/frameworks/native/cmds/ip-up-vpn/ |
Android.mk | 20 LOCAL_SRC_FILES := ip-up-vpn.c 22 LOCAL_MODULE := ip-up-vpn
|
/external/chromium_org/ash/system/chromeos/network/ |
tray_vpn.cc | 44 // Do not show VPN line in uber tray bubble if VPN is not configured. 47 const NetworkState* vpn = local 48 handler->FirstNetworkByType(NetworkTypePattern::VPN()); 49 return vpn != NULL; 77 const NetworkState* vpn = local 78 handler->FirstNetworkByType(NetworkTypePattern::VPN()); 79 if (!vpn || (vpn->connection_state() == shill::kStateIdle)) { 89 *animating = vpn->IsConnectingState() [all...] |
network_icon.cc | 82 // Updates the VPN badge. Returns true if changed. 94 // Defines color theme and VPN badging 106 // Cached vpn badge for the network when the icon was last generated. 513 } else if (network->Matches(NetworkTypePattern::VPN())) { 658 const NetworkState* vpn = NetworkHandler::Get()->network_state_handler()-> local 659 ConnectedNetworkByType(NetworkTypePattern::VPN()); 660 if (vpn && vpn_badge_ == NULL) { 663 } else if (!vpn && vpn_badge_ != NULL) { 889 state_handler->ConnectingNetworkByType(NetworkTypePattern::VPN()); [all...] |
/external/chromium_org/chromeos/network/onc/ |
onc_normalizer.cc | 126 RemoveEntryUnless(ipsec, ::onc::vpn::kClientCertType, auth_type == kCert); 129 RemoveEntryUnless(ipsec, ::onc::vpn::kSaveCredentials, auth_type == kPSK); 132 ipsec->GetStringWithoutPathExpansion(::onc::vpn::kClientCertType, 135 ::onc::vpn::kClientCertPattern, 138 ::onc::vpn::kClientCertRef, 178 using namespace ::onc::vpn; 199 void Normalizer::NormalizeVPN(base::DictionaryValue* vpn) { 200 using namespace ::onc::vpn; 203 vpn->GetStringWithoutPathExpansion(::onc::vpn::kType, &type) [all...] |
onc_signature.cc | 76 { ::onc::vpn::kClientCertPattern, &kCertificatePatternSignature}, 77 { ::onc::vpn::kClientCertRef, &kStringSignature}, 78 { ::onc::vpn::kClientCertType, &kStringSignature}, 82 { ::onc::vpn::kSaveCredentials, &kBoolSignature}, 93 { ::onc::vpn::kPassword, &kStringSignature}, 94 { ::onc::vpn::kUsername, &kStringSignature}, 99 { ::onc::vpn::kPassword, &kStringSignature}, 100 { ::onc::vpn::kSaveCredentials, &kBoolSignature}, 101 { ::onc::vpn::kUsername, &kStringSignature}, 110 { ::onc::vpn::kClientCertPattern, &kCertificatePatternSignature} [all...] |
onc_translation_tables.cc | 46 { ::onc::vpn::kSaveCredentials, shill::kSaveCredentialsProperty}, 51 { ::onc::vpn::kPassword, shill::kL2tpIpsecXauthPasswordProperty}, 52 { ::onc::vpn::kUsername, shill::kL2tpIpsecXauthUserProperty}, 56 { ::onc::vpn::kPassword, shill::kL2tpIpsecPasswordProperty}, 60 // { ::onc::vpn::kSaveCredentials, &kBoolSignature }, 61 { ::onc::vpn::kUsername, shill::kL2tpIpsecUserProperty}, {NULL}}; 74 { ::onc::vpn::kPassword, shill::kOpenVPNPasswordProperty}, 83 { ::onc::vpn::kSaveCredentials, shill::kSaveCredentialsProperty}, 91 { ::onc::vpn::kUsername, shill::kOpenVPNUserProperty}, 101 { ::onc::vpn::kAutoConnect, shill::kAutoConnectProperty} [all...] |
onc_normalizer.h | 46 void NormalizeVPN(base::DictionaryValue* vpn);
|
onc_validator.cc | 570 using namespace ::onc::vpn; 574 if (FieldExistsAndHasNoValidValue(*result, ::onc::vpn::kType, kValidTypes)) 577 bool all_required_exist = RequireField(*result, ::onc::vpn::kType); 579 result->GetStringWithoutPathExpansion(::onc::vpn::kType, &type); 601 *result, ::onc::vpn::kClientCertType, kValidCertTypes) || 620 all_required_exist &= RequireField(*result, ::onc::vpn::kClientCertType); 640 result->GetStringWithoutPathExpansion(::onc::vpn::kClientCertType, 647 all_required_exist &= RequireField(*result, ::onc::vpn::kClientCertPattern); 649 all_required_exist &= RequireField(*result, ::onc::vpn::kClientCertRef); 668 *result, ::onc::vpn::kClientCertType, kValidCertTypes) | [all...] |
onc_translator_shill_to_onc.cc | 173 if (onc_field_name == ::onc::vpn::kSaveCredentials || 194 // Shill wants all Provider/VPN fields to be strings. Translates these 225 shill::kProviderTypeProperty, kVPNTypeTable, ::onc::vpn::kType); 229 if (onc_object_->GetStringWithoutPathExpansion(::onc::vpn::kType, 231 if (vpn_type == ::onc::vpn::kTypeL2TP_IPsec) { 232 TranslateAndAddNestedObject(::onc::vpn::kIPsec); 233 TranslateAndAddNestedObject(::onc::vpn::kL2TP); 313 // Since Name is a read only field in Shill unless it's a VPN, it is copied 314 // here, but not when going the other direction (if it's not a VPN).
