/macosx-10.9.5/Security-55471.14.18/authd/ |
H A D | engine.c | 244 LOGV("engine[%i]: ** prepare agent hints for rule %s", connection_get_pid(engine->conn), rule_get_name(rule)); 270 LOGV("engine[%i]: - shared right %s (does NOT satisfy rule)", connection_get_pid(engine->conn), credential_get_name(cred)); 290 LOGV("engine[%i]: - validating %s%s %s (%i) for %s", connection_get_pid(engine->conn), 298 LOGV("engine[%i]: - invalid rule class %i (denied)", connection_get_pid(engine->conn), rule_get_class(rule)); 303 LOGV("engine[%i]: - %s %i invalid (does NOT satisfy rule)", connection_get_pid(engine->conn), cred_label, credential_get_uid(cred)); 309 LOGV("engine[%i]: - %s %i expired '%f > %lli' (does NOT satisfy rule)", connection_get_pid(engine->conn), cred_label, credential_get_uid(cred), 318 LOGV("engine[%i]: - shared %s %i (does NOT satisfy rule)", connection_get_pid(engine->conn), cred_label, credential_get_uid(cred)); 325 LOGV("engine[%i]: - %s %i has uid 0 (does satisfy rule)", connection_get_pid(engine->conn), cred_label, credential_get_uid(cred)); 331 LOGV("engine[%i]: - %s %i is session owner (does satisfy rule)", connection_get_pid(engine->conn), cred_label, credential_get_uid(cred)); 351 LOGV("engin [all...] |
H A D | authdb.c | 178 LOGV("%s, %s", errmsg, tmp); 206 LOGV("authdb: %s modified old=%f, new=%f", AUTHDB_DATA, old_ts, ts); 236 LOGV("Failed to delete db handle! SQLite error %i.\n", rc); 281 LOGV("authdb: initializing database"); 290 LOGV("authdb: current db ver=%lli", currentVersion); 292 LOGV("authdb: upgrading schema"); 321 // LOGV("authdb: timeout occurred!"); 347 LOGV("authdb: %s %s for %s", fn_name, sqlite3_errmsg(dbconn->handle), sqlite3_sql(stmt)); 349 LOGV("authdb: %s %s", fn_name, sqlite3_errmsg(dbconn->handle)); 414 LOGV("authd [all...] |
H A D | debugging.h | 17 #define LOGV(...) security_auth_log(AUTH_LOG_VERBOSE, ##__VA_ARGS__) macro
|
H A D | agent.c | 133 LOGV("agent[%i]: Stored auid %d fetched auid %d", agent->agentPid, audit_info->auid, tempAddr.ai_auid); 145 LOGV("agent[%i]: Creating a security agent stub", agent->agentPid); 153 LOGV("agent[%i]: Valid response received from stub", agent->agentPid); 155 LOGV("agent[%i]: Error response received from stub", agent->agentPid); 168 LOGV("agent[%i]: Creating a security agent", agent->agentPid); 174 LOGV("agent[%i]: Creating a standard authhost", agent->agentPid); 183 LOGV("agent[%i]: global xpc message received %s", agent->agentPid, objectDesc); 210 LOGV("agent[%i]: attaching an audit session port", agent->agentPid); 217 LOGV("agent[%i]: attaching a bootstrap port", agent->agentPid); 307 LOGV("agen [all...] |
H A D | server.c | 124 LOGV("server: IOMP powerstates %i", capabilities); 126 LOGV("server: disk"); 128 LOGV("server: net"); 130 LOGV("server: audio"); 132 LOGV("server: video"); 137 LOGV("server: enter DarkWake"); 140 LOGV("server: exit DarkWake"); 204 LOGV("server: session %i destroyed", aia.ai_asid); 235 LOGV("server: uid=%i, sid=%i", info.ai_auid, info.ai_asid); 330 LOGV("serve [all...] |
