/external/ipsec-tools/src/racoon/samples/roadwarrior/ |
D | README | 2 remote access using hybrid authentication. In this setup, the VPN 4 authenticates to the VPN gateway using a login and a password. 8 internal address, netmask and DNS from the VPN gateway. 17 The first server setup, in server/racoon.conf, is for a VPN gateway 26 Both configurations can be used with the Cisco VPN client if it 28 available in Cisco VPN client version 4.0.5 and above). The group 29 password configured in the Cisco VPN client is not used by racoon. 44 certificate authority that signed the VPN gateway certificate in 48 the VPN using racoonctl: 52 the DNS or IP address of the VPN gateway. racoonctl will prompt [all …]
|
/external/autotest/client/site_tests/network_VPNConnect/ |
D | control.l2tpipsec_cert | 7 PURPOSE = 'Verify shill correctly authenticates to an L2TP/IPSec Cert VPN' 13 Tests that we can complete L2TP/IPSec certificate VPN authentication. 16 is best suited for verifying that the connection manager and VPN 17 manager are correctly passing parameters to the underlying VPN client 21 L2TP/IPSec certificate-based VPN server running at the other end of a
|
D | control.l2tpipsec_psk | 12 Tests that we can complete L2TP/IPSec PSK VPN authentication. 15 is best suited for verifying that the connection manager and VPN 16 manager are correctly passing parameters to the underlying VPN client 20 L2TP/IPSec PSK VPN server runing at the other end of a virtual Ethernet
|
D | control.l2tpipsec_xauth | 12 Tests that we can complete L2TP/IPSec PSK VPN authentication with XAUTH. 15 is best suited for verifying that the connection manager and VPN 16 manager are correctly passing parameters to the underlying VPN client 20 L2TP/IPSec PSK VPN server runing at the other end of a virtual Ethernet
|
D | control.openvpn_cert_verify | 17 the underlying VPN client to have it properly connect. 19 This test fails if the DUT cannot successfully verify the remote VPN
|
D | control.openvpn | 16 VPN client to have it properly connect.
|
D | control.openvpn_user_pass | 17 VPN client to have it properly connect.
|
/external/sl4a/Common/src/com/googlecode/android_scripting/facade/ |
D | VpnFacade.java | 61 for (String key : keyStore.list(Credentials.VPN)) { in loadVpnProfiles() 62 final VpnProfile profile = VpnProfile.decode(key, keyStore.get(Credentials.VPN + key)); in loadVpnProfiles()
|
/external/openssh/ |
D | README.tun | 4 OpenSSH contains support for VPN tunneling using the tun(4) network 123 could be wireless networks or administrative VPN tunnels. 127 Protocol (IPSec) for robust and permanent VPN connections and to
|
D | ssh.0 | 704 ssh contains support for Virtual Private Network (VPN) tunnelling using
|
/external/tcpdump/tests/ |
D | bgp_vpn_attrset.out | 17 AFI: IPv4 (1), SAFI: labeled VPN Unicast (128)
|
/external/llvm/lib/Transforms/Utils/ |
D | LoopUnrollRuntime.cpp | 242 PHINode *VPN = cast<PHINode>(VMap[&BBI]); in ConnectEpilog() local 243 VPN->setIncomingValue(VPN->getBasicBlockIndex(EpilogPreHeader), NewPN); in ConnectEpilog()
|
/external/ipsec-tools/ |
D | NEWS | 73 RADIUS supoort. This is interoperable with the Cisco VPN client.
|
/external/iptables/utils/ |
D | pf.os | 589 S52:128:1:48:M1260,N,N,N,N: LinkSys:WRV54G::LinkSys WRV54G VPN router
|
/external/c-ares/ |
D | CHANGES | 1103 that is down (e.g. a VPN adapter).
|
/external/robolectric/v3/runtime/ |
D | android-all-4.1.2_r1-robolectric-0.jar | META-INF/
META-INF/MANIFEST.MF
android/
android/accessibilityservice/
android/ ... |
D | android-all-4.2.2_r1.2-robolectric-0.jar | META-INF/
META-INF/MANIFEST.MF
android/
android/accessibilityservice/
android/ ... |
D | android-all-4.3_r2-robolectric-0.jar | META-INF/
META-INF/MANIFEST.MF
android/
android/accessibilityservice/
android/ ... |
D | android-all-5.1.1_r9-robolectric-1.jar | META-INF/
META-INF/MANIFEST.MF
com/
com/google/
com/ ... |
D | android-all-5.0.0_r2-robolectric-1.jar | META-INF/
META-INF/MANIFEST.MF
com/
com/google/
com/ ... |
D | android-all-4.4_r1-robolectric-1.jar | META-INF/
META-INF/MANIFEST.MF
com/
com/google/
com/ ... |