- KeychainAuthLogger logger(mAuditToken, AUE_ssauthint, database, description);
-
-#if defined(NOSA)
- /* XXX/gh probably not complete; stolen verbatim from rogue-app query */
- if (getenv("NOSA")) {
- char answer[maxPassphraseLength+10];
-
- string applicationPath;
- AuthItem *applicationPathItem = mClientHints.find(AGENT_HINT_APPLICATION_PATH);
- if (applicationPathItem)
- applicationPathItem->getString(applicationPath);
-
- getNoSA(answer, sizeof(answer), "Allow %s to do %d on %s in %s? [yn][g]%s ",
- applicationPath.c_str(), int(action), (description ? description : "[NULL item]"),
- (database ? database : "[NULL database]"),
- mPassphraseCheck ? ":passphrase" : "");
- // turn passphrase (no ':') into y:passphrase
- if (mPassphraseCheck && !strchr(answer, ':')) {
- memmove(answer+2, answer, strlen(answer)+1);
- memcpy(answer, "y:", 2);
- }
-
- allow = answer[0] == 'y';
- remember = answer[1] == 'g';
- return SecurityAgent::noReason;
- }
-#endif