HomeSort by relevance Sort by last modified time
    Searched full:vpn (Results 1 - 25 of 845) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /external/mtpd/
mtpd.rc 4 user vpn
5 group vpn net_admin inet net_raw
  /external/ipsec-tools/
racoon.rc 4 # IKE uses UDP port 500. Racoon will setuid to vpn after binding the port.
5 group vpn net_admin inet
  /device/google/marlin/sepolicy/
ppp.te 1 # additional ioctls needed for VPN.
  /cts/hostsidetests/devicepolicy/app/DeviceAndProfileOwner/src/com/android/cts/deviceandprofileowner/
AlwaysOnVpnMultiStageTest.java 23 import com.android.cts.deviceandprofileowner.vpn.VpnTestHelper;
25 import static com.android.cts.deviceandprofileowner.vpn.VpnTestHelper.VPN_PACKAGE;
26 import static com.android.cts.deviceandprofileowner.vpn.VpnTestHelper.TEST_ADDRESS;
29 * Contains methods to test always-on VPN invoked by DeviceAndProfileOwnerTest
34 // Setup always-on vpn
41 // After the vpn app being force-stop, expect that always-on package stays the same
45 // Expect the network is still locked down after the vpn app process is killed
50 // Os.connect returns ENETUNREACH errno after the vpn app process is killed
56 // After the vpn app being uninstalled, check that always-on vpn is nul
    [all...]
AlwaysOnVpnTest.java 21 import com.android.cts.deviceandprofileowner.vpn.VpnTestHelper;
23 import static com.android.cts.deviceandprofileowner.vpn.VpnTestHelper.VPN_PACKAGE;
24 import static com.android.cts.deviceandprofileowner.vpn.VpnTestHelper.TEST_ADDRESS;
27 * Validates that a device owner or profile owner can set an always-on VPN without user action.
29 * A trivial VPN app is installed which reflects ping packets back to the sender. One ping packet is
31 * strange happened on the way through the VPN.
38 public static final String RESTRICTION_ADDRESSES = "vpn.addresses";
39 public static final String RESTRICTION_ROUTES = "vpn.routes";
40 public static final String RESTRICTION_ALLOWED = "vpn.allowed";
41 public static final String RESTRICTION_DISALLOWED = "vpn.disallowed"
    [all...]
  /external/ipsec-tools/src/racoon/samples/roadwarrior/
README 2 remote access using hybrid authentication. In this setup, the VPN
4 authenticates to the VPN gateway using a login and a password.
8 internal address, netmask and DNS from the VPN gateway.
17 The first server setup, in server/racoon.conf, is for a VPN gateway
26 Both configurations can be used with the Cisco VPN client if it
28 available in Cisco VPN client version 4.0.5 and above). The group
29 password configured in the Cisco VPN client is not used by racoon.
44 certificate authority that signed the VPN gateway certificate in
48 the VPN using racoonctl:
49 racoonctl vc -u username vpn-gateway.example.ne
    [all...]
  /frameworks/base/packages/VpnDialogs/res/values/
strings.xml 19 <!-- Dialog title to identify the request from a VPN application. [CHAR LIMIT=60] -->
22 <!-- Dialog message to warn about the risk of using a VPN application. [CHAR LIMIT=NONE] -->
23 <string name="warning"><xliff:g id="app">%s</xliff:g> wants to set up a VPN connection
29 ]]> appears at the top of your screen when VPN is active.
32 <!-- Dialog title for built-in VPN. [CHAR LIMIT=40] -->
33 <string name="legacy_title">VPN is connected</string>
34 <!-- Button label to configure the current VPN session. [CHAR LIMIT=20] -->
36 <!-- Button label to disconnect the current VPN session. [CHAR LIMIT=20] -->
39 <!-- Label for the name of the current VPN session. [CHAR LIMIT=20] -->
41 <!-- Label for the duration of the current VPN session. [CHAR LIMIT=20] --
    [all...]
  /external/autotest/client/site_tests/network_VPNConnect/
control.l2tpipsec_cert 7 PURPOSE = 'Verify shill correctly authenticates to an L2TP/IPSec Cert VPN'
14 Tests that we can complete L2TP/IPSec certificate VPN authentication.
17 is best suited for verifying that the connection manager and VPN
18 manager are correctly passing parameters to the underlying VPN client
22 L2TP/IPSec certificate-based VPN server running at the other end of a
control.l2tpipsec_psk 13 Tests that we can complete L2TP/IPSec PSK VPN authentication.
