Home
last modified time | relevance | path

Searched refs:passwords (Results 1 – 25 of 62) sorted by relevance

123

/external/chromium_org/third_party/WebKit/Source/web/
DWebPasswordFormData.cpp58 switch (fields->passwords.size()) { in locateSpecificPasswords()
61 *password = fields->passwords[0]; in locateSpecificPasswords()
64 if (fields->passwords[0]->value() == fields->passwords[1]->value()) in locateSpecificPasswords()
66 *password = fields->passwords[0]; in locateSpecificPasswords()
69 *oldPassword = fields->passwords[0]; in locateSpecificPasswords()
70 *password = fields->passwords[1]; in locateSpecificPasswords()
74 if (fields->passwords[0]->value() == fields->passwords[1]->value() in locateSpecificPasswords()
75 && fields->passwords[0]->value() == fields->passwords[2]->value()) { in locateSpecificPasswords()
77 *password = fields->passwords[0]; in locateSpecificPasswords()
78 } else if (fields->passwords[0]->value() == fields->passwords[1]->value()) { in locateSpecificPasswords()
[all …]
DWebPasswordFormUtils.cpp79 if ((fields->passwords.size() < maxPasswords) in findPasswordFormFields()
83 if (fields->passwords.isEmpty() && latestInputElement) { in findPasswordFormFields()
89 fields->passwords.append(inputElement); in findPasswordFormFields()
DWebPasswordFormUtils.h53 Vector<WebCore::HTMLInputElement*> passwords; member
/external/chromium_org/chrome/browser/resources/options/
Dpassword_manager_list.css5 #saved-passwords-list .list-inline-button {
15 html[dir='ltr'] #saved-passwords-list .list-inline-button {
19 html[dir='rtl'] #saved-passwords-list .list-inline-button {
28 #saved-passwords-list .url {
33 #saved-passwords-list .name {
38 #saved-passwords-list .password {
43 #saved-passwords-list .password input[type='password'],
44 #saved-passwords-list .password input[type='text'] {
53 #saved-passwords-list .url,
54 #saved-passwords-list .name,
Dpassword_manager.css26 #passwords-title {
/external/chromium/chrome/browser/resources/options/
Dpassword_manager_list.css39 #saved-passwords-list .url {
44 #saved-passwords-list .name {
49 #saved-passwords-list .password {
54 #saved-passwords-list .password input[type="password"],
55 #saved-passwords-list .password input[type="text"] {
64 #saved-passwords-list .url,
65 #saved-passwords-list .name,
/external/chromium_org/components/autofill/content/renderer/
Dpassword_generation_agent.cc37 std::vector<blink::WebInputElement>* passwords) { in GetAccountCreationPasswordFields() argument
52 passwords->push_back(*input_element); in GetAccountCreationPasswordFields()
59 if (!passwords->empty() && num_input_elements >= 3) { in GetAccountCreationPasswordFields()
63 if (passwords->size() > 2) in GetAccountCreationPasswordFields()
64 passwords->resize(2); in GetAccountCreationPasswordFields()
152 std::vector<blink::WebInputElement> passwords; in DidFinishLoad() local
153 if (GetAccountCreationPasswordFields(forms[i], &passwords)) { in DidFinishLoad()
157 passwords_ = passwords; in DidFinishLoad()
/external/chromium_org/chrome/browser/resources/gaia_auth/
Dmain.js234 function(passwords) { argument
235 if (passwords.length == 0) {
250 function(passwords) { argument
251 for (var i = 0; i < passwords.length; ++i) {
252 if (passwords[i] == password) {
253 this.completeLogin(this.email_, passwords[i]);
Dbackground.js137 var passwords = {};
139 passwords[this.passwordStore_[property]] = true;
141 return Object.keys(passwords);
/external/chromium/chrome/browser/sync/glue/
Dpassword_model_associator.cc51 std::vector<webkit_glue::PasswordForm*> passwords; in AssociateModels() local
52 if (!password_store_->FillAutofillableLogins(&passwords) || in AssociateModels()
53 !password_store_->FillBlacklistLogins(&passwords)) { in AssociateModels()
54 STLDeleteElements(&passwords); in AssociateModels()
