/external/chromium/chrome/browser/ |
H A D | accessibility_events.h | 190 bool password); 204 bool password() const { return password_; } function in class:AccessibilityTextBoxInfo
|
/external/chromium/chrome/browser/chromeos/login/ |
H A D | enterprise_enrollment_view.cc | 147 const std::string& password, 150 controller_->Authenticate(user, password, captcha, access_code); 146 OnAuthSubmitted(const std::string& user, const std::string& password, const std::string& captcha, const std::string& access_code) argument
|
H A D | google_authenticator.cc | 104 const std::string& password, 109 password_.assign(password); 115 // Not clearing the password, because we may need to pass it to the 124 const std::string& password, 129 // TODO(cmasone): Figure out how to parallelize fetch, username/password 132 ascii_hash_.assign(HashPassword(password)); 139 PrepareClientLoginAttempt(password, login_token, login_captcha); 145 const std::string& password) { 148 ascii_hash_.assign(HashPassword(password)); 370 // User seems to have given us the wrong old password 103 PrepareClientLoginAttempt( const std::string& password, const std::string& token, const std::string& captcha) argument 121 AuthenticateToLogin( Profile* profile, const std::string& username, const std::string& password, const std::string& login_token, const std::string& login_captcha) argument 144 AuthenticateToUnlock(const std::string& username, const std::string& password) argument 384 RetryAuth(Profile* profile, const std::string& username, const std::string& password, const std::string& login_token, const std::string& login_captcha) argument 431 HashPassword(const std::string& password) argument [all...] |
H A D | login_performer.cc | 111 const std::string& password, 125 // 1. ScreenLock active (pending correct new password input) 133 password, 237 const std::string& password) { 239 password_ = password; 249 password)); 358 // Offline auth OK, so it might be the case of changed password. 109 OnLoginSuccess( const std::string& username, const std::string& password, const GaiaAuthConsumer::ClientLoginResult& credentials, bool pending_requests) argument 236 Login(const std::string& username, const std::string& password) argument
|
H A D | mock_authenticator.h | 38 const std::string& password, 41 if (expected_username_ == username && expected_password_ == password) { 56 const std::string& password) { 57 return AuthenticateToLogin(NULL /* not used */, username, password, 91 const std::string& password, 115 const std::string& password, 120 EXPECT_EQ(expected_password_, password); 36 AuthenticateToLogin(Profile* profile, const std::string& username, const std::string& password, const std::string& login_token, const std::string& login_captcha) argument 55 AuthenticateToUnlock(const std::string& username, const std::string& password) argument 89 RetryAuth(Profile* profile, const std::string& username, const std::string& password, const std::string& login_token, const std::string& login_captcha) argument 114 PrepareProfile(const std::string& username, const std::string& password, const GaiaAuthConsumer::ClientLoginResult& res, bool pending_requests, Delegate* delegate) argument
|
H A D | parallel_authenticator.cc | 70 const std::string& password, 76 password, 77 HashPassword(password), 99 const std::string& password) { 102 HashPassword(password))); 141 current_state_->password, 248 const std::string& password, 253 password, 254 HashPassword(password), 323 // the same path they get when their password i 67 AuthenticateToLogin( Profile* profile, const std::string& username, const std::string& password, const std::string& login_token, const std::string& login_captcha) argument 98 AuthenticateToUnlock(const std::string& username, const std::string& password) argument 246 RetryAuth(Profile* profile, const std::string& username, const std::string& password, const std::string& login_token, const std::string& login_captcha) argument 572 HashPassword(const std::string& password) argument [all...] |
H A D | parallel_authenticator_unittest.cc | 179 const std::string& password, 182 EXPECT_CALL(consumer_, OnLoginSuccess(username, password, result, pending)) 427 // asserting that the wrong password was used. 178 ExpectLoginSuccess(const std::string& username, const std::string& password, const GaiaAuthConsumer::ClientLoginResult& result, bool pending) argument
|
H A D | views_login_display.cc | 253 const string16& password) { 254 delegate()->Login(source->user().email(), UTF16ToUTF8(password)); 252 Login(UserController* source, const string16& password) argument
