HomeSort by relevance Sort by last modified time
    Searched full:unencrypted (Results 26 - 50 of 92) sorted by null

12 3 4

  /external/ipsec-tools/src/racoon/
remoteconf.h 146 int weak_phase1_check; /* act on unencrypted deletions ? */
  /external/openssl/crypto/pem/
pem_pk8.c 80 * is NULL then it uses the unencrypted private key form. The 'nid' versions
  /external/wpa_supplicant/
todo.txt 30 to see unencrypted EAPOL-Key frames at all..
driver.h 405 * set_drop_unencrypted - Enable/disable unencrypted frame filtering
407 * @enabled: 1 = unencrypted Tx/Rx frames will be dropped, 0 = disabled
412 * transmit paths). Unencrypted EAPOL frames (ethertype 0x888e) must
eap_peap.c 55 * (unencrypted) EAP-Success after this
58 * (unencrypted) EAP-Success after this */
594 * unencrypted auth), so force EAP state
wpa_supplicant.conf.orig 296 # unencrypted identity with EAP types that support different tunnelled
498 # unencrypted use. Real identity is sent only within an encrypted TLS tunnel.
510 # EAP-TTLS/MSCHAPv2 configuration with anonymous identity for the unencrypted
driver_hostap.c 349 /* Allow unencrypted EAPOL messages even if pairwise keys are set when
  /external/wpa_supplicant_8/wpa_supplicant/doc/docbook/
wpa_supplicant.conf.sgml 99 identity for the unencrypted use. Real identity is sent only
  /docs/source.android.com/src/tech/encryption/
android_crypto_implementation.md 122 If init was able to mount /data, it sets ro.crypto.state to "unencrypted".
331 ro.crypto.state unencrypted Set by init to say this system is
332 running with an unencrypted /data
  /external/chromium/chrome/browser/
page_info_model.cc 162 // TODO(wtc): Bug 1198735: report mixed/unsafe content for unencrypted and
  /external/chromium/chrome/browser/profiles/
profile_manager.cc 147 // user data in an unencrypted profile. But doing this makes
  /external/chromium/chrome/browser/sync/engine/
syncapi.h 279 // Returns the unencrypted specifics associated with |entry|. If |entry| was
290 // A holder for the unencrypted data stored in an encrypted node.
408 // Resets the EntitySpecifics for this node based on the unencrypted data.
626 const sync_pb::PasswordSpecificsData& unencrypted() const;
    [all...]
  /external/openssl/apps/
pkcs8.c 223 BIO_printf(bio_err, "-nocrypt use or expect unencrypted private key\n");
  /external/webkit/Source/WebKit/mac/Panels/
WebAuthenticationPanel.m 206 UI_STRING_INTERNAL("Your password will be sent unencrypted.",
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_config.h 38 * This field is used for unencrypted use with EAP types that support
42 * If not set, the identity field will be used for both unencrypted and
eap_peap.c 58 * (unencrypted) EAP-Success after this
61 * (unencrypted) EAP-Success after this */
962 * unencrypted auth), so force EAP state
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_config.h 38 * This field is used for unencrypted use with EAP types that support
42 * If not set, the identity field will be used for both unencrypted and
eap_peap.c 58 * (unencrypted) EAP-Success after this
61 * (unencrypted) EAP-Success after this */
962 * unencrypted auth), so force EAP state
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/drivers/
driver.h 547 * set_drop_unencrypted - Enable/disable unencrypted frame filtering
549 * @enabled: 1 = unencrypted Tx/Rx frames will be dropped, 0 = disabled
554 * transmit paths). Unencrypted EAPOL frames (ethertype 0x888e) must
    [all...]
driver_hostap.c 347 /* Allow unencrypted EAPOL messages even if pairwise keys are set when
  /external/wpa_supplicant_6/wpa_supplicant/
wpa_supplicant.conf.orig 358 # unencrypted identity with EAP types that support different tunnelled
581 # unencrypted use. Real identity is sent only within an encrypted TLS tunnel.
593 # EAP-TTLS/MSCHAPv2 configuration with anonymous identity for the unencrypted
  /external/wpa_supplicant_8/wpa_supplicant/
wpa_supplicant.conf.orig 400 # unencrypted identity with EAP types that support different tunnelled
633 # unencrypted use. Real identity is sent only within an encrypted TLS tunnel.
645 # EAP-TTLS/MSCHAPv2 configuration with anonymous identity for the unencrypted
    [all...]
  /external/chromium/third_party/libjingle/source/talk/session/phone/
srtpfilter.cc 103 // Otherwise, complete the negotiation of a unencrypted session.
  /external/dropbear/
packet.c 415 buffer * clearwritebuf; /* unencrypted, possibly compressed */
  /frameworks/base/core/java/android/net/
Downloads.java 121 * unencrypted DRM files are saved in secure internal storage.

Completed in 1352 milliseconds

12 3 4