HomeSort by relevance Sort by last modified time
    Searched refs:keychain (Results 1 - 25 of 30) sorted by null

1 2

  /external/chromium_org/components/os_crypt/
keychain_password_mac.h 18 explicit KeychainPassword(const crypto::AppleKeychain& keychain)
19 : keychain_(keychain) {
23 // in the Keychain then one is generated, stored in the Mac keychain, and
25 // If one exists then it is fetched from the Keychain and returned.
26 // If the user disallows access to the Keychain (or an error occurs) then an
  /external/chromium_org/remoting/host/installer/mac/
do_signing.sh 123 local keychain="${2}"
131 codesign -vv -s "${id}" --keychain "${keychain}" "${name}"
137 local keychain="${2}"
140 sign "${input_dir}/${ME2ME_NM_HOST}" "${keychain}" "${id}"
141 sign "${input_dir}/${IT2ME_NM_HOST}" "${keychain}" "${id}"
142 sign "${input_dir}/${ME2ME_HOST}" "${keychain}" "${id}"
143 sign "${input_dir}/${UNINSTALLER}" "${keychain}" "${id}"
144 sign "${input_dir}/${PREFPANE}" "${keychain}" "${id}"
149 local keychain="${2}
    [all...]
  /external/chromium_org/chrome/installer/mac/
sign_versioned_dir.sh.in 52 codesign --sign "${codesign_id}" --keychain "${codesign_keychain}" \
56 codesign --sign "${codesign_id}" --keychain "${codesign_keychain}" \
60 codesign --sign "${codesign_id}" --keychain "${codesign_keychain}" \
64 codesign --sign "${codesign_id}" --keychain "${codesign_keychain}" \
sign_app.sh.in 54 codesign --sign "${codesign_id}" --keychain "${codesign_keychain}" \
  /packages/apps/KeyChain/src/com/android/keychain/
KeyChainBroadcastReceiver.java 2 package com.android.keychain;
  /packages/apps/KeyChain/support/src/com/android/keychain/tests/support/
IKeyChainServiceTestSupport.aidl 16 package com.android.keychain.tests.support;
KeyChainServiceTestSupport.java 17 package com.android.keychain.tests.support;
23 import android.security.KeyChain;
72 KeyChain.KeyChainConnection connection = null;
74 connection = KeyChain.bind(KeyChainServiceTestSupport.this);
  /external/chromium_org/chrome/browser/password_manager/
password_store_mac_internal.h 19 // PasswordForms instead of Keychain items.
22 // Creates an adapter for |keychain|. This class does not take ownership of
23 // |keychain|, so the caller must make sure that the keychain outlives the
25 explicit MacKeychainPasswordFormAdapter(const AppleKeychain* keychain);
27 // Returns PasswordForms for each keychain entry that could be used to fill
33 // Returns true if there is the Keychain entry that matches |query_form| on
34 // all of the fields that uniquely identify a Keychain item.
37 // Returns true if the keychain contains any items that are mergeable with
40 // passwords from the keychain, thus potentially triggering authorizaiton UI
    [all...]
password_store_mac.cc 36 // Utility class to handle the details of constructing and running a keychain
40 explicit KeychainSearch(const AppleKeychain& keychain);
57 // Fills |items| with all Keychain items that match the Init'd search.
67 KeychainSearch::KeychainSearch(const AppleKeychain& keychain)
68 : keychain_(&keychain), search_ref_(NULL) {
168 OSSTATUS_LOG(ERROR, result) << "Keychain lookup failed";
222 // Converts a Keychain time string to a Time object, returning true if
259 bool FillPasswordFormFromKeychainItem(const AppleKeychain& keychain,
289 OSStatus result = keychain.ItemCopyAttributesAndData(keychain_item, &attrInfo,
298 OSSTATUS_LOG(ERROR, result) << "Keychain data load failed"
    [all...]
password_store_mac.h 24 // Implements PasswordStore on top of the OS X Keychain, with an internal
26 // Keychain, as well as the rationale for some of the behaviors, see the
27 // Keychain integration design doc:
28 // http://dev.chromium.org/developers/design-documents/os-x-password-manager-keychain-integration
31 // Takes ownership of |keychain| and |login_db|, both of which must be
36 crypto::AppleKeychain* keychain,
78 // Adds the given form to the Keychain if it's something we want to store
84 // keychain form.
92 // Removes the given forms from the Keychain.
