/frameworks/native/cmds/ip-up-vpn/ |
Android.mk | 20 LOCAL_SRC_FILES := ip-up-vpn.c 22 LOCAL_MODULE := ip-up-vpn
|
/external/chromium/chrome/browser/chromeos/ |
network_login_observer.cc | 63 const VirtualNetwork* vpn = *it; local 64 network_failures_[vpn->service_path()] = vpn->failed(); 110 VirtualNetwork* vpn = *it; local 111 if (vpn->failed()) { 113 network_failures_.find(vpn->service_path()); 118 if (vpn->error() == ERROR_BAD_PASSPHRASE || vpn->added()) { 119 view = new NetworkConfigView(vpn);
|
/external/chromium/chrome/browser/chromeos/options/ |
vpn_config_view.cc | 75 VPNConfigView::VPNConfigView(NetworkConfigView* parent, VirtualNetwork* vpn) 76 : ChildNetworkConfigView(parent, vpn) { 77 Init(vpn); 116 VirtualNetwork* vpn = cros->FindVirtualNetworkByPath(service_path_); local 117 if (vpn && vpn->failed()) { 118 if (vpn->error() == ERROR_BAD_PASSPHRASE) { 122 error_msg = vpn->GetErrorString(); 202 VirtualNetwork* vpn = cros->FindVirtualNetworkByPath(service_path_); local 203 if (!vpn) { [all...] |
vpn_config_view.h | 28 // A dialog box to allow configuration of VPN connection. 34 VPNConfigView(NetworkConfigView* parent, VirtualNetwork* vpn); 81 void Init(VirtualNetwork* vpn);
|
/external/chromium_org/ash/system/chromeos/network/ |
tray_vpn.cc | 47 // Do not show VPN line in uber tray bubble if VPN is not configured. 50 const NetworkState* vpn = local 51 handler->FirstNetworkByType(NetworkTypePattern::VPN()); 52 return vpn != NULL; 80 const NetworkState* vpn = local 81 handler->FirstNetworkByType(NetworkTypePattern::VPN()); 82 if (!vpn || (vpn->connection_state() == shill::kStateIdle)) { 92 *animating = vpn->IsConnectingState() [all...] |
/external/chromium_org/chromeos/network/onc/ |
onc_normalizer.cc | 126 RemoveEntryUnless(ipsec, ::onc::vpn::kClientCertType, auth_type == kCert); 129 RemoveEntryUnless(ipsec, ::onc::vpn::kSaveCredentials, auth_type == kPSK); 132 ipsec->GetStringWithoutPathExpansion(::onc::vpn::kClientCertType, 135 ::onc::vpn::kClientCertPattern, 138 ::onc::vpn::kClientCertRef, 178 using namespace ::onc::vpn; 199 void Normalizer::NormalizeVPN(base::DictionaryValue* vpn) { 200 using namespace ::onc::vpn; 203 vpn->GetStringWithoutPathExpansion(::onc::vpn::kType, &type) [all...] |
onc_signature.cc | 76 { ::onc::vpn::kClientCertPattern, &kCertificatePatternSignature}, 77 { ::onc::vpn::kClientCertRef, &kStringSignature}, 78 { ::onc::vpn::kClientCertType, &kStringSignature}, 82 { ::onc::vpn::kSaveCredentials, &kBoolSignature}, 94 { ::onc::vpn::kPassword, &kStringSignature}, 95 { ::onc::vpn::kSaveCredentials, &kBoolSignature}, 96 { ::onc::vpn::kUsername, &kStringSignature}, 105 { ::onc::vpn::kClientCertPattern, &kCertificatePatternSignature}, 106 { ::onc::vpn::kClientCertRef, &kStringSignature}, 107 { ::onc::vpn::kClientCertType, &kStringSignature} [all...] |
onc_normalizer.h | 46 void NormalizeVPN(base::DictionaryValue* vpn);
|
