/macosx-10.10.1/Security-57031.1.35/codesign_wrapper/ |
H A D | MISEntitlement.h | 18 * Check if the entitlement dictionary permits an entitlement to have the 21 Boolean MISEntitlementDictionaryAllowsEntitlementValue(CFDictionaryRef entitlements, CFStringRef entitlement, CFTypeRef value);
|
H A D | MISEntitlement.c | 38 Boolean MISEntitlementDictionaryAllowsEntitlementValue(CFDictionaryRef entitlements, CFStringRef entitlement, CFTypeRef value) argument 42 /* NULL is never a valid entitlement value */ 45 /* Make sure the entitlement is present */ 46 CFTypeRef storedValue = CFDictionaryGetValue(entitlements, entitlement); 51 * If the value matches our constant, the entitlement is permitted 53 * If the value in the dictionary is a boolean, then the entitlement 56 * entitlement must be either one of those strings OR an array that
|
/macosx-10.10.1/ppp-786.1.1/Helpers/snhelper/ |
H A D | snhelper.c | 23 xpc_object_t entitlement = xpc_connection_copy_entitlement_value(connection, "com.apple.private.snhelper"); local 24 result = (isa_xpc_bool(entitlement) && xpc_bool_get_value(entitlement)); 25 if (entitlement != NULL) { 26 xpc_release(entitlement); 88 syslog(LOG_ERR, "Caller is missing the snhelper entitlement");
|
/macosx-10.10.1/WebKit2-7600.1.25/Shared/EntryPointUtilities/mac/XPCService/ |
H A D | XPCServiceEntryPoint.mm | 35 extern "C" xpc_object_t xpc_connection_copy_entitlement_value(xpc_connection_t connection, const char *entitlement); 53 NSLog(@"Application does not have the 'com.apple.security.network.client' entitlement."); 100 bool XPCServiceInitializerDelegate::hasEntitlement(const char* entitlement) 102 auto value = IPC::adoptXPC(xpc_connection_copy_entitlement_value(m_connection.get(), entitlement));
|
H A D | XPCServiceEntryPoint.h | 61 bool hasEntitlement(const char* entitlement);
|
/macosx-10.10.1/Security-57031.1.35/Security/include/security_codesigning/ |
H A D | SecTask.h | 68 @abstract Returns the value of a single entitlement for the represented 71 @param entitlement The name of the entitlement to be fetched 75 @result The value of the specified entitlement for the process or NULL if 76 the entitlement value could not be retrieved. The type of the returned 77 value will depend on the entitlement specified. The caller must release 80 the entitlement is simply not present. In the latter case, no CFError is 83 CFTypeRef SecTaskCopyValueForEntitlement(SecTaskRef task, CFStringRef entitlement, CFErrorRef *error); 90 @param entitlements An array of entitlement names to be fetched 93 detailed errors. If a requested entitlement i [all...] |
H A D | SecTask.c | 57 kSecCodeMagicEntitlement = 0xfade7171, /* entitlement blob */ 245 CFTypeRef SecTaskCopyValueForEntitlement(SecTaskRef task, CFStringRef entitlement, CFErrorRef *error) argument 254 value = CFDictionaryGetValue(task->entitlements, entitlement); 282 CFStringRef entitlement = CFArrayGetValueAtIndex(entitlements, i); local 283 CFTypeRef value = CFDictionaryGetValue(task->entitlements, entitlement); 285 CFDictionarySetValue(values, entitlement, value);
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_codesigning/lib/ |
H A D | SecTask.h | 68 @abstract Returns the value of a single entitlement for the represented 71 @param entitlement The name of the entitlement to be fetched 75 @result The value of the specified entitlement for the process or NULL if 76 the entitlement value could not be retrieved. The type of the returned 77 value will depend on the entitlement specified. The caller must release 80 the entitlement is simply not present. In the latter case, no CFError is 83 CFTypeRef SecTaskCopyValueForEntitlement(SecTaskRef task, CFStringRef entitlement, CFErrorRef *error); 90 @param entitlements An array of entitlement names to be fetched 93 detailed errors. If a requested entitlement i [all...] |
