Home
last modified time | relevance | path

Searched refs:passwords (Results 1 – 25 of 56) sorted by relevance

123

/external/webkit/Source/WebKit/chromium/src/
DWebPasswordFormData.cpp61 switch (fields->passwords.size()) { in locateSpecificPasswords()
64 *password = fields->passwords[0]; in locateSpecificPasswords()
67 if (fields->passwords[0]->value() == fields->passwords[1]->value()) in locateSpecificPasswords()
69 *password = fields->passwords[0]; in locateSpecificPasswords()
72 *oldPassword = fields->passwords[0]; in locateSpecificPasswords()
73 *password = fields->passwords[1]; in locateSpecificPasswords()
77 if (fields->passwords[0]->value() == fields->passwords[1]->value() in locateSpecificPasswords()
78 && fields->passwords[0]->value() == fields->passwords[2]->value()) { in locateSpecificPasswords()
80 *password = fields->passwords[0]; in locateSpecificPasswords()
81 } else if (fields->passwords[0]->value() == fields->passwords[1]->value()) { in locateSpecificPasswords()
[all …]
DWebPasswordFormUtils.cpp83 if ((fields->passwords.size() < maxPasswords) in findPasswordFormFields()
86 if (fields->passwords.isEmpty()) in findPasswordFormFields()
88 fields->passwords.append(inputElement); in findPasswordFormFields()
92 if (!fields->passwords.isEmpty()) { in findPasswordFormFields()
DWebPasswordFormUtils.h47 Vector<WebCore::HTMLInputElement*> passwords; member
/external/chromium/chrome/browser/resources/options/
Dpassword_manager_list.css39 #saved-passwords-list .url {
44 #saved-passwords-list .name {
49 #saved-passwords-list .password {
54 #saved-passwords-list .password input[type="password"],
55 #saved-passwords-list .password input[type="text"] {
64 #saved-passwords-list .url,
65 #saved-passwords-list .name,
/external/chromium/chrome/browser/sync/glue/
Dpassword_model_associator.cc51 std::vector<webkit_glue::PasswordForm*> passwords; in AssociateModels() local
52 if (!password_store_->FillAutofillableLogins(&passwords) || in AssociateModels()
53 !password_store_->FillBlacklistLogins(&passwords)) { in AssociateModels()
54 STLDeleteElements(&passwords); in AssociateModels()
72 passwords.begin(); in AssociateModels()
73 ix != passwords.end(); ++ix) { in AssociateModels()
89 STLDeleteElements(&passwords); in AssociateModels()
102 STLDeleteElements(&passwords); in AssociateModels()
115 STLDeleteElements(&passwords); in AssociateModels()
/external/e2fsprogs/lib/et/test_cases/
Dcontinuation.et4 "New password was found in a dictionary of possible passwords and\n\
Dheimdal2.et61 ec NULL, "Null passwords are not allowed"
/external/openssh/
DREADME.platform8 have passwords expired longer than the inactive time (ie the "Weeks between
12 Accounts in this state must have their passwords reset manually by the
14 passwords be reset before upgrading from OpenSSH <3.8.
Dsshd_config62 # To disable tunneled clear text passwords, change to no here!
66 # Change to no to disable s/key passwords
Dsshd_config.android61 # To disable tunneled clear text passwords, change to no here!
65 # Change to no to disable s/key passwords
DCREDITS6 Ahsan Rashid <arms@sco.com> - UnixWare long passwords
37 Dhiraj Gulati <dgulati@sco.com> - UnixWare long passwords
90 Thomas Neumann <tom@smart.ruhr.de> - Shadow passwords
Dscp.014 as ssh(1). Unlike rcp(1), scp will ask for passwords or passphrases if
38 -B Selects batch mode (prevents asking for passwords or
DINSTALL180 --with-md5-passwords will enable the use of MD5 passwords. Enable this
181 if your operating system uses MD5 passwords and the system crypt() does
183 resulting binary will support both MD5 and traditional crypt passwords.
DOVERVIEW57 are in readpass.c (the same code is used to read passwords).
/external/dropbear/
Dconfigure.in193 [ --disable-shadow Don't use shadow passwords (if available)],
196 AC_MSG_NOTICE(Not using shadow passwords)
199 AC_MSG_NOTICE(Using shadow passwords if available)
204 AC_MSG_NOTICE(Using shadow passwords if available)
DREADME66 (obviously). Shadow passwords will also be unusable as non-root.
/external/openssl/crypto/des/
DINSTALL17 run './rpw' to check the tty code for reading passwords works.
/external/webkit/Tools/BuildSlaveSupport/build.webkit.org-config/
Dmaster.cfg528 passwords = simplejson.load(open('passwords.json'))
534 …c['slaves'] = [BuildSlave(slave['name'], passwords[slave['name']], max_builds=1) for slave in conf…
/external/quake/quake/src/QW/
Dqw2do.txt61 x- allow 'password none' and 'spectator_password none' to clear passwords
/external/ipsec-tools/
DNEWS59 o Xauth can use shadow passwords
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/
Dwpa_supplicant.sgml364 <para>Include keys (passwords, etc.) in debug output.</para>
581 encrypted passwords.</para></listitem>
Dwpa_cli.sgml41 implement, e.g., one-time-passwords or generic token card
/external/chromium/chrome/browser/automation/
Dautomation_provider_observers.cc1658 ListValue* passwords = new ListValue; in OnPasswordStoreRequestDone() local
1677 passwords->Append(password_val); in OnPasswordStoreRequestDone()
1680 return_value->Set("passwords", passwords); in OnPasswordStoreRequestDone()
/external/chromium/chrome/browser/importer/
Dsafari_importer.mm302 // Safari stores it's passwords in the Keychain, same as us so we don't need
/external/qemu/
DChangelog60 - monitor: do_cont(): Don't ask for passwords (Luiz Capitulino)
99 - Fix reading encrypted hard disk passwords during early startup (Jan Kiszka)

123