/external/webkit/Source/WebKit/chromium/src/ |
D | WebPasswordFormData.cpp | 61 switch (fields->passwords.size()) { in locateSpecificPasswords() 64 *password = fields->passwords[0]; in locateSpecificPasswords() 67 if (fields->passwords[0]->value() == fields->passwords[1]->value()) in locateSpecificPasswords() 69 *password = fields->passwords[0]; in locateSpecificPasswords() 72 *oldPassword = fields->passwords[0]; in locateSpecificPasswords() 73 *password = fields->passwords[1]; in locateSpecificPasswords() 77 if (fields->passwords[0]->value() == fields->passwords[1]->value() in locateSpecificPasswords() 78 && fields->passwords[0]->value() == fields->passwords[2]->value()) { in locateSpecificPasswords() 80 *password = fields->passwords[0]; in locateSpecificPasswords() 81 } else if (fields->passwords[0]->value() == fields->passwords[1]->value()) { in locateSpecificPasswords() [all …]
|
D | WebPasswordFormUtils.cpp | 83 if ((fields->passwords.size() < maxPasswords) in findPasswordFormFields() 86 if (fields->passwords.isEmpty()) in findPasswordFormFields() 88 fields->passwords.append(inputElement); in findPasswordFormFields() 92 if (!fields->passwords.isEmpty()) { in findPasswordFormFields()
|
D | WebPasswordFormUtils.h | 47 Vector<WebCore::HTMLInputElement*> passwords; member
|
/external/chromium/chrome/browser/resources/options/ |
D | password_manager_list.css | 39 #saved-passwords-list .url { 44 #saved-passwords-list .name { 49 #saved-passwords-list .password { 54 #saved-passwords-list .password input[type="password"], 55 #saved-passwords-list .password input[type="text"] { 64 #saved-passwords-list .url, 65 #saved-passwords-list .name,
|
/external/chromium/chrome/browser/sync/glue/ |
D | password_model_associator.cc | 51 std::vector<webkit_glue::PasswordForm*> passwords; in AssociateModels() local 52 if (!password_store_->FillAutofillableLogins(&passwords) || in AssociateModels() 53 !password_store_->FillBlacklistLogins(&passwords)) { in AssociateModels() 54 STLDeleteElements(&passwords); in AssociateModels() 72 passwords.begin(); in AssociateModels() 73 ix != passwords.end(); ++ix) { in AssociateModels() 89 STLDeleteElements(&passwords); in AssociateModels() 102 STLDeleteElements(&passwords); in AssociateModels() 115 STLDeleteElements(&passwords); in AssociateModels()
|
/external/e2fsprogs/lib/et/test_cases/ |
D | continuation.et | 4 "New password was found in a dictionary of possible passwords and\n\
|
D | heimdal2.et | 61 ec NULL, "Null passwords are not allowed"
|
/external/openssh/ |
D | README.platform | 8 have passwords expired longer than the inactive time (ie the "Weeks between 12 Accounts in this state must have their passwords reset manually by the 14 passwords be reset before upgrading from OpenSSH <3.8.
|
D | sshd_config | 62 # To disable tunneled clear text passwords, change to no here! 66 # Change to no to disable s/key passwords
|
D | sshd_config.android | 61 # To disable tunneled clear text passwords, change to no here! 65 # Change to no to disable s/key passwords
|
D | CREDITS | 6 Ahsan Rashid <arms@sco.com> - UnixWare long passwords 37 Dhiraj Gulati <dgulati@sco.com> - UnixWare long passwords 90 Thomas Neumann <tom@smart.ruhr.de> - Shadow passwords
|
D | scp.0 | 14 as ssh(1). Unlike rcp(1), scp will ask for passwords or passphrases if 38 -B Selects batch mode (prevents asking for passwords or
|
D | INSTALL | 180 --with-md5-passwords will enable the use of MD5 passwords. Enable this 181 if your operating system uses MD5 passwords and the system crypt() does 183 resulting binary will support both MD5 and traditional crypt passwords.
|
D | OVERVIEW | 57 are in readpass.c (the same code is used to read passwords).
|
/external/dropbear/ |
D | configure.in | 193 [ --disable-shadow Don't use shadow passwords (if available)], 196 AC_MSG_NOTICE(Not using shadow passwords) 199 AC_MSG_NOTICE(Using shadow passwords if available) 204 AC_MSG_NOTICE(Using shadow passwords if available)
|
D | README | 66 (obviously). Shadow passwords will also be unusable as non-root.
|
/external/openssl/crypto/des/ |
D | INSTALL | 17 run './rpw' to check the tty code for reading passwords works.
|
/external/webkit/Tools/BuildSlaveSupport/build.webkit.org-config/ |
D | master.cfg | 528 passwords = simplejson.load(open('passwords.json')) 534 …c['slaves'] = [BuildSlave(slave['name'], passwords[slave['name']], max_builds=1) for slave in conf…
|
/external/quake/quake/src/QW/ |
D | qw2do.txt | 61 x- allow 'password none' and 'spectator_password none' to clear passwords
|
/external/ipsec-tools/ |
D | NEWS | 59 o Xauth can use shadow passwords
|
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/ |
D | wpa_supplicant.sgml | 364 <para>Include keys (passwords, etc.) in debug output.</para> 581 encrypted passwords.</para></listitem>
|
D | wpa_cli.sgml | 41 implement, e.g., one-time-passwords or generic token card
|
/external/chromium/chrome/browser/automation/ |
D | automation_provider_observers.cc | 1658 ListValue* passwords = new ListValue; in OnPasswordStoreRequestDone() local 1677 passwords->Append(password_val); in OnPasswordStoreRequestDone() 1680 return_value->Set("passwords", passwords); in OnPasswordStoreRequestDone()
|
/external/chromium/chrome/browser/importer/ |
D | safari_importer.mm | 302 // Safari stores it's passwords in the Keychain, same as us so we don't need
|
/external/qemu/ |
D | Changelog | 60 - monitor: do_cont(): Don't ask for passwords (Luiz Capitulino) 99 - Fix reading encrypted hard disk passwords during early startup (Jan Kiszka)
|