H A D | SecTask.c | 57 kSecCodeMagicEntitlement = 0xfade7171, /* entitlement blob */ 245 CFTypeRef SecTaskCopyValueForEntitlement(SecTaskRef task, CFStringRef entitlement, CFErrorRef *error) argument 254 value = CFDictionaryGetValue(task->entitlements, entitlement); 282 CFStringRef entitlement = CFArrayGetValueAtIndex(entitlements, i); local 283 CFTypeRef value = CFDictionaryGetValue(task->entitlements, entitlement); 285 CFDictionarySetValue(values, entitlement, value);
|
/macosx-10.10.1/Security-57031.1.35/sectask/ |
H A D | SecTask.h | 67 @abstract Returns the value of a single entitlement for the represented 70 @param entitlement The name of the entitlement to be fetched 74 @result The value of the specified entitlement for the process or NULL if 75 the entitlement value could not be retrieved. The type of the returned 76 value will depend on the entitlement specified. The caller must release 79 the entitlement is simply not present. In the latter case, no CFError is 82 CFTypeRef SecTaskCopyValueForEntitlement(SecTaskRef task, CFStringRef entitlement, CFErrorRef *error); 89 @param entitlements An array of entitlement names to be fetched 92 detailed errors. If a requested entitlement i [all...] |
H A D | SecTask.c | 252 CFTypeRef SecTaskCopyValueForEntitlement(SecTaskRef task, CFStringRef entitlement, CFErrorRef *error) argument 263 value = CFDictionaryGetValue(task->entitlements, entitlement); 293 CFStringRef entitlement = CFArrayGetValueAtIndex(entitlements, i); local 294 CFTypeRef value = CFDictionaryGetValue(task->entitlements, entitlement); 296 CFDictionarySetValue(values, entitlement, value);
|
/macosx-10.10.1/Security-57031.1.35/Security/authd/ |
H A D | authtoken.h | 82 CFTypeRef auth_token_copy_entitlement_value(auth_token_t, const char * entitlement); 85 bool auth_token_has_entitlement(auth_token_t, const char * entitlement);
|
H A D | process.h | 69 CFTypeRef process_copy_entitlement_value(process_t, const char * entitlement); 72 bool process_has_entitlement(process_t, const char * entitlement);
|
H A D | process.c | 375 process_copy_entitlement_value(process_t proc, const char * entitlement) argument 378 require(entitlement != NULL, done); 380 CFStringRef key = CFStringCreateWithCStringNoCopy(kCFAllocatorDefault, entitlement, kCFStringEncodingUTF8, kCFAllocatorNull); 391 process_has_entitlement(process_t proc, const char * entitlement) argument 394 require(entitlement != NULL, done); 396 CFStringRef key = CFStringCreateWithCStringNoCopy(kCFAllocatorDefault, entitlement, kCFStringEncodingUTF8, kCFAllocatorNull);
|
H A D | authtoken.c | 53 process_t creator; // weak reference, used for entitlement checking 422 auth_token_copy_entitlement_value(auth_token_t auth, const char * entitlement) argument 427 value = process_copy_entitlement_value(auth->creator, entitlement); 435 auth_token_has_entitlement(auth_token_t auth, const char * entitlement) argument 441 entitled = process_has_entitlement(auth->creator, entitlement);
|
/macosx-10.10.1/configd-699.1.5/SystemConfiguration.fproj/ |
H A D | VPNService.c | 151 CFBooleanRef entitlement = local 155 can_set_apple_app_rules = (isA_CFBoolean(entitlement) && CFBooleanGetValue(entitlement)); 156 if (entitlement != NULL) { 157 CFRelease(entitlement);
|
/macosx-10.10.1/configd-699.1.5/SystemConfiguration.fproj/helper/ |
H A D | SCHelper_server.c | 53 // entitlement used to control write access to a given "prefsID" 59 // entitlement used to allow limited [VPN configuration] write access to the "preferences.plist" 86 // write access entitlement associated with this session 680 * kSCHelperAuthCallerInfo - use entitlement 1452 copyEntitlement(SCHelperSessionRef session, CFStringRef entitlement) argument 1463 // Get the value for the entitlement 1464 value = SecTaskCopyValueForEntitlement(task, entitlement, &error); 1474 entitlement, 1530 CFArrayRef entitlement; local 1534 entitlement 1582 CFArrayRef entitlement; local [all...] |
/macosx-10.10.1/ppp-786.1.1/Controller/ |
H A D | ne_sm_bridge.c | 471 xpc_object_t entitlement = xpc_connection_copy_entitlement_value(connection, NESessionManagerPrivilegedEntitlement); local 474 isa_xpc_bool(entitlement) && xpc_bool_get_value(entitlement)) 483 if (entitlement) { 484 xpc_release(entitlement); 498 xpc_object_t entitlement = xpc_connection_copy_entitlement_value(connection, NESessionManagerPrivilegedEntitlement); local 500 if (isa_xpc_bool(entitlement) && xpc_bool_get_value(entitlement)) 507 if (entitlement) { 508 xpc_release(entitlement); [all...] |
