Searched defs:password (Results 201 - 225 of 541) sorted by relevance

1234567891011>>

/external/chromium/chrome/browser/
H A Daccessibility_events.h190 bool password);
204 bool password() const { return password_; } function in class:AccessibilityTextBoxInfo
/external/chromium/chrome/browser/chromeos/login/
H A Denterprise_enrollment_view.cc147 const std::string& password,
150 controller_->Authenticate(user, password, captcha, access_code);
146 OnAuthSubmitted(const std::string& user, const std::string& password, const std::string& captcha, const std::string& access_code) argument
H A Dgoogle_authenticator.cc104 const std::string& password,
109 password_.assign(password);
115 // Not clearing the password, because we may need to pass it to the
124 const std::string& password,
129 // TODO(cmasone): Figure out how to parallelize fetch, username/password
132 ascii_hash_.assign(HashPassword(password));
139 PrepareClientLoginAttempt(password, login_token, login_captcha);
145 const std::string& password) {
148 ascii_hash_.assign(HashPassword(password));
370 // User seems to have given us the wrong old password
103 PrepareClientLoginAttempt( const std::string& password, const std::string& token, const std::string& captcha) argument
121 AuthenticateToLogin( Profile* profile, const std::string& username, const std::string& password, const std::string& login_token, const std::string& login_captcha) argument
144 AuthenticateToUnlock(const std::string& username, const std::string& password) argument
384 RetryAuth(Profile* profile, const std::string& username, const std::string& password, const std::string& login_token, const std::string& login_captcha) argument
431 HashPassword(const std::string& password) argument
[all...]
H A Dlogin_performer.cc111 const std::string& password,
125 // 1. ScreenLock active (pending correct new password input)
133 password,
237 const std::string& password) {
239 password_ = password;
249 password));
358 // Offline auth OK, so it might be the case of changed password.
109 OnLoginSuccess( const std::string& username, const std::string& password, const GaiaAuthConsumer::ClientLoginResult& credentials, bool pending_requests) argument
236 Login(const std::string& username, const std::string& password) argument
H A Dmock_authenticator.h38 const std::string& password,
41 if (expected_username_ == username && expected_password_ == password) {
56 const std::string& password) {
57 return AuthenticateToLogin(NULL /* not used */, username, password,
91 const std::string& password,
115 const std::string& password,
120 EXPECT_EQ(expected_password_, password);
36 AuthenticateToLogin(Profile* profile, const std::string& username, const std::string& password, const std::string& login_token, const std::string& login_captcha) argument
55 AuthenticateToUnlock(const std::string& username, const std::string& password) argument
89 RetryAuth(Profile* profile, const std::string& username, const std::string& password, const std::string& login_token, const std::string& login_captcha) argument
114 PrepareProfile(const std::string& username, const std::string& password, const GaiaAuthConsumer::ClientLoginResult& res, bool pending_requests, Delegate* delegate) argument
H A Dparallel_authenticator.cc70 const std::string& password,
76 password,
77 HashPassword(password),
99 const std::string& password) {
102 HashPassword(password)));
141 current_state_->password,
248 const std::string& password,
253 password,
254 HashPassword(password),
323 // the same path they get when their password i
67 AuthenticateToLogin( Profile* profile, const std::string& username, const std::string& password, const std::string& login_token, const std::string& login_captcha) argument
98 AuthenticateToUnlock(const std::string& username, const std::string& password) argument
246 RetryAuth(Profile* profile, const std::string& username, const std::string& password, const std::string& login_token, const std::string& login_captcha) argument
572 HashPassword(const std::string& password) argument
[all...]
H A Dparallel_authenticator_unittest.cc179 const std::string& password,
182 EXPECT_CALL(consumer_, OnLoginSuccess(username, password, result, pending))
427 // asserting that the wrong password was used.
