Searched refs:unencrypted (Results 1 – 22 of 22) sorted by relevance
354 const sync_pb::EntitySpecifics& unencrypted = in GetAppSpecifics() local356 return unencrypted.GetExtension(sync_pb::app); in GetAppSpecifics()361 const sync_pb::EntitySpecifics& unencrypted = in GetAutofillSpecifics() local363 return unencrypted.GetExtension(sync_pb::autofill); in GetAutofillSpecifics()368 const sync_pb::EntitySpecifics& unencrypted = in GetAutofillProfileSpecifics() local370 return unencrypted.GetExtension(sync_pb::autofill_profile); in GetAutofillProfileSpecifics()375 const sync_pb::EntitySpecifics& unencrypted = in GetBookmarkSpecifics() local377 return unencrypted.GetExtension(sync_pb::bookmark); in GetBookmarkSpecifics()382 const sync_pb::EntitySpecifics& unencrypted = in GetNigoriSpecifics() local384 return unencrypted.GetExtension(sync_pb::nigori); in GetNigoriSpecifics()[all …]
626 const sync_pb::PasswordSpecificsData& unencrypted() const;
41 - unittest.key.bin : private key stored unencrypted.
81 refreshes using unencrypted UDP packets. This results in less load on84 packets sent over unencrypted UDP could be observed by an eavesdropper).102 unencrypted UDP), dnsextd uses the port number of the client's TCP
152 const sync_pb::PasswordSpecificsData& password = extra->unencrypted(); in ApplyChangesFromSyncModel()
24 - applied a security fix to not accept unencrypted SRTP unless specified by policy.
14 # identity can be used in the unencrypted phase 1 and the real user identity
270 * driver_madwifi: fixed configuration of unencrypted modes (plaintext
18 to see unencrypted EAPOL-Key frames at all..
553 unencrypted use. Real identity is sent only within an encrypted TLS tunnel.
504 * driver_ndis: Fixed encryption mode configuration for unencrypted1146 re-authentication by allowing unencrypted EAPOL frames when not using
21 to see unencrypted EAPOL-Key frames at all..
358 # unencrypted identity with EAP types that support different tunnelled581 # unencrypted use. Real identity is sent only within an encrypted TLS tunnel.593 # EAP-TTLS/MSCHAPv2 configuration with anonymous identity for the unencrypted
405 * driver_ndis: Fixed encryption mode configuration for unencrypted1047 re-authentication by allowing unencrypted EAPOL frames when not using
633 unencrypted use. Real identity is sent only within an encrypted TLS tunnel.
99 identity for the unencrypted use. Real identity is sent only
206 UI_STRING_INTERNAL("Your password will be sent unencrypted.",
488 "Your password will be sent unencrypted." = "Your password will be sent unencrypted.";
306 - Use zero based padding for unencrypted traffic.
150 -i This option will read an unencrypted private (or public) key file
915 encrypted or unencrypted. Section 9.1 of [RFC3550] allows
12853 use "unencrypted" instead of "in the clear". Also, use the "Your log-in information