/macosx-10.9.5/ppp-727.90.1/Helpers/snhelper/ |
H A D | snhelper.c | 22 xpc_object_t entitlement = xpc_connection_copy_entitlement_value(connection, "com.apple.private.snhelper"); local 23 result = (isa_xpc_bool(entitlement) && xpc_bool_get_value(entitlement)); 24 if (entitlement != NULL) { 25 xpc_release(entitlement); 82 syslog(LOG_ERR, "Caller is missing the snhelper entitlement");
|
/macosx-10.9.5/Security-55471.14.18/include/security_codesigning/ |
H A D | SecTask.h | 68 @abstract Returns the value of a single entitlement for the represented 71 @param entitlement The name of the entitlement to be fetched 75 @result The value of the specified entitlement for the process or NULL if 76 the entitlement value could not be retrieved. The type of the returned 77 value will depend on the entitlement specified. The caller must release 80 the entitlement is simply not present. In the latter case, no CFError is 83 CFTypeRef SecTaskCopyValueForEntitlement(SecTaskRef task, CFStringRef entitlement, CFErrorRef *error); 90 @param entitlements An array of entitlement names to be fetched 93 detailed errors. If a requested entitlement i [all...] |
H A D | SecTask.c | 57 kSecCodeMagicEntitlement = 0xfade7171, /* entitlement blob */ 245 CFTypeRef SecTaskCopyValueForEntitlement(SecTaskRef task, CFStringRef entitlement, CFErrorRef *error) argument 254 value = CFDictionaryGetValue(task->entitlements, entitlement); 282 CFStringRef entitlement = CFArrayGetValueAtIndex(entitlements, i); local 283 CFTypeRef value = CFDictionaryGetValue(task->entitlements, entitlement); 285 CFDictionarySetValue(values, entitlement, value);
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_codesigning/lib/ |
H A D | SecTask.h | 68 @abstract Returns the value of a single entitlement for the represented 71 @param entitlement The name of the entitlement to be fetched 75 @result The value of the specified entitlement for the process or NULL if 76 the entitlement value could not be retrieved. The type of the returned 77 value will depend on the entitlement specified. The caller must release 80 the entitlement is simply not present. In the latter case, no CFError is 83 CFTypeRef SecTaskCopyValueForEntitlement(SecTaskRef task, CFStringRef entitlement, CFErrorRef *error); 90 @param entitlements An array of entitlement names to be fetched 93 detailed errors. If a requested entitlement i [all...] |
H A D | SecTask.c | 57 kSecCodeMagicEntitlement = 0xfade7171, /* entitlement blob */ 245 CFTypeRef SecTaskCopyValueForEntitlement(SecTaskRef task, CFStringRef entitlement, CFErrorRef *error) argument 254 value = CFDictionaryGetValue(task->entitlements, entitlement); 282 CFStringRef entitlement = CFArrayGetValueAtIndex(entitlements, i); local 283 CFTypeRef value = CFDictionaryGetValue(task->entitlements, entitlement); 285 CFDictionarySetValue(values, entitlement, value);
|
/macosx-10.9.5/Security-55471.14.18/authd/ |
H A D | authtoken.h | 82 CFTypeRef auth_token_copy_entitlement_value(auth_token_t, const char * entitlement); 85 bool auth_token_has_entitlement(auth_token_t, const char * entitlement);
|
H A D | process.h | 69 CFTypeRef process_copy_entitlement_value(process_t, const char * entitlement); 72 bool process_has_entitlement(process_t, const char * entitlement);
|
H A D | process.c | 375 process_copy_entitlement_value(process_t proc, const char * entitlement) argument 378 require(entitlement != NULL, done); 380 CFStringRef key = CFStringCreateWithCStringNoCopy(kCFAllocatorDefault, entitlement, kCFStringEncodingUTF8, kCFAllocatorNull); 391 process_has_entitlement(process_t proc, const char * entitlement) argument 394 require(entitlement != NULL, done); 396 CFStringRef key = CFStringCreateWithCStringNoCopy(kCFAllocatorDefault, entitlement, kCFStringEncodingUTF8, kCFAllocatorNull);
|
H A D | authtoken.c | 53 process_t creator; // weak reference, used for entitlement checking 422 auth_token_copy_entitlement_value(auth_token_t auth, const char * entitlement) argument 427 value = process_copy_entitlement_value(auth->creator, entitlement); 435 auth_token_has_entitlement(auth_token_t auth, const char * entitlement) argument 441 entitled = process_has_entitlement(auth->creator, entitlement);
|
/macosx-10.9.5/security_systemkeychain-55191.2/syspolicyd/ |
