Searched refs:keychain (Results 1 - 15 of 15) sorted by relevance

/external/chromium_org/components/os_crypt/
H A Dkeychain_password_mac.h18 explicit KeychainPassword(const crypto::AppleKeychain& keychain) argument
19 : keychain_(keychain) {
23 // in the Keychain then one is generated, stored in the Mac keychain, and
/external/chromium_org/remoting/host/installer/mac/
H A Ddo_signing.sh123 local keychain="${2}"
131 codesign -vv -s "${id}" --keychain "${keychain}" "${name}"
137 local keychain="${2}"
140 sign "${input_dir}/${ME2ME_NM_HOST}" "${keychain}" "${id}"
141 sign "${input_dir}/${IT2ME_NM_HOST}" "${keychain}" "${id}"
142 sign "${input_dir}/${ME2ME_HOST}" "${keychain}" "${id}"
143 sign "${input_dir}/${UNINSTALLER}" "${keychain}" "${id}"
144 sign "${input_dir}/${PREFPANE}" "${keychain}" "${id}"
149 local keychain
[all...]
/external/chromium_org/chrome/installer/mac/
H A Dsign_versioned_dir.sh.in52 codesign --sign "${codesign_id}" --keychain "${codesign_keychain}" \
56 codesign --sign "${codesign_id}" --keychain "${codesign_keychain}" \
60 codesign --sign "${codesign_id}" --keychain "${codesign_keychain}" \
64 codesign --sign "${codesign_id}" --keychain "${codesign_keychain}" \
H A Dsign_app.sh.in54 codesign --sign "${codesign_id}" --keychain "${codesign_keychain}" \
/external/chromium_org/chrome/browser/password_manager/
H A Dpassword_store_mac_internal.h22 // Creates an adapter for |keychain|. This class does not take ownership of
23 // |keychain|, so the caller must make sure that the keychain outlives the
25 explicit MacKeychainPasswordFormAdapter(const AppleKeychain* keychain);
27 // Returns PasswordForms for each keychain entry that could be used to fill
37 // Returns true if the keychain contains any items that are mergeable with
40 // passwords from the keychain, thus potentially triggering authorizaiton UI,
45 // Returns all keychain items of types corresponding to password forms.
48 // Returns password data from all keychain items of types corresponding to
52 // Creates a new keychain entr
[all...]
H A Dpassword_store_mac.cc36 // Utility class to handle the details of constructing and running a keychain
40 explicit KeychainSearch(const AppleKeychain& keychain);
67 KeychainSearch::KeychainSearch(const AppleKeychain& keychain) argument
68 : keychain_(&keychain), search_ref_(NULL) {
259 bool FillPasswordFormFromKeychainItem(const AppleKeychain& keychain, argument
289 OSStatus result = keychain.ItemCopyAttributesAndData(keychain_item, &attrInfo,
363 keychain.ItemFreeAttributesAndData(attrList, password_data);
386 // We never merge blacklist entries between our store and the keychain.
409 // keychain items with paths probably came from us).
457 // than being merged with keychain form
487 ExtractAllKeychainItemAttributesIntoPasswordForms( std::vector<SecKeychainItemRef>* keychain_items, const AppleKeychain& keychain) argument
507 GetPasswordsForForms( const AppleKeychain& keychain, std::vector<PasswordForm*>* database_forms) argument
593 ExtractPasswordsMergeableWithForm( const AppleKeychain& keychain, const std::vector<ItemFormPair>& item_form_pairs, const PasswordForm& query_form) argument
621 MacKeychainPasswordFormAdapter( const AppleKeychain* keychain) argument
863 PasswordStoreMac( scoped_refptr<base::SingleThreadTaskRunner> main_thread_runner, scoped_refptr<base::SingleThreadTaskRunner> db_thread_runner, AppleKeychain* keychain, password_manager::LoginDatabase* login_db) argument
[all...]
H A Dpassword_store_mac.h28 // http://dev.chromium.org/developers/design-documents/os-x-password-manager-keychain-integration
31 // Takes ownership of |keychain| and |login_db|, both of which must be
36 crypto::AppleKeychain* keychain,
84 // keychain form.
97 // keychain. Removes those forms from the database, and returns them in
H A Dpassword_store_factory.cc155 crypto::AppleKeychain* keychain = local
160 main_thread_runner, db_thread_runner, keychain, login_db.release());
H A Dpassword_store_mac_unittest.cc69 crypto::AppleKeychain* keychain,
73 keychain,
806 // Test a merge where Chrome has a blacklist entry, and the keychain has
955 // When |extract_password_data| is true and the keychain entry has a non-empty
970 // When |extract_password_data| is true and the keychain entry has an empty
985 // When |extract_password_data| is true and the keychain entry has an empty
999 // When |extract_password_data| is true and the keychain entry has a single
1087 MockAppleKeychain* keychain() { return keychain_; } function
1100 // Insert a password into both the database and the keychain.
1118 // Insert a password into the keychain onl
66 TestPasswordStoreMac( scoped_refptr<base::SingleThreadTaskRunner> main_thread_runner, scoped_refptr<base::SingleThreadTaskRunner> db_thread_runner, crypto::AppleKeychain* keychain, LoginDatabase* login_db) argument
[all...]
/external/chromium_org/crypto/
H A Dmock_apple_keychain.cc43 SecKeychainRef keychain,
42 AddGenericPassword( SecKeychainRef keychain, UInt32 serviceNameLength, const char* serviceName, UInt32 accountNameLength, const char* accountName, UInt32 passwordLength, const void* passwordData, SecKeychainItemRef* itemRef) const argument
H A Dapple_keychain.h46 virtual OSStatus AddGenericPassword(SecKeychainRef keychain,
84 virtual OSStatus AddInternetPassword(SecKeychainRef keychain,
H A Dmock_apple_keychain.h26 // of AppleKeychain doesn't apply to the actual keychain data, so all of the
47 SecKeychainRef keychain,
82 SecKeychainRef keychain,
119 // Adds a keychain item with the given info to the test set.
146 // Type of the map holding the mock keychain attributes.
151 // Returns true if the keychain already contains a password that matches the
165 // Initializes storage for keychain data at |key|.
210 // Mutable because the MockAppleKeychain API requires its internal keychain
H A Dmock_apple_keychain_mac.cc370 // The keychain already has this item, since all fields other than the
378 SecKeychainRef keychain,
398 // If the account already exists in the keychain, we don't add it.
411 // Initialize keychain data storage at the target location.
377 AddInternetPassword( SecKeychainRef keychain, UInt32 serverNameLength, const char* serverName, UInt32 securityDomainLength, const char* securityDomain, UInt32 accountNameLength, const char* accountName, UInt32 pathLength, const char* path, UInt16 port, SecProtocolType protocol, SecAuthenticationType authenticationType, UInt32 passwordLength, const void* passwordData, SecKeychainItemRef* itemRef) const argument
/external/chromium_org/net/base/
H A Dkeygen_handler_mac.cc200 // Remove keys from keychain if asked to during unit testing:
231 SecKeychainRef keychain; local
232 err = SecKeychainCopyDefault(&keychain);
237 base::ScopedCFTypeRef<SecKeychainRef> scoped_keychain(keychain);
241 keychain,
/external/sepolicy/
H A Dfile_contexts207 /data/misc/keychain(/.*)? u:object_r:keychain_data_file:s0

Completed in 9076 milliseconds