/external/chromium/chrome/browser/password_manager/ |
encryptor_password_mac_unittest.cc | 11 // Test that if we have an existing password in the Keychain and we are 14 MockKeychain keychain(0); 15 keychain.set_find_generic_result(noErr); 16 EncryptorPassword password(keychain); 18 EXPECT_FALSE(keychain.called_add_generic()); 19 EXPECT_EQ(0, keychain.password_data_count()); 22 // Test that if we do not have an existing password in the Keychain then it 25 MockKeychain keychain(0); 26 keychain.set_find_generic_result(errSecItemNotFound); 27 EncryptorPassword password(keychain); [all...] |
encryptor_password_mac.h | 17 explicit EncryptorPassword(const MacKeychain& keychain) 18 : keychain_(keychain) { 22 // in the Keychain then one is generated, stored in the Mac keychain, and 24 // If one exists then it is fetched from the Keychain and returned. 25 // If the user disallows access to the Keychain (or an error occurs) then an
|
password_store_mac_internal.h | 18 // PasswordForms instead of Keychain items. 21 // Creates an adapter for |keychain|. This class does not take ownership of 22 // |keychain|, so the caller must make sure that the keychain outlives the 24 explicit MacKeychainPasswordFormAdapter(const MacKeychain* keychain); 26 // Returns PasswordForms for each keychain entry that could be used to fill 31 // Returns PasswordForms for each keychain entry that could be merged with 37 // Returns the PasswordForm for the Keychain entry that matches |form| on all 38 // of the fields that uniquely identify a Keychain item, or NULL if there is 46 // the return count would require reading the passwords from the keychain, [all...] |
password_store_mac.h | 19 // Implements PasswordStore on top of the OS X Keychain, with an internal 21 // Keychain, as well as the rationale for some of the behaviors, see the 22 // Keychain integration design doc: 23 // http://dev.chromium.org/developers/design-documents/os-x-password-manager-keychain-integration 26 // Takes ownership of |keychain| and |login_db|, both of which must be 28 PasswordStoreMac(MacKeychain* keychain, LoginDatabase* login_db); 55 // Adds the given form to the Keychain if it's something we want to store 61 // keychain form. 65 // Returns all the Keychain entries that we own but no longer have 74 // Removes the given forms from the Keychain [all...] |
/external/chromium_org/components/webdata/encryptor/ |
encryptor_password_mac_unittest.cc | 13 // Test that if we have an existing password in the Keychain and we are 16 MockAppleKeychain keychain; local 17 keychain.set_find_generic_result(noErr); 18 EncryptorPassword password(keychain); 20 EXPECT_FALSE(keychain.called_add_generic()); 21 EXPECT_EQ(0, keychain.password_data_count()); 24 // Test that if we do not have an existing password in the Keychain then it 27 MockAppleKeychain keychain; local 28 keychain.set_find_generic_result(errSecItemNotFound); 29 EncryptorPassword password(keychain); 38 MockAppleKeychain keychain; local 49 MockAppleKeychain keychain; local [all...] |
encryptor_password_mac.h | 18 explicit EncryptorPassword(const crypto::AppleKeychain& keychain) 19 : keychain_(keychain) { 23 // in the Keychain then one is generated, stored in the Mac keychain, and 25 // If one exists then it is fetched from the Keychain and returned. 26 // If the user disallows access to the Keychain (or an error occurs) then an
|
/external/chromium_org/remoting/host/installer/mac/ |
do_signing.sh | 111 local keychain="${2}" 119 codesign -vv -s "${id}" --keychain "${keychain}" "${name}" 125 local keychain="${2}" 128 sign "${input_dir}/${ME2ME_HOST}" "${keychain}" "${id}" 129 sign "${input_dir}/${UNINSTALLER}" "${keychain}" "${id}" 130 sign "${input_dir}/${PREFPANE}" "${keychain}" "${id}" 135 local keychain="${2}" 139 productsign --sign "${id}" --keychain "${keychain}" \ [all...] |
/external/chromium_org/chrome/installer/mac/ |
sign_versioned_dir.sh.in | 52 codesign -s "${codesign_id}" --keychain "${codesign_keychain}" "${framework}" \ 55 codesign -s "${codesign_id}" --keychain "${codesign_keychain}" "${helper_app}" \ 58 codesign -s "${codesign_id}" --keychain "${codesign_keychain}" \ 62 codesign -s "${codesign_id}" --keychain "${codesign_keychain}" \
|
sign_app.sh.in | 54 codesign -s "${codesign_id}" --keychain "${codesign_keychain}" \
|
/packages/apps/KeyChain/src/com/android/keychain/ |
KeyChainBroadcastReceiver.java | 2 package com.android.keychain;
|
/packages/apps/KeyChain/support/src/com/android/keychain/tests/support/ |
IKeyChainServiceTestSupport.aidl | 16 package com.android.keychain.tests.support;
|
/external/chromium_org/chrome/browser/password_manager/ |
password_store_mac_internal.h | 19 // PasswordForms instead of Keychain items. 22 // Creates an adapter for |keychain|. This class does not take ownership of 23 // |keychain|, so the caller must make sure that the keychain outlives the 25 explicit MacKeychainPasswordFormAdapter(const AppleKeychain* keychain); 27 // Returns PasswordForms for each keychain entry that could be used to fill 32 // Returns the PasswordForm for the Keychain entry that matches |form| on all 33 // of the fields that uniquely identify a Keychain item, or NULL if there is 39 // Returns true if the keychain contains any items that are mergeable with 42 // passwords from the keychain, thus potentially triggering authorizaiton UI [all...] |
