Searched refs:LOGE (Results 1 - 13 of 13) sorted by relevance
/macosx-10.9.5/Security-55471.14.18/authd/ |
H A D | debugging.h | 18 #define LOGE(...) security_auth_log(AUTH_LOG_ERROR, ##__VA_ARGS__) macro
|
H A D | main.c | 30 require_action(conn != NULL, done, LOGE("xpc[%i]: process context not found", xpc_connection_get_pid(connection))); 161 LOGE("xpc[%i]: failed to register connection", xpc_connection_get_pid(xpc_conn)); 174 LOGE("server: sandbox_init failed %s (%i)", errorbuf, rc); 194 LOGE("auth: server_init() failed");
|
H A D | ccaudit.c | 91 LOGE("ccaudit: error checking auditing status (%d)", acond); 108 LOGE("ccaudit: au_open() failed (%s)", strerror(errno)); 121 LOGE("ccaudit: au_close() failed; record not committed"); 131 LOGE("ccaudit: invalid '%s' token", tokenName); 135 LOGE("ccaudit: error writing '%s' token (%s)", tokenName, strerror(errno));
|
H A D | authdb.c | 118 LOGE("authdb: exec, (%i) %s", rc, errmsg); 195 require_action(authURL != NULL, done, LOGE("authdb: file not found %s", AUTHDB_DATA)); 208 require_noerr_action(rc, done, LOGE("authdb: failed to load %s", AUTHDB_DATA)); 260 LOGE("Database at path %s is corrupt. Copying it to %s for further investigation.", dbconn->db->db_path, buf); 262 LOGE("Tried to copy corrupt database at path %s, but we failed with SQLite error %i.", dbconn->db->db_path, rc); 283 require_noerr_action(s3e, done, LOGE("authdb: failed to initialize database %i", s3e)); 286 require_noerr_action(s3e, done, LOGE("authdb: failed to get config %i", s3e)); 1005 require_noerr_action(rc, done, LOGE("authdb: open %s (%i) %s", db->db_path, rc, sqlite3_errmsg(handle)));
|
H A D | server.c | 192 LOGE("server: could not open %s %d", AUDIT_SDEV_PATH, errno); 198 LOGE("server: au_sdev_read_aia failed: %d", errno); 894 LOGE("server[%i]: smartcard: enable(%i) failed to update %s", connection_get_pid(conn), enable_smartcard, SYSTEM_LOGIN_CONSOLE); 898 LOGE("server[%i]: smartcard: enable(%i) failed to update %s", connection_get_pid(conn), enable_smartcard, AUTHENTICATE); 986 require_action(rule_get_extract_password(rule) == false, done, status = errAuthorizationDenied; LOGE("server[%i]: AuthorizationRightSet not allowed to set extract-password. (denied)", connection_get_pid(conn))); 992 LOGE("server[%i]: AuthorizationRightSet required for process %s (missing code signature). To add rights to the Authorization database, your process must have a code signature.", connection_get_pid(conn), process_get_code_url(proc)); 998 LOGE("server[%i]: AuthorizationRightSet Denied API abuse process %s already contains %lli rights.", connection_get_pid(conn), process_get_code_url(proc), _get_max_process_rights()); 1008 LOGE("server[%i]: AuthorizationRightSet denied, root required to update the 'authenticate' rule", connection_get_pid(conn)); 1016 LOGE("server[%i]: AuthorizationRightSet Denied updating '%s' rule is prohibited", connection_get_pid(conn), rule_get_name(existingRule)); 1042 LOGE("serve [all...] |
H A D | engine.c | 419 require_action(agent != NULL, done, result = kAuthorizationResultUndefined; LOGE("engine[%i]: error creating mechanism agent", connection_get_pid(engine->conn))); 916 LOGE("engine[%i]: default rule lookup error (missing), using builtin defaults", connection_get_pid(engine->conn)); 940 require_action(pw != NULL, done, LOGE("engine[%i]: user not found %s", connection_get_pid(engine->conn), user)); 943 require_action(checkpw_status == CHECKPW_SUCCESS, done, LOGE("engine[%i]: checkpw() returned %d; failed to authenticate user %s (uid %u).", connection_get_pid(engine->conn), checkpw_status, pw->pw_name, pw->pw_uid)); 965 LOGE("Sandbox denied authorizing right '%s' by client '%s' [%d]", right, process_get_code_url(engine->proc), pid); 971 LOGE("Sandbox denied authorizing right '%s' for authorization created by '%s' [%d]", right, auth_token_get_code_url(engine->auth), pid); 1075 LOGE("engine[%i]: evaluate returned %i returning errAuthorizationInternal", connection_get_pid(engine->conn), status); 1221 require_action(right[len-1] != '.', done, LOGE("engine[%i]: not allowed to set wild card rules", connection_get_pid(engine->conn)));
|
H A D | session.c | 67 LOGE("session: failed to get session info");
|
H A D | rule.c | 742 LOGE("Warning mechanism not found on disk %s during import of %s", mechanism_get_string(mech), rule_get_name(rule)); 744 require_action(mechanism_get_id(mech) != 0, done, LOGE("rule: commit, invalid mechanism %s:%s for %s", mechanism_get_plugin(mech), mechanism_get_param(mech), rule_get_name(rule))); 757 require_action(rule_get_id(delegate) != 0, done, LOGE("rule: commit, missing delegate %s for %s", rule_get_name(delegate), rule_get_name(rule)));
|
H A D | authtoken.c | 148 LOGE("authtoken[%i]: failed to generate blob", auditInfo->pid);
|
H A D | process.c | 147 LOGE("process[%i]: failed to create code ref %i", proc->auditInfo.pid, status);
|
H A D | authitems.c | 33 LOGE("realloc failed");
|
/macosx-10.9.5/Security-55471.14.18/utilities/src/ |
H A D | SecDb.c | 24 #define LOGE(ARG,...) secerror(ARG, ## __VA_ARGS__) macro
|
/macosx-10.9.5/Security-55471.14.18/utilities/utilities/ |
H A D | SecDb.c | 24 #define LOGE(ARG,...) secerror(ARG, ## __VA_ARGS__) macro
|
Completed in 208 milliseconds