/external/chromium_org/chromeos/network/onc/ |
onc_normalizer.cc | 125 RemoveEntryUnless(ipsec, vpn::kClientCertType, auth_type == kCert); 128 RemoveEntryUnless(ipsec, vpn::kSaveCredentials, auth_type == kPSK); 131 ipsec->GetStringWithoutPathExpansion(vpn::kClientCertType, &clientcert_type); 132 RemoveEntryUnless(ipsec, vpn::kClientCertPattern, 134 RemoveEntryUnless(ipsec, vpn::kClientCertRef, 167 using namespace vpn; 187 void Normalizer::NormalizeVPN(base::DictionaryValue* vpn) { 188 using namespace vpn; 191 vpn->GetStringWithoutPathExpansion(vpn::kType, &type) [all...] |
onc_signature.cc | 73 { vpn::kClientCertPattern, &kCertificatePatternSignature }, 74 { vpn::kClientCertRef, &kStringSignature }, 75 { vpn::kClientCertType, &kStringSignature }, 79 { vpn::kSaveCredentials, &kBoolSignature }, 90 { vpn::kPassword, &kStringSignature }, 91 { vpn::kSaveCredentials, &kBoolSignature }, 92 { vpn::kUsername, &kStringSignature }, 102 { vpn::kClientCertPattern, &kCertificatePatternSignature }, 103 { vpn::kClientCertRef, &kStringSignature }, 104 { vpn::kClientCertType, &kStringSignature } [all...] |
onc_normalizer_unittest.cc | 24 data->GetDictionary("ethernet-and-vpn", &original); 25 data->GetDictionary("ethernet-and-vpn-normalized", &expected_normalized);
|
onc_translation_tables.cc | 48 { vpn::kSaveCredentials, flimflam::kSaveCredentialsProperty }, 54 { vpn::kPassword, flimflam::kL2tpIpsecPasswordProperty }, 57 // { vpn::kSaveCredentials, &kBoolSignature }, 58 { vpn::kUsername, flimflam::kL2tpIpsecUserProperty }, 71 { vpn::kPassword, flimflam::kOpenVPNPasswordProperty }, 80 { vpn::kSaveCredentials, flimflam::kSaveCredentialsProperty }, 87 { vpn::kUsername, flimflam::kOpenVPNUserProperty }, 92 { vpn::kAutoConnect, flimflam::kAutoConnectProperty }, 93 { vpn::kHost, flimflam::kProviderHostProperty }, 95 // { vpn::kType, flimflam::kProviderTypeProperty } [all...] |
onc_translator_shill_to_onc.cc | 132 if (onc_field_name == vpn::kSaveCredentials || 153 // Shill wants all Provider/VPN fields to be strings. Translates these 178 vpn::kType); 182 if (onc_object_->GetStringWithoutPathExpansion(vpn::kType, 184 if (vpn_type == vpn::kTypeL2TP_IPsec) { 185 TranslateAndAddNestedObject(vpn::kIPsec); 186 TranslateAndAddNestedObject(vpn::kL2TP); 223 // Since Name is a read only field in Shill unless it's a VPN, it is copied 224 // here, but not when going the other direction (if it's not a VPN).
|
/frameworks/native/cmds/ip-up-vpn/ |
Android.mk | 20 LOCAL_SRC_FILES := ip-up-vpn.c 22 LOCAL_MODULE := ip-up-vpn
|
/external/chromium_org/third_party/openssl/openssl/apps/ |
dh2048.pem | 11 (http://www.skip-vpn.org/spec/numbers.html).
|
dh512.pem | 7 (http://www.skip-vpn.org/spec/numbers.html).
|
dh1024.pem | 8 (http://www.skip-vpn.org/spec/numbers.html).
|
/external/openssl/apps/ |
dh2048.pem | 11 (http://www.skip-vpn.org/spec/numbers.html).
|
dh512.pem | 7 (http://www.skip-vpn.org/spec/numbers.html).
|
dh1024.pem | 8 (http://www.skip-vpn.org/spec/numbers.html).
