Searched refs:entitlement (Results 1 - 25 of 32) sorted by relevance

12

/macosx-10.10.1/Security-57031.1.35/codesign_wrapper/
H A DMISEntitlement.h18 * Check if the entitlement dictionary permits an entitlement to have the
21 Boolean MISEntitlementDictionaryAllowsEntitlementValue(CFDictionaryRef entitlements, CFStringRef entitlement, CFTypeRef value);
H A DMISEntitlement.c38 Boolean MISEntitlementDictionaryAllowsEntitlementValue(CFDictionaryRef entitlements, CFStringRef entitlement, CFTypeRef value) argument
42 /* NULL is never a valid entitlement value */
45 /* Make sure the entitlement is present */
46 CFTypeRef storedValue = CFDictionaryGetValue(entitlements, entitlement);
51 * If the value matches our constant, the entitlement is permitted
53 * If the value in the dictionary is a boolean, then the entitlement
56 * entitlement must be either one of those strings OR an array that
/macosx-10.10.1/ppp-786.1.1/Helpers/snhelper/
H A Dsnhelper.c23 xpc_object_t entitlement = xpc_connection_copy_entitlement_value(connection, "com.apple.private.snhelper"); local
24 result = (isa_xpc_bool(entitlement) && xpc_bool_get_value(entitlement));
25 if (entitlement != NULL) {
26 xpc_release(entitlement);
88 syslog(LOG_ERR, "Caller is missing the snhelper entitlement");
/macosx-10.10.1/WebKit2-7600.1.25/Shared/EntryPointUtilities/mac/XPCService/
H A DXPCServiceEntryPoint.mm35 extern "C" xpc_object_t xpc_connection_copy_entitlement_value(xpc_connection_t connection, const char *entitlement);
53 NSLog(@"Application does not have the 'com.apple.security.network.client' entitlement.");
100 bool XPCServiceInitializerDelegate::hasEntitlement(const char* entitlement)
102 auto value = IPC::adoptXPC(xpc_connection_copy_entitlement_value(m_connection.get(), entitlement));
H A DXPCServiceEntryPoint.h61 bool hasEntitlement(const char* entitlement);
/macosx-10.10.1/Security-57031.1.35/Security/include/security_codesigning/
H A DSecTask.h68 @abstract Returns the value of a single entitlement for the represented
71 @param entitlement The name of the entitlement to be fetched
75 @result The value of the specified entitlement for the process or NULL if
76 the entitlement value could not be retrieved. The type of the returned
77 value will depend on the entitlement specified. The caller must release
80 the entitlement is simply not present. In the latter case, no CFError is
83 CFTypeRef SecTaskCopyValueForEntitlement(SecTaskRef task, CFStringRef entitlement, CFErrorRef *error);
90 @param entitlements An array of entitlement names to be fetched
93 detailed errors. If a requested entitlement i
[all...]
H A DSecTask.c57 kSecCodeMagicEntitlement = 0xfade7171, /* entitlement blob */
245 CFTypeRef SecTaskCopyValueForEntitlement(SecTaskRef task, CFStringRef entitlement, CFErrorRef *error) argument
254 value = CFDictionaryGetValue(task->entitlements, entitlement);
282 CFStringRef entitlement = CFArrayGetValueAtIndex(entitlements, i); local
283 CFTypeRef value = CFDictionaryGetValue(task->entitlements, entitlement);
285 CFDictionarySetValue(values, entitlement, value);
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_codesigning/lib/
H A DSecTask.h68 @abstract Returns the value of a single entitlement for the represented
71 @param entitlement The name of the entitlement to be fetched
75 @result The value of the specified entitlement for the process or NULL if
76 the entitlement value could not be retrieved. The type of the returned
77 value will depend on the entitlement specified. The caller must release
80 the entitlement is simply not present. In the latter case, no CFError is
83 CFTypeRef SecTaskCopyValueForEntitlement(SecTaskRef task, CFStringRef entitlement, CFErrorRef *error);
90 @param entitlements An array of entitlement names to be fetched
93 detailed errors. If a requested entitlement i
[all...]