password_store_mac.h | 24 // Implements PasswordStore on top of the OS X Keychain, with an internal 26 // Keychain, as well as the rationale for some of the behaviors, see the 27 // Keychain integration design doc: 28 // http://dev.chromium.org/developers/design-documents/os-x-password-manager-keychain-integration 31 // Takes ownership of |keychain| and |login_db|, both of which must be 33 PasswordStoreMac(crypto::AppleKeychain* keychain, LoginDatabase* login_db); 65 // Adds the given form to the Keychain if it's something we want to store 71 // keychain form. 75 // Returns all the Keychain entries that we own but no longer have 84 // Removes the given forms from the Keychain [all...] |
password_store_mac.cc | 32 // Utility class to handle the details of constructing and running a keychain 36 explicit KeychainSearch(const AppleKeychain& keychain); 49 // Fills |items| with all Keychain items that match the Init'd search. 59 KeychainSearch::KeychainSearch(const AppleKeychain& keychain) 60 : keychain_(&keychain), search_ref_(NULL) { 157 OSSTATUS_LOG(ERROR, result) << "Keychain lookup failed"; 199 // Converts a Keychain time string to a Time object, returning true if 236 bool FillPasswordFormFromKeychainItem(const AppleKeychain& keychain, 266 OSStatus result = keychain.ItemCopyAttributesAndData(keychain_item, &attrInfo, 275 OSSTATUS_LOG(ERROR, result) << "Keychain data load failed" [all...] |
/packages/apps/KeyChain/support/ |
Android.mk | 19 LOCAL_SRC_FILES := src/com/android/keychain/tests/support/IKeyChainServiceTestSupport.aidl 20 LOCAL_MODULE := com.android.keychain.tests.support 27 LOCAL_STATIC_JAVA_LIBRARIES := com.android.keychain.tests.support
|
/external/chromium/chrome/browser/ |
keychain_mac.cc | 45 SecKeychainRef keychain, 54 return SecKeychainAddInternetPassword(keychain, 87 OSStatus MacKeychain::AddGenericPassword(SecKeychainRef keychain, 95 return SecKeychainAddGenericPassword(keychain,
|
keychain_mac.h | 16 // See Keychain Services documentation for function documentation, as these call 17 // through directly to their Keychain Services equivalents (Foo -> 48 virtual OSStatus AddInternetPassword(SecKeychainRef keychain, 74 virtual OSStatus AddGenericPassword(SecKeychainRef keychain,
|
/external/chromium_org/chrome/browser/mac/ |
security_wrappers.cc | 289 SecKeychainRef keychain; local 290 OSStatus status = SecKeychainItemCopyKeychain(item, &keychain); 296 return keychain; 300 SecKeychainRef keychain, 303 OSStatus status = SecKeychainAttributeInfoForItemID(keychain, 315 SecKeychainRef keychain, 359 CrSKeychainAttributeInfoForItemID(keychain, item_id)); 391 SecKeychainRef keychain, 399 keychain,
|
security_wrappers.h | 210 SecKeychainRef keychain, 216 SecKeychainRef keychain, 227 SecKeychainRef keychain,
|
/external/chromium_org/crypto/ |
mock_apple_keychain.cc | 43 SecKeychainRef keychain,
|
apple_keychain.h | 24 // See Keychain Services documentation for function documentation, as these call 25 // through directly to their Keychain Services equivalents (Foo -> 46 virtual OSStatus AddGenericPassword(SecKeychainRef keychain, 84 virtual OSStatus AddInternetPassword(SecKeychainRef keychain,
|
/development/samples/KeyChainDemo/src/com/example/android/keychain/ |
KeyChainDemoActivity.java | 17 package com.example.android.keychain; 25 import android.security.KeyChain; 45 public static final String PKCS12_FILENAME = "keychain.p12"; 64 private static final String KEYCHAIN_PREF = "keychain"; 69 // Request code used when starting the activity using the KeyChain install 228 byte[] keychain = new byte[bis.available()]; 229 bis.read(keychain); 231 Intent installIntent = KeyChain.createInstallIntent(); 232 installIntent.putExtra(KeyChain.EXTRA_PKCS12, keychain); [all...] |
SecureWebServerService.java | 17 package com.example.android.keychain;
|
/external/chromium/net/base/ |
keygen_handler_mac.cc | 118 // sets a label on the Keychain dialogs. Pass NULL as the second 199 // Remove keys from keychain if asked to during unit testing: 222 // is passed as the initial access control list in Keychain. The 230 SecKeychainRef keychain; local 231 err = SecKeychainCopyDefault(&keychain); 236 base::mac::ScopedCFTypeRef<SecKeychainRef> scoped_keychain(keychain); 240 keychain,
|
/external/chromium_org/net/base/ |
keygen_handler_mac.cc | 119 // sets a label on the Keychain dialogs. Pass NULL as the second 200 // Remove keys from keychain if asked to during unit testing: 223 // is passed as the initial access control list in Keychain. The 231 SecKeychainRef keychain; local 232 err = SecKeychainCopyDefault(&keychain); 237 base::ScopedCFTypeRef<SecKeychainRef> scoped_keychain(keychain); 241 keychain,
|