/external/ppp/pppd/ |
ccp.c | 41 #ifdef MPPE 68 #ifdef MPPE 111 #ifdef MPPE 112 /* MPPE options are symmetrical ... we only set wantoptions here */ 113 { "require-mppe", o_bool, &ccp_wantoptions[0].mppe, 114 "require MPPE encryption", 116 { "+mppe", o_bool, &ccp_wantoptions[0].mppe, 117 "require MPPE encryption" [all...] |
mppe.h | 2 * mppe.h - Definitions for MPPE 36 #define MPPE_PAD 4 /* MPPE growth per frame */ 39 /* option bits for ccp_options.mppe */ 67 /* Build a CI from mppe opts (see RFC 3078) */
|
ccp.h | 40 bool mppe; /* do MPPE? */ member in struct:ccp_options
|
chap_ms.h | 70 #ifdef MPPE 71 #include "mppe.h" /* MPPE_MAX_KEY_LEN */ 93 #ifdef MPPE
|
chap_ms.c | 46 * implementation in RFC 2759. Implemented MPPE functionality, 117 #ifdef MPPE 127 #ifdef MPPE 130 int mppe_keys_set = 0; /* Have the MPPE keys been set? */ 133 /* For MPPE debug */ 140 #include "fsm.h" /* Need to poke MPPE options */ 729 #ifdef MPPE 796 /* "This is the MPPE Master Key" */ 884 #endif /* MPPE */ 905 #ifdef MPPE [all...] |
Makefile.linux | 47 # Uncomment the next line to include support for MPPE. CHAPMS (above) must 49 MPPE=y 98 ifdef MPPE
|
pppd.8 | 658 .B mppe\-stateful 659 Allow MPPE to use stateful mode. Stateless mode is still attempted first. [all...] |
/external/ppp/pppd/plugins/radius/etc/ |
dictionary.microsoft | 15 ATTRIBUTE MS-MPPE-Encryption-Policy 7 string Microsoft 18 ATTRIBUTE MS-MPPE-Encryption-Type 8 string Microsoft 19 ATTRIBUTE MS-MPPE-Encryption-Types 8 string Microsoft 23 ATTRIBUTE MS-CHAP-MPPE-Keys 12 string Microsoft 27 ATTRIBUTE MS-MPPE-Send-Key 16 string Microsoft 28 ATTRIBUTE MS-MPPE-Recv-Key 17 string Microsoft
|
/external/ppp/pppd/plugins/radius/ |
Makefile.linux | 20 # Uncomment the next line to include support for MPPE. 21 MPPE=y 27 ifdef MPPE
|
radius.c | 19 * MPPE support is by Ralf Hofmann, <ralf.hofmann@elvido.net>, with 33 #ifdef MPPE 95 #ifdef MPPE 345 #ifdef MPPE 346 /* Need the RADIUS secret and Request Authenticator to decode MPPE */ 543 #ifdef MPPE 670 #ifdef MPPE 674 "RADIUS: bad MS-CHAP-MPPE-Keys attribute"); 684 "RADIUS: bad MS-MPPE-%s-Key attribute", 700 #endif /* MPPE */ [all...] |
/external/wpa_supplicant_8/src/common/ |
eapol_common.h | 76 /* HMAC-MD5 message integrity check computed with MS-MPPE-Send-Key as 84 * MS-MPPE-Send-Key attribute to be used as the keying material; 85 * RC4 key used in encryption = Key-IV + MS-MPPE-Recv-Key */
|
/external/ppp/pppd/plugins/ |
Makefile.linux | 18 MPPE=y 20 ifdef MPPE
|
winbind.c | 26 * MPPE support is by Ralf Hofmann, <ralf.hofmann@elvido.net>, with 40 #ifdef MPPE
|
/packages/apps/Settings/tests/app/src/com/android/settings/vpn2/ |
VpnProfileParser.java | 52 boolean mppe; 94 if (tagName.equalsIgnoreCase("mppe")) { 95 mppe = true; 169 if (mppe) { 170 profile.mppe = Boolean.valueOf(strValue); 171 mppe = false;
|
/frameworks/base/core/java/com/android/internal/net/ |
VpnProfile.java | 58 public boolean mppe = true; // 8 field in class:VpnProfile 83 mppe = in.readInt() != 0; 104 out.writeInt(mppe ? 1 : 0); 138 profile.mppe = Boolean.valueOf(values[8]); 163 builder.append('\0').append(mppe);
|
/external/kernel-headers/original/uapi/linux/ |
ppp-comp.h | 77 * Definitions for MPPE. 80 #define CI_MPPE 18 /* config option for MPPE */
|
/external/ppp/pppd/include/net/ |
ppp-comp.h | 166 * Definitions for MPPE. 168 #define CI_MPPE 18 /* config option for MPPE */
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/include/linux/ |
ppp-comp.h | 194 * Definitions for MPPE. 197 #define CI_MPPE 18 /* config option for MPPE */
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/linux/ |
ppp-comp.h | 194 * Definitions for MPPE. 197 #define CI_MPPE 18 /* config option for MPPE */
|
/external/wpa_supplicant_8/wpa_supplicant/ |
eap_testing.txt | 361 - uses tunneled EAP-Success, expects reply in tunnel or TLS ACK, sends MPPE 367 - uses tunneled EAP-Success, expects reply in tunnel or TLS ACK, sends MPPE 373 - uses TLV Success and Reply, sends MPPE keys with outer EAP-Success message 378 - sends tunneled EAP-Success with MPPE keys and expects the authentication to 384 - sends tunneled EAP-Success with MPPE keys and expects to receive TLS ACK 389 - uses tunneled EAP-Success, expects reply in tunnel or TLS ACK, sends MPPE
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_mschapv2.c | 12 * RFC 2759. Use of EAP-MSCHAPV2 derived keys with MPPE cipher is described in 859 /* MSK = server MS-MPPE-Recv-Key | MS-MPPE-Send-Key, i.e., 860 * peer MS-MPPE-Send-Key | MS-MPPE-Recv-Key */
|
/packages/apps/Settings/src/com/android/settings/vpn2/ |
ConfigDialog.java | 106 mMppe = (CheckBox) mView.findViewById(R.id.mppe); 128 mMppe.setChecked(mProfile.mppe); 419 profile.mppe = mMppe.isChecked();
|
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/ |
eapol_test.sgml | 166 <listitem><para>Indicates that no MPPE keys are expected.
|
/packages/apps/Settings/res/layout/ |
vpn_dialog.xml | 43 <CheckBox style="@style/vpn_value" android:id="@+id/mppe"
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_mschapv2.c | 554 /* MSK = server MS-MPPE-Recv-Key | MS-MPPE-Send-Key */
|