/external/chromium_org/components/os_crypt/ |
H A D | keychain_password_mac.h | 18 explicit KeychainPassword(const crypto::AppleKeychain& keychain) argument 19 : keychain_(keychain) { 23 // in the Keychain then one is generated, stored in the Mac keychain, and
|
/external/chromium_org/remoting/host/installer/mac/ |
H A D | do_signing.sh | 123 local keychain="${2}" 131 codesign -vv -s "${id}" --keychain "${keychain}" "${name}" 137 local keychain="${2}" 140 sign "${input_dir}/${ME2ME_NM_HOST}" "${keychain}" "${id}" 141 sign "${input_dir}/${IT2ME_NM_HOST}" "${keychain}" "${id}" 142 sign "${input_dir}/${ME2ME_HOST}" "${keychain}" "${id}" 143 sign "${input_dir}/${UNINSTALLER}" "${keychain}" "${id}" 144 sign "${input_dir}/${PREFPANE}" "${keychain}" "${id}" 149 local keychain [all...] |
/external/chromium_org/chrome/installer/mac/ |
H A D | sign_versioned_dir.sh.in | 52 codesign --sign "${codesign_id}" --keychain "${codesign_keychain}" \ 56 codesign --sign "${codesign_id}" --keychain "${codesign_keychain}" \ 60 codesign --sign "${codesign_id}" --keychain "${codesign_keychain}" \ 64 codesign --sign "${codesign_id}" --keychain "${codesign_keychain}" \
|
H A D | sign_app.sh.in | 54 codesign --sign "${codesign_id}" --keychain "${codesign_keychain}" \
|
/external/chromium_org/chrome/browser/password_manager/ |
H A D | password_store_mac_internal.h | 22 // Creates an adapter for |keychain|. This class does not take ownership of 23 // |keychain|, so the caller must make sure that the keychain outlives the 25 explicit MacKeychainPasswordFormAdapter(const AppleKeychain* keychain); 27 // Returns PasswordForms for each keychain entry that could be used to fill 37 // Returns true if the keychain contains any items that are mergeable with 40 // passwords from the keychain, thus potentially triggering authorizaiton UI, 45 // Returns all keychain items of types corresponding to password forms. 48 // Returns password data from all keychain items of types corresponding to 52 // Creates a new keychain entr [all...] |
H A D | password_store_mac.cc | 36 // Utility class to handle the details of constructing and running a keychain 40 explicit KeychainSearch(const AppleKeychain& keychain); 67 KeychainSearch::KeychainSearch(const AppleKeychain& keychain) argument 68 : keychain_(&keychain), search_ref_(NULL) { 259 bool FillPasswordFormFromKeychainItem(const AppleKeychain& keychain, argument 289 OSStatus result = keychain.ItemCopyAttributesAndData(keychain_item, &attrInfo, 363 keychain.ItemFreeAttributesAndData(attrList, password_data); 386 // We never merge blacklist entries between our store and the keychain. 409 // keychain items with paths probably came from us). 457 // than being merged with keychain form 487 ExtractAllKeychainItemAttributesIntoPasswordForms( std::vector<SecKeychainItemRef>* keychain_items, const AppleKeychain& keychain) argument 507 GetPasswordsForForms( const AppleKeychain& keychain, std::vector<PasswordForm*>* database_forms) argument 593 ExtractPasswordsMergeableWithForm( const AppleKeychain& keychain, const std::vector<ItemFormPair>& item_form_pairs, const PasswordForm& query_form) argument 621 MacKeychainPasswordFormAdapter( const AppleKeychain* keychain) argument 863 PasswordStoreMac( scoped_refptr<base::SingleThreadTaskRunner> main_thread_runner, scoped_refptr<base::SingleThreadTaskRunner> db_thread_runner, AppleKeychain* keychain, password_manager::LoginDatabase* login_db) argument [all...] |
H A D | password_store_mac.h | 28 // http://dev.chromium.org/developers/design-documents/os-x-password-manager-keychain-integration 31 // Takes ownership of |keychain| and |login_db|, both of which must be 36 crypto::AppleKeychain* keychain, 84 // keychain form. 97 // keychain. Removes those forms from the database, and returns them in
|
H A D | password_store_factory.cc | 155 crypto::AppleKeychain* keychain = local 160 main_thread_runner, db_thread_runner, keychain, login_db.release());
|
H A D | password_store_mac_unittest.cc | 69 crypto::AppleKeychain* keychain, 73 keychain, 806 // Test a merge where Chrome has a blacklist entry, and the keychain has 955 // When |extract_password_data| is true and the keychain entry has a non-empty 970 // When |extract_password_data| is true and the keychain entry has an empty 985 // When |extract_password_data| is true and the keychain entry has an empty 999 // When |extract_password_data| is true and the keychain entry has a single 1087 MockAppleKeychain* keychain() { return keychain_; } function 1100 // Insert a password into both the database and the keychain. 1118 // Insert a password into the keychain onl 66 TestPasswordStoreMac( scoped_refptr<base::SingleThreadTaskRunner> main_thread_runner, scoped_refptr<base::SingleThreadTaskRunner> db_thread_runner, crypto::AppleKeychain* keychain, LoginDatabase* login_db) argument [all...] |
/external/chromium_org/crypto/ |
H A D | mock_apple_keychain.cc | 43 SecKeychainRef keychain, 42 AddGenericPassword( SecKeychainRef keychain, UInt32 serviceNameLength, const char* serviceName, UInt32 accountNameLength, const char* accountName, UInt32 passwordLength, const void* passwordData, SecKeychainItemRef* itemRef) const argument
|
H A D | apple_keychain.h | 46 virtual OSStatus AddGenericPassword(SecKeychainRef keychain, 84 virtual OSStatus AddInternetPassword(SecKeychainRef keychain,
|
H A D | mock_apple_keychain.h | 26 // of AppleKeychain doesn't apply to the actual keychain data, so all of the 47 SecKeychainRef keychain, 82 SecKeychainRef keychain, 119 // Adds a keychain item with the given info to the test set. 146 // Type of the map holding the mock keychain attributes. 151 // Returns true if the keychain already contains a password that matches the 165 // Initializes storage for keychain data at |key|. 210 // Mutable because the MockAppleKeychain API requires its internal keychain
|
H A D | mock_apple_keychain_mac.cc | 370 // The keychain already has this item, since all fields other than the 378 SecKeychainRef keychain, 398 // If the account already exists in the keychain, we don't add it. 411 // Initialize keychain data storage at the target location. 377 AddInternetPassword( SecKeychainRef keychain, UInt32 serverNameLength, const char* serverName, UInt32 securityDomainLength, const char* securityDomain, UInt32 accountNameLength, const char* accountName, UInt32 pathLength, const char* path, UInt16 port, SecProtocolType protocol, SecAuthenticationType authenticationType, UInt32 passwordLength, const void* passwordData, SecKeychainItemRef* itemRef) const argument
|
/external/chromium_org/net/base/ |
H A D | keygen_handler_mac.cc | 200 // Remove keys from keychain if asked to during unit testing: 231 SecKeychainRef keychain; local 232 err = SecKeychainCopyDefault(&keychain); 237 base::ScopedCFTypeRef<SecKeychainRef> scoped_keychain(keychain); 241 keychain,
|
/external/sepolicy/ |
H A D | file_contexts | 207 /data/misc/keychain(/.*)? u:object_r:keychain_data_file:s0
|