Searched refs:entitlement (Results 1 - 19 of 19) sorted by relevance

/macosx-10.9.5/ppp-727.90.1/Helpers/snhelper/
H A Dsnhelper.c22 xpc_object_t entitlement = xpc_connection_copy_entitlement_value(connection, "com.apple.private.snhelper"); local
23 result = (isa_xpc_bool(entitlement) && xpc_bool_get_value(entitlement));
24 if (entitlement != NULL) {
25 xpc_release(entitlement);
82 syslog(LOG_ERR, "Caller is missing the snhelper entitlement");
/macosx-10.9.5/Security-55471.14.18/include/security_codesigning/
H A DSecTask.h68 @abstract Returns the value of a single entitlement for the represented
71 @param entitlement The name of the entitlement to be fetched
75 @result The value of the specified entitlement for the process or NULL if
76 the entitlement value could not be retrieved. The type of the returned
77 value will depend on the entitlement specified. The caller must release
80 the entitlement is simply not present. In the latter case, no CFError is
83 CFTypeRef SecTaskCopyValueForEntitlement(SecTaskRef task, CFStringRef entitlement, CFErrorRef *error);
90 @param entitlements An array of entitlement names to be fetched
93 detailed errors. If a requested entitlement i
[all...]
H A DSecTask.c57 kSecCodeMagicEntitlement = 0xfade7171, /* entitlement blob */
245 CFTypeRef SecTaskCopyValueForEntitlement(SecTaskRef task, CFStringRef entitlement, CFErrorRef *error) argument
254 value = CFDictionaryGetValue(task->entitlements, entitlement);
282 CFStringRef entitlement = CFArrayGetValueAtIndex(entitlements, i); local
283 CFTypeRef value = CFDictionaryGetValue(task->entitlements, entitlement);
285 CFDictionarySetValue(values, entitlement, value);
/macosx-10.9.5/Security-55471.14.18/libsecurity_codesigning/lib/
H A DSecTask.h68 @abstract Returns the value of a single entitlement for the represented
71 @param entitlement The name of the entitlement to be fetched
75 @result The value of the specified entitlement for the process or NULL if
76 the entitlement value could not be retrieved. The type of the returned
77 value will depend on the entitlement specified. The caller must release
80 the entitlement is simply not present. In the latter case, no CFError is
83 CFTypeRef SecTaskCopyValueForEntitlement(SecTaskRef task, CFStringRef entitlement, CFErrorRef *error);
90 @param entitlements An array of entitlement names to be fetched
93 detailed errors. If a requested entitlement i
[all...]
H A DSecTask.c57 kSecCodeMagicEntitlement = 0xfade7171, /* entitlement blob */
245 CFTypeRef SecTaskCopyValueForEntitlement(SecTaskRef task, CFStringRef entitlement, CFErrorRef *error) argument
254 value = CFDictionaryGetValue(task->entitlements, entitlement);
282 CFStringRef entitlement = CFArrayGetValueAtIndex(entitlements, i); local
283 CFTypeRef value = CFDictionaryGetValue(task->entitlements, entitlement);
285 CFDictionarySetValue(values, entitlement, value);
/macosx-10.9.5/Security-55471.14.18/authd/
H A Dauthtoken.h82 CFTypeRef auth_token_copy_entitlement_value(auth_token_t, const char * entitlement);
85 bool auth_token_has_entitlement(auth_token_t, const char * entitlement);
H A Dprocess.h69 CFTypeRef process_copy_entitlement_value(process_t, const char * entitlement);
72 bool process_has_entitlement(process_t, const char * entitlement);
H A Dprocess.c375 process_copy_entitlement_value(process_t proc, const char * entitlement) argument
378 require(entitlement != NULL, done);
380 CFStringRef key = CFStringCreateWithCStringNoCopy(kCFAllocatorDefault, entitlement, kCFStringEncodingUTF8, kCFAllocatorNull);
391 process_has_entitlement(process_t proc, const char * entitlement) argument
394 require(entitlement != NULL, done);
396 CFStringRef key = CFStringCreateWithCStringNoCopy(kCFAllocatorDefault, entitlement, kCFStringEncodingUTF8, kCFAllocatorNull);
H A Dauthtoken.c53 process_t creator; // weak reference, used for entitlement checking
422 auth_token_copy_entitlement_value(auth_token_t auth, const char * entitlement) argument
427 value = process_copy_entitlement_value(auth->creator, entitlement);
435 auth_token_has_entitlement(auth_token_t auth, const char * entitlement) argument
441 entitled = process_has_entitlement(auth->creator, entitlement);
/macosx-10.9.5/security_systemkeychain-55191.2/syspolicyd/
H A Dsyspolicyd.cpp170 // check caller for required entitlement
171 xpc_object_t entitlement = xpc_connection_copy_entitlement_value(connection, "com.apple.private.assessment.recording"); local
172 if (entitlement == NULL || entitlement == XPC_BOOL_FALSE) {
/macosx-10.9.5/configd-596.15/SystemConfiguration.fproj/helper/
H A DSCHelper_server.c56 // entitlement used to control write access to a given "prefsID"
62 // entitlement used to allow limited [VPN configuration] write access to the "preferences.plist"
89 // write access entitlement associated with this session
676 * kSCHelperAuthCallerInfo - use entitlement
1448 copyEntitlement(SCHelperSessionRef session, CFStringRef entitlement) argument
1459 // Get the value for the entitlement
1460 value = SecTaskCopyValueForEntitlement(task, entitlement, &error);
1470 entitlement,
1526 CFArrayRef entitlement; local
1530 entitlement
1578 CFArrayRef entitlement; local
[all...]