H A D | main.c | 43 LOGV("xpc[%i]: client disconnected", xpc_connection_get_pid(connection)); 56 LOGV("xpc[%i]: received message type=%llu", connection_get_pid(conn), auth_type); 189 LOGV("starting");
|
H A D | session.c | 25 LOGV("session: %i deallocated %p", session->auditinfo.ai_asid, session); 76 LOGV("session: %i created (uid=%i) %p", session->auditinfo.ai_asid, session->auditinfo.ai_auid, session); 99 LOGV("session: failed to update session info (%d)", rc);
|
H A D | authtoken.c | 74 LOGV("authtoken: deallocated %p", auth); 208 LOGV("authtoken[%i]: created %p", auth->auditInfo.pid, auth); 229 LOGV("authtoken[%i]: failed to create session", auth->auditInfo.pid); 242 LOGV("authtoken[%i]: failed to create code ref (%i)", auth->auditInfo.pid, status); 254 LOGV("authtoken[%i]: created %p for %s", auth->auditInfo.pid, auth, auth->code_url);
|
H A D | process.c | 70 LOGV("process[%i]: deallocated %p", proc->auditInfo.pid, proc); 153 require_noerr_action(status, done, LOGV("process[%i]: SecCodeCopySigningInformation failed with %i", proc->auditInfo.pid, status)); 193 LOGV("process[%i]: created (sid=%i) %s %p", proc->auditInfo.pid, proc->auditInfo.asid, proc->code_url, proc); 458 LOGV("process[%i]: code requirement check failed (%d)", proc->auditInfo.pid, status);
|
H A D | authitems.c | 627 LOGV("auth_items: key = %s, invalid type=%i expected=%i", 662 LOGV("auth_items: key = %s, invalid type=%i expected=%i", 697 LOGV("auth_items: key = %s, invalid type=%i expected=%i or size=%li expected=%li", 737 LOGV("auth_items: key = %s, invalid type=%i expected=%i or size=%li expected=%li", 777 LOGV("auth_items: key = %s, invalid type=%i expected=%i or size=%li expected=%li", 817 LOGV("auth_items: key = %s, invalid type=%i expected=%i or size=%li expected=%li", 857 LOGV("auth_items: key = %s, invalid type=%i expected=%i or size=%li expected=%li", 895 LOGV("auth_items: key = %s, invalid type=%i expected=%i or size=%li expected=%li",
|
H A D | rule.c | 800 LOGV("rule: commit, failed for %s (%llu)", rule_get_name(rule), rule_get_id(rule));
|
/macosx-10.9.5/Security-55471.14.18/utilities/src/ |
H A D | SecDb.c | 25 #define LOGV(ARG,...) secdebug("secdb", ARG, ## __VA_ARGS__) macro 168 LOGV("sqlDb: running from installer"); 203 LOGV("sqlDb: warning error %@ when running integrity check", error); 378 LOGV("sqlDb: %s", sqlite3_errmsg(dbconn->handle)); 502 LOGV("sqlDb: nested transaction asked to not be committed"); 662 LOGV("sqlDb: sql profile: %s", profile_enabled ? "enabled" : "disabled"); 680 LOGV("==\nsqlDb: %s\nTime: %llu ms\n", sql, ns >> 20);
|
/macosx-10.9.5/Security-55471.14.18/utilities/utilities/ |
H A D | SecDb.c | 25 #define LOGV(ARG,...) secdebug("secdb", ARG, ## __VA_ARGS__) macro 168 LOGV("sqlDb: running from installer"); 203 LOGV("sqlDb: warning error %@ when running integrity check", error); 378 LOGV("sqlDb: %s", sqlite3_errmsg(dbconn->handle)); 502 LOGV("sqlDb: nested transaction asked to not be committed"); 662 LOGV("sqlDb: sql profile: %s", profile_enabled ? "enabled" : "disabled"); 680 LOGV("==\nsqlDb: %s\nTime: %llu ms\n", sql, ns >> 20);
|