|
onc_translator_onc_to_shill.cc | 134 if (it.key() == ::onc::vpn::kSaveCredentials || 139 // Shill wants all Provider/VPN fields to be strings. 148 onc_object_->GetStringWithoutPathExpansion(::onc::vpn::kType, &type); 202 // Shill doesn't allow setting the name for non-VPN networks.
|
/external/chromium_org/chrome/browser/chromeos/options/ |
vpn_config_view.cc | 85 return onc::vpn::kIPsec; 87 return onc::vpn::kOpenVPN; 383 const NetworkState* vpn = NetworkHandler::Get()->network_state_handler()-> local 385 if (!vpn) { 490 const NetworkState* vpn = NULL; local 492 vpn = NetworkHandler::Get()->network_state_handler()-> 494 DCHECK(vpn && vpn->type() == shill::kTypeVPN); 518 title_ = vpn ? IDS_OPTIONS_SETTINGS_JOIN_VPN : IDS_OPTIONS_SETTINGS_ADD_VPN; 690 if (vpn) { 703 const NetworkState* vpn = NetworkHandler::Get()->network_state_handler()-> local 995 const NetworkState* vpn = NetworkHandler::Get()->network_state_handler()-> local [all...] |
vpn_config_view.h | 41 // A dialog box to allow configuration of VPN connection. 82 void ParseUIProperties(const NetworkState* vpn); 128 // Parses a VPN UI |property| from the given |network|. |key| is the property 129 // name within the type-specific VPN subdictionary named |dict_key|. 181 // Cached VPN properties, only set when configuring an existing network.
|
/external/chromium_org/chrome/browser/resources/options/chromeos/ |
internet_detail.css | 48 #vpn-tab td { 52 #vpn-tab .option-value:not(input) {
|
/external/chromium_org/chromeos/network/ |
client_cert_resolver.cc | 212 const base::DictionaryValue* vpn = NULL; local 213 network_config.GetDictionaryWithoutPathExpansion(network_config::kVPN, &vpn); 214 if (vpn) { 216 vpn->GetDictionaryWithoutPathExpansion(vpn::kOpenVPN, &openvpn); 221 vpn->GetDictionaryWithoutPathExpansion(vpn::kIPsec, &ipsec);
|
network_ui_data.cc | 189 if (ipsec.GetStringWithoutPathExpansion(::onc::vpn::kClientCertType, 198 if (openvpn.GetStringWithoutPathExpansion(::onc::vpn::kClientCertType,
|
/build/target/product/ |
core_minimal.mk | 49 ip-up-vpn \
|
core_tiny.mk | 53 ip-up-vpn \
|
/external/chromium_org/components/onc/ |
onc_constants.cc | 50 const char kVPN[] = "VPN"; 71 const char kVPN[] = "VPN"; 233 namespace vpn { namespace in namespace:onc 247 } // namespace vpn
|
onc_constants.h | 251 namespace vpn { namespace in namespace:onc 265 } // namespace vpn
|
/frameworks/base/services/core/java/com/android/server/net/ |
LockdownVpnTracker.java | 48 import com.android.server.connectivity.Vpn; 54 * connected and kicks off VPN connection, managing any required {@code netd} 60 /** Number of VPN attempts before waiting for user intervention. */ 65 private static final String ACTION_VPN_SETTINGS = "android.net.vpn.SETTINGS"; 66 private static final String EXTRA_PICK_LOCKDOWN = "android.net.vpn.PICK_LOCKDOWN"; 73 private final Vpn mVpn; 92 ConnectivityService connService, Vpn vpn, VpnProfile profile) { 96 mVpn = Preconditions.checkNotNull(vpn); 116 * Watch for state changes to both active egress network, kicking off a VPN [all...] |
/external/chromium_org/chrome/browser/resources/options/ |
browser_options.css | 306 @-webkit-keyframes vpn-connecting-animation { 319 .network-vpn.network-connecting { 320 -webkit-animation: vpn-connecting-animation 500ms alternate infinite;
|
/frameworks/base/packages/SystemUI/src/com/android/systemui/statusbar/ |
SignalClusterView.java | 97 mVpn = (ImageView) findViewById(R.id.vpn); 211 if (DEBUG) Log.d(TAG, String.format("vpn: %s", mVpnVisible ? "VISIBLE" : "GONE"));
|
/system/extras/tests/fstest/ |
perm_checker.conf | 63 /dev/ppp 660 660 radio radio vpn vpn
|
/external/chromium_org/third_party/libjingle/source/talk/base/ |
network_unittest.cc | 567 Network vpn("bridge_test", "VPN Adapter", IPAddress(0x12345600U), 24, 569 EXPECT_EQ(ADAPTER_TYPE_VPN, vpn.type());
|
/external/chromium_org/third_party/webrtc/base/ |
network_unittest.cc | 550 Network vpn("bridge_test", "VPN Adapter", IPAddress(0x12345600U), 24, 552 EXPECT_EQ(ADAPTER_TYPE_VPN, vpn.type());
|