H A DSecTask.c57 kSecCodeMagicEntitlement = 0xfade7171, /* entitlement blob */
245 CFTypeRef SecTaskCopyValueForEntitlement(SecTaskRef task, CFStringRef entitlement, CFErrorRef *error) argument
254 value = CFDictionaryGetValue(task->entitlements, entitlement);
282 CFStringRef entitlement = CFArrayGetValueAtIndex(entitlements, i); local
283 CFTypeRef value = CFDictionaryGetValue(task->entitlements, entitlement);
285 CFDictionarySetValue(values, entitlement, value);
/macosx-10.10.1/Security-57031.1.35/sectask/
H A DSecTask.h67 @abstract Returns the value of a single entitlement for the represented
70 @param entitlement The name of the entitlement to be fetched
74 @result The value of the specified entitlement for the process or NULL if
75 the entitlement value could not be retrieved. The type of the returned
76 value will depend on the entitlement specified. The caller must release
79 the entitlement is simply not present. In the latter case, no CFError is
82 CFTypeRef SecTaskCopyValueForEntitlement(SecTaskRef task, CFStringRef entitlement, CFErrorRef *error);
89 @param entitlements An array of entitlement names to be fetched
92 detailed errors. If a requested entitlement i
[all...]
H A DSecTask.c252 CFTypeRef SecTaskCopyValueForEntitlement(SecTaskRef task, CFStringRef entitlement, CFErrorRef *error) argument
263 value = CFDictionaryGetValue(task->entitlements, entitlement);
293 CFStringRef entitlement = CFArrayGetValueAtIndex(entitlements, i); local
294 CFTypeRef value = CFDictionaryGetValue(task->entitlements, entitlement);
296 CFDictionarySetValue(values, entitlement, value);
/macosx-10.10.1/Security-57031.1.35/Security/authd/
H A Dauthtoken.h82 CFTypeRef auth_token_copy_entitlement_value(auth_token_t, const char * entitlement);
85 bool auth_token_has_entitlement(auth_token_t, const char * entitlement);
H A Dprocess.h69 CFTypeRef process_copy_entitlement_value(process_t, const char * entitlement);
72 bool process_has_entitlement(process_t, const char * entitlement);
H A Dprocess.c375 process_copy_entitlement_value(process_t proc, const char * entitlement) argument
378 require(entitlement != NULL, done);
380 CFStringRef key = CFStringCreateWithCStringNoCopy(kCFAllocatorDefault, entitlement, kCFStringEncodingUTF8, kCFAllocatorNull);
391 process_has_entitlement(process_t proc, const char * entitlement) argument
394 require(entitlement != NULL, done);
396 CFStringRef key = CFStringCreateWithCStringNoCopy(kCFAllocatorDefault, entitlement, kCFStringEncodingUTF8, kCFAllocatorNull);
H A Dauthtoken.c53 process_t creator; // weak reference, used for entitlement checking
422 auth_token_copy_entitlement_value(auth_token_t auth, const char * entitlement) argument
427 value = process_copy_entitlement_value(auth->creator, entitlement);
435 auth_token_has_entitlement(auth_token_t auth, const char * entitlement) argument
441 entitled = process_has_entitlement(auth->creator, entitlement);
/macosx-10.10.1/configd-699.1.5/SystemConfiguration.fproj/
H A DVPNService.c151 CFBooleanRef entitlement = local
155 can_set_apple_app_rules = (isA_CFBoolean(entitlement) && CFBooleanGetValue(entitlement));
156 if (entitlement != NULL) {
157 CFRelease(entitlement);
/macosx-10.10.1/configd-699.1.5/SystemConfiguration.fproj/helper/
H A DSCHelper_server.c53 // entitlement used to control write access to a given "prefsID"
59 // entitlement used to allow limited [VPN configuration] write access to the "preferences.plist"
86 // write access entitlement associated with this session
680 * kSCHelperAuthCallerInfo - use entitlement
1452 copyEntitlement(SCHelperSessionRef session, CFStringRef entitlement) argument
1463 // Get the value for the entitlement
1464 value = SecTaskCopyValueForEntitlement(task, entitlement, &error);
1474 entitlement,
1530 CFArrayRef entitlement; local
1534 entitlement
1582 CFArrayRef entitlement; local
[all...]
/macosx-10.10.1/ppp-786.1.1/Controller/
H A Dne_sm_bridge.c471 xpc_object_t entitlement = xpc_connection_copy_entitlement_value(connection, NESessionManagerPrivilegedEntitlement); local
474 isa_xpc_bool(entitlement) && xpc_bool_get_value(entitlement))
483 if (entitlement) {
484 xpc_release(entitlement);
498 xpc_object_t entitlement = xpc_connection_copy_entitlement_value(connection, NESessionManagerPrivilegedEntitlement); local
500 if (isa_xpc_bool(entitlement) && xpc_bool_get_value(entitlement))
507 if (entitlement) {
508 xpc_release(entitlement);
[all...]
