From: Apple Date: Wed, 13 Aug 2014 22:51:47 +0000 (+0000) Subject: Security-55471.14.8.tar.gz X-Git-Tag: os-x-1094^0 X-Git-Url: https://git.saurik.com/apple/security.git/commitdiff_plain/e3d3b979fd185d8303f28a937baa53a187fb8c7d Security-55471.14.8.tar.gz --- diff --git a/CloudKeychainProxy/CloudKeychainProxy-Info.plist b/CloudKeychainProxy/CloudKeychainProxy-Info.plist index 4b3a1ba4..753b00e3 100644 --- a/CloudKeychainProxy/CloudKeychainProxy-Info.plist +++ b/CloudKeychainProxy/CloudKeychainProxy-Info.plist @@ -21,7 +21,7 @@ CFBundleSignature ???? CFBundleVersion - 55471.14.4 + 55471.14.8 NSHumanReadableCopyright Copyright © 2013 Apple, Inc. All rights reserved. diff --git a/Keychain Circle Notification/Keychain Circle Notification-Info.plist b/Keychain Circle Notification/Keychain Circle Notification-Info.plist index 471548b6..a7c85cbd 100644 --- a/Keychain Circle Notification/Keychain Circle Notification-Info.plist +++ b/Keychain Circle Notification/Keychain Circle Notification-Info.plist @@ -21,7 +21,7 @@ CFBundleSignature ???? CFBundleVersion - 55471.14.4 + 55471.14.8 LSApplicationCategoryType LSMinimumSystemVersion diff --git a/Keychain/Keychain-Info.plist b/Keychain/Keychain-Info.plist index 0b234892..db90fc62 100644 --- a/Keychain/Keychain-Info.plist +++ b/Keychain/Keychain-Info.plist @@ -21,7 +21,7 @@ CFBundleSignature ???? CFBundleVersion - 55471.14.4 + 55471.14.8 LSMinimumSystemVersion ${MACOSX_DEPLOYMENT_TARGET} NSMainNibFile diff --git a/authd/Info.plist b/authd/Info.plist index 55e7c843..4169be64 100644 --- a/authd/Info.plist +++ b/authd/Info.plist @@ -19,7 +19,7 @@ CFBundleSignature ???? CFBundleVersion - 55471.14.4 + 55471.14.8 NSHumanReadableCopyright Copyright © 2012 Apple. All rights reserved. XPCService diff --git a/lib/Info-Security.plist b/lib/Info-Security.plist index 1bd358d9..72270a74 100644 --- a/lib/Info-Security.plist +++ b/lib/Info-Security.plist @@ -19,6 +19,6 @@ CFBundleSignature ???? CFBundleVersion - 55471.14.4 + 55471.14.8 diff --git a/lib/plugins/csparser-Info.plist b/lib/plugins/csparser-Info.plist index 21b38856..76a993e0 100644 --- a/lib/plugins/csparser-Info.plist +++ b/lib/plugins/csparser-Info.plist @@ -17,7 +17,7 @@ CFBundleSignature ???? CFBundleVersion - 55471.14.4 + 55471.14.8 CFBundleShortVersionString 3.0 diff --git a/lib/security.exp-in b/lib/security.exp-in index 585b1198..4e0838c2 100644 --- a/lib/security.exp-in +++ b/lib/security.exp-in @@ -2200,3 +2200,12 @@ _kSecPasswordSeparator // utilities // _add_security_log_hanlder + +// gate keeper logging + +_GKBIS_DS_Store_Present +_GKBIS_Dot_underbar_Present +_GKBIS_Num_localizations +_GKBIS_Num_files +_GKBIS_Num_dirs +_GKBIS_Num_symlinks diff --git a/libsecurity_codesigning/lib/StaticCode.cpp b/libsecurity_codesigning/lib/StaticCode.cpp index 62bfe215..2f6b48d2 100644 --- a/libsecurity_codesigning/lib/StaticCode.cpp +++ b/libsecurity_codesigning/lib/StaticCode.cpp @@ -243,6 +243,7 @@ void SecStaticCode::resetValidity() mEntitlements = NULL; mResourceDict = NULL; mDesignatedReq = NULL; + mCDHash = NULL; mGotResourceBase = false; mTrust = NULL; mCertChain = NULL; diff --git a/libsecurity_codesigning/lib/machorep.cpp b/libsecurity_codesigning/lib/machorep.cpp index b3ed8437..2130171d 100644 --- a/libsecurity_codesigning/lib/machorep.cpp +++ b/libsecurity_codesigning/lib/machorep.cpp @@ -247,12 +247,13 @@ string MachORep::format() // void MachORep::flush() { + size_t offset = mExecutable->offset(); delete mExecutable; mExecutable = NULL; ::free(mSigningData); mSigningData = NULL; SingleDiskRep::flush(); - mExecutable = new Universal(fd()); + mExecutable = new Universal(fd(), offset); } diff --git a/libsecurity_codesigning/lib/policyengine.cpp b/libsecurity_codesigning/lib/policyengine.cpp index 31f11821..e3b6fe8e 100644 --- a/libsecurity_codesigning/lib/policyengine.cpp +++ b/libsecurity_codesigning/lib/policyengine.cpp @@ -78,6 +78,42 @@ PolicyEngine::PolicyEngine() PolicyEngine::~PolicyEngine() { } +#define GKBIS_XPC_SERVICE_NAME "com.apple.gkbisd" +#define GKBIS_REQUEST_KEY_PATH "path" +#define GKBIS_REQUEST_KEY_DEFER "defer" +#define GKBIS_REQUEST_KEY_QUARANTINED "quarantined" + +static void +gkbis_invoke_collector(const char *path) +{ + dispatch_queue_t queue = dispatch_queue_create("gkbis_invoke_collector", NULL); + dispatch_group_t group = dispatch_group_create(); + /* Set up a connection to gkbisd. */ + xpc_connection_t connection = xpc_connection_create_mach_service(GKBIS_XPC_SERVICE_NAME, + queue, XPC_CONNECTION_MACH_SERVICE_PRIVILEGED); + xpc_connection_set_event_handler(connection, ^(xpc_object_t event) { + }); + xpc_connection_resume(connection); + + /* Construct and send the request. */ + xpc_object_t message = xpc_dictionary_create(NULL, NULL, 0); + xpc_dictionary_set_string(message, GKBIS_REQUEST_KEY_PATH, path); + xpc_dictionary_set_bool(message, GKBIS_REQUEST_KEY_QUARANTINED, true); + xpc_dictionary_set_bool(message, GKBIS_REQUEST_KEY_DEFER, true); + xpc_connection_send_message(connection, message); + xpc_release(message); + /* Cancel the connection after the request has been sent. */ + dispatch_group_enter(group); + xpc_connection_send_barrier(connection, ^{ + xpc_connection_cancel(connection); + xpc_release(connection); + dispatch_group_leave(group); + }); + /* Wait until the connection is canceled. */ + dispatch_group_wait(group, DISPATCH_TIME_FOREVER); + dispatch_release(queue); + dispatch_release(group); +} // // Top-level evaluation driver @@ -89,6 +125,7 @@ void PolicyEngine::evaluate(CFURLRef path, AuthorityType type, SecAssessmentFlag switch (type) { case kAuthorityExecute: + gkbis_invoke_collector(cfString(path).c_str()); evaluateCode(path, kAuthorityExecute, flags, context, result, true); break; case kAuthorityInstall: diff --git a/libsecurity_codesigning/lib/resources.cpp b/libsecurity_codesigning/lib/resources.cpp index e5c50a49..0ac68ecb 100644 --- a/libsecurity_codesigning/lib/resources.cpp +++ b/libsecurity_codesigning/lib/resources.cpp @@ -32,6 +32,17 @@ #include #include +// These are pretty nasty, but are a quick safe fix +// to pass information down to the gatekeeper collection tool +extern "C" { + int GKBIS_DS_Store_Present; + int GKBIS_Dot_underbar_Present; + int GKBIS_Num_localizations; + int GKBIS_Num_files; + int GKBIS_Num_dirs; + int GKBIS_Num_symlinks; +} + namespace Security { namespace CodeSigning { @@ -93,6 +104,16 @@ void ResourceBuilder::addRule(CFTypeRef key, CFTypeRef value) addRule(new Rule(pattern, weight, flags)); } +static bool findStringEndingNoCase(const char *path, const char * end) +{ + size_t len_path = strlen(path); + size_t len_end = strlen(end); + + if (len_path >= len_end) { + return strcasecmp(path + (len_path - len_end), end) == 0; + } else + return false; +} // // Locate the next non-ignored file, look up its rule, and return it. @@ -101,11 +122,23 @@ void ResourceBuilder::addRule(CFTypeRef key, CFTypeRef value) void ResourceBuilder::scan(Scanner next) { bool first = true; + while (FTSENT *ent = fts_read(mFTS)) { const char *relpath = ent->fts_path + mRoot.size() + 1; // skip prefix + "/" switch (ent->fts_info) { case FTS_F: secdebug("rdirenum", "file %s", ent->fts_path); + GKBIS_Num_files++; + + // These are checks for the gatekeeper collection + static const char underbar[] = "._"; + if (strncasecmp(ent->fts_name, underbar, strlen(underbar)) == 0) + GKBIS_Dot_underbar_Present++; + + static const char ds_store[] = ".DS_Store"; + if (strcasecmp(ent->fts_name, ds_store) == 0) + GKBIS_DS_Store_Present++; + if (Rule *rule = findRule(relpath)) if (!(rule->flags & (omitted | exclusion))) next(ent, rule->flags, relpath, rule); @@ -113,12 +146,16 @@ void ResourceBuilder::scan(Scanner next) case FTS_SL: // symlinks cannot ever be nested code, so quietly convert to resource file secdebug("rdirenum", "symlink %s", ent->fts_path); + GKBIS_Num_symlinks++; + if (Rule *rule = findRule(relpath)) if (!(rule->flags & (omitted | exclusion))) next(ent, rule->flags & ~nested, relpath, rule); break; case FTS_D: secdebug("rdirenum", "entering %s", ent->fts_path); + GKBIS_Num_dirs++; + if (!first) { // skip root directory (relpath invalid) if (Rule *rule = findRule(relpath)) { if (rule->flags & nested) { @@ -132,7 +169,11 @@ void ResourceBuilder::scan(Scanner next) // else treat as normal directory and descend into it } } + // Report the number of localizations + if (findStringEndingNoCase(ent->fts_name, ".lproj")) + GKBIS_Num_localizations++; first = false; + break; case FTS_DP: secdebug("rdirenum", "leaving %s", ent->fts_path); diff --git a/libsecurity_codesigning/lib/security_codesigning.exp b/libsecurity_codesigning/lib/security_codesigning.exp index d6f20463..1bb8bfdf 100644 --- a/libsecurity_codesigning/lib/security_codesigning.exp +++ b/libsecurity_codesigning/lib/security_codesigning.exp @@ -162,3 +162,12 @@ _kSecAssessmentAssessmentAuthorityOverride _kSecAssessmentAssessmentOriginalVerdict _kSecAssessmentAssessmentSource _kSecAssessmentAssessmentVerdict + +# gatekeeper logging + +_GKBIS_DS_Store_Present +_GKBIS_Dot_underbar_Present +_GKBIS_Num_localizations +_GKBIS_Num_files +_GKBIS_Num_dirs +_GKBIS_Num_symlinks diff --git a/libsecurity_ssl/lib/SSLRecordInternal.c b/libsecurity_ssl/lib/SSLRecordInternal.c index ac07e445..d7de1fcb 100644 --- a/libsecurity_ssl/lib/SSLRecordInternal.c +++ b/libsecurity_ssl/lib/SSLRecordInternal.c @@ -306,7 +306,7 @@ static int SSLRecordReadInternal(SSLRecordContextRef ref, SSLRecord *rec) rec->protocolVersion = (SSLProtocolVersion)SSLDecodeInt(charPtr, 2); charPtr += 2; - if(rec->protocolVersion == DTLS_Version_1_0) + if(ctx->isDTLS) { sslUint64 seqNum; SSLDecodeUInt64(charPtr, 8, &seqNum); diff --git a/libsecurity_ssl/regressions/ssl-43-ciphers.c b/libsecurity_ssl/regressions/ssl-43-ciphers.c index 92afa7e4..1030a281 100644 --- a/libsecurity_ssl/regressions/ssl-43-ciphers.c +++ b/libsecurity_ssl/regressions/ssl-43-ciphers.c @@ -85,7 +85,7 @@ static struct { { OPENSSL_SERVER, 4000, 0, false}, //openssl s_server w/o client side auth { GNUTLS_SERVER, 5000, 1, false}, // gnutls-serv w/o client side auth { "www.mikestoolbox.org", 442, 2, false}, // mike's w/o client side auth -// { "tls.secg.org", 40022, 3, false}, // secg ecc server w/o client side auth - This server generate DH params we dont support. +// { "tls.secg.org", 40022, 3, false}, // secg ecc server w/o client side auth - This server generate DH params we dont support. { OPENSSL_SERVER, 4010, 0, true}, //openssl s_server w/ client side auth { GNUTLS_SERVER, 5010, 1, true}, // gnutls-serv w/ client side auth diff --git a/libsecurity_utilities/lib/macho++.h b/libsecurity_utilities/lib/macho++.h index c1280b67..54fb4abb 100644 --- a/libsecurity_utilities/lib/macho++.h +++ b/libsecurity_utilities/lib/macho++.h @@ -202,6 +202,8 @@ public: bool isUniversal() const { return mArchList != NULL; } Architecture bestNativeArch() const; + size_t offset() const { return mBase; } + public: static uint32_t typeOf(FileDesc fd); diff --git a/sec/SOSCircle/SecureObjectSync/SOSAccount.c b/sec/SOSCircle/SecureObjectSync/SOSAccount.c index 8ac8431e..198a3904 100644 --- a/sec/SOSCircle/SecureObjectSync/SOSAccount.c +++ b/sec/SOSCircle/SecureObjectSync/SOSAccount.c @@ -1994,25 +1994,23 @@ static bool sosAccountLeaveCircle(SOSAccountRef account, SOSCircleRef circle, CF SOSFullPeerInfoRef fpi = SOSAccountGetMyFullPeerInCircle(account, circle, NULL); if(!fpi) return false; CFErrorRef localError = NULL; - SOSPeerInfoRef pi = SOSFullPeerInfoGetPeerInfo(fpi); - CFStringRef retire_key = SOSRetirementKeyCreateWithCircleAndPeer(circle, SOSPeerInfoGetPeerID(pi)); - SOSPeerInfoRef retire_peer = NULL; + SOSPeerInfoRef retire_peer = SOSFullPeerInfoPromoteToRetiredAndCopy(fpi, &localError);; + CFStringRef retire_key = SOSRetirementKeyCreateWithCircleAndPeer(circle, SOSPeerInfoGetPeerID(retire_peer)); CFDataRef retire_value = NULL; bool retval = false; bool writeCircle = false; // Create a Retirement Ticket and store it in the retired_peers of the account. - retire_peer = SOSFullPeerInfoPromoteToRetiredAndCopy(fpi, &localError); require_action_quiet(retire_peer, errout, secerror("Create ticket failed for peer %@: %@", fpi, localError)); retire_value = SOSPeerInfoCopyEncodedData(retire_peer, NULL, &localError); require_action_quiet(retire_value, errout, secerror("Failed to encode retirement peer %@: %@", retire_peer, localError)); // See if we need to repost the circle we could either be an applicant or a peer already in the circle - if(SOSCircleHasApplicant(circle, pi, NULL)) { + if(SOSCircleHasApplicant(circle, retire_peer, NULL)) { // Remove our application if we have one. - SOSCircleWithdrawRequest(circle, pi, NULL); + SOSCircleWithdrawRequest(circle, retire_peer, NULL); writeCircle = true; - } else if (SOSCircleHasPeer(circle, pi, NULL)) { + } else if (SOSCircleHasPeer(circle, retire_peer, NULL)) { if (SOSCircleUpdatePeerInfo(circle, retire_peer)) { CFErrorRef cleanupError = NULL; SOSAccountCleanupAfterPeer(account, RETIREMENT_FINALIZATION_SECONDS, circle, retire_peer, &cleanupError); diff --git a/sec/SOSCircle/SecureObjectSync/SOSCircle.c b/sec/SOSCircle/SecureObjectSync/SOSCircle.c index 9475fc64..1b131fd4 100644 --- a/sec/SOSCircle/SecureObjectSync/SOSCircle.c +++ b/sec/SOSCircle/SecureObjectSync/SOSCircle.c @@ -279,6 +279,7 @@ static CFIndex CFArrayRemoveAllPassing(CFMutableArrayRef array, bool (^test)(con static CFIndex CFArrayRemoveAllWithMatchingID(CFMutableArrayRef array, SOSPeerInfoRef peerInfo) { CFStringRef peer_id = SOSPeerInfoGetPeerID(peerInfo); + if (!peer_id) return 0; return CFArrayRemoveAllPassing(array, ^ bool (const void *element) { SOSPeerInfoRef peer = (SOSPeerInfoRef) element; diff --git a/sec/SOSCircle/SecureObjectSync/SOSCoder.c b/sec/SOSCircle/SecureObjectSync/SOSCoder.c index 581d1f2f..7a9eb8ff 100644 --- a/sec/SOSCircle/SecureObjectSync/SOSCoder.c +++ b/sec/SOSCircle/SecureObjectSync/SOSCoder.c @@ -164,7 +164,7 @@ SOSCoderRef SOSCoderCreateFromData(CFDataRef exportedData, CFErrorRef *error) { require(ccder_decode_tag(&tag, der, der_end),fail); switch (tag) { - case CCDER_OCTET_STRING: + case CCDER_OCTET_STRING: { der = der_decode_data(kCFAllocatorDefault, 0, &otr_data, error, der, der_end); p->waitingForDataPacket = false; diff --git a/sec/SOSCircle/SecureObjectSync/SOSPeerInfo.c b/sec/SOSCircle/SecureObjectSync/SOSPeerInfo.c index 84c3e481..14738b2e 100644 --- a/sec/SOSCircle/SecureObjectSync/SOSPeerInfo.c +++ b/sec/SOSCircle/SecureObjectSync/SOSPeerInfo.c @@ -365,8 +365,20 @@ static Boolean SOSPeerInfoCompare(CFTypeRef lhs, CFTypeRef rhs) { CFComparisonResult SOSPeerInfoCompareByID(const void *val1, const void *val2, void *context) { + // The code below is necessary but not sufficient; not returning a CFComparisonResult + // It probably is OK to say that a NULL is < + if (val1 == NULL || val2 == NULL) { + ptrdiff_t dv = val1 - val2; + return dv < 0 ? kCFCompareLessThan : dv == 0 ? kCFCompareEqualTo : kCFCompareGreaterThan; + } + CFStringRef v1 = SOSPeerInfoGetPeerID((SOSPeerInfoRef) val1); CFStringRef v2 = SOSPeerInfoGetPeerID((SOSPeerInfoRef) val2); + if (v1 == NULL || v2 == NULL) { + ptrdiff_t dv = (const void *)v1 - (const void *)v2; + return dv < 0 ? kCFCompareLessThan : dv == 0 ? kCFCompareEqualTo : kCFCompareGreaterThan; + } + return CFStringCompare(v1, v2, 0); } @@ -405,7 +417,7 @@ CFTypeRef SOSPeerInfoLookupGestaltValue(SOSPeerInfoRef pi, CFStringRef key) { } CFStringRef SOSPeerInfoGetPeerID(SOSPeerInfoRef pi) { - return pi->id; + return pi ? pi->id : NULL; } CFIndex SOSPeerInfoGetVersion(SOSPeerInfoRef pi) { diff --git a/sec/Security/Regressions/secitem/si-33-keychain-backup.c b/sec/Security/Regressions/secitem/si-33-keychain-backup.c index 0456964a..dddb3d10 100644 --- a/sec/Security/Regressions/secitem/si-33-keychain-backup.c +++ b/sec/Security/Regressions/secitem/si-33-keychain-backup.c @@ -409,7 +409,6 @@ static void tests(void) "Found the item we added after restore"); CFReleaseNull(backup); - // force tombstone to be added, since it's not the default behavior in Innsbruck per rdar://14680869 CFDictionaryAddValue(query, kSecUseTombstones, kCFBooleanTrue); ok_status(SecItemDelete(query), "Deleted item we added"); diff --git a/sec/sec.xcodeproj/project.xcworkspace/contents.xcworkspacedata b/sec/sec.xcodeproj/project.xcworkspace/contents.xcworkspacedata deleted file mode 100644 index 2310a48b..00000000 --- a/sec/sec.xcodeproj/project.xcworkspace/contents.xcworkspacedata +++ /dev/null @@ -1,7 +0,0 @@ - - - - - diff --git a/sec/sec.xcodeproj/project.xcworkspace/xcshareddata/sec.xccheckout