16 is best suited for verifying that the connection manager and VPN
17 manager are correctly passing parameters to the underlying VPN client
21 L2TP/IPSec PSK VPN server runing at the other end of a virtual Ethernet
control.l2tpipsec_xauth 13 Tests that we can complete L2TP/IPSec PSK VPN authentication with XAUTH.
16 is best suited for verifying that the connection manager and VPN
17 manager are correctly passing parameters to the underlying VPN client
21 L2TP/IPSec PSK VPN server runing at the other end of a virtual Ethernet
network_VPNConnect.py 18 """The VPN authentication class.
20 Starts up a VPN server within a chroot on the other end of a virtual
21 ethernet pair and attempts a VPN association using shill.
82 """Returns a VPN server instance."""
100 raise error.TestFail('Unknown vpn server type %s' % self._vpn_type)
104 """Returns VPN configuration properties.
115 'Name': 'test-vpn-l2tp-psk',
118 'Type': 'vpn',
119 'VPN.Domain': 'test-vpn-psk-domain
    [all...]
  /development/samples/ToyVpn/
_index.html 1 <p>ToyVPN is a sample application that shows how to build a VPN client using the <a href="../../../reference/android/net/VpnService.html">VpnService</a> class introduced in API level 14.</p>
3 <p>This application consists of an Android client and a sample implementation of a server. It performs IP over UDP and is capable of doing seamless handover between different networks as long as it receives the same VPN parameters.</p>
7 <img alt="" src="../images/vpn-confirmation.png" />
  /frameworks/base/services/tests/servicestests/src/com/android/server/connectivity/
VpnTest.java 50 * Tests for {@link Vpn}.
75 static final String[] PKGS = {"com.example", "org.example", "net.example", "web.vpn"};
106 final Vpn vpn = new MockVpn(primaryUser.id); local
107 final Set<UidRange> ranges = vpn.createUserAndRestrictedProfilesRanges(primaryUser.id,
120 final Vpn vpn = new MockVpn(primaryUser.id); local
121 final Set<UidRange> ranges = vpn.createUserAndRestrictedProfilesRanges(primaryUser.id,
133 final Vpn vpn = new MockVpn(primaryUser.id) local
144 final Vpn vpn = new MockVpn(primaryUser.id); local
169 final MockVpn vpn = new MockVpn(primaryUser.id); local
204 final MockVpn vpn = new MockVpn(primaryUser.id); local
    [all...]
  /system/sepolicy/
mtp.te 0 # vpn tunneling protocol manager
racoon.te 20 # XXX: should we give ip-up-vpn its own label (currently racoon domain)
27 # Racoon (VPN) has a restricted set of permissions from the default.
  /frameworks/base/core/java/android/net/
VpnService.java 52 * own VPN solutions. In general, it creates a virtual network interface,
58 * always started with IP headers. The application then completes a VPN
63 * A VPN application can easily break the network. Besides, two of them may
67 * <li>User action is required the first time an application creates a VPN
69 * <li>There can be only one VPN connection running at the same time. The
72 * VPN connection.</li>
73 * <li>A system-managed dialog gives the information of the current VPN
76 * closed. It also covers the cases when a VPN application is crashed
82 * the VPN connection created by another application. The latter creates
83 * a VPN interface using the parameters supplied to the {@link Builder}
    [all...]
  /system/connectivity/shill/dbus/
chromeos_firewalld_proxy.cc 30 // automatically re-request VPN setup when firewalld is restarted.
38 // VPN already setup.
47 LOG(ERROR) << "Failed to request VPN setup: " << error->GetCode()
54 // No VPN setup.
62 LOG(ERROR) << "Failed to remove VPN setup: " << error->GetCode()
  /system/netd/server/
VirtualNetwork.h 27 // A secure VPN is the usual type of VPN that grabs the default route (and thus all user traffic).
28 // Only a few privileged UIDs may skip the VPN and go directly to the underlying physical network.
30 // A non-secure VPN ("bypassable" VPN) also grabs all user traffic by default. But all apps are
FwmarkServer.cpp 119 // An "appropriate" NetId is the NetId of a bypassable VPN that applies to the user, or
120 // failing that, the default network. We'll never set the NetId of a secure VPN here.
