/external/chromium_org/components/os_crypt/ |
keychain_password_mac.h | 18 explicit KeychainPassword(const crypto::AppleKeychain& keychain) 19 : keychain_(keychain) { 23 // in the Keychain then one is generated, stored in the Mac keychain, and 25 // If one exists then it is fetched from the Keychain and returned. 26 // If the user disallows access to the Keychain (or an error occurs) then an
|
/external/chromium_org/remoting/host/installer/mac/ |
do_signing.sh | 123 local keychain="${2}" 131 codesign -vv -s "${id}" --keychain "${keychain}" "${name}" 137 local keychain="${2}" 140 sign "${input_dir}/${ME2ME_NM_HOST}" "${keychain}" "${id}" 141 sign "${input_dir}/${IT2ME_NM_HOST}" "${keychain}" "${id}" 142 sign "${input_dir}/${ME2ME_HOST}" "${keychain}" "${id}" 143 sign "${input_dir}/${UNINSTALLER}" "${keychain}" "${id}" 144 sign "${input_dir}/${PREFPANE}" "${keychain}" "${id}" 149 local keychain="${2} [all...] |
/external/chromium_org/chrome/installer/mac/ |
sign_versioned_dir.sh.in | 52 codesign --sign "${codesign_id}" --keychain "${codesign_keychain}" \ 56 codesign --sign "${codesign_id}" --keychain "${codesign_keychain}" \ 60 codesign --sign "${codesign_id}" --keychain "${codesign_keychain}" \ 64 codesign --sign "${codesign_id}" --keychain "${codesign_keychain}" \
|
sign_app.sh.in | 54 codesign --sign "${codesign_id}" --keychain "${codesign_keychain}" \
|
/external/chromium_org/chrome/browser/password_manager/ |
password_store_mac_internal.h | 19 // PasswordForms instead of Keychain items. 22 // Creates an adapter for |keychain|. This class does not take ownership of 23 // |keychain|, so the caller must make sure that the keychain outlives the 25 explicit MacKeychainPasswordFormAdapter(const AppleKeychain* keychain); 27 // Returns PasswordForms for each keychain entry that could be used to fill 33 // Returns true if there is the Keychain entry that matches |query_form| on 34 // all of the fields that uniquely identify a Keychain item. 37 // Returns true if the keychain contains any items that are mergeable with 40 // passwords from the keychain, thus potentially triggering authorizaiton UI [all...] |
password_store_mac.cc | 36 // Utility class to handle the details of constructing and running a keychain 40 explicit KeychainSearch(const AppleKeychain& keychain); 57 // Fills |items| with all Keychain items that match the Init'd search. 67 KeychainSearch::KeychainSearch(const AppleKeychain& keychain) 68 : keychain_(&keychain), search_ref_(NULL) { 168 OSSTATUS_LOG(ERROR, result) << "Keychain lookup failed"; 222 // Converts a Keychain time string to a Time object, returning true if 259 bool FillPasswordFormFromKeychainItem(const AppleKeychain& keychain, 289 OSStatus result = keychain.ItemCopyAttributesAndData(keychain_item, &attrInfo, 298 OSSTATUS_LOG(ERROR, result) << "Keychain data load failed" [all...] |
password_store_mac.h | 24 // Implements PasswordStore on top of the OS X Keychain, with an internal 26 // Keychain, as well as the rationale for some of the behaviors, see the 27 // Keychain integration design doc: 28 // http://dev.chromium.org/developers/design-documents/os-x-password-manager-keychain-integration 31 // Takes ownership of |keychain| and |login_db|, both of which must be 36 crypto::AppleKeychain* keychain, 78 // Adds the given form to the Keychain if it's something we want to store 84 // keychain form. 92 // Removes the given forms from the Keychain. 97 // keychain. Removes those forms from the database, and returns them i [all...] |
password_store_factory.cc | 155 crypto::AppleKeychain* keychain = local 160 main_thread_runner, db_thread_runner, keychain, login_db.release());
|
password_store_mac_unittest.cc | 69 crypto::AppleKeychain* keychain, 73 keychain, 155 // Causes a test failure unless any Keychain items added during the test have 1087 MockAppleKeychain* keychain() { return keychain_; } function [all...] |
/external/chromium_org/crypto/ |
mock_apple_keychain.cc | 43 SecKeychainRef keychain,
|
apple_keychain.h | 24 // See Keychain Services documentation for function documentation, as these call 25 // through directly to their Keychain Services equivalents (Foo -> 46 virtual OSStatus AddGenericPassword(SecKeychainRef keychain, 84 virtual OSStatus AddInternetPassword(SecKeychainRef keychain,
|
mock_apple_keychain.h | 20 // Mock Keychain wrapper for testing code that interacts with the OS X 21 // Keychain. Implemented by storing SecKeychainAttributeList and 26 // of AppleKeychain doesn't apply to the actual keychain data, so all of the 47 SecKeychainRef keychain, 82 SecKeychainRef keychain, 119 // Adds a keychain item with the given info to the test set. 124 // interaction with the system Keychain. For mocking purposes we allow the 146 // Type of the map holding the mock keychain attributes. 151 // Returns true if the keychain already contains a password that matches the 165 // Initializes storage for keychain data at |key| [all...] |
mock_apple_keychain_mac.cc | 370 // The keychain already has this item, since all fields other than the 378 SecKeychainRef keychain, 398 // If the account already exists in the keychain, we don't add it. 411 // Initialize keychain data storage at the target location.
|
/development/samples/KeyChainDemo/src/com/example/android/keychain/ |
KeyChainDemoActivity.java | 17 package com.example.android.keychain; 25 import android.security.KeyChain; 45 public static final String PKCS12_FILENAME = "keychain.p12"; 64 private static final String KEYCHAIN_PREF = "keychain"; 69 // Request code used when starting the activity using the KeyChain install 228 byte[] keychain = new byte[bis.available()]; 229 bis.read(keychain); 231 Intent installIntent = KeyChain.createInstallIntent(); 232 installIntent.putExtra(KeyChain.EXTRA_PKCS12, keychain); [all...] |
SecureWebServerService.java | 17 package com.example.android.keychain;
|
SecureWebServer.java | 17 package com.example.android.keychain;
|
/external/chromium_org/net/base/ |
keygen_handler_mac.cc | 119 // sets a label on the Keychain dialogs. Pass NULL as the second 200 // Remove keys from keychain if asked to during unit testing: 223 // is passed as the initial access control list in Keychain. The 231 SecKeychainRef keychain; local 232 err = SecKeychainCopyDefault(&keychain); 237 base::ScopedCFTypeRef<SecKeychainRef> scoped_keychain(keychain); 241 keychain,
|