|
/external/chromium/chrome/browser/printing/cloud_print/ |
H A D | cloud_print_setup_flow.cc | 234 const std::string& password, 251 authenticator_->StartClientLogin(user, password, 233 OnUserSubmittedAuth(const std::string& user, const std::string& password, const std::string& captcha, const std::string& access_code) argument
|
/external/chromium/chrome/browser/sync/engine/ |
H A D | syncer_util.cc | 340 } else if (specifics.HasExtension(sync_pb::password)) { 342 const sync_pb::PasswordSpecifics& password = local 343 specifics.GetExtension(sync_pb::password); 344 if (!cryptographer->CanDecrypt(password.encrypted())) {
|
/external/chromium/chrome/browser/sync/glue/ |
H A D | password_model_associator.cc | 48 // We must not be holding a transaction when we interact with the password 55 LOG(ERROR) << "Could not get the password entries."; 66 LOG(ERROR) << "Server did not create the top-level password node. We " 80 const sync_pb::PasswordSpecificsData& password = local 82 DCHECK_EQ(tag, MakeTag(password)); 86 if (MergePasswords(password, **ix, &new_password)) { 90 LOG(ERROR) << "Failed to edit password sync node."; 103 LOG(ERROR) << "Failed to create password sync node."; 124 const sync_pb::PasswordSpecificsData& password = local 126 std::string tag = MakeTag(password); 230 GetSyncIdFromChromeId( const std::string& password) argument 236 Associate( const std::string* password, int64 sync_id) argument 299 CopyPassword( const sync_pb::PasswordSpecificsData& password, webkit_glue::PasswordForm* new_password) argument 324 MergePasswords( const sync_pb::PasswordSpecificsData& password, const webkit_glue::PasswordForm& password_form, webkit_glue::PasswordForm* new_password) argument 364 sync_pb::PasswordSpecificsData password; local 382 MakeTag( const webkit_glue::PasswordForm& password) argument 392 MakeTag( const sync_pb::PasswordSpecificsData& password) argument [all...] |
/external/chromium/chrome/browser/sync/ |
H A D | profile_sync_service_harness.cc | 91 const std::string& password, 99 password_(password), 119 const std::string& password) { 121 password_ = password; 88 ProfileSyncServiceHarness( Profile* profile, const std::string& username, const std::string& password, int id) argument 118 SetCredentials(const std::string& username, const std::string& password) argument
|
H A D | profile_sync_service_password_unittest.cc | 270 const sync_pb::PasswordSpecificsData& password = local 274 PasswordModelAssociator::CopyPassword(password, &form); 492 // every time the password store is accessed.
|
H A D | sync_setup_flow.cc | 34 // Helper function to disable password sync. 228 const std::string& password, 231 service_->OnUserSubmittedAuth(username, password, captcha, access_code); 227 OnUserSubmittedAuth(const std::string& username, const std::string& password, const std::string& captcha, const std::string& access_code) argument
|
/external/chromium/chrome/browser/ui/gtk/ |
H A D | crypto_module_password_dialog.cc | 64 void GotPassword(const char* password) { argument 65 if (password) 66 password_ = password;
|
/external/chromium/chrome/browser/ui/login/ |
H A D | login_prompt_browsertest.cc | 42 const std::wstring password) 43 : username_(username), password_(password) {} 332 // Testing for recovery from an incorrect password for the case where 374 // The request should be retried after the incorrect password is 41 AuthInfo(const std::wstring username, const std::wstring password) argument
|
H A D | login_prompt_ui.cc | 36 dict.SetString("password", 132 const std::wstring& password); 170 const std::wstring& password) { 172 delegate_->ShowAutofillData(username, password); 208 string16 password; local 211 !res->GetString("password", &password)) { 214 login_handler_->SetAuth(username, password); 222 const std::wstring& password) { 224 autofill_password_ = WideToUTF8(password); 169 OnAutofillDataAvailable(const std::wstring& username, const std::wstring& password) argument 221 ShowAutofillData(const std::wstring& username, const std::wstring& password) argument [all...] |
/external/chromium/chrome/browser/ui/views/ |
H A D | accessibility_event_router_views.cc | 269 bool password = textfield->IsPassword(); local 270 AccessibilityTextBoxInfo info(profile, name, password);
|
/external/chromium/chrome/browser/ui/webui/options/ |
