Home
last modified time | relevance | path

Searched refs:VPN (Results 1 – 25 of 30) sorted by relevance

12

/external/ipsec-tools/src/racoon/samples/roadwarrior/
DREADME2 remote access using hybrid authentication. In this setup, the VPN
4 authenticates to the VPN gateway using a login and a password.
8 internal address, netmask and DNS from the VPN gateway.
17 The first server setup, in server/racoon.conf, is for a VPN gateway
26 Both configurations can be used with the Cisco VPN client if it
28 available in Cisco VPN client version 4.0.5 and above). The group
29 password configured in the Cisco VPN client is not used by racoon.
44 certificate authority that signed the VPN gateway certificate in
48 the VPN using racoonctl:
52 the DNS or IP address of the VPN gateway. racoonctl will prompt
[all …]
/external/autotest/client/site_tests/network_VPNConnect/
Dcontrol.l2tpipsec_cert7 PURPOSE = 'Verify shill correctly authenticates to an L2TP/IPSec Cert VPN'
13 Tests that we can complete L2TP/IPSec certificate VPN authentication.
16 is best suited for verifying that the connection manager and VPN
17 manager are correctly passing parameters to the underlying VPN client
21 L2TP/IPSec certificate-based VPN server running at the other end of a
Dcontrol.l2tpipsec_psk12 Tests that we can complete L2TP/IPSec PSK VPN authentication.
15 is best suited for verifying that the connection manager and VPN
16 manager are correctly passing parameters to the underlying VPN client
20 L2TP/IPSec PSK VPN server runing at the other end of a virtual Ethernet
23 The -evil variant simulates connecting to a VPN gateway that specifies
Dcontrol.l2tpipsec_xauth12 Tests that we can complete L2TP/IPSec PSK VPN authentication with XAUTH.
15 is best suited for verifying that the connection manager and VPN
16 manager are correctly passing parameters to the underlying VPN client
20 L2TP/IPSec PSK VPN server runing at the other end of a virtual Ethernet
Dcontrol.openvpn_cert_verify17 the underlying VPN client to have it properly connect.
19 This test fails if the DUT cannot successfully verify the remote VPN
Dcontrol.openvpn16 VPN client to have it properly connect.
Dcontrol.openvpn_user_pass17 VPN client to have it properly connect.
/external/tcpdump/tests/
Dbgp-aigp-oobr-nossl.out20 AFI: IPv4 (1), SAFI: labeled VPN Unicast (128)
43 AFI: Unknown AFI (64769), SAFI: labeled VPN Unicast (128)
63 AFI: IPv4 (1), SAFI: labeled VPN Unicast (128)
108 AFI: IPv4 (1), SAFI: labeled VPN Unicast (128)
131 AFI: IPv4 (1), SAFI: labeled VPN Unicast (128)
160 AFI: IPv4 (1), SAFI: labeled VPN Unicast (128)
199 AFI: IPv4 (1), SAFI: labeled VPN Unicast (128)
222 AFI: IPv4 (1), SAFI: labeled VPN Unicast (128)
251 AFI: IPv4 (1), SAFI: labeled VPN Unicast (128)
290 AFI: IPv4 (1), SAFI: labeled VPN Unicast (128)
[all …]
Dbgp-aigp-oobr-ssl.out20 AFI: IPv4 (1), SAFI: labeled VPN Unicast (128)
43 AFI: Unknown AFI (64769), SAFI: labeled VPN Unicast (128)
63 AFI: IPv4 (1), SAFI: labeled VPN Unicast (128)
108 AFI: IPv4 (1), SAFI: labeled VPN Unicast (128)
131 AFI: IPv4 (1), SAFI: labeled VPN Unicast (128)
160 AFI: IPv4 (1), SAFI: labeled VPN Unicast (128)
199 AFI: IPv4 (1), SAFI: labeled VPN Unicast (128)
222 AFI: IPv4 (1), SAFI: labeled VPN Unicast (128)
251 AFI: IPv4 (1), SAFI: labeled VPN Unicast (128)
290 AFI: IPv4 (1), SAFI: labeled VPN Unicast (128)
[all …]
Dtok2str-oobr-1.out17 AFI: IPv4 (1), SAFI: labeled VPN Unicast (128)
