Search results for

İOS 26 beta battery %1

253,792 results found

Post

Replies

Boosts

Views

Activity

Reply to Commands for MacOS which gives similar information as "lsappinfo" and "system_profiler SPApplicationsDataType" for other Mach-O binaries
[quote='805992021, oddeyed, /thread/805992, /profile/oddeyed'] I am currently researching for ways to get the versions of all of the Mach-O executables and dylibs [/quote] To what end? Your ultimate goal here matters, because that affects what path you follow. For example, if you’re just messing around with shell scripts, then lsappinfo is a reasonable enough choice. However, if you’re trying to build a product that you ship to a wide range of users, you wouldn’t want to rely on lsappinfo because it’s output is intended to be read by humans, not by programs. OTOH, there are APIs that let you get similar information. Share and Enjoy — Quinn “The Eskimo!” @ Developer Technical Support @ Apple let myEmail = eskimo + 1 + @ + apple.com
Topic: App & System Services SubTopic: Core OS Tags:
4d
Reply to -10985 network error from urlSession
-10985 is not in any of the standard error ranges that I’d expect to see returned by URLSession. Indeed, I was unable to find an uses of that number as an error code. Are you able to reproduce this? If so, please add code to print the error and then post the results: … assuming `error` is either an `NSError` or a Swift `Error` … print(error) Share and Enjoy — Quinn “The Eskimo!” @ Developer Technical Support @ Apple let myEmail = eskimo + 1 + @ + apple.com
4d
FIDO2 USB Monitoring using custom Authorization Plugin
I'm looking to implement USB monitoring for FIDO2 authentication through a custom Authorization Plugin, specifically for the below ones. This plugin applies to the following macOS authorization mechanisms: system.login.console — login window authentication system.login.screensaver — screensaver unlock authentication The goal is to build a GUI AuthPlugin, an authorization plugin that presents a custom window prompting the user to Insert your FIDO key”. Additionally, the plugin should detect when the FIDO2 device is removed and respond accordingly. Additional Info: We have already developed a custom authorization plugin which is a primary authentication using OTP at login and Lock Screen. We are now extending to include FIDO2 support as a primary. Our custom authorization plugin is designed to replace the default loginwindow:login mechanism with a custom implementation. Question: Is there a reliable approach to achieve the USB monitoring functionality through a custom authorization plugin? Any guidance
6
0
442
4d
Reply to App Extension Network Extension - failed to start, signature check failed
The first thing to rule out is the device not actually being included in the profile. Do this: Dump the profile of the app: % security cms -D -i MyApp.app/Contents/embedded.provisionprofile Dump the profile of the provider: % security cms -D -i MyApp.app/Contents/PlugIns/MyAppEx.appex/Contents/embedded.provisionprofile Check that the ProvisionedDevices lists match. Share and Enjoy — Quinn “The Eskimo!” @ Developer Technical Support @ Apple let myEmail = eskimo + 1 + @ + apple.com
4d
Reply to memory leak in dlopen / dlcose, or user error?
[quote='806035021, chris_ogden, /thread/806035, /profile/chris_ogden'] I'm running on x86_64 macOS 13.6.6 [/quote] Are you able to reproduce this on a more modern version of macOS? There’s a couple of reasons why this matters: The dynamic linker has received significant updates in the last few years, so it’s possible that this is fixed already. If that’s the case, there’s no point filing a bug against macOS 13 because there’s no release vehicle for such a fix. Notwithstanding the above, be aware that dlclose has a significant limitation on macOS: In many cases its unable to actually unload the library. This limitation is fundamental to the system, rather than a bug. The dlclose man page lists some of the causes, but those are just the start. Share and Enjoy — Quinn “The Eskimo!” @ Developer Technical Support @ Apple let myEmail = eskimo + 1 + @ + apple.com
4d
Provisioning profile entitlements
Hi, I am developing a iOS app with Packet Tunnel Provider Network Extension. I manage signing manually. I created a distribution provisioning profile. Then when I archive and click validate I get this error: Your application bundle's signature contains code signing entitlements that are not supported on iOS. Specifically, value 'url-filter-provider' for key 'com.apple.developer.networking.networkextension' So I run security cms -D -i profiles/vpn_distribution.mobileprovision and I see there Entitlements com.apple.developer.networking.networkextension app-proxy-provider content-filter-provider packet-tunnel-provider dns-proxy dns-settings relay url-filter-provider hotspot-provider Where are those coming from. My entitlement file has com.apple.developer.networking.networkextension packet-tunnel-provider com.apple.security.application-groups group.my-app-group What is happening here. How can I get a provisioning profile that only has the entitlements that I actually need?
2
0
102
4d
Reply to MultiPeer Connectivity Example Code Crashes in Swift 6
[quote='806107021, Yuantong, /thread/806107, /profile/Yuantong'] when I switch to Swift6, the example would crash [/quote] This doesn’t surprise me. The Multipeer Connectivity API hasn’t been updated for Swift concurrency [1]. Specifically, MCSession makes delegate callbacks on some unspecified serial queue, and Swift concurrency is that trapping because it’s expecting the callback to arrive on the main thread/queue/actor. You can fix this by implementing a non-isolated conformance to MCSessionDelegate. Having said that, my advice is that you use this as excuse to move away from Multipeer Connectivity completely. It has at least one known crashing bug that… well… while I can’t predict the future, the fact that it’s remained unfixed for the last five years should tell you something |-: If you decide you want to tackle this now, see Moving from Multipeer Connectivity to Network Framework for lots of advice. Note I haven’t updated that post to use the new Network framework API we introduced in