/macosx-10.9.5/ppp-727.90.1/Controller/
H A Dscnc_mach_server.c88 static Boolean hasEntitlement(audit_token_t audit_token, CFStringRef entitlement, CFStringRef vpntype);
177 /* does caller has the right entitlement */
179 SCLog(TRUE, LOG_ERR, CFSTR("_pppcontroller_attach_proxy client fails entitlement for client uid change"));
811 hasEntitlement(audit_token_t audit_token, CFStringRef entitlement, CFStringRef vpntype) argument
822 /* Get the value for the entitlement. */
823 value = SecTaskCopyValueForEntitlement(task, entitlement, &error);
827 /* if client DOES have entitlement */
838 // if client DOES have entitlement
844 CFSTR("SCNC Controller: entitlement not valid: %@"),
845 entitlement);
[all...]
/macosx-10.9.5/bootp-268.1/IPConfiguration.bproj/
H A Dserver.c52 S_has_entitlement(audit_token_t token, CFStringRef entitlement) argument
62 S_has_entitlement(audit_token_t token, CFStringRef entitlement) argument
71 allow = SecTaskCopyValueForEntitlement(task, entitlement, NULL);
/macosx-10.9.5/configd-596.15/configd.tproj/
H A Dsession.c332 * release any entitlement info
454 copyEntitlement(serverSessionRef session, CFStringRef entitlement) argument
464 // Get the value for the entitlement
465 value = SecTaskCopyValueForEntitlement(task, entitlement, &error);
475 entitlement,
630 // if key matches one of the entitlement "keys", grant
647 // if key matches one of the entitlement
/macosx-10.9.5/Security-55471.14.18/sec/ipc/
H A Dserver.c110 CFStringRef entitlement)
113 entitlement, NULL);
123 CFStringRef entitlement)
126 entitlement, NULL);
177 CFStringRef entitlement) {
180 entitlement, NULL);
303 // operations before kSecXPCOpTryUserCredentials don't need this entitlement.
311 // Per <rdar://problem/13315020> Disable the entitlement check for "keychain-cloud-circle"
312 // we disable entitlement enforcement. However, we still log so we know who needs the entitlement
109 SecTaskCopyStringForEntitlement(SecTaskRef task, CFStringRef entitlement) argument
122 SecTaskCopyArrayOfStringsForEntitlement(SecTaskRef task, CFStringRef entitlement) argument
176 SecTaskGetBooleanValueForEntitlement(SecTaskRef task, CFStringRef entitlement) argument
[all...]
/macosx-10.9.5/PowerManagement-420.90.1/pmconfigd/
H A DPrivateLib.h552 CFStringRef entitlement);
H A DPrivateLib.c221 CFStringRef entitlement)
230 val = SecTaskCopyValueForEntitlement(task, entitlement, &errorp);
219 auditTokenHasEntitlement( audit_token_t token, CFStringRef entitlement) argument
/macosx-10.9.5/securityd-55199.3/securityd_service/securityd_service/
H A Dmain.c624 // Requires the entitlement: com.apple.private.securityd.keychain
738 bool peer_has_entitlement(xpc_connection_t peer, const char * entitlement) argument
742 xpc_object_t value = xpc_connection_copy_entitlement_value(peer, entitlement);
/macosx-10.9.5/launchd-842.92.1/src/
H A Dcore.c10979 uint64_t entitlement = 0; local
10985 entitlement = xpc_uint64_get_value(value);
10991 return entitlement;
11129 xpc_object_t entitlement = xpc_copy_entitlement_for_token(XPC_SERVICE_ENTITLEMENT_ATTACH, token); local
11130 if (!entitlement) {
11131 job_log(j, LOG_ERR, "Job does not have entitlement: %s", XPC_SERVICE_ENTITLEMENT_ATTACH);
11135 if (entitlement != XPC_BOOL_TRUE) {
11136 char *desc = xpc_copy_description(entitlement);
11137 job_log(j, LOG_ERR, "Job has bad value for entitlement: %s:\n%s", XPC_SERVICE_ENTITLEMENT_ATTACH, desc);
11140 xpc_release(entitlement);
[all...]

Completed in 202 milliseconds