/external/chromium_org/third_party/WebKit/Source/web/ |
D | WebPasswordFormData.cpp | 58 switch (fields->passwords.size()) { in locateSpecificPasswords() 61 *password = fields->passwords[0]; in locateSpecificPasswords() 64 if (fields->passwords[0]->value() == fields->passwords[1]->value()) in locateSpecificPasswords() 66 *password = fields->passwords[0]; in locateSpecificPasswords() 69 *oldPassword = fields->passwords[0]; in locateSpecificPasswords() 70 *password = fields->passwords[1]; in locateSpecificPasswords() 74 if (fields->passwords[0]->value() == fields->passwords[1]->value() in locateSpecificPasswords() 75 && fields->passwords[0]->value() == fields->passwords[2]->value()) { in locateSpecificPasswords() 77 *password = fields->passwords[0]; in locateSpecificPasswords() 78 } else if (fields->passwords[0]->value() == fields->passwords[1]->value()) { in locateSpecificPasswords() [all …]
|
D | WebPasswordFormUtils.cpp | 79 if ((fields->passwords.size() < maxPasswords) in findPasswordFormFields() 83 if (fields->passwords.isEmpty() && latestInputElement) { in findPasswordFormFields() 89 fields->passwords.append(inputElement); in findPasswordFormFields()
|
D | WebPasswordFormUtils.h | 53 Vector<WebCore::HTMLInputElement*> passwords; member
|
/external/chromium_org/chrome/browser/resources/options/ |
D | password_manager_list.css | 5 #saved-passwords-list .list-inline-button { 15 html[dir='ltr'] #saved-passwords-list .list-inline-button { 19 html[dir='rtl'] #saved-passwords-list .list-inline-button { 28 #saved-passwords-list .url { 33 #saved-passwords-list .name { 38 #saved-passwords-list .password { 43 #saved-passwords-list .password input[type='password'], 44 #saved-passwords-list .password input[type='text'] { 53 #saved-passwords-list .url, 54 #saved-passwords-list .name,
|
D | password_manager.css | 26 #passwords-title {
|
/external/chromium/chrome/browser/resources/options/ |
D | password_manager_list.css | 39 #saved-passwords-list .url { 44 #saved-passwords-list .name { 49 #saved-passwords-list .password { 54 #saved-passwords-list .password input[type="password"], 55 #saved-passwords-list .password input[type="text"] { 64 #saved-passwords-list .url, 65 #saved-passwords-list .name,
|
/external/chromium_org/components/autofill/content/renderer/ |
D | password_generation_agent.cc | 37 std::vector<blink::WebInputElement>* passwords) { in GetAccountCreationPasswordFields() argument 52 passwords->push_back(*input_element); in GetAccountCreationPasswordFields() 59 if (!passwords->empty() && num_input_elements >= 3) { in GetAccountCreationPasswordFields() 63 if (passwords->size() > 2) in GetAccountCreationPasswordFields() 64 passwords->resize(2); in GetAccountCreationPasswordFields() 152 std::vector<blink::WebInputElement> passwords; in DidFinishLoad() local 153 if (GetAccountCreationPasswordFields(forms[i], &passwords)) { in DidFinishLoad() 157 passwords_ = passwords; in DidFinishLoad()
|
/external/chromium_org/chrome/browser/resources/gaia_auth/ |
D | main.js | 234 function(passwords) { argument 235 if (passwords.length == 0) { 250 function(passwords) { argument 251 for (var i = 0; i < passwords.length; ++i) { 252 if (passwords[i] == password) { 253 this.completeLogin(this.email_, passwords[i]);
|
D | background.js | 137 var passwords = {}; 139 passwords[this.passwordStore_[property]] = true; 141 return Object.keys(passwords);
|
/external/chromium/chrome/browser/sync/glue/ |
D | password_model_associator.cc | 51 std::vector<webkit_glue::PasswordForm*> passwords; in AssociateModels() local 52 if (!password_store_->FillAutofillableLogins(&passwords) || in AssociateModels() 53 !password_store_->FillBlacklistLogins(&passwords)) { in AssociateModels() 54 STLDeleteElements(&passwords); in AssociateModels() 72 passwords.begin(); in AssociateModels() 73 ix != passwords.end(); ++ix) { in AssociateModels() 89 STLDeleteElements(&passwords); in AssociateModels() 102 STLDeleteElements(&passwords); in AssociateModels() 115 STLDeleteElements(&passwords); in AssociateModels()