|
/frameworks/base/services/java/com/android/server/net/ |
LockdownVpnTracker.java | 46 import com.android.server.connectivity.Vpn; 52 * connected and kicks off VPN connection, managing any required {@code netd} 58 /** Number of VPN attempts before waiting for user intervention. */ 63 private static final String ACTION_VPN_SETTINGS = "android.net.vpn.SETTINGS"; 64 private static final String EXTRA_PICK_LOCKDOWN = "android.net.vpn.PICK_LOCKDOWN"; 69 private final Vpn mVpn; 88 ConnectivityService connService, Vpn vpn, VpnProfile profile) { 92 mVpn = Preconditions.checkNotNull(vpn); 112 * Watch for state changes to both active egress network, kicking off a VPN [all...] |
/external/chromium_org/chromeos/test/data/network/ |
shill_openvpn.json | 4 "Type": "vpn", 5 "Name": "my vpn", 8 "Provider.Host": "vpn.my.domain.com",
|
shill_openvpn_with_errors.json | 3 "Type": "vpn", 4 "Name": "my vpn", 8 "Provider.Host": "vpn.my.domain.com",
|
augmented_merge.json | 40 "DevicePolicy": "VPN", 42 "UserPolicy": "VPN", 45 "VPN": {
|
toplevel_openvpn_clientcert_with_cert_pems.onc | 20 "Type": "VPN", 22 "VPN": { 23 "Host": "vpn.acme.org",
|
managed_toplevel1.onc | 4 "Type": "VPN", 11 "VPN": {
|
managed_toplevel1_with_cert_pems.onc | 4 "Type": "VPN", 11 "VPN": {
|
managed_toplevel2.onc | 34 "Type": "VPN", 36 "VPN": { 37 "Host": "vpn.my.domain.com",
|
managed_toplevel2_with_cert_pems.onc | 34 "Type": "VPN", 36 "VPN": { 37 "Host": "vpn.my.domain.com",
|
/external/chromium_org/ash/system/chromeos/network/ |
network_icon.h | 23 // Type of icon which dictates color theme and VPN badging 25 ICON_TYPE_TRAY, // light icons with VPN badges 26 ICON_TYPE_DEFAULT_VIEW, // dark icons with VPN badges 27 ICON_TYPE_LIST, // dark icons without VPN badges 32 // show the VPN badge. This caches badged icons per network per |icon_type|.
|
tray_vpn.cc | 45 // Do not show VPN line in uber tray bubble if VPN is not configured. 48 const NetworkState* vpn = handler->FirstNetworkByType(flimflam::kTypeVPN); local 49 return vpn != NULL; 77 const NetworkState* vpn = handler->FirstNetworkByType( local 79 if (!vpn || (vpn->connection_state() == flimflam::kStateIdle)) { 89 *animating = vpn->IsConnectingState(); 91 vpn, network_icon::ICON_TYPE_DEFAULT_VIEW); 94 vpn, network_icon::ICON_TYPE_DEFAULT_VIEW) [all...] |
/external/chromium/chrome/browser/chromeos/ |
network_login_observer.cc | 63 const VirtualNetwork* vpn = *it; local 64 network_failures_[vpn->service_path()] = vpn->failed(); 110 VirtualNetwork* vpn = *it; local 111 if (vpn->failed()) { 113 network_failures_.find(vpn->service_path()); 118 if (vpn->error() == ERROR_BAD_PASSPHRASE || vpn->added()) { 119 view = new NetworkConfigView(vpn);
|
/frameworks/base/services/java/com/android/server/connectivity/ |
Vpn.java | 92 public class Vpn extends BaseNetworkStateTracker { 93 private static final String TAG = "Vpn"; 96 // TODO: create separate trackers for each unique VPN to support 111 /* list of users using this VPN. */ 118 public Vpn(Context context, VpnCallback callback, INetworkManagementService netService, 133 // Owner's VPN also needs to handle restricted users 182 // TODO: finish migration to unique tracker for each VPN 188 // TODO: finish migration to unique tracker for each VPN 207 * Prepare for a VPN application. This method is designed to solve 216 * Legacy VPN is handled specially since it is not a real package [all...] |