/external/ipsec-tools/src/racoon/ |
remoteconf.h | 146 int weak_phase1_check; /* act on unencrypted deletions ? */
|
/external/openssl/crypto/pem/ |
pem_pk8.c | 80 * is NULL then it uses the unencrypted private key form. The 'nid' versions
|
/external/wpa_supplicant/ |
todo.txt | 30 to see unencrypted EAPOL-Key frames at all..
|
driver.h | 405 * set_drop_unencrypted - Enable/disable unencrypted frame filtering 407 * @enabled: 1 = unencrypted Tx/Rx frames will be dropped, 0 = disabled 412 * transmit paths). Unencrypted EAPOL frames (ethertype 0x888e) must
|
eap_peap.c | 55 * (unencrypted) EAP-Success after this 58 * (unencrypted) EAP-Success after this */ 594 * unencrypted auth), so force EAP state
|
wpa_supplicant.conf.orig | 296 # unencrypted identity with EAP types that support different tunnelled 498 # unencrypted use. Real identity is sent only within an encrypted TLS tunnel. 510 # EAP-TTLS/MSCHAPv2 configuration with anonymous identity for the unencrypted
|
driver_hostap.c | 349 /* Allow unencrypted EAPOL messages even if pairwise keys are set when
|
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/ |
wpa_supplicant.conf.sgml | 99 identity for the unencrypted use. Real identity is sent only
|
/docs/source.android.com/src/tech/encryption/ |
android_crypto_implementation.md | 122 If init was able to mount /data, it sets ro.crypto.state to "unencrypted". 331 ro.crypto.state unencrypted Set by init to say this system is 332 running with an unencrypted /data
|
/external/chromium/chrome/browser/ |
page_info_model.cc | 162 // TODO(wtc): Bug 1198735: report mixed/unsafe content for unencrypted and
|
/external/chromium/chrome/browser/profiles/ |
profile_manager.cc | 147 // user data in an unencrypted profile. But doing this makes
|
/external/chromium/chrome/browser/sync/engine/ |
syncapi.h | 279 // Returns the unencrypted specifics associated with |entry|. If |entry| was 290 // A holder for the unencrypted data stored in an encrypted node. 408 // Resets the EntitySpecifics for this node based on the unencrypted data. 626 const sync_pb::PasswordSpecificsData& unencrypted() const; [all...] |
/external/openssl/apps/ |
pkcs8.c | 223 BIO_printf(bio_err, "-nocrypt use or expect unencrypted private key\n");
|
/external/webkit/Source/WebKit/mac/Panels/ |
WebAuthenticationPanel.m | 206 UI_STRING_INTERNAL("Your password will be sent unencrypted.",
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_config.h | 38 * This field is used for unencrypted use with EAP types that support 42 * If not set, the identity field will be used for both unencrypted and
|
eap_peap.c | 58 * (unencrypted) EAP-Success after this 61 * (unencrypted) EAP-Success after this */ 962 * unencrypted auth), so force EAP state [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_config.h | 38 * This field is used for unencrypted use with EAP types that support 42 * If not set, the identity field will be used for both unencrypted and
|
eap_peap.c | 58 * (unencrypted) EAP-Success after this 61 * (unencrypted) EAP-Success after this */ 962 * unencrypted auth), so force EAP state [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/drivers/ |
driver.h | 547 * set_drop_unencrypted - Enable/disable unencrypted frame filtering 549 * @enabled: 1 = unencrypted Tx/Rx frames will be dropped, 0 = disabled 554 * transmit paths). Unencrypted EAPOL frames (ethertype 0x888e) must [all...] |
driver_hostap.c | 347 /* Allow unencrypted EAPOL messages even if pairwise keys are set when
|
/external/wpa_supplicant_6/wpa_supplicant/ |
wpa_supplicant.conf.orig | 358 # unencrypted identity with EAP types that support different tunnelled 581 # unencrypted use. Real identity is sent only within an encrypted TLS tunnel. 593 # EAP-TTLS/MSCHAPv2 configuration with anonymous identity for the unencrypted
|
/external/wpa_supplicant_8/wpa_supplicant/ |
wpa_supplicant.conf.orig | 400 # unencrypted identity with EAP types that support different tunnelled 633 # unencrypted use. Real identity is sent only within an encrypted TLS tunnel. 645 # EAP-TTLS/MSCHAPv2 configuration with anonymous identity for the unencrypted [all...] |
/external/chromium/third_party/libjingle/source/talk/session/phone/ |
srtpfilter.cc | 103 // Otherwise, complete the negotiation of a unencrypted session.
|
/external/dropbear/ |
packet.c | 415 buffer * clearwritebuf; /* unencrypted, possibly compressed */
|
/frameworks/base/core/java/android/net/ |
Downloads.java | 121 * unencrypted DRM files are saved in secure internal storage.
|