HomeSort by relevance Sort by last modified time
    Searched refs:vpn (Results 1 - 25 of 35) sorted by null

1 2

  /frameworks/native/cmds/ip-up-vpn/
Android.mk 20 LOCAL_SRC_FILES := ip-up-vpn.c
22 LOCAL_MODULE := ip-up-vpn
  /external/chromium/chrome/browser/chromeos/
network_login_observer.cc 63 const VirtualNetwork* vpn = *it; local
64 network_failures_[vpn->service_path()] = vpn->failed();
110 VirtualNetwork* vpn = *it; local
111 if (vpn->failed()) {
113 network_failures_.find(vpn->service_path());
118 if (vpn->error() == ERROR_BAD_PASSPHRASE || vpn->added()) {
119 view = new NetworkConfigView(vpn);
  /external/chromium/chrome/browser/chromeos/options/
vpn_config_view.cc 75 VPNConfigView::VPNConfigView(NetworkConfigView* parent, VirtualNetwork* vpn)
76 : ChildNetworkConfigView(parent, vpn) {
77 Init(vpn);
116 VirtualNetwork* vpn = cros->FindVirtualNetworkByPath(service_path_); local
117 if (vpn && vpn->failed()) {
118 if (vpn->error() == ERROR_BAD_PASSPHRASE) {
122 error_msg = vpn->GetErrorString();
202 VirtualNetwork* vpn = cros->FindVirtualNetworkByPath(service_path_); local
203 if (!vpn) {
    [all...]
vpn_config_view.h 28 // A dialog box to allow configuration of VPN connection.
34 VPNConfigView(NetworkConfigView* parent, VirtualNetwork* vpn);
81 void Init(VirtualNetwork* vpn);
  /external/chromium_org/ash/system/chromeos/network/
tray_vpn.cc 47 // Do not show VPN line in uber tray bubble if VPN is not configured.
50 const NetworkState* vpn = local
51 handler->FirstNetworkByType(NetworkTypePattern::VPN());
52 return vpn != NULL;
80 const NetworkState* vpn = local
81 handler->FirstNetworkByType(NetworkTypePattern::VPN());
82 if (!vpn || (vpn->connection_state() == shill::kStateIdle)) {
92 *animating = vpn->IsConnectingState()
    [all...]
  /external/chromium_org/chromeos/network/onc/
onc_normalizer.cc 126 RemoveEntryUnless(ipsec, ::onc::vpn::kClientCertType, auth_type == kCert);
129 RemoveEntryUnless(ipsec, ::onc::vpn::kSaveCredentials, auth_type == kPSK);
132 ipsec->GetStringWithoutPathExpansion(::onc::vpn::kClientCertType,
135 ::onc::vpn::kClientCertPattern,
138 ::onc::vpn::kClientCertRef,
178 using namespace ::onc::vpn;
199 void Normalizer::NormalizeVPN(base::DictionaryValue* vpn) {
200 using namespace ::onc::vpn;
203 vpn->GetStringWithoutPathExpansion(::onc::vpn::kType, &type)
    [all...]
onc_signature.cc 76 { ::onc::vpn::kClientCertPattern, &kCertificatePatternSignature},
77 { ::onc::vpn::kClientCertRef, &kStringSignature},
78 { ::onc::vpn::kClientCertType, &kStringSignature},
82 { ::onc::vpn::kSaveCredentials, &kBoolSignature},
94 { ::onc::vpn::kPassword, &kStringSignature},
95 { ::onc::vpn::kSaveCredentials, &kBoolSignature},
96 { ::onc::vpn::kUsername, &kStringSignature},
105 { ::onc::vpn::kClientCertPattern, &kCertificatePatternSignature},
106 { ::onc::vpn::kClientCertRef, &kStringSignature},
107 { ::onc::vpn::kClientCertType, &kStringSignature}
    [all...]
