HomeAppleHow one can restrict `set-key-partition-list` to at least one certificates

How one can restrict `set-key-partition-list` to at least one certificates


TLDR: How can I discover make safety set-key-partition-list run in opposition to a single entry, reasonably than all the things within the keystore?


I used to be dealing with points with a cipher mismatch with an dotnet/aspnet app and a self signed cert:
How one can restrict `set-key-partition-list` to at least one certificates

Finally I discovered this github difficulty, which led me to

log stream --process <PID_OF_SECURITYD>

Giving:

 securityd: [com.apple.securityd:integrity] failure extending partition
 securityd: [com.apple.securityd:security_exception] MacOS error: 32
 securityd: [com.apple.securityd:clientid] code requirement verify failed (-67050), shopper is just not Apple-signed
 securityd: [com.apple.securityd:integrity] ACL partition mismatch: shopper teamid:UBF8T346G9 ACL ("cdhash:71c6a2e36e9b3aa01232049c467ebbad51311b9")

Looking from there gave me this SO query(!), which prompt

sudo safety set-key-partition-list -D localhost -S unsigned:,teamid:UBF8T346G9 $(safety login-keychain)

And voila, this labored – I can now use this certificates to run the app regionally.

However, that command ran in opposition to ~2489 entries, reasonably than the 1 that I anticipated.

So, how can I discover make safety set-key-partition-list run in opposition to a
single entry, reasonably than all the things within the keystore?

It appears that evidently safety find-key has utterly completely different args that do not appear to match – I both get no outcomes, or ~2489 outcomes.

I’ve even obtained to the purpose of spelunking by the supply code to try to determine this out, however I did not get very far.

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -
Google search engine

Most Popular

Recent Comments