HomeSort by relevance Sort by last modified time
    Searched refs:keychain (Results 1 - 25 of 40) sorted by null

1 2

  /external/chromium/chrome/browser/password_manager/
encryptor_password_mac_unittest.cc 11 // Test that if we have an existing password in the Keychain and we are
14 MockKeychain keychain(0);
15 keychain.set_find_generic_result(noErr);
16 EncryptorPassword password(keychain);
18 EXPECT_FALSE(keychain.called_add_generic());
19 EXPECT_EQ(0, keychain.password_data_count());
22 // Test that if we do not have an existing password in the Keychain then it
25 MockKeychain keychain(0);
26 keychain.set_find_generic_result(errSecItemNotFound);
27 EncryptorPassword password(keychain);
    [all...]
encryptor_password_mac.h 17 explicit EncryptorPassword(const MacKeychain& keychain)
18 : keychain_(keychain) {
22 // in the Keychain then one is generated, stored in the Mac keychain, and
24 // If one exists then it is fetched from the Keychain and returned.
25 // If the user disallows access to the Keychain (or an error occurs) then an
password_store_mac_internal.h 18 // PasswordForms instead of Keychain items.
21 // Creates an adapter for |keychain|. This class does not take ownership of
22 // |keychain|, so the caller must make sure that the keychain outlives the
24 explicit MacKeychainPasswordFormAdapter(const MacKeychain* keychain);
26 // Returns PasswordForms for each keychain entry that could be used to fill
31 // Returns PasswordForms for each keychain entry that could be merged with
37 // Returns the PasswordForm for the Keychain entry that matches |form| on all
38 // of the fields that uniquely identify a Keychain item, or NULL if there is
46 // the return count would require reading the passwords from the keychain,
    [all...]
password_store_mac.h 19 // Implements PasswordStore on top of the OS X Keychain, with an internal
21 // Keychain, as well as the rationale for some of the behaviors, see the
22 // Keychain integration design doc:
23 // http://dev.chromium.org/developers/design-documents/os-x-password-manager-keychain-integration
26 // Takes ownership of |keychain| and |login_db|, both of which must be
28 PasswordStoreMac(MacKeychain* keychain, LoginDatabase* login_db);
55 // Adds the given form to the Keychain if it's something we want to store
61 // keychain form.
65 // Returns all the Keychain entries that we own but no longer have
74 // Removes the given forms from the Keychain
    [all...]
  /external/chromium_org/components/webdata/encryptor/
encryptor_password_mac_unittest.cc 13 // Test that if we have an existing password in the Keychain and we are
16 MockAppleKeychain keychain; local
17 keychain.set_find_generic_result(noErr);
18 EncryptorPassword password(keychain);
20 EXPECT_FALSE(keychain.called_add_generic());
21 EXPECT_EQ(0, keychain.password_data_count());
24 // Test that if we do not have an existing password in the Keychain then it
27 MockAppleKeychain keychain; local
28 keychain.set_find_generic_result(errSecItemNotFound);
29 EncryptorPassword password(keychain);
38 MockAppleKeychain keychain; local
49 MockAppleKeychain keychain; local
    [all...]
encryptor_password_mac.h 18 explicit EncryptorPassword(const crypto::AppleKeychain& keychain)
19 : keychain_(keychain) {
23 // in the Keychain then one is generated, stored in the Mac keychain, and
25 // If one exists then it is fetched from the Keychain and returned.
26 // If the user disallows access to the Keychain (or an error occurs) then an
  /external/chromium_org/remoting/host/installer/mac/
do_signing.sh 111 local keychain="${2}"
119 codesign -vv -s "${id}" --keychain "${keychain}" "${name}"
125 local keychain="${2}"
128 sign "${input_dir}/${ME2ME_HOST}" "${keychain}" "${id}"
129 sign "${input_dir}/${UNINSTALLER}" "${keychain}" "${id}"
130 sign "${input_dir}/${PREFPANE}" "${keychain}" "${id}"
135 local keychain="${2}"
139 productsign --sign "${id}" --keychain "${keychain}" \
    [all...]
  /external/chromium_org/chrome/installer/mac/
sign_versioned_dir.sh.in 52 codesign -s "${codesign_id}" --keychain "${codesign_keychain}" "${framework}" \
55 codesign -s "${codesign_id}" --keychain "${codesign_keychain}" "${helper_app}" \
58 codesign -s "${codesign_id}" --keychain "${codesign_keychain}" \
62 codesign -s "${codesign_id}" --keychain "${codesign_keychain}" \
sign_app.sh.in 54 codesign -s "${codesign_id}" --keychain "${codesign_keychain}" \
  /packages/apps/KeyChain/src/com/android/keychain/
KeyChainBroadcastReceiver.java 2 package com.android.keychain;
  /packages/apps/KeyChain/support/src/com/android/keychain/tests/support/
IKeyChainServiceTestSupport.aidl 16 package com.android.keychain.tests.support;
  /external/chromium_org/chrome/browser/password_manager/
password_store_mac_internal.h 19 // PasswordForms instead of Keychain items.
22 // Creates an adapter for |keychain|. This class does not take ownership of
23 // |keychain|, so the caller must make sure that the keychain outlives the
25 explicit MacKeychainPasswordFormAdapter(const AppleKeychain* keychain);