onc_normalizer.h 46 void NormalizeVPN(base::DictionaryValue* vpn);
onc_translation_tables.cc 48 { ::onc::vpn::kSaveCredentials, shill::kSaveCredentialsProperty},
53 { ::onc::vpn::kPassword, shill::kL2tpIpsecPasswordProperty},
57 // { ::onc::vpn::kSaveCredentials, &kBoolSignature },
58 { ::onc::vpn::kUsername, shill::kL2tpIpsecUserProperty}, {NULL}};
69 { ::onc::vpn::kPassword, shill::kOpenVPNPasswordProperty},
78 { ::onc::vpn::kSaveCredentials, shill::kSaveCredentialsProperty},
86 { ::onc::vpn::kUsername, shill::kOpenVPNUserProperty},
96 { ::onc::vpn::kAutoConnect, shill::kAutoConnectProperty},
97 { ::onc::vpn::kHost, shill::kProviderHostProperty},
99 // { ::onc::vpn::kType, shill::kProviderTypeProperty }
    [all...]
onc_validator.cc 566 using namespace ::onc::vpn;
570 if (FieldExistsAndHasNoValidValue(*result, ::onc::vpn::kType, kValidTypes))
573 bool all_required_exist = RequireField(*result, ::onc::vpn::kType);
575 result->GetStringWithoutPathExpansion(::onc::vpn::kType, &type);
597 *result, ::onc::vpn::kClientCertType, kValidCertTypes) ||
616 all_required_exist &= RequireField(*result, ::onc::vpn::kClientCertType);
636 result->GetStringWithoutPathExpansion(::onc::vpn::kClientCertType,
643 all_required_exist &= RequireField(*result, ::onc::vpn::kClientCertPattern);
645 all_required_exist &= RequireField(*result, ::onc::vpn::kClientCertRef);
664 *result, ::onc::vpn::kClientCertType, kValidCertTypes) |
    [all...]
onc_translator_shill_to_onc.cc 166 if (onc_field_name == ::onc::vpn::kSaveCredentials ||
187 // Shill wants all Provider/VPN fields to be strings. Translates these
212 shill::kProviderTypeProperty, kVPNTypeTable, ::onc::vpn::kType);
216 if (onc_object_->GetStringWithoutPathExpansion(::onc::vpn::kType,
218 if (vpn_type == ::onc::vpn::kTypeL2TP_IPsec) {
219 TranslateAndAddNestedObject(::onc::vpn::kIPsec);
220 TranslateAndAddNestedObject(::onc::vpn::kL2TP);
273 // Since Name is a read only field in Shill unless it's a VPN, it is copied
274 // here, but not when going the other direction (if it's not a VPN).
onc_translator_onc_to_shill.cc 134 if (it.key() == ::onc::vpn::kSaveCredentials ||
139 // Shill wants all Provider/VPN fields to be strings.
148 onc_object_->GetStringWithoutPathExpansion(::onc::vpn::kType, &type);
202 // Shill doesn't allow setting the name for non-VPN networks.
  /external/chromium_org/chrome/browser/chromeos/options/
vpn_config_view.cc 84 return onc::vpn::kIPsec;
86 return onc::vpn::kOpenVPN;
380 const NetworkState* vpn = NetworkHandler::Get()->network_state_handler()-> local
382 if (!vpn) {
489 const NetworkState* vpn = NULL; local
491 vpn = NetworkHandler::Get()->network_state_handler()->
493 DCHECK(vpn && vpn->type() == shill::kTypeVPN);
517 title_ = vpn ? IDS_OPTIONS_SETTINGS_JOIN_VPN : IDS_OPTIONS_SETTINGS_ADD_VPN;
689 if (vpn) {
702 const NetworkState* vpn = NetworkHandler::Get()->network_state_handler()-> local
988 const NetworkState* vpn = NetworkHandler::Get()->network_state_handler()-> local
    [all...]
vpn_config_view.h 41 // A dialog box to allow configuration of VPN connection.
82 void ParseUIProperties(const NetworkState* vpn);
128 // Parses a VPN UI |property| from the given |network|. |key| is the property
129 // name within the type-specific VPN subdictionary named |dict_key|.