H A D | scnc_mach_server.c | 88 static Boolean hasEntitlement(audit_token_t audit_token, CFStringRef entitlement, CFStringRef vpntype); 177 /* does caller has the right entitlement */ 179 SCLog(TRUE, LOG_ERR, CFSTR("_pppcontroller_attach_proxy client fails entitlement for client uid change")); 811 hasEntitlement(audit_token_t audit_token, CFStringRef entitlement, CFStringRef vpntype) argument 822 /* Get the value for the entitlement. */ 823 value = SecTaskCopyValueForEntitlement(task, entitlement, &error); 827 /* if client DOES have entitlement */ 838 // if client DOES have entitlement 844 CFSTR("SCNC Controller: entitlement not valid: %@"), 845 entitlement); [all...] |
/macosx-10.10.1/security_systemkeychain-55202/syspolicyd/ |
H A D | syspolicyd.cpp | 275 // check caller for required entitlement 276 xpc_object_t entitlement = xpc_connection_copy_entitlement_value(connection, "com.apple.private.assessment.recording"); local 277 if (entitlement == NULL || entitlement == XPC_BOOL_FALSE) {
|
/macosx-10.10.1/bootp-298/IPConfiguration.bproj/ |
H A D | server.c | 52 S_has_entitlement(audit_token_t token, CFStringRef entitlement) argument 62 S_has_entitlement(audit_token_t token, CFStringRef entitlement) argument 71 allow = SecTaskCopyValueForEntitlement(task, entitlement, NULL);
|
/macosx-10.10.1/configd-699.1.5/configd.tproj/ |
H A D | session.c | 327 * release any entitlement info 446 copyEntitlement(serverSessionRef session, CFStringRef entitlement) argument 456 // Get the value for the entitlement 457 value = SecTaskCopyValueForEntitlement(task, entitlement, &error); 467 entitlement, 619 // if key matches one of the entitlement "keys", grant 636 // if key matches one of the entitlement
|
/macosx-10.10.1/Security-57031.1.35/Security/sec/ipc/ |
H A D | server.c | 69 CFStringRef entitlement) 72 entitlement, NULL); 82 CFStringRef entitlement) 85 entitlement, NULL); 148 CFStringRef entitlement) { 150 entitlement, NULL); 274 // operations before kSecXPCOpTryUserCredentials don't need this entitlement. 278 // Per <rdar://problem/13315020> Disable the entitlement check for "keychain-cloud-circle" 279 // we disable entitlement enforcement. However, we still log so we know who needs the entitlement 68 SecTaskCopyStringForEntitlement(SecTaskRef task, CFStringRef entitlement) argument 81 SecTaskCopyArrayOfStringsForEntitlement(SecTaskRef task, CFStringRef entitlement) argument 147 SecTaskGetBooleanValueForEntitlement(SecTaskRef task, CFStringRef entitlement) argument [all...] |
/macosx-10.10.1/Security-57031.1.35/Security/sec/SharedWebCredential/ |
H A D | swcagent.m | 113 static bool SecTaskGetBooleanValueForEntitlement(SecTaskRef task, CFStringRef entitlement) 115 CFStringRef canModify = (CFStringRef)SecTaskCopyValueForEntitlement(task, entitlement, NULL); 124 static CFArrayRef SecTaskCopyArrayOfStringsForEntitlement(SecTaskRef task, CFStringRef entitlement) 127 entitlement, NULL); 575 // check our caller's private entitlement to invoke swcagent 576 // TODO: on iOS it's enough to have the entitlement; will need to check code requirement on OS X 582 SecError(errSecMissingEntitlement, &entitlementError, CFSTR("%@: %@ lacks entitlement %@"), SOSCCGetOperationDescription((enum SWCAXPCOperation)operation), clientTask, kSecEntitlementPrivateAssociatedDomains); 605 // check for presence of original client's shared credential entitlement 609 SecError(errSecMissingEntitlement, &entitlementError, CFSTR("%@: %@ lacks entitlement %@"), SOSCCGetOperationDescription((enum SWCAXPCOperation)operation), clientTask, kSecEntitlementAssociatedDomains);
|
/macosx-10.10.1/PowerManagement-494.1.2/pmconfigd/ |
H A D | PMAssertions.h | 272 CFStringRef entitlement; /* if set, caller must have this entitlement to create this assertion */ member in struct:assertionType
|