/external/chromium/net/http/ |
http_auth_sspi_win_unittest.cc | 41 ULONG max_token_length = kMaxTokenLength; local 42 int rv = DetermineMaxTokenLength(&mock_library, L"NTLM", &max_token_length); 44 EXPECT_EQ(1337, max_token_length); 51 ULONG max_token_length = kMaxTokenLength; local 52 int rv = DetermineMaxTokenLength(&mock_library, L"Foo", &max_token_length); 54 // |DetermineMaxTokenLength()| interface states that |max_token_length| should 56 EXPECT_EQ(100, max_token_length);
|
http_auth_handler_ntlm_win.cc | 23 SSPILibrary* sspi_library, ULONG max_token_length, 25 : auth_sspi_(sspi_library, "NTLM", NTLMSP_NAME, max_token_length),
|
http_auth_sspi_win.cc | 190 ULONG max_token_length) 194 max_token_length_(max_token_length), 412 ULONG* max_token_length) { 414 DCHECK(max_token_length); 426 *max_token_length = token_length;
|
http_auth_sspi_win.h | 129 ULONG max_token_length); 189 // |library| and |max_token_length| must be non-NULL pointers to valid objects. 191 // If the return value is OK, |*max_token_length| contains the maximum token 195 // known SSPI authentication scheme on this system. |*max_token_length| is not 199 // in the underlying SSPI call. The details are logged, and |*max_token_length| 203 ULONG* max_token_length);
|
http_auth_handler_ntlm.h | 105 HttpAuthHandlerNTLM(SSPILibrary* sspi_library, ULONG max_token_length,
|
http_auth_handler_negotiate.h | 95 ULONG max_token_length,
|
http_auth_handler_negotiate.cc | 84 ULONG max_token_length, 91 : auth_system_(auth_library, "Negotiate", NEGOSSP_NAME, max_token_length),
|
/external/chromium_org/net/http/ |
http_auth_sspi_win_unittest.cc | 41 ULONG max_token_length = kMaxTokenLength; local 42 int rv = DetermineMaxTokenLength(&mock_library, L"NTLM", &max_token_length); 44 EXPECT_EQ(1337, max_token_length); 51 ULONG max_token_length = kMaxTokenLength; local 52 int rv = DetermineMaxTokenLength(&mock_library, L"Foo", &max_token_length); 54 // |DetermineMaxTokenLength()| interface states that |max_token_length| should 56 EXPECT_EQ(100, max_token_length);
|
http_auth_handler_ntlm_win.cc | 23 SSPILibrary* sspi_library, ULONG max_token_length, 25 : auth_sspi_(sspi_library, "NTLM", NTLMSP_NAME, max_token_length),
|
http_auth_sspi_win.cc | 190 ULONG max_token_length) 194 max_token_length_(max_token_length), 411 ULONG* max_token_length) { 413 DCHECK(max_token_length); 425 *max_token_length = token_length;
|
http_auth_sspi_win.h | 129 ULONG max_token_length); 189 // |library| and |max_token_length| must be non-NULL pointers to valid objects. 191 // If the return value is OK, |*max_token_length| contains the maximum token 195 // known SSPI authentication scheme on this system. |*max_token_length| is not 199 // in the underlying SSPI call. The details are logged, and |*max_token_length| 203 ULONG* max_token_length);
|
http_auth_handler_negotiate.h | 95 ULONG max_token_length,
|
http_auth_handler_ntlm.h | 103 HttpAuthHandlerNTLM(SSPILibrary* sspi_library, ULONG max_token_length,
|
http_auth_handler_negotiate.cc | 93 ULONG max_token_length, 100 : auth_system_(auth_library, "Negotiate", NEGOSSP_NAME, max_token_length),
|