178 ExpectLoginSuccess(const std::string& username, const std::string& password, const GaiaAuthConsumer::ClientLoginResult& result, bool pending) argument
H A Dviews_login_display.cc253 const string16& password) {
254 delegate()->Login(source->user().email(), UTF16ToUTF8(password));
252 Login(UserController* source, const string16& password) argument
/external/chromium/chrome/browser/printing/cloud_print/
H A Dcloud_print_setup_flow.cc234 const std::string& password,
251 authenticator_->StartClientLogin(user, password,
233 OnUserSubmittedAuth(const std::string& user, const std::string& password, const std::string& captcha, const std::string& access_code) argument
/external/chromium/chrome/browser/sync/engine/
H A Dsyncer_util.cc340 } else if (specifics.HasExtension(sync_pb::password)) {
342 const sync_pb::PasswordSpecifics& password = local
343 specifics.GetExtension(sync_pb::password);
344 if (!cryptographer->CanDecrypt(password.encrypted())) {
/external/chromium/chrome/browser/sync/glue/
H A Dpassword_model_associator.cc48 // We must not be holding a transaction when we interact with the password
55 LOG(ERROR) << "Could not get the password entries.";
66 LOG(ERROR) << "Server did not create the top-level password node. We "
80 const sync_pb::PasswordSpecificsData& password = local
82 DCHECK_EQ(tag, MakeTag(password));
86 if (MergePasswords(password, **ix, &new_password)) {
90 LOG(ERROR) << "Failed to edit password sync node.";
103 LOG(ERROR) << "Failed to create password sync node.";
124 const sync_pb::PasswordSpecificsData& password = local
126 std::string tag = MakeTag(password);
230 GetSyncIdFromChromeId( const std::string& password) argument
236 Associate( const std::string* password, int64 sync_id) argument
299 CopyPassword( const sync_pb::PasswordSpecificsData& password, webkit_glue::PasswordForm* new_password) argument
324 MergePasswords( const sync_pb::PasswordSpecificsData& password, const webkit_glue::PasswordForm& password_form, webkit_glue::PasswordForm* new_password) argument
364 sync_pb::PasswordSpecificsData password; local
382 MakeTag( const webkit_glue::PasswordForm& password) argument
392 MakeTag( const sync_pb::PasswordSpecificsData& password) argument
[all...]
/external/chromium/chrome/browser/sync/
H A Dprofile_sync_service_harness.cc91 const std::string& password,
99 password_(password),
119 const std::string& password) {
121 password_ = password;
88 ProfileSyncServiceHarness( Profile* profile, const std::string& username, const std::string& password, int id) argument
118 SetCredentials(const std::string& username, const std::string& password) argument
H A Dprofile_sync_service_password_unittest.cc270 const sync_pb::PasswordSpecificsData& password = local
274 PasswordModelAssociator::CopyPassword(password, &form);
492 // every time the password store is accessed.
H A Dsync_setup_flow.cc34 // Helper function to disable password sync.
228 const std::string& password,
231 service_->OnUserSubmittedAuth(username, password, captcha, access_code);
227 OnUserSubmittedAuth(const std::string& username, const std::string& password, const std::string& captcha, const std::string& access_code) argument
/external/chromium/chrome/browser/ui/gtk/
H A Dcrypto_module_password_dialog.cc64 void GotPassword(const char* password) { argument
65 if (password)
66 password_ = password;
/external/chromium/chrome/browser/ui/login/
H A Dlogin_prompt_browsertest.cc42 const std::wstring password)
43 : username_(username), password_(password) {}
332 // Testing for recovery from an incorrect password for the case where
374 // The request should be retried after the incorrect password is
41 AuthInfo(const std::wstring username, const std::wstring password) argument
H A Dlogin_prompt_ui.cc36 dict.SetString("password",
132 const std::wstring& password);
170 const std::wstring& password) {
172 delegate_->ShowAutofillData(username, password);
208 string16 password; local
211 !res->GetString("password", &password)) {
214 login_handler_->SetAuth(username, password);
222 const std::wstring& password) {
224 autofill_password_ = WideToUTF8(password);
169 OnAutofillDataAvailable(const std::wstring& username, const std::wstring& password) argument
221 ShowAutofillData(const std::wstring& username, const std::wstring& password) argument
[all...]