|
/external/chromium_org/chrome/browser/sync/glue/ |
D | password_model_associator.cc | 69 std::vector<autofill::PasswordForm*> passwords; in AssociateModels() local 70 if (!password_store_->FillAutofillableLogins(&passwords) || in AssociateModels() 71 !password_store_->FillBlacklistLogins(&passwords)) { in AssociateModels() 72 STLDeleteElements(&passwords); in AssociateModels() 98 passwords.begin(); in AssociateModels() 99 ix != passwords.end(); ++ix) { in AssociateModels() 115 STLDeleteElements(&passwords); in AssociateModels() 131 STLDeleteElements(&passwords); in AssociateModels() 146 STLDeleteElements(&passwords); in AssociateModels()
|
/external/chromium_org/chrome/browser/password_manager/ |
D | password_form_manager_unittest.cc | 382 TestPasswordStore::PasswordMap passwords = password_store->stored_passwords(); in TEST_F() local 383 EXPECT_EQ(1U, passwords.size()); in TEST_F() 384 ASSERT_EQ(1U, passwords[saved_match()->signon_realm].size()); in TEST_F() 386 passwords[saved_match()->signon_realm][0].username_value); in TEST_F() 389 passwords[saved_match()->signon_realm][0]. in TEST_F() 412 passwords = password_store->stored_passwords(); in TEST_F() 413 EXPECT_EQ(1U, passwords.size()); in TEST_F() 414 ASSERT_EQ(1U, passwords[saved_match()->signon_realm].size()); in TEST_F() 416 passwords[saved_match()->signon_realm][0].username_value); in TEST_F() 419 passwords[saved_match()->signon_realm][0]. in TEST_F()
|
D | password_manager_util_mac.mm | 23 {"com.google.Chrome.show-passwords", 0, NULL, 0}
|
/external/chromium_org/chrome/test/functional/ |
D | PYAUTO_TESTS | 50 'passwords', 155 '-passwords.PasswordTest.testPasswdInfoNotStoredWhenAutocompleteOff', 157 '-passwords.PasswordTest.testSavedPasswordInTabsAndWindows', 190 '-passwords', 205 '-passwords', 264 '-passwords.PasswordTest.testClearFetchedCredForNewUserName', 265 '-passwords.PasswordTest.testSavedPasswordInTabsAndWindows',
|
/external/e2fsprogs/lib/et/test_cases/ |
D | continuation.et | 4 "New password was found in a dictionary of possible passwords and\n\
|
D | heimdal2.et | 61 ec NULL, "Null passwords are not allowed"
|
/external/openssh/ |
D | README.platform | 8 have passwords expired longer than the inactive time (ie the "Weeks between 12 Accounts in this state must have their passwords reset manually by the 14 passwords be reset before upgrading from OpenSSH <3.8.
|
D | sshd_config | 62 # To disable tunneled clear text passwords, change to no here! 66 # Change to no to disable s/key passwords
|
D | sshd_config.android | 61 # To disable tunneled clear text passwords, change to no here! 65 # Change to no to disable s/key passwords
|
D | CREDITS | 6 Ahsan Rashid <arms@sco.com> - UnixWare long passwords 37 Dhiraj Gulati <dgulati@sco.com> - UnixWare long passwords 90 Thomas Neumann <tom@smart.ruhr.de> - Shadow passwords
|
D | scp.0 | 14 as ssh(1). Unlike rcp(1), scp will ask for passwords or passphrases if 38 -B Selects batch mode (prevents asking for passwords or
|
D | INSTALL | 180 --with-md5-passwords will enable the use of MD5 passwords. Enable this 181 if your operating system uses MD5 passwords and the system crypt() does 183 resulting binary will support both MD5 and traditional crypt passwords.
|
/external/dropbear/ |
D | configure.in | 193 [ --disable-shadow Don't use shadow passwords (if available)], 196 AC_MSG_NOTICE(Not using shadow passwords) 199 AC_MSG_NOTICE(Using shadow passwords if available) 204 AC_MSG_NOTICE(Using shadow passwords if available)
|
D | README | 66 (obviously). Shadow passwords will also be unusable as non-root.
|
/external/openssl/crypto/des/ |
D | INSTALL | 17 run './rpw' to check the tty code for reading passwords works.
|