HomeSort by relevance Sort by last modified time
    Searched full:mppe (Results 1 - 25 of 116) sorted by null

1 2 3 4 5

  /external/ppp/pppd/
ccp.c 41 #ifdef MPPE
68 #ifdef MPPE
111 #ifdef MPPE
112 /* MPPE options are symmetrical ... we only set wantoptions here */
113 { "require-mppe", o_bool, &ccp_wantoptions[0].mppe,
114 "require MPPE encryption",
116 { "+mppe", o_bool, &ccp_wantoptions[0].mppe,
117 "require MPPE encryption"
    [all...]
mppe.h 2 * mppe.h - Definitions for MPPE
36 #define MPPE_PAD 4 /* MPPE growth per frame */
39 /* option bits for ccp_options.mppe */
67 /* Build a CI from mppe opts (see RFC 3078) */
ccp.h 40 bool mppe; /* do MPPE? */ member in struct:ccp_options
chap_ms.h 70 #ifdef MPPE
71 #include "mppe.h" /* MPPE_MAX_KEY_LEN */
93 #ifdef MPPE
chap_ms.c 46 * implementation in RFC 2759. Implemented MPPE functionality,
117 #ifdef MPPE
127 #ifdef MPPE
130 int mppe_keys_set = 0; /* Have the MPPE keys been set? */
133 /* For MPPE debug */
140 #include "fsm.h" /* Need to poke MPPE options */
729 #ifdef MPPE
796 /* "This is the MPPE Master Key" */
884 #endif /* MPPE */
905 #ifdef MPPE
    [all...]
Makefile.linux 47 # Uncomment the next line to include support for MPPE. CHAPMS (above) must
49 MPPE=y
98 ifdef MPPE
pppd.8 658 .B mppe\-stateful
659 Allow MPPE to use stateful mode. Stateless mode is still attempted first.
    [all...]
  /external/ppp/pppd/plugins/radius/etc/
dictionary.microsoft 15 ATTRIBUTE MS-MPPE-Encryption-Policy 7 string Microsoft
18 ATTRIBUTE MS-MPPE-Encryption-Type 8 string Microsoft
19 ATTRIBUTE MS-MPPE-Encryption-Types 8 string Microsoft
23 ATTRIBUTE MS-CHAP-MPPE-Keys 12 string Microsoft
27 ATTRIBUTE MS-MPPE-Send-Key 16 string Microsoft
28 ATTRIBUTE MS-MPPE-Recv-Key 17 string Microsoft
  /external/ppp/pppd/plugins/radius/
Makefile.linux 20 # Uncomment the next line to include support for MPPE.
21 MPPE=y
27 ifdef MPPE
radius.c 19 * MPPE support is by Ralf Hofmann, <ralf.hofmann@elvido.net>, with
33 #ifdef MPPE
95 #ifdef MPPE
345 #ifdef MPPE
346 /* Need the RADIUS secret and Request Authenticator to decode MPPE */
543 #ifdef MPPE
670 #ifdef MPPE
674 "RADIUS: bad MS-CHAP-MPPE-Keys attribute");
684 "RADIUS: bad MS-MPPE-%s-Key attribute",
700 #endif /* MPPE */
    [all...]
  /external/wpa_supplicant_8/src/common/
eapol_common.h 76 /* HMAC-MD5 message integrity check computed with MS-MPPE-Send-Key as
84 * MS-MPPE-Send-Key attribute to be used as the keying material;
85 * RC4 key used in encryption = Key-IV + MS-MPPE-Recv-Key */
  /external/ppp/pppd/plugins/
Makefile.linux 18 MPPE=y
20 ifdef MPPE
winbind.c 26 * MPPE support is by Ralf Hofmann, <ralf.hofmann@elvido.net>, with
40 #ifdef MPPE
  /packages/apps/Settings/tests/app/src/com/android/settings/vpn2/
VpnProfileParser.java 52 boolean mppe;
94 if (tagName.equalsIgnoreCase("mppe")) {
95 mppe = true;
169 if (mppe) {
170 profile.mppe = Boolean.valueOf(strValue);
171 mppe = false;
  /frameworks/base/core/java/com/android/internal/net/
VpnProfile.java 58 public boolean mppe = true; // 8 field in class:VpnProfile
83 mppe = in.readInt() != 0;
104 out.writeInt(mppe ? 1 : 0);
138 profile.mppe = Boolean.valueOf(values[8]);
163 builder.append('\0').append(mppe);
  /external/kernel-headers/original/uapi/linux/
ppp-comp.h 77 * Definitions for MPPE.
80 #define CI_MPPE 18 /* config option for MPPE */
  /external/ppp/pppd/include/net/
ppp-comp.h 166 * Definitions for MPPE.
168 #define CI_MPPE 18 /* config option for MPPE */
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/include/linux/
ppp-comp.h 194 * Definitions for MPPE.
197 #define CI_MPPE 18 /* config option for MPPE */
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/linux/
ppp-comp.h 194 * Definitions for MPPE.
197 #define CI_MPPE 18 /* config option for MPPE */
  /external/wpa_supplicant_8/wpa_supplicant/
eap_testing.txt 361 - uses tunneled EAP-Success, expects reply in tunnel or TLS ACK, sends MPPE
367 - uses tunneled EAP-Success, expects reply in tunnel or TLS ACK, sends MPPE
373 - uses TLV Success and Reply, sends MPPE keys with outer EAP-Success message
378 - sends tunneled EAP-Success with MPPE keys and expects the authentication to
384 - sends tunneled EAP-Success with MPPE keys and expects to receive TLS ACK
389 - uses tunneled EAP-Success, expects reply in tunnel or TLS ACK, sends MPPE
  /external/wpa_supplicant_8/src/eap_peer/
eap_mschapv2.c 12 * RFC 2759. Use of EAP-MSCHAPV2 derived keys with MPPE cipher is described in
859 /* MSK = server MS-MPPE-Recv-Key | MS-MPPE-Send-Key, i.e.,
860 * peer MS-MPPE-Send-Key | MS-MPPE-Recv-Key */
  /packages/apps/Settings/src/com/android/settings/vpn2/
ConfigDialog.java 106 mMppe = (CheckBox) mView.findViewById(R.id.mppe);
128 mMppe.setChecked(mProfile.mppe);
419 profile.mppe = mMppe.isChecked();
  /external/wpa_supplicant_8/wpa_supplicant/doc/docbook/
eapol_test.sgml 166 <listitem><para>Indicates that no MPPE keys are expected.
  /packages/apps/Settings/res/layout/
vpn_dialog.xml 43 <CheckBox style="@style/vpn_value" android:id="@+id/mppe"
  /external/wpa_supplicant_8/src/eap_server/
eap_server_mschapv2.c 554 /* MSK = server MS-MPPE-Recv-Key | MS-MPPE-Send-Key */

Completed in 830 milliseconds

1 2 3 4 5