onc_translation_tables.cc | 48 { ::onc::vpn::kSaveCredentials, shill::kSaveCredentialsProperty}, 53 { ::onc::vpn::kPassword, shill::kL2tpIpsecPasswordProperty}, 57 // { ::onc::vpn::kSaveCredentials, &kBoolSignature }, 58 { ::onc::vpn::kUsername, shill::kL2tpIpsecUserProperty}, {NULL}}; 69 { ::onc::vpn::kPassword, shill::kOpenVPNPasswordProperty}, 78 { ::onc::vpn::kSaveCredentials, shill::kSaveCredentialsProperty}, 86 { ::onc::vpn::kUsername, shill::kOpenVPNUserProperty}, 96 { ::onc::vpn::kAutoConnect, shill::kAutoConnectProperty}, 97 { ::onc::vpn::kHost, shill::kProviderHostProperty}, 99 // { ::onc::vpn::kType, shill::kProviderTypeProperty } [all...] |
onc_validator.cc | 566 using namespace ::onc::vpn; 570 if (FieldExistsAndHasNoValidValue(*result, ::onc::vpn::kType, kValidTypes)) 573 bool all_required_exist = RequireField(*result, ::onc::vpn::kType); 575 result->GetStringWithoutPathExpansion(::onc::vpn::kType, &type); 597 *result, ::onc::vpn::kClientCertType, kValidCertTypes) || 616 all_required_exist &= RequireField(*result, ::onc::vpn::kClientCertType); 636 result->GetStringWithoutPathExpansion(::onc::vpn::kClientCertType, 643 all_required_exist &= RequireField(*result, ::onc::vpn::kClientCertPattern); 645 all_required_exist &= RequireField(*result, ::onc::vpn::kClientCertRef); 664 *result, ::onc::vpn::kClientCertType, kValidCertTypes) | [all...] |
onc_translator_shill_to_onc.cc | 166 if (onc_field_name == ::onc::vpn::kSaveCredentials || 187 // Shill wants all Provider/VPN fields to be strings. Translates these 212 shill::kProviderTypeProperty, kVPNTypeTable, ::onc::vpn::kType); 216 if (onc_object_->GetStringWithoutPathExpansion(::onc::vpn::kType, 218 if (vpn_type == ::onc::vpn::kTypeL2TP_IPsec) { 219 TranslateAndAddNestedObject(::onc::vpn::kIPsec); 220 TranslateAndAddNestedObject(::onc::vpn::kL2TP); 273 // Since Name is a read only field in Shill unless it's a VPN, it is copied 274 // here, but not when going the other direction (if it's not a VPN).
|
onc_translator_onc_to_shill.cc | 134 if (it.key() == ::onc::vpn::kSaveCredentials || 139 // Shill wants all Provider/VPN fields to be strings. 148 onc_object_->GetStringWithoutPathExpansion(::onc::vpn::kType, &type); 202 // Shill doesn't allow setting the name for non-VPN networks.
|
/external/chromium_org/chrome/browser/chromeos/options/ |
vpn_config_view.cc | 84 return onc::vpn::kIPsec; 86 return onc::vpn::kOpenVPN; 380 const NetworkState* vpn = NetworkHandler::Get()->network_state_handler()-> local 382 if (!vpn) { 489 const NetworkState* vpn = NULL; local 491 vpn = NetworkHandler::Get()->network_state_handler()-> 493 DCHECK(vpn && vpn->type() == shill::kTypeVPN); 517 title_ = vpn ? IDS_OPTIONS_SETTINGS_JOIN_VPN : IDS_OPTIONS_SETTINGS_ADD_VPN; 689 if (vpn) { 702 const NetworkState* vpn = NetworkHandler::Get()->network_state_handler()-> local 988 const NetworkState* vpn = NetworkHandler::Get()->network_state_handler()-> local [all...] |
vpn_config_view.h | 41 // A dialog box to allow configuration of VPN connection. 82 void ParseUIProperties(const NetworkState* vpn); 128 // Parses a VPN UI |property| from the given |network|. |key| is the property 129 // name within the type-specific VPN subdictionary named |dict_key|. 181 // Cached VPN properties, only set when configuring an existing network.