181 // Cached VPN properties, only set when configuring an existing network.
  /build/target/product/
core_minimal.mk 42 ip-up-vpn \
  /external/chromium_org/chrome/browser/resources/options/chromeos/
internet_detail.css 48 #vpn-tab td {
52 #vpn-tab .option-value:not(input) {
  /external/chromium_org/chromeos/network/
client_cert_resolver.cc 209 const base::DictionaryValue* vpn = NULL; local
210 network_config.GetDictionaryWithoutPathExpansion(network_config::kVPN, &vpn);
211 if (vpn) {
213 vpn->GetDictionaryWithoutPathExpansion(vpn::kOpenVPN, &openvpn);
218 vpn->GetDictionaryWithoutPathExpansion(vpn::kIPsec, &ipsec);
network_ui_data.cc 182 if (ipsec.GetStringWithoutPathExpansion(::onc::vpn::kClientCertType,
191 if (openvpn.GetStringWithoutPathExpansion(::onc::vpn::kClientCertType,
  /external/chromium/chrome/browser/chromeos/status/
network_menu.cc 166 VirtualNetwork* vpn = cros->FindVirtualNetworkByPath(service_path); local
167 if (vpn) {
169 if (vpn->connecting_or_connected()) {
176 if (vpn->NeedMoreInfoToConnect()) {
177 ShowNetworkConfigView(new NetworkConfigView(vpn));
180 cros->ConnectToVirtualNetwork(vpn);
187 LOG(WARNING) << "VPN does not exist to connect to: " << service_path;
659 // VPN only applies if there's a connected underlying network.
673 const VirtualNetwork* vpn = virtual_networks[i]; local
674 if (vpn->connecting())
    [all...]
  /external/chromium/chrome/browser/ui/webui/options/chromeos/
internet_options_handler.h 99 void PopulateVPNDetails(const chromeos::VirtualNetwork* vpn,
  /external/chromium_org/components/onc/
onc_constants.cc 47 const char kVPN[] = "VPN";
55 const char kVPN[] = "VPN";
212 namespace vpn { namespace in namespace:onc
226 } // namespace vpn
  /frameworks/base/services/java/com/android/server/net/
LockdownVpnTracker.java 46 import com.android.server.connectivity.Vpn;
52 * connected and kicks off VPN connection, managing any required {@code netd}
58 /** Number of VPN attempts before waiting for user intervention. */
63 private static final String ACTION_VPN_SETTINGS = "android.net.vpn.SETTINGS";
64 private static final String EXTRA_PICK_LOCKDOWN = "android.net.vpn.PICK_LOCKDOWN";
69 private final Vpn mVpn;
88 ConnectivityService connService, Vpn vpn, VpnProfile profile) {
92 mVpn = Preconditions.checkNotNull(vpn);
112 * Watch for state changes to both active egress network, kicking off a VPN
    [all...]
  /external/chromium_org/chrome/browser/resources/options/
browser_options.css 276 @-webkit-keyframes vpn-connecting-animation {
289 .network-vpn.network-connecting {
290 -webkit-animation: vpn-connecting-animation 500ms alternate infinite;
  /external/chromium/chrome/browser/
browser_about_handler.cc 448 const chromeos::VirtualNetwork* vpn = local
450 str += WrapWithTH(vpn->server_hostname());
451 str += WrapWithTH(vpn->GetProviderTypeString());
452 str += WrapWithTD(std::string(vpn->psk_passphrase().length(), '*'));
453 str += WrapWithTH(vpn->username());
454 str += WrapWithTD(std::string(vpn->user_passphrase().length(), '*'));
    [all...]
  /external/chromium/chrome/browser/chromeos/cros/
network_library.cc 215 const char* kTypeVPN = "vpn";
272 // Flimflam VPN provider types.
3617 VirtualNetwork* vpn = new VirtualNetwork(service_path); local
    [all...]

Completed in 409 milliseconds

1 2