b/sec/sec.xcodeproj/project.xcworkspace/xcshareddata/sec.xccheckout deleted file mode 100644 index 3e2b35f5..00000000 --- a/sec/sec.xcodeproj/project.xcworkspace/xcshareddata/sec.xccheckout +++ /dev/null @@ -1,41 +0,0 @@ - - - - - IDESourceControlProjectFavoriteDictionaryKey - - IDESourceControlProjectIdentifier - 55BE31B1-4B75-46C3-99C0-AC509F5CE8EA - IDESourceControlProjectName - sec - IDESourceControlProjectOriginsDictionary - - B1756FC7-4092-4712-B882-FDA75264D61A - git.apple.com:/git/projects/secmodules/sec - - IDESourceControlProjectPath - sec.xcodeproj/project.xcworkspace - IDESourceControlProjectRelativeInstallPathDictionary - - B1756FC7-4092-4712-B882-FDA75264D61A - ../.. - - IDESourceControlProjectURL - git.apple.com:/git/projects/secmodules/sec - IDESourceControlProjectVersion - 110 - IDESourceControlProjectWCCIdentifier - B1756FC7-4092-4712-B882-FDA75264D61A - IDESourceControlProjectWCConfigurations - - - IDESourceControlRepositoryExtensionIdentifierKey - public.vcs.git - IDESourceControlWCCIdentifierKey - B1756FC7-4092-4712-B882-FDA75264D61A - IDESourceControlWCCName - sec - - - - diff --git a/sec/sec.xcodeproj/project.xcworkspace/xcuserdata/jkauth.xcuserdatad/UserInterfaceState.xcuserstate b/sec/sec.xcodeproj/project.xcworkspace/xcuserdata/jkauth.xcuserdatad/UserInterfaceState.xcuserstate deleted file mode 100644 index 9860dcc4..00000000 Binary files a/sec/sec.xcodeproj/project.xcworkspace/xcuserdata/jkauth.xcuserdatad/UserInterfaceState.xcuserstate and /dev/null differ diff --git a/sec/sec.xcodeproj/xcuserdata/jkauth.xcuserdatad/xcschemes/libCPSRegresssions.xcscheme b/sec/sec.xcodeproj/xcuserdata/jkauth.xcuserdatad/xcschemes/libCPSRegresssions.xcscheme deleted file mode 100644 index 6926d6a6..00000000 --- a/sec/sec.xcodeproj/xcuserdata/jkauth.xcuserdatad/xcschemes/libCPSRegresssions.xcscheme +++ /dev/null @@ -1,59 +0,0 @@ - - - - - - - - - - - - - - - - - - - - - - - - - diff --git a/sec/sec.xcodeproj/xcuserdata/jkauth.xcuserdatad/xcschemes/libCloudKeychainProxy.xcscheme b/sec/sec.xcodeproj/xcuserdata/jkauth.xcuserdatad/xcschemes/libCloudKeychainProxy.xcscheme deleted file mode 100644 index bac26879..00000000 --- a/sec/sec.xcodeproj/xcuserdata/jkauth.xcuserdatad/xcschemes/libCloudKeychainProxy.xcscheme +++ /dev/null @@ -1,59 +0,0 @@ - - - - - - - - - - - - - - - - - - - - - - - - - diff --git a/sec/sec.xcodeproj/xcuserdata/jkauth.xcuserdatad/xcschemes/libCloudProtection.xcscheme b/sec/sec.xcodeproj/xcuserdata/jkauth.xcuserdatad/xcschemes/libCloudProtection.xcscheme deleted file mode 100644 index 5880dcd5..00000000 --- a/sec/sec.xcodeproj/xcuserdata/jkauth.xcuserdatad/xcschemes/libCloudProtection.xcscheme +++ /dev/null @@ -1,59 +0,0 @@ - - - - - - - - - - - - - - - - - - - - - - - - - diff --git a/sec/sec.xcodeproj/xcuserdata/jkauth.xcuserdatad/xcschemes/libSOSCommands.xcscheme b/sec/sec.xcodeproj/xcuserdata/jkauth.xcuserdatad/xcschemes/libSOSCommands.xcscheme deleted file mode 100644 index 2144bfeb..00000000 --- a/sec/sec.xcodeproj/xcuserdata/jkauth.xcuserdatad/xcschemes/libSOSCommands.xcscheme +++ /dev/null @@ -1,59 +0,0 @@ - - - - - - - - - - - - - - - - - - - - - - - - - diff --git a/sec/sec.xcodeproj/xcuserdata/jkauth.xcuserdatad/xcschemes/libSOSRegressions.xcscheme b/sec/sec.xcodeproj/xcuserdata/jkauth.xcuserdatad/xcschemes/libSOSRegressions.xcscheme