|
/build/target/product/ |
core_minimal.mk | 42 ip-up-vpn \
|
/external/chromium_org/chrome/browser/resources/options/chromeos/ |
internet_detail.css | 48 #vpn-tab td { 52 #vpn-tab .option-value:not(input) {
|
/external/chromium_org/chromeos/network/ |
client_cert_resolver.cc | 209 const base::DictionaryValue* vpn = NULL; local 210 network_config.GetDictionaryWithoutPathExpansion(network_config::kVPN, &vpn); 211 if (vpn) { 213 vpn->GetDictionaryWithoutPathExpansion(vpn::kOpenVPN, &openvpn); 218 vpn->GetDictionaryWithoutPathExpansion(vpn::kIPsec, &ipsec);
|
network_ui_data.cc | 182 if (ipsec.GetStringWithoutPathExpansion(::onc::vpn::kClientCertType, 191 if (openvpn.GetStringWithoutPathExpansion(::onc::vpn::kClientCertType,
|
/external/chromium/chrome/browser/chromeos/status/ |
network_menu.cc | 166 VirtualNetwork* vpn = cros->FindVirtualNetworkByPath(service_path); local 167 if (vpn) { 169 if (vpn->connecting_or_connected()) { 176 if (vpn->NeedMoreInfoToConnect()) { 177 ShowNetworkConfigView(new NetworkConfigView(vpn)); 180 cros->ConnectToVirtualNetwork(vpn); 187 LOG(WARNING) << "VPN does not exist to connect to: " << service_path; 659 // VPN only applies if there's a connected underlying network. 673 const VirtualNetwork* vpn = virtual_networks[i]; local 674 if (vpn->connecting()) [all...] |
/external/chromium/chrome/browser/ui/webui/options/chromeos/ |
internet_options_handler.h | 99 void PopulateVPNDetails(const chromeos::VirtualNetwork* vpn,
|
/external/chromium_org/components/onc/ |
onc_constants.cc | 47 const char kVPN[] = "VPN"; 55 const char kVPN[] = "VPN"; 212 namespace vpn { namespace in namespace:onc 226 } // namespace vpn
|
/frameworks/base/services/java/com/android/server/net/ |
LockdownVpnTracker.java | 46 import com.android.server.connectivity.Vpn; 52 * connected and kicks off VPN connection, managing any required {@code netd} 58 /** Number of VPN attempts before waiting for user intervention. */ 63 private static final String ACTION_VPN_SETTINGS = "android.net.vpn.SETTINGS"; 64 private static final String EXTRA_PICK_LOCKDOWN = "android.net.vpn.PICK_LOCKDOWN"; 69 private final Vpn mVpn; 88 ConnectivityService connService, Vpn vpn, VpnProfile profile) { 92 mVpn = Preconditions.checkNotNull(vpn); 112 * Watch for state changes to both active egress network, kicking off a VPN [all...] |
/external/chromium_org/chrome/browser/resources/options/ |
browser_options.css | 276 @-webkit-keyframes vpn-connecting-animation { 289 .network-vpn.network-connecting { 290 -webkit-animation: vpn-connecting-animation 500ms alternate infinite;
|
/external/chromium/chrome/browser/ |
browser_about_handler.cc | 448 const chromeos::VirtualNetwork* vpn = local 450 str += WrapWithTH(vpn->server_hostname()); 451 str += WrapWithTH(vpn->GetProviderTypeString()); 452 str += WrapWithTD(std::string(vpn->psk_passphrase().length(), '*')); 453 str += WrapWithTH(vpn->username()); 454 str += WrapWithTD(std::string(vpn->user_passphrase().length(), '*')); [all...] |
/external/chromium/chrome/browser/chromeos/cros/ |
network_library.cc | 215 const char* kTypeVPN = "vpn"; 272 // Flimflam VPN provider types. 3617 VirtualNetwork* vpn = new VirtualNetwork(service_path); local [all...] |