27 // Returns PasswordForms for each keychain entry that could be used to fill
32 // Returns the PasswordForm for the Keychain entry that matches |form| on all
33 // of the fields that uniquely identify a Keychain item, or NULL if there is
39 // Returns true if the keychain contains any items that are mergeable with
42 // passwords from the keychain, thus potentially triggering authorizaiton UI
    [all...]
password_store_mac.h 24 // Implements PasswordStore on top of the OS X Keychain, with an internal
26 // Keychain, as well as the rationale for some of the behaviors, see the
27 // Keychain integration design doc:
28 // http://dev.chromium.org/developers/design-documents/os-x-password-manager-keychain-integration
31 // Takes ownership of |keychain| and |login_db|, both of which must be
33 PasswordStoreMac(crypto::AppleKeychain* keychain, LoginDatabase* login_db);
65 // Adds the given form to the Keychain if it's something we want to store
71 // keychain form.
75 // Returns all the Keychain entries that we own but no longer have
84 // Removes the given forms from the Keychain
    [all...]
password_store_mac.cc 32 // Utility class to handle the details of constructing and running a keychain
36 explicit KeychainSearch(const AppleKeychain& keychain);
49 // Fills |items| with all Keychain items that match the Init'd search.
59 KeychainSearch::KeychainSearch(const AppleKeychain& keychain)
60 : keychain_(&keychain), search_ref_(NULL) {
157 OSSTATUS_LOG(ERROR, result) << "Keychain lookup failed";
199 // Converts a Keychain time string to a Time object, returning true if
236 bool FillPasswordFormFromKeychainItem(const AppleKeychain& keychain,
266 OSStatus result = keychain.ItemCopyAttributesAndData(keychain_item, &attrInfo,
275 OSSTATUS_LOG(ERROR, result) << "Keychain data load failed"
    [all...]
  /packages/apps/KeyChain/support/
Android.mk 19 LOCAL_SRC_FILES := src/com/android/keychain/tests/support/IKeyChainServiceTestSupport.aidl
20 LOCAL_MODULE := com.android.keychain.tests.support
27 LOCAL_STATIC_JAVA_LIBRARIES := com.android.keychain.tests.support
  /external/chromium/chrome/browser/
keychain_mac.cc 45 SecKeychainRef keychain,
54 return SecKeychainAddInternetPassword(keychain,
87 OSStatus MacKeychain::AddGenericPassword(SecKeychainRef keychain,
95 return SecKeychainAddGenericPassword(keychain,
keychain_mac.h 16 // See Keychain Services documentation for function documentation, as these call
17 // through directly to their Keychain Services equivalents (Foo ->
48 virtual OSStatus AddInternetPassword(SecKeychainRef keychain,
74 virtual OSStatus AddGenericPassword(SecKeychainRef keychain,
  /external/chromium_org/chrome/browser/mac/
security_wrappers.cc 289 SecKeychainRef keychain; local
290 OSStatus status = SecKeychainItemCopyKeychain(item, &keychain);
296 return keychain;
300 SecKeychainRef keychain,
303 OSStatus status = SecKeychainAttributeInfoForItemID(keychain,
315 SecKeychainRef keychain,
359 CrSKeychainAttributeInfoForItemID(keychain, item_id));
391 SecKeychainRef keychain,
399 keychain,
security_wrappers.h 210 SecKeychainRef keychain,
216 SecKeychainRef keychain,
227 SecKeychainRef keychain,
  /external/chromium_org/crypto/
mock_apple_keychain.cc 43 SecKeychainRef keychain,
apple_keychain.h 24 // See Keychain Services documentation for function documentation, as these call
25 // through directly to their Keychain Services equivalents (Foo ->
46 virtual OSStatus AddGenericPassword(SecKeychainRef keychain,
84 virtual OSStatus AddInternetPassword(SecKeychainRef keychain,
  /development/samples/KeyChainDemo/src/com/example/android/keychain/
KeyChainDemoActivity.java 17 package com.example.android.keychain;
25 import android.security.KeyChain;
45 public static final String PKCS12_FILENAME = "keychain.p12";
64 private static final String KEYCHAIN_PREF = "keychain";
69 // Request code used when starting the activity using the KeyChain install
228 byte[] keychain = new byte[bis.available()];
229 bis.read(keychain);
231 Intent installIntent = KeyChain.createInstallIntent();
232 installIntent.putExtra(KeyChain.EXTRA_PKCS12, keychain);
    [all...]
SecureWebServerService.java 17 package com.example.android.keychain;
  /external/chromium/net/base/
keygen_handler_mac.cc 118 // sets a label on the Keychain dialogs. Pass NULL as the second
199 // Remove keys from keychain if asked to during unit testing:
222 // is passed as the initial access control list in Keychain. The
230 SecKeychainRef keychain; local
231 err = SecKeychainCopyDefault(&keychain);
236 base::mac::ScopedCFTypeRef<SecKeychainRef> scoped_keychain(keychain);
240 keychain,
  /external/chromium_org/net/base/
keygen_handler_mac.cc 119 // sets a label on the Keychain dialogs. Pass NULL as the second
200 // Remove keys from keychain if asked to during unit testing:
223 // is passed as the initial access control list in Keychain. The
231 SecKeychainRef keychain; local
232 err = SecKeychainCopyDefault(&keychain);
237 base::ScopedCFTypeRef<SecKeychainRef> scoped_keychain(keychain);
241 keychain,

Completed in 618 milliseconds

1 2