H A D | sync_setup_handler.cc | 41 std::string* password, 50 !result->GetString("pass", password) || 377 std::string username, password, captcha, access_code; 378 if (!GetAuthData(json, &username, &password, &captcha, &access_code)) { 386 flow_->OnUserSubmittedAuth(username, password, captcha, access_code); 39 GetAuthData(const std::string& json, std::string* username, std::string* password, std::string* captcha, std::string* access_code) argument
|
/external/chromium/chrome/common/net/gaia/ |
H A D | gaia_authenticator.cc | 62 const string& password, 68 params.password = password; 76 const string& password, 82 MakeParams(user_name, password, captcha_token, captcha_value); 124 results->password = params.password; 162 post_body += "&Passwd=" + EscapeUrlEncodedData(params.password); 367 const string& password) { 369 auth_results_.password 60 MakeParams( const string& user_name, const string& password, const string& captcha_token, const string& captcha_value) argument 75 Authenticate(const string& user_name, const string& password, const string& captcha_token, const string& captcha_value) argument 366 SetUsernamePassword(const string& username, const string& password) argument 388 Authenticate(const string& user_name, const string& password) argument [all...] |
H A D | gaia_authenticator.h | 22 // email address associated with the Gaia account can be read; the password is 109 bool Authenticate(const std::string& user_name, const std::string& password, 113 bool Authenticate(const std::string& user_name, const std::string& password); 125 const std::string& password); 138 std::string password; member in struct:gaia::GaiaAuthenticator::AuthResults 164 std::string password; member in struct:gaia::GaiaAuthenticator::AuthParams 171 const std::string& password, 203 // Retrieve password. 204 inline std::string password() const { function in class:gaia::GaiaAuthenticator 206 return auth_results_.password; [all...] |
/external/chromium/crypto/ |
H A D | symmetric_key_win.cc | 247 // password P and the concatenation of the salt S and the block index i: 356 const std::string& password, 390 // Convert the user password into a key suitable to be fed into the PRF 394 const_cast<BYTE*>(reinterpret_cast<const BYTE*>(password.data())); 396 password.size(), &password_as_key)) 433 // to the password P, the salt S, the iteration count c, and the block 355 DeriveKeyFromPassword(Algorithm algorithm, const std::string& password, const std::string& salt, size_t iterations, size_t key_size_in_bits) argument
|
/external/chromium/googleurl/src/ |
H A D | gurl_unittest.cc | 80 EXPECT_EQ("pass", url.password()); 96 EXPECT_EQ("", url.password()); 114 EXPECT_EQ("pass", url2.password()); 129 EXPECT_EQ("", invalid2.password()); 146 EXPECT_EQ("", url.password()); 236 const char* password; member in struct:ReplaceCase 258 SetupReplacement(&GURL::Replacements::SetPassword, &repl, cur.password);
|
H A D | url_canon_etc.cc | 168 // The username and password components reference ranges in the corresponding 176 const url_parse::Component& password, 180 if (username.len <= 0 && password.len <= 0) { 196 // When there is a password, we need the separator. Note that we strip 198 if (password.len > 0) { 201 AppendStringOfType(&password_spec[password.begin], password.len, 338 const url_parse::Component& password, 343 username_source, username, password_source, password, 350 const url_parse::Component& password, 173 DoUserInfo(const CHAR* username_spec, const url_parse::Component& username, const CHAR* password_spec, const url_parse::Component& password, CanonOutput* output, url_parse::Component* out_username, url_parse::Component* out_password) argument 335 CanonicalizeUserInfo(const char* username_source, const url_parse::Component& username, const char* password_source, const url_parse::Component& password, CanonOutput* output, url_parse::Component* out_username, url_parse::Component* out_password) argument 347 CanonicalizeUserInfo(const char16* username_source, const url_parse::Component& username, const char16* password_source, const url_parse::Component& password, CanonOutput* output, url_parse::Component* out_username, url_parse::Component* out_password) argument [all...] |
H A D | url_parse_unittest.cc | 79 const char* password; member in struct:__anon2931::URLParseCase 199 // This case is a little weird. It will report that the password would 287 // ... "]" in the password field isn't allowed, but we tolerate it here... 340 EXPECT_TRUE(ComponentMatches(url, cases[i].password, parsed.password)); 377 ExpectInvalidComponent(parsed.password); 431 EXPECT_TRUE(ComponentMatches(url, file_cases[i].password, parsed.password)); 579 ExpectInvalidComponent(parsed.password);
|