/frameworks/native/cmds/ip-up-vpn/ |
Android.mk | 20 LOCAL_SRC_FILES := ip-up-vpn.c 22 LOCAL_MODULE := ip-up-vpn
|
/external/chromium_org/ash/system/chromeos/network/ |
tray_vpn.cc | 46 // Do not show VPN line in uber tray bubble if VPN is not configured. 49 const NetworkState* vpn = local 50 handler->FirstNetworkByType(NetworkTypePattern::VPN()); 51 return vpn != NULL; 80 const NetworkState* vpn = local 81 handler->FirstNetworkByType(NetworkTypePattern::VPN()); 82 if (!vpn || (vpn->connection_state() == shill::kStateIdle)) { 92 *animating = vpn->IsConnectingState() [all...] |
/external/chromium_org/chrome/browser/chromeos/options/ |
vpn_config_view.cc | 81 return onc::vpn::kIPsec; 83 return onc::vpn::kOpenVPN; 379 const NetworkState* vpn = NetworkHandler::Get()->network_state_handler()-> local 381 if (!vpn) { 494 const NetworkState* vpn = NULL; local 496 vpn = NetworkHandler::Get()->network_state_handler()-> 498 DCHECK(vpn && vpn->type() == shill::kTypeVPN); 522 title_ = vpn ? IDS_OPTIONS_SETTINGS_JOIN_VPN : IDS_OPTIONS_SETTINGS_ADD_VPN; 694 if (vpn) { 707 const NetworkState* vpn = NetworkHandler::Get()->network_state_handler()-> local 999 const NetworkState* vpn = NetworkHandler::Get()->network_state_handler()-> local [all...] |
vpn_config_view.h | 42 // A dialog box to allow configuration of VPN connection. 83 void ParseUIProperties(const NetworkState* vpn); 133 // Parses a VPN UI |property| from the given |network|. |key| is the property 134 // name within the type-specific VPN subdictionary named |dict_key|. 186 // Cached VPN properties, only set when configuring an existing network.
|
/external/chromium_org/chromeos/network/onc/ |
onc_normalizer.cc | 133 RemoveEntryUnless(ipsec, ::onc::vpn::kSaveCredentials, auth_type == kPSK); 182 using namespace ::onc::vpn; 205 void Normalizer::NormalizeVPN(base::DictionaryValue* vpn) { 206 using namespace ::onc::vpn; 209 vpn->GetStringWithoutPathExpansion(::onc::vpn::kType, &type); 210 RemoveEntryUnless(vpn, kOpenVPN, type == kOpenVPN); 211 RemoveEntryUnless(vpn, kIPsec, type == kIPsec || type == kTypeL2TP_IPsec); 212 RemoveEntryUnless(vpn, kL2TP, type == kTypeL2TP_IPsec);
|
onc_normalizer.h | 46 void NormalizeVPN(base::DictionaryValue* vpn);
|
onc_signature.cc | 88 { ::onc::vpn::kSaveCredentials, &kBoolSignature}, 99 { ::onc::vpn::kPassword, &kStringSignature}, 100 { ::onc::vpn::kUsername, &kStringSignature}, 105 { ::onc::vpn::kPassword, &kStringSignature}, 106 { ::onc::vpn::kSaveCredentials, &kBoolSignature}, 107 { ::onc::vpn::kUsername, &kStringSignature}, 124 { ::onc::vpn::kPassword, &kStringSignature}, 132 { ::onc::vpn::kSaveCredentials, &kBoolSignature}, 145 { ::onc::vpn::kUsername, &kStringSignature}, 159 { ::onc::vpn::kAutoConnect, &kBoolSignature} [all...] |
onc_translation_tables.cc | 47 // { ::onc::vpn::kSaveCredentials, shill::kSaveCredentialsProperty}, 52 { ::onc::vpn::kPassword, shill::kL2tpIpsecXauthPasswordProperty}, 53 { ::onc::vpn::kUsername, shill::kL2tpIpsecXauthUserProperty}, 57 { ::onc::vpn::kPassword, shill::kL2tpIpsecPasswordProperty}, 60 // { ::onc::vpn::kSaveCredentials, &kBoolSignature }, 61 { ::onc::vpn::kUsername, shill::kL2tpIpsecUserProperty}, {NULL}}; 74 { ::onc::vpn::kPassword, shill::kOpenVPNPasswordProperty}, 84 // { ::onc::vpn::kSaveCredentials, shill::kSaveCredentialsProperty}, 92 { ::onc::vpn::kUsername, shill::kOpenVPNUserProperty}, 102 { ::onc::vpn::kAutoConnect, shill::kAutoConnectProperty} [all...] |
onc_translator_onc_to_shill.cc | 157 ::onc::vpn::kSaveCredentials, &save_credentials)) { 179 // Shill wants all Provider/VPN fields to be strings. 193 ::onc::vpn::kSaveCredentials, &save_credentials)) { 201 if (onc_object_->GetStringWithoutPathExpansion(::onc::vpn::kHost, &host)) { 206 onc_object_->GetStringWithoutPathExpansion(::onc::vpn::kType, &type); 260 // Shill doesn't allow setting the name for non-VPN networks.
