/external/ipsec-tools/src/racoon/samples/roadwarrior/ |
D | README | 2 remote access using hybrid authentication. In this setup, the VPN 4 authenticates to the VPN gateway using a login and a password. 8 internal address, netmask and DNS from the VPN gateway. 17 The first server setup, in server/racoon.conf, is for a VPN gateway 26 Both configurations can be used with the Cisco VPN client if it 28 available in Cisco VPN client version 4.0.5 and above). The group 29 password configured in the Cisco VPN client is not used by racoon. 44 certificate authority that signed the VPN gateway certificate in 48 the VPN using racoonctl: 52 the DNS or IP address of the VPN gateway. racoonctl will prompt [all …]
|
/external/autotest/client/site_tests/network_VPNConnect/ |
D | control.l2tpipsec_cert | 7 PURPOSE = 'Verify shill correctly authenticates to an L2TP/IPSec Cert VPN' 13 Tests that we can complete L2TP/IPSec certificate VPN authentication. 16 is best suited for verifying that the connection manager and VPN 17 manager are correctly passing parameters to the underlying VPN client 21 L2TP/IPSec certificate-based VPN server running at the other end of a
|
D | control.l2tpipsec_psk | 12 Tests that we can complete L2TP/IPSec PSK VPN authentication. 15 is best suited for verifying that the connection manager and VPN 16 manager are correctly passing parameters to the underlying VPN client 20 L2TP/IPSec PSK VPN server runing at the other end of a virtual Ethernet 23 The -evil variant simulates connecting to a VPN gateway that specifies
|
D | control.l2tpipsec_xauth | 12 Tests that we can complete L2TP/IPSec PSK VPN authentication with XAUTH. 15 is best suited for verifying that the connection manager and VPN 16 manager are correctly passing parameters to the underlying VPN client 20 L2TP/IPSec PSK VPN server runing at the other end of a virtual Ethernet
|
D | control.openvpn_cert_verify | 17 the underlying VPN client to have it properly connect. 19 This test fails if the DUT cannot successfully verify the remote VPN
|
D | control.openvpn | 16 VPN client to have it properly connect.
|
D | control.openvpn_user_pass | 17 VPN client to have it properly connect.
|
/external/tcpdump/tests/ |
D | bgp-aigp-oobr-nossl.out | 20 AFI: IPv4 (1), SAFI: labeled VPN Unicast (128) 43 AFI: Unknown AFI (64769), SAFI: labeled VPN Unicast (128) 63 AFI: IPv4 (1), SAFI: labeled VPN Unicast (128) 108 AFI: IPv4 (1), SAFI: labeled VPN Unicast (128) 131 AFI: IPv4 (1), SAFI: labeled VPN Unicast (128) 160 AFI: IPv4 (1), SAFI: labeled VPN Unicast (128) 199 AFI: IPv4 (1), SAFI: labeled VPN Unicast (128) 222 AFI: IPv4 (1), SAFI: labeled VPN Unicast (128) 251 AFI: IPv4 (1), SAFI: labeled VPN Unicast (128) 290 AFI: IPv4 (1), SAFI: labeled VPN Unicast (128) [all …]
|
D | bgp-aigp-oobr-ssl.out | 20 AFI: IPv4 (1), SAFI: labeled VPN Unicast (128) 43 AFI: Unknown AFI (64769), SAFI: labeled VPN Unicast (128) 63 AFI: IPv4 (1), SAFI: labeled VPN Unicast (128) 108 AFI: IPv4 (1), SAFI: labeled VPN Unicast (128) 131 AFI: IPv4 (1), SAFI: labeled VPN Unicast (128) 160 AFI: IPv4 (1), SAFI: labeled VPN Unicast (128) 199 AFI: IPv4 (1), SAFI: labeled VPN Unicast (128) 222 AFI: IPv4 (1), SAFI: labeled VPN Unicast (128) 251 AFI: IPv4 (1), SAFI: labeled VPN Unicast (128) 290 AFI: IPv4 (1), SAFI: labeled VPN Unicast (128) [all …]
|
D | tok2str-oobr-1.out | 17 AFI: IPv4 (1), SAFI: labeled VPN Unicast (128) 37 AFI: IPv4 (1), SAFI: Multicast VPN (5) 54 AFI: IPv4 (1), SAFI: labeled VPN Unicast (128)
|
