Searched refs:passwords (Results 1 - 10 of 10) sorted by relevance

/external/webkit/Source/WebKit/chromium/src/
H A DWebPasswordFormData.cpp61 switch (fields->passwords.size()) {
64 *password = fields->passwords[0];
67 if (fields->passwords[0]->value() == fields->passwords[1]->value())
68 // Treat two identical passwords as a single password.
69 *password = fields->passwords[0];
72 *oldPassword = fields->passwords[0];
73 *password = fields->passwords[1];
77 if (fields->passwords[0]->value() == fields->passwords[
[all...]
H A DWebPasswordFormUtils.cpp83 if ((fields->passwords.size() < maxPasswords)
86 if (fields->passwords.isEmpty())
88 fields->passwords.append(inputElement);
92 if (!fields->passwords.isEmpty()) {
H A DWebPasswordFormUtils.h44 // Helper structure to locate username, passwords and submit fields.
47 Vector<WebCore::HTMLInputElement*> passwords; member in struct:WebKit::PasswordFormFields
/external/chromium/chrome/browser/resources/options/
H A Dpassword_manager_list.css39 #saved-passwords-list .url {
44 #saved-passwords-list .name {
49 #saved-passwords-list .password {
54 #saved-passwords-list .password input[type="password"],
55 #saved-passwords-list .password input[type="text"] {
64 #saved-passwords-list .url,
65 #saved-passwords-list .name,
/external/chromium/chrome/browser/sync/glue/
H A Dpassword_model_associator.cc51 std::vector<webkit_glue::PasswordForm*> passwords; local
52 if (!password_store_->FillAutofillableLogins(&passwords) ||
53 !password_store_->FillBlacklistLogins(&passwords)) {
54 STLDeleteElements(&passwords);
72 passwords.begin();
73 ix != passwords.end(); ++ix) {
89 STLDeleteElements(&passwords);
102 STLDeleteElements(&passwords);
115 STLDeleteElements(&passwords);
146 LOG(ERROR) << "Failed to write passwords
[all...]
/external/chromium/chrome/browser/automation/
H A Dautomation_provider_observers.cc1658 ListValue* passwords = new ListValue; local
1677 passwords->Append(password_val);
1680 return_value->Set("passwords", passwords);
/external/openssh/contrib/redhat/
H A Dopenssh.spec200 --with-md5-passwords \
/external/dropbear/libtomcrypt/
H A Dcrypt.tex4766 In order to securely handle user passwords for the purposes of creating session keys and chaining IVs the PKCS \#5 was drafted. PKCS \#5
4785 Where \textit{password} is the user's password. Since the algorithm allows binary passwords you must also specify the length in \textit{password\_len}.
4809 Where \textit{password} is the users password. Since the algorithm allows binary passwords you must also specify the length in \textit{password\_len}.
/external/openssh/
H A Dconfigure1430 --with-md5-passwords Enable use of MD5 passwords
15427 # Check whether to enable MD5 passwords
15430 # Check whether --with-md5-passwords was given.
/external/dropbear/
H A Dconfigure852 --disable-shadow Don't use shadow passwords (if available)
4527 { echo "$as_me:$LINENO: Not using shadow passwords" >&5
4528 echo "$as_me: Not using shadow passwords" >&6;}
4680 { echo "$as_me:$LINENO: Using shadow passwords if available" >&5
4681 echo "$as_me: Using shadow passwords if available" >&6;}
4836 { echo "$as_me:$LINENO: Using shadow passwords if available" >&5
4837 echo "$as_me: Using shadow passwords if available" >&6;}

Completed in 584 milliseconds