97 // keychain. Removes those forms from the database, and returns them i
    [all...]
password_store_factory.cc 155 crypto::AppleKeychain* keychain = local
160 main_thread_runner, db_thread_runner, keychain, login_db.release());
password_store_mac_unittest.cc 69 crypto::AppleKeychain* keychain,
73 keychain,
155 // Causes a test failure unless any Keychain items added during the test have
1087 MockAppleKeychain* keychain() { return keychain_; } function
    [all...]
  /packages/apps/KeyChain/support/
Android.mk 19 LOCAL_SRC_FILES := src/com/android/keychain/tests/support/IKeyChainServiceTestSupport.aidl
20 LOCAL_MODULE := com.android.keychain.tests.support
27 LOCAL_STATIC_JAVA_LIBRARIES := com.android.keychain.tests.support
  /external/chromium_org/crypto/
mock_apple_keychain.cc 43 SecKeychainRef keychain,
apple_keychain.h 24 // See Keychain Services documentation for function documentation, as these call
25 // through directly to their Keychain Services equivalents (Foo ->
46 virtual OSStatus AddGenericPassword(SecKeychainRef keychain,
84 virtual OSStatus AddInternetPassword(SecKeychainRef keychain,
mock_apple_keychain.h 20 // Mock Keychain wrapper for testing code that interacts with the OS X
21 // Keychain. Implemented by storing SecKeychainAttributeList and
26 // of AppleKeychain doesn't apply to the actual keychain data, so all of the
47 SecKeychainRef keychain,
82 SecKeychainRef keychain,
119 // Adds a keychain item with the given info to the test set.
124 // interaction with the system Keychain. For mocking purposes we allow the
146 // Type of the map holding the mock keychain attributes.
151 // Returns true if the keychain already contains a password that matches the
165 // Initializes storage for keychain data at |key|
    [all...]
  /development/samples/KeyChainDemo/src/com/example/android/keychain/
KeyChainDemoActivity.java 17 package com.example.android.keychain;
25 import android.security.KeyChain;
45 public static final String PKCS12_FILENAME = "keychain.p12";
64 private static final String KEYCHAIN_PREF = "keychain";
69 // Request code used when starting the activity using the KeyChain install
228 byte[] keychain = new byte[bis.available()];
229 bis.read(keychain);
231 Intent installIntent = KeyChain.createInstallIntent();
232 installIntent.putExtra(KeyChain.EXTRA_PKCS12, keychain);
    [all...]
SecureWebServerService.java 17 package com.example.android.keychain;
SecureWebServer.java 17 package com.example.android.keychain;
  /external/chromium_org/net/base/
keygen_handler_mac.cc 119 // sets a label on the Keychain dialogs. Pass NULL as the second
200 // Remove keys from keychain if asked to during unit testing:
223 // is passed as the initial access control list in Keychain. The
231 SecKeychainRef keychain; local
232 err = SecKeychainCopyDefault(&keychain);
237 base::ScopedCFTypeRef<SecKeychainRef> scoped_keychain(keychain);
241 keychain,
  /packages/apps/KeyChain/tests/
Android.mk 21 LOCAL_STATIC_JAVA_LIBRARIES := com.android.keychain.tests.support core-tests mockwebserver
  /packages/apps/KeyChain/tests/src/com/android/keychain/tests/
KeyChainServiceTest.java 17 package com.android.keychain.tests;
29 import com.android.keychain.tests.support.IKeyChainServiceTestSupport;
KeyChainTestActivity.java 17 package com.android.keychain.tests;
24 import android.security.KeyChain;
51 * Simple activity based test that exercises the KeyChain API
107 KeyChain.getPrivateKey(null, null);
114 log("KeyChain failed as expected with null argument.");
118 KeyChain.getPrivateKey(this, null);
125 log("KeyChain failed as expected with null argument.");
129 KeyChain.getPrivateKey(null, "");
136 log("KeyChain failed as expected with null argument.");
140 KeyChain.getPrivateKey(this, "")
    [all...]
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.6/sysroot/usr/include/rpcsvc/
nis.x 360 % int keychain; /* It's hash key (for pop) */
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/include/rpcsvc/
nis.x 360 % int keychain; /* It's hash key (for pop) */

Completed in 1694 milliseconds

1 2