PICK_LOCKDOWN = "android.net.vpn.PICK_LOCKDOWN";
107 inflater.inflate(R.menu.vpn, menu);
114 // Hide lockdown VPN on devices that require IMS authentication
240 mKeyStore.put(Credentials.VPN + profile.key, profile.encode(), KeyStore.UID_SELF,
309 mKeyStore.delete(Credentials.VPN + mSelectedKey);
457 * Dialog to configure always-on VPN.
549 final String[] keys = keyStore.saw(Credentials.VPN);
553 key, keyStore.get(Credentials.VPN + key));
  /prebuilts/sdk/10/
framework.aidl 42 interface android.net.vpn.IVpnService;
  /prebuilts/sdk/11/
framework.aidl 42 interface android.net.vpn.IVpnService;
  /prebuilts/sdk/12/
framework.aidl 42 interface android.net.vpn.IVpnService;
  /prebuilts/sdk/13/
framework.aidl 42 interface android.net.vpn.IVpnService;
  /prebuilts/sdk/6/
framework.aidl 37 interface android.net.vpn.IVpnService;
  /prebuilts/sdk/7/
framework.aidl 37 interface android.net.vpn.IVpnService;
  /prebuilts/sdk/8/
framework.aidl 39 interface android.net.vpn.IVpnService;
  /prebuilts/sdk/9/
framework.aidl 43 interface android.net.vpn.IVpnService;
  /external/chromium_org/chromeos/test/data/network/
invalid_settings_with_repairs.json 206 "toplevel-with-vpn": {
210 "Type": "VPN",
212 "VPN": {
  /external/openssh/
README.tun 4 OpenSSH contains support for VPN tunneling using the tun(4) network
123 could be wireless networks or administrative VPN tunnels.
127 Protocol (IPSec) for robust and permanent VPN connections and to
  /external/chromium_org/chromeos/docs/
onc_spec.html 24 Bluetooth/WiFi-Direct, and VPN connections in a single file format, in order
204 Describes Wi-Fi, Ethernet, VPN, and wireless connections.
319 <dt class="field">VPN</dt>
323 <span class="value">VPN</span>, otherwise ignored)
324 <span class="type">VPN</span>
326 VPN settings.
350 and <span class="value">VPN</span>.
560 <h1>VPN networks</h1>
569 For VPN connections, <span class="field">Type</span> must be set
570 to <span class="value">VPN</span> and th
    [all...]

Completed in 1038 milliseconds

1 2 3 4 56 7 8 91011>>