|
onc_translator_shill_to_onc.cc | 232 // Shill wants all Provider/VPN fields to be strings. Translates these 286 onc_object_->SetStringWithoutPathExpansion(::onc::vpn::kType, 291 onc_object_->SetStringWithoutPathExpansion(::onc::vpn::kHost, 297 if (onc_provider_type == ::onc::vpn::kTypeL2TP_IPsec) { 298 TranslateAndAddNestedObject(::onc::vpn::kIPsec, *provider); 299 TranslateAndAddNestedObject(::onc::vpn::kL2TP, *provider); 300 provider_type_dictionary = ::onc::vpn::kIPsec; 310 ::onc::vpn::kSaveCredentials, 408 // Since Name is a read only field in Shill unless it's a VPN, it is copied 409 // here, but not when going the other direction (if it's not a VPN) [all...] |
onc_validator.cc | 593 using namespace ::onc::vpn; 597 if (FieldExistsAndHasNoValidValue(*result, ::onc::vpn::kType, valid_types)) 600 bool all_required_exist = RequireField(*result, ::onc::vpn::kType); 602 result->GetStringWithoutPathExpansion(::onc::vpn::kType, &type);
|
/external/chromium_org/chromeos/network/ |
client_cert_util.cc | 132 // Look for VPN specific client certificate properties. 134 // VPN Provider values are read from the "Provider" dictionary, not the 287 const base::DictionaryValue* vpn = NULL; local 288 network_config.GetDictionaryWithoutPathExpansion(network_config::kVPN, &vpn); 289 if (vpn) { 291 vpn->GetDictionaryWithoutPathExpansion(vpn::kOpenVPN, &openvpn); 293 vpn->GetDictionaryWithoutPathExpansion(vpn::kIPsec, &ipsec); 323 // VPN certificate properties are read from the Provider dictionary [all...] |
policy_util.cc | 172 ::onc::vpn::kAutoConnect,
|
/external/chromium_org/chrome/browser/resources/options/chromeos/ |
internet_detail.css | 48 #vpn-tab td { 52 #vpn-tab .option-value:not(input) {
|
internet_detail.js | 131 } else if (type == 'VPN') { 495 updateHidden('#details-internet-page .vpn-details', this.type_ != 'VPN'); 509 // Hide network tab for VPN. 511 this.type_ == 'VPN'); 678 (this.type_ == 'WiMAX' || this.type_ == 'VPN'))) { 748 else if (type == 'VPN') [all...] |
/build/target/product/ |
core_minimal.mk | 49 ip-up-vpn \
|
core_tiny.mk | 54 ip-up-vpn \
|
/external/chromium_org/components/onc/ |
onc_constants.cc | 59 const char kVPN[] = "VPN"; 81 const char kVPN[] = "VPN"; 273 namespace vpn { namespace in namespace:onc 284 } // namespace vpn
|
onc_constants.h | 291 namespace vpn { namespace in namespace:onc 302 } // namespace vpn
|
/frameworks/base/services/core/java/com/android/server/net/ |
LockdownVpnTracker.java | 48 import com.android.server.connectivity.Vpn; 54 * connected and kicks off VPN connection, managing any required {@code netd} 60 /** Number of VPN attempts before waiting for user intervention. */ 65 private static final String ACTION_VPN_SETTINGS = "android.net.vpn.SETTINGS"; 66 private static final String EXTRA_PICK_LOCKDOWN = "android.net.vpn.PICK_LOCKDOWN"; 73 private final Vpn mVpn; 92 ConnectivityService connService, Vpn vpn, VpnProfile profile) { 96 mVpn = Preconditions.checkNotNull(vpn); 116 * Watch for state changes to both active egress network, kicking off a VPN [all...] |
/external/chromium_org/chrome/browser/resources/options/ |
browser_options.css | 306 @-webkit-keyframes vpn-connecting-animation { 319 .network-vpn.network-connecting { 320 -webkit-animation: vpn-connecting-animation 500ms alternate infinite;
|
/system/extras/tests/fstest/ |
perm_checker.conf | 63 /dev/ppp 660 660 radio radio vpn vpn
|
/frameworks/base/packages/SystemUI/src/com/android/systemui/statusbar/ |
SignalClusterView.java | 111 mVpn = (ImageView) findViewById(R.id.vpn); 265 if (DEBUG) Log.d(TAG, String.format("vpn: %s", mVpnVisible ? "VISIBLE" : "GONE"));
|
/external/chromium_org/ui/chromeos/network/ |
network_icon.cc | 82 // Updates the VPN badge. Returns true if changed. 94 // Defines color theme and VPN badging 106 // Cached vpn badge for the network when the icon was last generated. 512 } else if (network->Matches(NetworkTypePattern::VPN())) { 658 const NetworkState* vpn = NetworkHandler::Get()->network_state_handler()-> local 659 ConnectedNetworkByType(NetworkTypePattern::VPN()); 660 if (vpn && vpn_badge_ == NULL) { 663 } else if (!vpn && vpn_badge_ != NULL) { 889 state_handler->ConnectingNetworkByType(NetworkTypePattern::VPN()); [all...] |
/external/chromium_org/third_party/webrtc/base/ |
network_unittest.cc | 550 Network vpn("bridge_test", "VPN Adapter", IPAddress(0x12345600U), 24, 552 EXPECT_EQ(ADAPTER_TYPE_VPN, vpn.type());
|