72 passwords.begin(); in AssociateModels()
73 ix != passwords.end(); ++ix) { in AssociateModels()
89 STLDeleteElements(&passwords); in AssociateModels()
102 STLDeleteElements(&passwords); in AssociateModels()
115 STLDeleteElements(&passwords); in AssociateModels()
/external/chromium_org/chrome/browser/sync/glue/
Dpassword_model_associator.cc69 std::vector<autofill::PasswordForm*> passwords; in AssociateModels() local
70 if (!password_store_->FillAutofillableLogins(&passwords) || in AssociateModels()
71 !password_store_->FillBlacklistLogins(&passwords)) { in AssociateModels()
72 STLDeleteElements(&passwords); in AssociateModels()
98 passwords.begin(); in AssociateModels()
99 ix != passwords.end(); ++ix) { in AssociateModels()
115 STLDeleteElements(&passwords); in AssociateModels()
131 STLDeleteElements(&passwords); in AssociateModels()
146 STLDeleteElements(&passwords); in AssociateModels()
/external/chromium_org/chrome/browser/password_manager/
Dpassword_form_manager_unittest.cc382 TestPasswordStore::PasswordMap passwords = password_store->stored_passwords(); in TEST_F() local
383 EXPECT_EQ(1U, passwords.size()); in TEST_F()
384 ASSERT_EQ(1U, passwords[saved_match()->signon_realm].size()); in TEST_F()
386 passwords[saved_match()->signon_realm][0].username_value); in TEST_F()
389 passwords[saved_match()->signon_realm][0]. in TEST_F()
412 passwords = password_store->stored_passwords(); in TEST_F()
413 EXPECT_EQ(1U, passwords.size()); in TEST_F()
414 ASSERT_EQ(1U, passwords[saved_match()->signon_realm].size()); in TEST_F()
416 passwords[saved_match()->signon_realm][0].username_value); in TEST_F()
419 passwords[saved_match()->signon_realm][0]. in TEST_F()
Dpassword_manager_util_mac.mm23 {"com.google.Chrome.show-passwords", 0, NULL, 0}
/external/chromium_org/chrome/test/functional/
DPYAUTO_TESTS50 'passwords',
155 '-passwords.PasswordTest.testPasswdInfoNotStoredWhenAutocompleteOff',
157 '-passwords.PasswordTest.testSavedPasswordInTabsAndWindows',
190 '-passwords',
205 '-passwords',
264 '-passwords.PasswordTest.testClearFetchedCredForNewUserName',
265 '-passwords.PasswordTest.testSavedPasswordInTabsAndWindows',
/external/e2fsprogs/lib/et/test_cases/
Dcontinuation.et4 "New password was found in a dictionary of possible passwords and\n\
Dheimdal2.et61 ec NULL, "Null passwords are not allowed"
/external/openssh/
DREADME.platform8 have passwords expired longer than the inactive time (ie the "Weeks between
12 Accounts in this state must have their passwords reset manually by the
14 passwords be reset before upgrading from OpenSSH <3.8.
Dsshd_config62 # To disable tunneled clear text passwords, change to no here!
66 # Change to no to disable s/key passwords
Dsshd_config.android61 # To disable tunneled clear text passwords, change to no here!
65 # Change to no to disable s/key passwords
DCREDITS6 Ahsan Rashid <arms@sco.com> - UnixWare long passwords
37 Dhiraj Gulati <dgulati@sco.com> - UnixWare long passwords
90 Thomas Neumann <tom@smart.ruhr.de> - Shadow passwords
Dscp.014 as ssh(1). Unlike rcp(1), scp will ask for passwords or passphrases if
38 -B Selects batch mode (prevents asking for passwords or
DINSTALL180 --with-md5-passwords will enable the use of MD5 passwords. Enable this
181 if your operating system uses MD5 passwords and the system crypt() does
183 resulting binary will support both MD5 and traditional crypt passwords.
/external/dropbear/
Dconfigure.in193 [ --disable-shadow Don't use shadow passwords (if available)],
196 AC_MSG_NOTICE(Not using shadow passwords)
199 AC_MSG_NOTICE(Using shadow passwords if available)
204 AC_MSG_NOTICE(Using shadow passwords if available)
DREADME66 (obviously). Shadow passwords will also be unusable as non-root.
/external/openssl/crypto/des/
DINSTALL17 run './rpw' to check the tty code for reading passwords works.

123