Searched refs:signing_id (Results 1 – 9 of 9) sorted by relevance
| /xnu-8792.41.9/bsd/security/audit/ |
| H A D | audit_arg.c | 940 if (id_info->signing_id != NULL) { in audit_identity_info_destruct() 941 kfree_data(id_info->signing_id, MAX_AU_IDENTITY_SIGNING_ID_LENGTH); in audit_identity_info_destruct() 942 id_info->signing_id = NULL; in audit_identity_info_destruct() 962 const char *signing_id = NULL; in audit_identity_info_construct() local 970 signing_id = csblob_get_identity(blob); in audit_identity_info_construct() 978 if (id_info->signing_id == NULL && signing_id != NULL) { in audit_identity_info_construct() 979 id_info->signing_id = kalloc_data(MAX_AU_IDENTITY_SIGNING_ID_LENGTH, in audit_identity_info_construct() 981 src_len = strlcpy(id_info->signing_id, in audit_identity_info_construct() 982 signing_id, MAX_AU_IDENTITY_SIGNING_ID_LENGTH); in audit_identity_info_construct()
|
| H A D | audit_syscalls.c | 160 .signing_id = NULL, in audit() 169 char *signing_id = NULL; in audit() local 264 id_tok = au_to_identity(id_info.signer_type, id_info.signing_id, in audit() 279 signing_id = id_info.signing_id; in audit() 335 (void)audit_send_analytics(signing_id, process_name); in audit()
|
| H A D | audit_bsd.c | 477 audit_send_analytics(char* signing_id, char* process_name) in audit_send_analytics() argument 484 (void)audit_analytics(audit_port, signing_id, process_name); in audit_send_analytics()
|
| H A D | audit_bsm_token.c | 1393 au_to_identity(uint32_t signer_type, const char* signing_id, in au_to_identity() argument 1403 if (signing_id) { in au_to_identity() 1404 signing_id_len = strlen(signing_id); in au_to_identity() 1432 ADD_STRING(dptr, signing_id, signing_id_len); // truncated signing id in au_to_identity()
|
| H A D | audit_private.h | 207 char *signing_id; member
|
| H A D | audit_bsm.c | 2066 tok = au_to_identity(id->signer_type, id->signing_id, in kaudit_to_bsm()
|
| /xnu-8792.41.9/bsd/netinet/ |
| H A D | flow_divert.c | 953 const char *signing_id = cs_identity_get(p); in flow_divert_find_proc_by_uuid_filter() local 954 if (signing_id != NULL) { in flow_divert_find_proc_by_uuid_filter() 955 …LOG(LOG_INFO, &nil_pcb, "Found process %d with signing identifier %s", proc_getpid(p), signing_id); in flow_divert_find_proc_by_uuid_filter() 956 size_t signing_id_size = strlen(signing_id) + 1; in flow_divert_find_proc_by_uuid_filter() 959 memcpy(info->found_signing_id, signing_id, signing_id_size); in flow_divert_find_proc_by_uuid_filter() 960 } else if (memcmp(signing_id, info->found_signing_id, signing_id_size)) { in flow_divert_find_proc_by_uuid_filter() 993 flow_divert_add_proc_info(struct flow_divert_pcb *fd_cb, proc_t proc, const char *signing_id, mbuf_… in flow_divert_add_proc_info() argument 998 const char *proc_cs_id = signing_id; in flow_divert_add_proc_info() 1036 if (signing_id == NULL && proc_cs_id != NULL) { in flow_divert_add_proc_info() 1083 …ct flow_divert_pcb *fd_cb, struct socket *so, proc_t proc, const char *signing_id, mbuf_t connect_… in flow_divert_add_all_proc_info() argument [all …]
|
| /xnu-8792.41.9/bsd/bsm/ |
| H A D | audit_record.h | 367 token_t *au_to_identity(uint32_t signer_type, const char* signing_id,
|
| /xnu-8792.41.9/bsd/net/ |
| H A D | necp.c | 793 const char *signing_id = NULL; in necp_check_drop_all_bypass_result() local 795 (signing_id = cs_identity_get(proc)) && in necp_check_drop_all_bypass_result() 796 (strlen(signing_id) == SIGNING_ID_CONFIGD_LEN) && in necp_check_drop_all_bypass_result() 797 (memcmp(signing_id, SIGNING_ID_CONFIGD, SIGNING_ID_CONFIGD_LEN) == 0)); in necp_check_drop_all_bypass_result() 7950 const char *signing_id = cs_identity_get(proc ? proc : current_proc()); in necp_socket_check_policy() local 7954 signing_id ? signing_id : "<n/a>"); in necp_socket_check_policy() 7955 if (signing_id != NULL) { in necp_socket_check_policy() 7956 size_t signing_id_size = strlen(signing_id) + 1; in necp_socket_check_policy() 7957 if (memcmp(signing_id, kernel_policy->cond_signing_identifier, signing_id_size) == 0) { in necp_socket_check_policy()
|