deleted file mode 100644 index 9e81d34a..00000000 --- a/sec/sec.xcodeproj/xcuserdata/jkauth.xcuserdatad/xcschemes/libSOSRegressions.xcscheme +++ /dev/null @@ -1,59 +0,0 @@ - - - - - - - - - - - - - - - - - - - - - - - - - diff --git a/sec/sec.xcodeproj/xcuserdata/jkauth.xcuserdatad/xcschemes/libSecItemShimOSX.xcscheme b/sec/sec.xcodeproj/xcuserdata/jkauth.xcuserdatad/xcschemes/libSecItemShimOSX.xcscheme deleted file mode 100644 index f75e31b7..00000000 --- a/sec/sec.xcodeproj/xcuserdata/jkauth.xcuserdatad/xcschemes/libSecItemShimOSX.xcscheme +++ /dev/null @@ -1,59 +0,0 @@ - - - - - - - - - - - - - - - - - - - - - - - - - diff --git a/sec/sec.xcodeproj/xcuserdata/jkauth.xcuserdatad/xcschemes/libSecOtrOSX.xcscheme b/sec/sec.xcodeproj/xcuserdata/jkauth.xcuserdatad/xcschemes/libSecOtrOSX.xcscheme deleted file mode 100644 index 95daee4d..00000000 --- a/sec/sec.xcodeproj/xcuserdata/jkauth.xcuserdatad/xcschemes/libSecOtrOSX.xcscheme +++ /dev/null @@ -1,59 +0,0 @@ - - - - - - - - - - - - - - - - - - - - - - - - - diff --git a/sec/sec.xcodeproj/xcuserdata/jkauth.xcuserdatad/xcschemes/libSecureObjectSync.xcscheme b/sec/sec.xcodeproj/xcuserdata/jkauth.xcuserdatad/xcschemes/libSecureObjectSync.xcscheme deleted file mode 100644 index 91e9ff49..00000000 --- a/sec/sec.xcodeproj/xcuserdata/jkauth.xcuserdatad/xcschemes/libSecureObjectSync.xcscheme +++ /dev/null @@ -1,59 +0,0 @@ - - - - - - - - - - - - - - - - - - - - - - - - - diff --git a/sec/sec.xcodeproj/xcuserdata/jkauth.xcuserdatad/xcschemes/libSecurityCommands.xcscheme b/sec/sec.xcodeproj/xcuserdata/jkauth.xcuserdatad/xcschemes/libSecurityCommands.xcscheme deleted file mode 100644 index 93eabc64..00000000 --- a/sec/sec.xcodeproj/xcuserdata/jkauth.xcuserdatad/xcschemes/libSecurityCommands.xcscheme +++ /dev/null @@ -1,59 +0,0 @@ - - - - - - - - - - - - - - - - - - - - - - - - - diff --git a/sec/sec.xcodeproj/xcuserdata/jkauth.xcuserdatad/xcschemes/libSecurityRegressions.xcscheme b/sec/sec.xcodeproj/xcuserdata/jkauth.xcuserdatad/xcschemes/libSecurityRegressions.xcscheme deleted file mode 100644 index e5b07f27..00000000 --- a/sec/sec.xcodeproj/xcuserdata/jkauth.xcuserdatad/xcschemes/libSecurityRegressions.xcscheme +++ /dev/null @@ -1,59 +0,0 @@ - - - - - - - - - - - - - - - - - - - - - - - - - diff --git a/sec/sec.xcodeproj/xcuserdata/jkauth.xcuserdatad/xcschemes/libSecurityTool.xcscheme b/sec/sec.xcodeproj/xcuserdata/jkauth.xcuserdatad/xcschemes/libSecurityTool.xcscheme deleted file mode 100644 index 32f54126..00000000 --- a/sec/sec.xcodeproj/xcuserdata/jkauth.xcuserdatad/xcschemes/libSecurityTool.xcscheme +++ /dev/null @@ -1,59 +0,0 @@ - - - - - - - - - - - - - - - - - - - - - - - - - diff --git a/sec/sec.xcodeproj/xcuserdata/jkauth.xcuserdatad/xcschemes/libsecdRegressions.xcscheme b/sec/sec.xcodeproj/xcuserdata/jkauth.xcuserdatad/xcschemes/libsecdRegressions.xcscheme deleted file mode 100644 index 27a28f0a..00000000 --- a/sec/sec.xcodeproj/xcuserdata/jkauth.xcuserdatad/xcschemes/libsecdRegressions.xcscheme +++ /dev/null @@ -1,59 +0,0 @@ - - - - - - - - - - - - - - - - - - - - - - - - - diff --git a/sec/sec.xcodeproj/xcuserdata/jkauth.xcuserdatad/xcschemes/libsecipc_client.xcscheme b/sec/sec.xcodeproj/xcuserdata/jkauth.xcuserdatad/xcschemes/libsecipc_client.xcscheme deleted file mode 