124 // or the download manager) acting on behalf of another user, or a VPN provider. If it's
125 // a proxy, we shouldn't reset the NetId. If it's a VPN provider, we should set the
128 // There's no easy way to tell the difference between a proxy and a VPN app. We can't
129 // use PERMISSION_SYSTEM to identify the proxy because a VPN app may also have those
132 // If it's a proxy, but the existing NetId is not a VPN, that means the user (that the
133 // proxy is acting on behalf of) is not subject to a VPN, so the proxy must have picked
137 // Conversely, if it's a VPN provider, the existing NetId cannot be a VPN. The only tim
    [all...]
  /packages/apps/Settings/tests/app/src/com/android/settings/vpn2/
VpnTests.java 56 * Legacy VPN connection tests
62 * VPN profiles are saved in an xml file and will be loaded through {@link VpnProfileParser}.
67 * <vpn>
82 * </vpn>
83 * VPN types include: TYPE_PPTP, TYPE_L2TP_IPSEC_PSK, TYPE_L2TP_IPSEC_RSA,
88 /* Maximum time to wait for VPN connection */
117 Assert.assertNotNull("no VPN profiles are parsed", mVpnInfoPool);
119 Log.v(TAG, "print out the vpn profiles");
124 Log.d(TAG, "certificate file for this vpn is " + vpnInfo.getCertificateFile());
131 // disconnect existing vpn if there is an
    [all...]
  /external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/vpc/
vpnconnection.py 26 Represents a VPN Connectionn
33 Represents VPN connection options
35 :ivar static_routes_only: Indicates whether the VPN connection uses static
57 Represents a static route for a VPN connection.
87 Represents telemetry for a VPN tunnel
91 :ivar status: The status of the VPN tunnel. Valid values: UP | DOWN
131 Represents a VPN Connection
133 :ivar id: The ID of the VPN connection.
134 :ivar state: The current state of the VPN connection.
137 VPN connection's customer gateway (in the native XML format). Thi
    [all...]
  /system/connectivity/shill/
scope_logger_unittest.cc 82 "vpn+"
98 EXPECT_EQ("service+vpn+wifi", logger_.GetEnabledScopeNames());
101 EXPECT_EQ("service+vpn", logger_.GetEnabledScopeNames());
114 logger_.EnableScopesByName("+vpn+wifi");
115 EXPECT_EQ("service+vpn+wifi", logger_.GetEnabledScopeNames());
118 EXPECT_EQ("service+vpn", logger_.GetEnabledScopeNames());
120 logger_.EnableScopesByName("-vpn-service+wifi");
126 logger_.EnableScopesByName("-vpn+vpn+wifi-wifi");
127 EXPECT_EQ("vpn", logger_.GetEnabledScopeNames())
    [all...]
  /frameworks/native/cmds/ip-up-vpn/
Android.mk 20 LOCAL_SRC_FILES := ip-up-vpn.c
22 LOCAL_MODULE := ip-up-vpn
  /external/chromium-trace/catapult/third_party/gsutil/third_party/boto/tests/unit/vpc/
test_vpnconnection.py 12 <vpnConnectionId>vpn-12qw34er56ty</vpnConnectionId>
23 <value>VPN 1</value>
54 <vpnConnectionId>vpn-qwerty12</vpnConnectionId>
104 ['vpn-12qw34er56ty', 'vpn-qwerty12'], filters=[('state', ['pending', 'available'])])
107 'VpnConnectionId.1': 'vpn-12qw34er56ty',
108 'VpnConnectionId.2': 'vpn-qwerty12',
122 self.assertDictEqual(vpn0.tags, {'Name': 'VPN 1'})
144 <vpnConnectionId>vpn-83ad48ea</vpnConnectionId>
173 self.assertEquals(api_response.id, 'vpn-83ad48ea'
    [all...]
  /cts/apps/CtsVerifier/src/com/android/cts/verifier/managedprovisioning/
VpnTestActivity.java 41 * Activity to test Vpn configuration
45 public static final String ACTION_VPN = "com.android.cts.verifier.managedprovisioning.VPN";
87 // vpn connection canceled by user
106 // vpn connection not established, as expected, test case succeeds
111 // vpn connection established, not expected, test case fails
112 Log.w(TAG, "vpn connection established, not expected, test case fails");
117 Log.i(TAG, "Closing vpn connection failed. Caught exception: ", e);

Completed in 667 milliseconds

1 2 3 4 5 6 7 8 91011>>