37 AFI: IPv4 (1), SAFI: Multicast VPN (5)
54 AFI: IPv4 (1), SAFI: labeled VPN Unicast (128)
Dbgp_mvpn_6_and_7.out8 AFI: IPv4 (1), SAFI: Multicast VPN (5), nh-length: 0, no SNPA
Dbgp_vpn_attrset.out17 AFI: IPv4 (1), SAFI: labeled VPN Unicast (128)
Dbgp_vpn_rt-oobr.out8 AFI: IPv6 (2), SAFI: Multicast VPN (5)
Dbgp-as-path-oobr-ssl.out20 AFI: IPv4 (1), SAFI: labeled VPN Unicast (128)
42 AFI: IPv4 (1), SAFI: labeled VPN Unicast (128)
85 AFI: IPv4 (1), SAFI: labeled VPN Unicast (128)
143 AFI: IPv4 (1), SAFI: labeled VPN Unicast (128)
167 AFI: IPv4 (1), SAFI: labeled VPN Unicast (128)
188 AFI: IPv4 (1), SAFI: labeled VPN Unicast (128)
218 AFI: Unknown AFI (257), SAFI: labeled VPN Unicast (128)
294 AFI: IPv4 (1), SAFI: labeled VPN Unicast (128)
1418 AFI: IPv4 (1), SAFI: labeled VPN Unicast (128)
2545 AFI: IPv4 (1), SAFI: labeled VPN Unicast (128)
[all …]
Dbgp-as-path-oobr-nossl.out20 AFI: IPv4 (1), SAFI: labeled VPN Unicast (128)
42 AFI: IPv4 (1), SAFI: labeled VPN Unicast (128)
85 AFI: IPv4 (1), SAFI: labeled VPN Unicast (128)
143 AFI: IPv4 (1), SAFI: labeled VPN Unicast (128)
167 AFI: IPv4 (1), SAFI: labeled VPN Unicast (128)
188 AFI: IPv4 (1), SAFI: labeled VPN Unicast (128)
218 AFI: Unknown AFI (257), SAFI: labeled VPN Unicast (128)
294 AFI: IPv4 (1), SAFI: labeled VPN Unicast (128)
1418 AFI: IPv4 (1), SAFI: labeled VPN Unicast (128)
2545 AFI: IPv4 (1), SAFI: labeled VPN Unicast (128)
[all …]
/external/openssh/
DREADME.tun4 OpenSSH contains support for VPN tunneling using the tun(4) network
123 could be wireless networks or administrative VPN tunnels.
127 Protocol (IPSec) for robust and permanent VPN connections and to
/external/sl4a/Common/src/com/googlecode/android_scripting/facade/
DVpnFacade.java61 for (String key : keyStore.list(Credentials.VPN)) { in loadVpnProfiles()
62 final VpnProfile profile = VpnProfile.decode(key, keyStore.get(Credentials.VPN + key)); in loadVpnProfiles()
/external/ppp/pppd/
DREADME.pppopptp11 In general case, the execution flow for VPN startup on Android devices is:
DREADME.pppol2tp11 In general case, the execution flow for VPN startup on Android devices is:
/external/llvm/lib/Transforms/Utils/
DLoopUnrollRuntime.cpp242 PHINode *VPN = cast<PHINode>(VMap[&BBI]); in ConnectEpilog() local
243 VPN->setIncomingValue(VPN->getBasicBlockIndex(EpilogPreHeader), NewPN); in ConnectEpilog()
/external/swiftshader/third_party/llvm-7.0/llvm/lib/Transforms/Utils/
DLoopUnrollRuntime.cpp249 PHINode *VPN = cast<PHINode>(VMap[&PN]); in ConnectEpilog() local
250 VPN->setIncomingValue(VPN->getBasicBlockIndex(EpilogPreHeader), NewPN); in ConnectEpilog()
/external/scapy/test/
Dx509.uts81 tbs.get_issuer_str() == '/C=FR/ST=Paris/L=Paris/O=Mushroom Corp./OU=Mushroom VPN Services/CN=IKEv2 …
98 tbs.get_subject_str() == '/C=FR/ST=Paris/L=Paris/O=Mushroom Corp./OU=Mushroom VPN Services/CN=IKEv2…
Dcert.uts205 x.issuer_str == '/C=FR/ST=Paris/L=Paris/O=Mushroom Corp./OU=Mushroom VPN Services/CN=IKEv2 X.509 Te…
208 x.subject_str == '/C=FR/ST=Paris/L=Paris/O=Mushroom Corp./OU=Mushroom VPN Services/CN=IKEv2 X.509 T…
/external/ipsec-tools/
DNEWS73 RADIUS supoort. This is interoperable with the Cisco VPN client.
/external/autotest/server/cros/tradefed_test_unittest_data/
DCtsHostsideNetworkTests.txt44 junit.framework.AssertionFailedError: Socket opened before VPN connects should be closed when VPN c…
104 junit.framework.AssertionFailedError: Socket opened before VPN connects should be closed when VPN c…

12