4d
Reply to Expected timing/delays when triggering background URLSessionTask
You are mixing two technologies that don’t usually mix. A UIApplication background task makes sense when you’re using a standard session. It prevents the system from suspending your app, giving it time to complete the transfer. In contrast, when you use a background session you don’t need a UIApplication background task because the transfer gets handed off to a system process that does it on your behalf. That allows the transfer to run even if your app gets suspended. And if your app is suspended when all your session tasks complete, the system will resume (or relaunch) your app in the background to let you know. There’s a stark latency vs endurance trade-off here: Standard sessions are low latency. The transfer starts as soon as you create it [1]. However, the transfer only continues as long as your app can avoid being suspended. Background sessions work even if your app gets suspended, but they have high latency. A background session will only start a transfer when conditions are favourable, and th
4d
DeviceDiscoveryUI's UIViewControllers are available for Wi-Fi Aware?
HI, I am currently developing an app that utilizes Wi-Fi Aware. According to the Wi-Fi Aware framework examples and the WWDC25 session on Wi-Fi Aware, discovery is handled using DevicePairingView and DevicePicker from the DeviceDiscoveryUI module. However, these SwiftUI views present their connection UI modally when tapped. My app's design requires the ability to control the presentation of this UI programmatically, rather than relying on a user tap. While inspecting the DeviceDiscoveryUI module, I found DDDevicePairingViewController and DDDevicePickerViewController, which appear to be the UIViewController counterparts to the SwiftUI views. The initializer for DDDevicePairingViewController accepts a ListenerProvider, so it seems I can pass the same ListenerProvider instance that is used with the DevicePairingView. However, the initializer for DDDevicePickerViewController requires an NWBrowser.Descriptor, which seems incompatible with the parameters used for the SwiftUI DevicePicker. I have two main questions:
0
0
21
4d
Reply to Failed on creating static code object with API SecStaticCodeCreateWithPath(_:_:_:)
This is failing with EPERM, which is the most common reason for this sort of failure. It means that the operation was deny by some security subsystem, like App Sandbox. I discuss this in great detail in On File System Permissions. [quote='806049021, Richie_Wu, /thread/806049, /profile/Richie_Wu'] My process running with root privilege [/quote] On modern versions of macOS there’s no guarantee that root can access all files [1]. Given the location of the problematic app, I doubt this is not being caused by App Sandbox or MAC, meaning that ES is the most likely culprit. Share and Enjoy — Quinn “The Eskimo!” @ Developer Technical Support @ Apple let myEmail = eskimo + 1 + @ + apple.com [1] Well, that was true even on ancient versions of macOS, where NFS would map root to nobody.
Topic: App & System Services SubTopic: Core OS Tags:
4d
WiFi aware demo paring issue
I am developing a program on my chip and attempting to establish a connection with the WiFi Aware demo app launched by iOS 26. Currently, I am encountering an issue during the pairing phase. If I am the subscriber of the service and successfully complete the follow-up frame exchange of pairing bootstrapping, I see the PIN code displayed by iOS. Question 1: How should I use this PIN code? Question 2: Subsequently, I need to negotiate keys with iOS through PASN. What should I use as the password for the PASN SAE process? If I am the subscriber of the service and successfully complete the follow-up frame exchange of pairing bootstrapping, I should display the PIN code. Question 3: How do I generate this PIN code? Question 4: Subsequently, I need to negotiate keys with iOS through PASN. What should I use as the password for the PASN SAE process?
4
0
67
4d
Xcode 26 + iOS 26 debugging is extremely slow
Since upgrading my iPhone 13 Pro Max to iOS 26, apps have become nearly impossible to debug. The recent update to iOS 26.1 has made this even worse. Going from app start to a fully rendered & responding screen takes <1 second on a Debug build when no debugger is attached, but with the debugger attached I get these times (measured manually with a stopwatch): First render: <1 second without debugger 5 seconds on USB debugger 30 seconds on wireless debugger Data loaded from webserver and UI responding: <1 second without debugger 19 seconds on USB debugger 5 minutes on wireless debugger! Doing an online speed test reports 55 Mbps for the phone and 60 Mbps on the MacBook, so I doubt it's my WiFi. Having a debugger attached used to make minimal difference on iOS 18, but the performance has tanked completely since the last major release. What happened?
4
0
90
4d
Reply to SIM ToolKit API
The best way to get these ideas in front of the folks who have the power to act on them is to put them in an enhancement request. Please post your bug number, just for the record. Share and Enjoy — Quinn “The Eskimo!” @ Developer Technical Support @ Apple let myEmail = eskimo + 1 + @ + apple.com
Topic: App & System Services SubTopic: Core OS Tags:
4d