H A Dscnc_mach_server.c88 static Boolean hasEntitlement(audit_token_t audit_token, CFStringRef entitlement, CFStringRef vpntype);
177 /* does caller has the right entitlement */
179 SCLog(TRUE, LOG_ERR, CFSTR("_pppcontroller_attach_proxy client fails entitlement for client uid change"));
811 hasEntitlement(audit_token_t audit_token, CFStringRef entitlement, CFStringRef vpntype) argument
822 /* Get the value for the entitlement. */
823 value = SecTaskCopyValueForEntitlement(task, entitlement, &error);
827 /* if client DOES have entitlement */
838 // if client DOES have entitlement
844 CFSTR("SCNC Controller: entitlement not valid: %@"),
845 entitlement);
[all...]
/macosx-10.10.1/security_systemkeychain-55202/syspolicyd/
H A Dsyspolicyd.cpp275 // check caller for required entitlement
276 xpc_object_t entitlement = xpc_connection_copy_entitlement_value(connection, "com.apple.private.assessment.recording"); local
277 if (entitlement == NULL || entitlement == XPC_BOOL_FALSE) {
/macosx-10.10.1/bootp-298/IPConfiguration.bproj/
H A Dserver.c52 S_has_entitlement(audit_token_t token, CFStringRef entitlement) argument
62 S_has_entitlement(audit_token_t token, CFStringRef entitlement) argument
71 allow = SecTaskCopyValueForEntitlement(task, entitlement, NULL);
/macosx-10.10.1/configd-699.1.5/configd.tproj/
H A Dsession.c327 * release any entitlement info
446 copyEntitlement(serverSessionRef session, CFStringRef entitlement) argument
456 // Get the value for the entitlement
457 value = SecTaskCopyValueForEntitlement(task, entitlement, &error);
467 entitlement,
619 // if key matches one of the entitlement "keys", grant
636 // if key matches one of the entitlement
/macosx-10.10.1/Security-57031.1.35/Security/sec/ipc/
H A Dserver.c69 CFStringRef entitlement)
72 entitlement, NULL);
82 CFStringRef entitlement)
85 entitlement, NULL);
148 CFStringRef entitlement) {
150 entitlement, NULL);
274 // operations before kSecXPCOpTryUserCredentials don't need this entitlement.
278 // Per <rdar://problem/13315020> Disable the entitlement check for "keychain-cloud-circle"
279 // we disable entitlement enforcement. However, we still log so we know who needs the entitlement
68 SecTaskCopyStringForEntitlement(SecTaskRef task, CFStringRef entitlement) argument
81 SecTaskCopyArrayOfStringsForEntitlement(SecTaskRef task, CFStringRef entitlement) argument
147 SecTaskGetBooleanValueForEntitlement(SecTaskRef task, CFStringRef entitlement) argument
[all...]
/macosx-10.10.1/Security-57031.1.35/Security/sec/SharedWebCredential/
H A Dswcagent.m113 static bool SecTaskGetBooleanValueForEntitlement(SecTaskRef task, CFStringRef entitlement)
115 CFStringRef canModify = (CFStringRef)SecTaskCopyValueForEntitlement(task, entitlement, NULL);
124 static CFArrayRef SecTaskCopyArrayOfStringsForEntitlement(SecTaskRef task, CFStringRef entitlement)
127 entitlement, NULL);
575 // check our caller's private entitlement to invoke swcagent
576 // TODO: on iOS it's enough to have the entitlement; will need to check code requirement on OS X
582 SecError(errSecMissingEntitlement, &entitlementError, CFSTR("%@: %@ lacks entitlement %@"), SOSCCGetOperationDescription((enum SWCAXPCOperation)operation), clientTask, kSecEntitlementPrivateAssociatedDomains);
605 // check for presence of original client's shared credential entitlement
609 SecError(errSecMissingEntitlement, &entitlementError, CFSTR("%@: %@ lacks entitlement %@"), SOSCCGetOperationDescription((enum SWCAXPCOperation)operation), clientTask, kSecEntitlementAssociatedDomains);
/macosx-10.10.1/PowerManagement-494.1.2/pmconfigd/
H A DPMAssertions.h272 CFStringRef entitlement; /* if set, caller must have this entitlement to create this assertion */ member in struct:assertionType

Completed in 314 milliseconds

12