D | bgp_mvpn_6_and_7.out | 8 AFI: IPv4 (1), SAFI: Multicast VPN (5), nh-length: 0, no SNPA
|
D | bgp_vpn_attrset.out | 17 AFI: IPv4 (1), SAFI: labeled VPN Unicast (128)
|
D | bgp_vpn_rt-oobr.out | 8 AFI: IPv6 (2), SAFI: Multicast VPN (5)
|
D | bgp-as-path-oobr-ssl.out | 20 AFI: IPv4 (1), SAFI: labeled VPN Unicast (128) 42 AFI: IPv4 (1), SAFI: labeled VPN Unicast (128) 85 AFI: IPv4 (1), SAFI: labeled VPN Unicast (128) 143 AFI: IPv4 (1), SAFI: labeled VPN Unicast (128) 167 AFI: IPv4 (1), SAFI: labeled VPN Unicast (128) 188 AFI: IPv4 (1), SAFI: labeled VPN Unicast (128) 218 AFI: Unknown AFI (257), SAFI: labeled VPN Unicast (128) 294 AFI: IPv4 (1), SAFI: labeled VPN Unicast (128) 1418 AFI: IPv4 (1), SAFI: labeled VPN Unicast (128) 2545 AFI: IPv4 (1), SAFI: labeled VPN Unicast (128) [all …]
|
D | bgp-as-path-oobr-nossl.out | 20 AFI: IPv4 (1), SAFI: labeled VPN Unicast (128) 42 AFI: IPv4 (1), SAFI: labeled VPN Unicast (128) 85 AFI: IPv4 (1), SAFI: labeled VPN Unicast (128) 143 AFI: IPv4 (1), SAFI: labeled VPN Unicast (128) 167 AFI: IPv4 (1), SAFI: labeled VPN Unicast (128) 188 AFI: IPv4 (1), SAFI: labeled VPN Unicast (128) 218 AFI: Unknown AFI (257), SAFI: labeled VPN Unicast (128) 294 AFI: IPv4 (1), SAFI: labeled VPN Unicast (128) 1418 AFI: IPv4 (1), SAFI: labeled VPN Unicast (128) 2545 AFI: IPv4 (1), SAFI: labeled VPN Unicast (128) [all …]
|
/external/openssh/ |
D | README.tun | 4 OpenSSH contains support for VPN tunneling using the tun(4) network 123 could be wireless networks or administrative VPN tunnels. 127 Protocol (IPSec) for robust and permanent VPN connections and to
|
/external/sl4a/Common/src/com/googlecode/android_scripting/facade/ |
D | VpnFacade.java | 61 for (String key : keyStore.list(Credentials.VPN)) { in loadVpnProfiles() 62 final VpnProfile profile = VpnProfile.decode(key, keyStore.get(Credentials.VPN + key)); in loadVpnProfiles()
|
/external/ppp/pppd/ |
D | README.pppopptp | 11 In general case, the execution flow for VPN startup on Android devices is:
|
D | README.pppol2tp | 11 In general case, the execution flow for VPN startup on Android devices is:
|
/external/llvm/lib/Transforms/Utils/ |
D | LoopUnrollRuntime.cpp | 242 PHINode *VPN = cast<PHINode>(VMap[&BBI]); in ConnectEpilog() local 243 VPN->setIncomingValue(VPN->getBasicBlockIndex(EpilogPreHeader), NewPN); in ConnectEpilog()
|
/external/swiftshader/third_party/llvm-7.0/llvm/lib/Transforms/Utils/ |
D | LoopUnrollRuntime.cpp | 249 PHINode *VPN = cast<PHINode>(VMap[&PN]); in ConnectEpilog() local 250 VPN->setIncomingValue(VPN->getBasicBlockIndex(EpilogPreHeader), NewPN); in ConnectEpilog()
|
/external/scapy/test/ |
D | x509.uts | 81 tbs.get_issuer_str() == '/C=FR/ST=Paris/L=Paris/O=Mushroom Corp./OU=Mushroom VPN Services/CN=IKEv2 … 98 tbs.get_subject_str() == '/C=FR/ST=Paris/L=Paris/O=Mushroom Corp./OU=Mushroom VPN Services/CN=IKEv2…
|
D | cert.uts | 205 x.issuer_str == '/C=FR/ST=Paris/L=Paris/O=Mushroom Corp./OU=Mushroom VPN Services/CN=IKEv2 X.509 Te… 208 x.subject_str == '/C=FR/ST=Paris/L=Paris/O=Mushroom Corp./OU=Mushroom VPN Services/CN=IKEv2 X.509 T…
|
/external/ipsec-tools/ |
D | NEWS | 73 RADIUS supoort. This is interoperable with the Cisco VPN client.
|
/external/autotest/server/cros/tradefed_test_unittest_data/ |
D | CtsHostsideNetworkTests.txt | 44 junit.framework.AssertionFailedError: Socket opened before VPN connects should be closed when VPN c… 104 junit.framework.AssertionFailedError: Socket opened before VPN connects should be closed when VPN c…
|