Home | History | Annotate | Download | only in password_manager

Lines Matching defs:form

56       // Basic HTML form.
60 // HTML form with path.
64 // Secure HTML form with path.
149 PasswordForm* form = new PasswordForm();
150 form->scheme = form_data.scheme;
151 form->preferred = form_data.preferred;
152 form->ssl_valid = form_data.ssl_valid;
153 form->date_created = base::Time::FromDoubleT(form_data.creation_time);
155 form->signon_realm = std::string(form_data.signon_realm);
157 form->origin = GURL(form_data.origin);
159 form->action = GURL(form_data.action);
161 form->submit_element = WideToUTF16(form_data.submit_element);
163 form->username_element = WideToUTF16(form_data.username_element);
165 form->password_element = WideToUTF16(form_data.password_element);
167 form->username_value = WideToUTF16(form_data.username_value);
169 form->password_value = WideToUTF16(form_data.password_value);
171 form->blacklisted_by_user = true;
173 return form;
199 PasswordForm* form = forms[i];
201 EXPECT_EQ(expectation->scheme, form->scheme) << test_label;
202 EXPECT_EQ(std::string(expectation->signon_realm), form->signon_realm)
204 EXPECT_EQ(GURL(expectation->origin), form->origin) << test_label;
205 EXPECT_EQ(GURL(expectation->action), form->action) << test_label;
206 EXPECT_EQ(WideToUTF16(expectation->submit_element), form->submit_element)
209 form->username_element) << test_label;
211 form->password_element) << test_label;
214 form->username_value) << test_label;
216 form->password_value) << test_label;
218 EXPECT_TRUE(form->blacklisted_by_user) << test_label;
220 EXPECT_EQ(expectation->preferred, form->preferred) << test_label;
221 EXPECT_EQ(expectation->ssl_valid, form->ssl_valid) << test_label;
223 form->date_created.ToDoubleT()) << test_label;
281 PasswordForm form;
283 *keychain_, keychain_item, &form);
287 EXPECT_EQ(expected[i].scheme, form.scheme) << "In iteration " << i;
288 EXPECT_EQ(GURL(expected[i].origin), form.origin) << "In iteration " << i;
289 EXPECT_EQ(expected[i].ssl_valid, form.ssl_valid) << "In iteration " << i;
290 EXPECT_EQ(std::string(expected[i].signon_realm), form.signon_realm)
293 EXPECT_EQ(WideToUTF16(expected[i].username), form.username_value)
295 EXPECT_EQ(WideToUTF16(expected[i].password), form.password_value)
297 EXPECT_FALSE(form.blacklisted_by_user) << "In iteration " << i;
299 EXPECT_TRUE(form.blacklisted_by_user) << "In iteration " << i;
302 form.date_created.UTCExplode(&exploded_time);
320 PasswordForm form;
322 *keychain_, keychain_item, &form);
335 // An HTML form we've seen.
342 // An HTML form we haven't seen
382 // Check matches treating the form as a fill target.
388 // Check matches treating the form as a merging target.
403 // Changes just the origin path of |form|.
404 static void SetPasswordFormPath(PasswordForm* form, const char* path) {
408 form->origin = form->origin.ReplaceComponents(replacement);
411 // Changes just the signon_realm port of |form|.
412 static void SetPasswordFormPort(PasswordForm* form, const char* port) {
416 GURL signon_gurl = GURL(form->signon_realm);
417 form->signon_realm = signon_gurl.ReplaceComponents(replacement).spec();
420 // Changes just the signon_ream auth realm of |form|.
421 static void SetPasswordFormRealm(PasswordForm* form, const char* realm) {
425 GURL signon_gurl = GURL(form->signon_realm);
426 form->signon_realm = signon_gurl.ReplaceComponents(replacement).spec();
445 // Create a base form and make sure we find a match.
487 EXPECT_EQ(NULL, match) << "In modified version " << j << " of base form "
591 scoped_ptr<PasswordForm> form(CreatePasswordFormFromData(
594 owned_keychain_adapter.RemovePassword(*form));
597 PasswordForm* match = keychain_adapter.PasswordExactlyMatchingForm(*form);
883 scoped_ptr<PasswordForm> form(CreatePasswordFormFromData(
885 owned_keychain_adapter.AddPassword(*form);
984 // case where a form is filled, then the stored login is removed, then the
985 // form is submitted.
994 scoped_ptr<PasswordForm> form(CreatePasswordFormFromData(
996 store_->UpdateLogin(*form);