/external/chromium/chrome/browser/ui/views/
H A Daccessibility_event_router_views.cc269 bool password = textfield->IsPassword(); local
270 AccessibilityTextBoxInfo info(profile, name, password);
/external/chromium/chrome/browser/ui/webui/options/
H A Dsync_setup_handler.cc41 std::string* password,
50 !result->GetString("pass", password) ||
377 std::string username, password, captcha, access_code;
378 if (!GetAuthData(json, &username, &password, &captcha, &access_code)) {
386 flow_->OnUserSubmittedAuth(username, password, captcha, access_code);
39 GetAuthData(const std::string& json, std::string* username, std::string* password, std::string* captcha, std::string* access_code) argument
/external/chromium/chrome/common/net/gaia/
H A Dgaia_authenticator.cc62 const string& password,
68 params.password = password;
76 const string& password,
82 MakeParams(user_name, password, captcha_token, captcha_value);
124 results->password = params.password;
162 post_body += "&Passwd=" + EscapeUrlEncodedData(params.password);
367 const string& password) {
369 auth_results_.password
60 MakeParams( const string& user_name, const string& password, const string& captcha_token, const string& captcha_value) argument
75 Authenticate(const string& user_name, const string& password, const string& captcha_token, const string& captcha_value) argument
366 SetUsernamePassword(const string& username, const string& password) argument
388 Authenticate(const string& user_name, const string& password) argument
[all...]
H A Dgaia_authenticator.h22 // email address associated with the Gaia account can be read; the password is
109 bool Authenticate(const std::string& user_name, const std::string& password,
113 bool Authenticate(const std::string& user_name, const std::string& password);
125 const std::string& password);
138 std::string password; member in struct:gaia::GaiaAuthenticator::AuthResults
164 std::string password; member in struct:gaia::GaiaAuthenticator::AuthParams
171 const std::string& password,
203 // Retrieve password.
204 inline std::string password() const { function in class:gaia::GaiaAuthenticator
206 return auth_results_.password;
[all...]
/external/chromium/crypto/
H A Dsymmetric_key_win.cc247 // password P and the concatenation of the salt S and the block index i:
356 const std::string& password,
390 // Convert the user password into a key suitable to be fed into the PRF
394 const_cast<BYTE*>(reinterpret_cast<const BYTE*>(password.data()));
396 password.size(), &password_as_key))
433 // to the password P, the salt S, the iteration count c, and the block
355 DeriveKeyFromPassword(Algorithm algorithm, const std::string& password, const std::string& salt, size_t iterations, size_t key_size_in_bits) argument
/external/chromium/googleurl/src/
H A Dgurl_unittest.cc80 EXPECT_EQ("pass", url.password());
96 EXPECT_EQ("", url.password());
114 EXPECT_EQ("pass", url2.password());
129 EXPECT_EQ("", invalid2.password());
146 EXPECT_EQ("", url.password());
236 const char* password; member in struct:ReplaceCase
258 SetupReplacement(&GURL::Replacements::SetPassword, &repl, cur.password);
H A Durl_canon_etc.cc168 // The username and password components reference ranges in the corresponding
176 const url_parse::Component& password,
180 if (username.len <= 0 && password.len <= 0) {
196 // When there is a password, we need the separator. Note that we strip
198 if (password.len > 0) {
201 AppendStringOfType(&password_spec[password.begin], password.len,
338 const url_parse::Component& password,
343 username_source, username, password_source, password,
350 const url_parse::Component& password,
173 DoUserInfo(const CHAR* username_spec, const url_parse::Component& username, const CHAR* password_spec, const url_parse::Component& password, CanonOutput* output, url_parse::Component* out_username, url_parse::Component* out_password) argument
335 CanonicalizeUserInfo(const char* username_source, const url_parse::Component& username, const char* password_source, const url_parse::Component& password, CanonOutput* output, url_parse::Component* out_username, url_parse::Component* out_password) argument
347 CanonicalizeUserInfo(const char16* username_source, const url_parse::Component& username, const char16* password_source, const url_parse::Component& password, CanonOutput* output, url_parse::Component* out_username, url_parse::Component* out_password) argument
[all...]
H A Durl_parse_unittest.cc79 const char* password; member in struct:__anon2931::URLParseCase
199 // This case is a little weird. It will report that the password would
287 // ... "]" in the password field isn't allowed, but we tolerate it here...
340 EXPECT_TRUE(ComponentMatches(url, cases[i].password, parsed.password));
377 ExpectInvalidComponent(parsed.password);
431 EXPECT_TRUE(ComponentMatches(url, file_cases[i].password, parsed.password));
579 ExpectInvalidComponent(parsed.password);

Completed in 252 milliseconds

1234567891011>>