objc2_security/generated/SecAccessControl.rs
1//! This file has been automatically generated by `objc2`'s `header-translator`.
2//! DO NOT EDIT
3use core::ptr::NonNull;
4#[cfg(feature = "objc2")]
5use objc2::__framework_prelude::*;
6use objc2_core_foundation::*;
7
8use crate::*;
9
10#[cfg(feature = "SecBase")]
11unsafe impl ConcreteType for SecAccessControl {
12 /// Returns the type identifier of SecAccessControl instances.
13 ///
14 /// Returns: The CFTypeID of SecAccessControl instances.
15 #[doc(alias = "SecAccessControlGetTypeID")]
16 #[inline]
17 fn type_id() -> CFTypeID {
18 extern "C-unwind" {
19 fn SecAccessControlGetTypeID() -> CFTypeID;
20 }
21 unsafe { SecAccessControlGetTypeID() }
22 }
23}
24
25/// User presence policy using biometry or Passcode. Biometry does not have to be available or enrolled. Item is still
26/// accessible by Touch ID even if fingers are added or removed. Item is still accessible by Face ID if user is re-enrolled.
27///
28///
29/// Constraint: Touch ID (any finger) or Face ID. Touch ID or Face ID must be available. With Touch ID
30/// at least one finger must be enrolled. With Face ID user has to be enrolled. Item is still accessible by Touch ID even
31/// if fingers are added or removed. Item is still accessible by Face ID if user is re-enrolled.
32///
33///
34/// Deprecated, please use kSecAccessControlBiometryAny instead.
35///
36///
37/// Constraint: Touch ID from the set of currently enrolled fingers. Touch ID must be available and at least one finger must
38/// be enrolled. When fingers are added or removed, the item is invalidated. When Face ID is re-enrolled this item is invalidated.
39///
40///
41/// Deprecated, please use kSecAccessControlBiometryCurrentSet instead.
42///
43///
44/// Constraint: Device passcode
45///
46///
47/// Deprecated, please use kSecAccessControlCompanion instead.
48///
49///
50/// Constraint: Paired companion device
51///
52///
53/// Constraint logic operation: when using more than one constraint, at least one of them must be satisfied.
54///
55///
56/// Constraint logic operation: when using more than one constraint, all must be satisfied.
57///
58///
59/// Create access control for private key operations (i.e. sign operation)
60///
61///
62/// Security: Application provided password for data encryption key generation. This is not a constraint but additional item
63/// encryption mechanism.
64///
65/// See also [Apple's documentation](https://developer.apple.com/documentation/security/secaccesscontrolcreateflags?language=objc)
66// NS_OPTIONS
67#[repr(transparent)]
68#[derive(Clone, Copy, Debug, PartialEq, Eq, Hash, PartialOrd, Ord)]
69pub struct SecAccessControlCreateFlags(pub CFOptionFlags);
70bitflags::bitflags! {
71 impl SecAccessControlCreateFlags: CFOptionFlags {
72 #[doc(alias = "kSecAccessControlUserPresence")]
73 const UserPresence = 1<<0;
74 #[doc(alias = "kSecAccessControlBiometryAny")]
75 const BiometryAny = 1<<1;
76#[deprecated]
77 #[doc(alias = "kSecAccessControlTouchIDAny")]
78 const TouchIDAny = 1<<1;
79 #[doc(alias = "kSecAccessControlBiometryCurrentSet")]
80 const BiometryCurrentSet = 1<<3;
81#[deprecated]
82 #[doc(alias = "kSecAccessControlTouchIDCurrentSet")]
83 const TouchIDCurrentSet = 1<<3;
84 #[doc(alias = "kSecAccessControlDevicePasscode")]
85 const DevicePasscode = 1<<4;
86#[deprecated]
87 #[doc(alias = "kSecAccessControlWatch")]
88 const Watch = 1<<5;
89 #[doc(alias = "kSecAccessControlCompanion")]
90 const Companion = 1<<5;
91 #[doc(alias = "kSecAccessControlOr")]
92 const Or = 1<<14;
93 #[doc(alias = "kSecAccessControlAnd")]
94 const And = 1<<15;
95 #[doc(alias = "kSecAccessControlPrivateKeyUsage")]
96 const PrivateKeyUsage = 1<<30;
97 #[doc(alias = "kSecAccessControlApplicationPassword")]
98 const ApplicationPassword = 1<<31;
99 }
100}
101
102#[cfg(feature = "objc2")]
103unsafe impl Encode for SecAccessControlCreateFlags {
104 const ENCODING: Encoding = CFOptionFlags::ENCODING;
105}
106
107#[cfg(feature = "objc2")]
108unsafe impl RefEncode for SecAccessControlCreateFlags {
109 const ENCODING_REF: Encoding = Encoding::Pointer(&Self::ENCODING);
110}
111
112/// Creates new access control object based on protection type and additional flags.
113///
114/// Created access control object should be used as a value for kSecAttrAccessControl attribute in SecItemAdd,
115/// SecItemUpdate or SecKeyGeneratePair functions. Accessing keychain items or performing operations on keys which are
116/// protected by access control objects can block the execution because of UI which can appear to satisfy the access control
117/// conditions, therefore it is recommended to either move those potentially blocking operations out of the main
118/// application thread or use combination of kSecUseAuthenticationContext and kSecUseAuthenticationUI attributes to control
119/// where the UI interaction can appear.
120///
121/// Parameter `allocator`: Allocator to be used by this instance.
122///
123/// Parameter `protection`: Protection class to be used for the item. One of kSecAttrAccessible constants.
124///
125/// Parameter `flags`: If no flags are set then all operations are allowed.
126///
127/// Parameter `error`: Additional error information filled in case of failure.
128///
129/// Returns: Newly created access control object.
130#[cfg(feature = "SecBase")]
131#[inline]
132pub unsafe extern "C-unwind" fn SecAccessControlCreateWithFlags(
133 allocator: Option<&CFAllocator>,
134 protection: &CFType,
135 flags: SecAccessControlCreateFlags,
136 error: *mut *mut CFError,
137) -> Option<CFRetained<SecAccessControl>> {
138 extern "C-unwind" {
139 fn SecAccessControlCreateWithFlags(
140 allocator: Option<&CFAllocator>,
141 protection: &CFType,
142 flags: SecAccessControlCreateFlags,
143 error: *mut *mut CFError,
144 ) -> Option<NonNull<SecAccessControl>>;
145 }
146 let ret = unsafe { SecAccessControlCreateWithFlags(allocator, protection, flags, error) };
147 ret.map(|ret| unsafe { CFRetained::from_raw(ret) })
148}