100644 index c2be7edd..00000000 --- a/sec/sec.xcodeproj/xcuserdata/jkauth.xcuserdatad/xcschemes/libsecipc_client.xcscheme +++ /dev/null @@ -1,59 +0,0 @@ - - - - - - - - - - - - - - - - - - - - - - - - - diff --git a/sec/sec.xcodeproj/xcuserdata/jkauth.xcuserdatad/xcschemes/libsecurity.xcscheme b/sec/sec.xcodeproj/xcuserdata/jkauth.xcuserdatad/xcschemes/libsecurity.xcscheme deleted file mode 100644 index a1652457..00000000 --- a/sec/sec.xcodeproj/xcuserdata/jkauth.xcuserdatad/xcschemes/libsecurity.xcscheme +++ /dev/null @@ -1,59 +0,0 @@ - - - - - - - - - - - - - - - - - - - - - - - - - diff --git a/sec/sec.xcodeproj/xcuserdata/jkauth.xcuserdatad/xcschemes/libsecurityd.xcscheme b/sec/sec.xcodeproj/xcuserdata/jkauth.xcuserdatad/xcschemes/libsecurityd.xcscheme deleted file mode 100644 index 434f12ef..00000000 --- a/sec/sec.xcodeproj/xcuserdata/jkauth.xcuserdatad/xcschemes/libsecurityd.xcscheme +++ /dev/null @@ -1,59 +0,0 @@ - - - - - - - - - - - - - - - - - - - - - - - - - diff --git a/sec/sec.xcodeproj/xcuserdata/jkauth.xcuserdatad/xcschemes/libsecuritydRegressions.xcscheme b/sec/sec.xcodeproj/xcuserdata/jkauth.xcuserdatad/xcschemes/libsecuritydRegressions.xcscheme deleted file mode 100644 index 904ed592..00000000 --- a/sec/sec.xcodeproj/xcuserdata/jkauth.xcuserdatad/xcschemes/libsecuritydRegressions.xcscheme +++ /dev/null @@ -1,59 +0,0 @@ - - - - - - - - - - - - - - - - - - - - - - - - - diff --git a/sec/sec.xcodeproj/xcuserdata/jkauth.xcuserdatad/xcschemes/xcschememanagement.plist b/sec/sec.xcodeproj/xcuserdata/jkauth.xcuserdatad/xcschemes/xcschememanagement.plist deleted file mode 100644 index f24515bb..00000000 --- a/sec/sec.xcodeproj/xcuserdata/jkauth.xcuserdatad/xcschemes/xcschememanagement.plist +++ /dev/null @@ -1,172 +0,0 @@ - - - - - SchemeUserState - - libCPSRegresssions.xcscheme - - orderHint - 15 - - libCloudKeychainProxy.xcscheme - - orderHint - 9 - - libCloudProtection.xcscheme - - orderHint - 14 - - libSOSCommands.xcscheme - - orderHint - 12 - - libSOSRegressions.xcscheme - - orderHint - 5 - - libSecItemShimOSX.xcscheme - - orderHint - 2 - - libSecOtrOSX.xcscheme - - orderHint - 8 - - libSecureObjectSync.xcscheme - - orderHint - 4 - - libSecurityCommands.xcscheme - - orderHint - 11 - - libSecurityRegressions.xcscheme - - orderHint - 6 - - libSecurityTool.xcscheme - - orderHint - 10 - - libsecdRegressions.xcscheme - - orderHint - 13 - - libsecipc_client.xcscheme - - orderHint - 3 - - libsecurity.xcscheme - - orderHint - 0 - - libsecurityd.xcscheme - - orderHint - 1 - - libsecuritydRegressions.xcscheme - - orderHint - 7 - - - SuppressBuildableAutocreation - - 0C0BDB55175687EC00BC1A7E - - primary - - - 18270F5414CF651900B05E7F - - primary - - - 186CDD0E14CA116C00AF9171 - - primary - - - 18D4043414CE0CF300A2BE4E - - primary - - - 18D4056114CE53C200A2BE4E - - primary - - - 4A5CCA4E15ACEFA500702357 - - primary - - - 4A824AFB158FF07000F932C0 - - primary - - - 4CC92AC215A3BC6B00C6D578 - - primary - - - 5284029F164445760035F320 - - primary - - - E702E73514E1F3EA00CDE635 - - primary - - - E702E75714E1F48800CDE635 - - primary - - - E71049F1169E023B00DB0045 - - primary - - - E7104A12169E216E00DB0045 - - primary - - - E7CBDB711890BD810010B75B - - primary - - - E7CBDB911890BF350010B75B - - primary - - - E7FEFB82169E363300E18152 - - primary - - - - -