H A D | syspolicyd.cpp | 170 // check caller for required entitlement 171 xpc_object_t entitlement = xpc_connection_copy_entitlement_value(connection, "com.apple.private.assessment.recording"); local 172 if (entitlement == NULL || entitlement == XPC_BOOL_FALSE) {
|
/macosx-10.9.5/configd-596.15/SystemConfiguration.fproj/helper/ |
H A D | SCHelper_server.c | 56 // entitlement used to control write access to a given "prefsID" 62 // entitlement used to allow limited [VPN configuration] write access to the "preferences.plist" 89 // write access entitlement associated with this session 676 * kSCHelperAuthCallerInfo - use entitlement 1448 copyEntitlement(SCHelperSessionRef session, CFStringRef entitlement) argument 1459 // Get the value for the entitlement 1460 value = SecTaskCopyValueForEntitlement(task, entitlement, &error); 1470 entitlement, 1526 CFArrayRef entitlement; local 1530 entitlement 1578 CFArrayRef entitlement; local [all...] |
/macosx-10.9.5/ppp-727.90.1/Controller/ |
H A D | scnc_mach_server.c | 88 static Boolean hasEntitlement(audit_token_t audit_token, CFStringRef entitlement, CFStringRef vpntype); 177 /* does caller has the right entitlement */ 179 SCLog(TRUE, LOG_ERR, CFSTR("_pppcontroller_attach_proxy client fails entitlement for client uid change")); 811 hasEntitlement(audit_token_t audit_token, CFStringRef entitlement, CFStringRef vpntype) argument 822 /* Get the value for the entitlement. */ 823 value = SecTaskCopyValueForEntitlement(task, entitlement, &error); 827 /* if client DOES have entitlement */ 838 // if client DOES have entitlement 844 CFSTR("SCNC Controller: entitlement not valid: %@"), 845 entitlement); [all...] |
/macosx-10.9.5/bootp-268.1/IPConfiguration.bproj/ |
H A D | server.c | 52 S_has_entitlement(audit_token_t token, CFStringRef entitlement) argument 62 S_has_entitlement(audit_token_t token, CFStringRef entitlement) argument 71 allow = SecTaskCopyValueForEntitlement(task, entitlement, NULL);
|
/macosx-10.9.5/configd-596.15/configd.tproj/ |
H A D | session.c | 332 * release any entitlement info 454 copyEntitlement(serverSessionRef session, CFStringRef entitlement) argument 464 // Get the value for the entitlement 465 value = SecTaskCopyValueForEntitlement(task, entitlement, &error); 475 entitlement, 630 // if key matches one of the entitlement "keys", grant 647 // if key matches one of the entitlement
|
/macosx-10.9.5/Security-55471.14.18/sec/ipc/ |
H A D | server.c | 110 CFStringRef entitlement) 113 entitlement, NULL); 123 CFStringRef entitlement) 126 entitlement, NULL); 177 CFStringRef entitlement) { 180 entitlement, NULL); 303 // operations before kSecXPCOpTryUserCredentials don't need this entitlement. 311 // Per <rdar://problem/13315020> Disable the entitlement check for "keychain-cloud-circle" 312 // we disable entitlement enforcement. However, we still log so we know who needs the entitlement 109 SecTaskCopyStringForEntitlement(SecTaskRef task, CFStringRef entitlement) argument 122 SecTaskCopyArrayOfStringsForEntitlement(SecTaskRef task, CFStringRef entitlement) argument 176 SecTaskGetBooleanValueForEntitlement(SecTaskRef task, CFStringRef entitlement) argument [all...] |
/macosx-10.9.5/PowerManagement-420.90.1/pmconfigd/ |
H A D | PrivateLib.h | 552 CFStringRef entitlement);
|
H A D | PrivateLib.c | 221 CFStringRef entitlement) 230 val = SecTaskCopyValueForEntitlement(task, entitlement, &errorp); 219 auditTokenHasEntitlement( audit_token_t token, CFStringRef entitlement) argument
|
/macosx-10.9.5/securityd-55199.3/securityd_service/securityd_service/ |
H A D | main.c | 624 // Requires the entitlement: com.apple.private.securityd.keychain 738 bool peer_has_entitlement(xpc_connection_t peer, const char * entitlement) argument 742 xpc_object_t value = xpc_connection_copy_entitlement_value(peer, entitlement);
|
/macosx-10.9.5/launchd-842.92.1/src/ |
H A D | core.c | 10979 uint64_t entitlement = 0; local 10985 entitlement = xpc_uint64_get_value(value); 10991 return entitlement; 11129 xpc_object_t entitlement = xpc_copy_entitlement_for_token(XPC_SERVICE_ENTITLEMENT_ATTACH, token); local 11130 if (!entitlement) { 11131 job_log(j, LOG_ERR, "Job does not have entitlement: %s", XPC_SERVICE_ENTITLEMENT_ATTACH); 11135 if (entitlement != XPC_BOOL_TRUE) { 11136 char *desc = xpc_copy_description(entitlement); 11137 job_log(j, LOG_ERR, "Job has bad value for entitlement: %s:\n%s", XPC_SERVICE_ENTITLEMENT_ATTACH, desc); 11140 xpc_release(entitlement); [all...] |