HomeSort by relevance Sort by last modified time
    Searched refs:max_token_length (Results 1 - 14 of 14) sorted by null

  /external/chromium/net/http/
http_auth_sspi_win_unittest.cc 41 ULONG max_token_length = kMaxTokenLength; local
42 int rv = DetermineMaxTokenLength(&mock_library, L"NTLM", &max_token_length);
44 EXPECT_EQ(1337, max_token_length);
51 ULONG max_token_length = kMaxTokenLength; local
52 int rv = DetermineMaxTokenLength(&mock_library, L"Foo", &max_token_length);
54 // |DetermineMaxTokenLength()| interface states that |max_token_length| should
56 EXPECT_EQ(100, max_token_length);
http_auth_handler_ntlm_win.cc 23 SSPILibrary* sspi_library, ULONG max_token_length,
25 : auth_sspi_(sspi_library, "NTLM", NTLMSP_NAME, max_token_length),
http_auth_sspi_win.cc 190 ULONG max_token_length)
194 max_token_length_(max_token_length),
412 ULONG* max_token_length) {
414 DCHECK(max_token_length);
426 *max_token_length = token_length;
http_auth_sspi_win.h 129 ULONG max_token_length);
189 // |library| and |max_token_length| must be non-NULL pointers to valid objects.
191 // If the return value is OK, |*max_token_length| contains the maximum token
195 // known SSPI authentication scheme on this system. |*max_token_length| is not
199 // in the underlying SSPI call. The details are logged, and |*max_token_length|
203 ULONG* max_token_length);
http_auth_handler_ntlm.h 105 HttpAuthHandlerNTLM(SSPILibrary* sspi_library, ULONG max_token_length,
http_auth_handler_negotiate.h 95 ULONG max_token_length,
http_auth_handler_negotiate.cc 84 ULONG max_token_length,
91 : auth_system_(auth_library, "Negotiate", NEGOSSP_NAME, max_token_length),
  /external/chromium_org/net/http/
http_auth_sspi_win_unittest.cc 41 ULONG max_token_length = kMaxTokenLength; local
42 int rv = DetermineMaxTokenLength(&mock_library, L"NTLM", &max_token_length);
44 EXPECT_EQ(1337, max_token_length);
51 ULONG max_token_length = kMaxTokenLength; local
52 int rv = DetermineMaxTokenLength(&mock_library, L"Foo", &max_token_length);
54 // |DetermineMaxTokenLength()| interface states that |max_token_length| should
56 EXPECT_EQ(100, max_token_length);
http_auth_handler_ntlm_win.cc 23 SSPILibrary* sspi_library, ULONG max_token_length,
25 : auth_sspi_(sspi_library, "NTLM", NTLMSP_NAME, max_token_length),
http_auth_sspi_win.cc 190 ULONG max_token_length)
194 max_token_length_(max_token_length),
411 ULONG* max_token_length) {
413 DCHECK(max_token_length);
425 *max_token_length = token_length;
http_auth_sspi_win.h 129 ULONG max_token_length);
189 // |library| and |max_token_length| must be non-NULL pointers to valid objects.
191 // If the return value is OK, |*max_token_length| contains the maximum token
195 // known SSPI authentication scheme on this system. |*max_token_length| is not
199 // in the underlying SSPI call. The details are logged, and |*max_token_length|
203 ULONG* max_token_length);
http_auth_handler_negotiate.h 95 ULONG max_token_length,
http_auth_handler_ntlm.h 103 HttpAuthHandlerNTLM(SSPILibrary* sspi_library, ULONG max_token_length,
http_auth_handler_negotiate.cc 93 ULONG max_token_length,
100 : auth_system_(auth_library, "Negotiate", NEGOSSP_NAME, max_token_length),

Completed in 2915 milliseconds