Searched refs:identifier (Results 1 - 9 of 9) sorted by relevance

/xnu-2422.115.4/security/
H A Dmac_kext.c7 mac_kext_check_load(kauth_cred_t cred, const char *identifier) { argument
10 MAC_CHECK(kext_check_load, cred, identifier);
16 mac_kext_check_unload(kauth_cred_t cred, const char *identifier) { argument
19 MAC_CHECK(kext_check_unload, cred, identifier);
H A Dmac_framework.h568 int mac_kext_check_load(kauth_cred_t cred, const char *identifier);
569 int mac_kext_check_unload(kauth_cred_t cred, const char *identifier);
H A Dmac_policy.h4418 @param semakptr Pointer to semaphore identifier
4437 @param semakptr Pointer to semaphore identifier
4454 @param semakptr Pointer to semaphore identifier
4527 @param shmsegptr Pointer to shared memory segment identifier
4546 @param shmsegptr Pointer to shared memory segment identifier
4566 @param shmsegptr Pointer to shared memory segment identifier
4581 @brief Access control check obtaining System V shared memory identifier
4583 @param shmsegptr Pointer to shared memory segment identifier
6193 @param identifier Kext identifier
[all...]
/xnu-2422.115.4/bsd/kern/
H A Dkern_authorization.c121 static kauth_scope_t kauth_alloc_scope(const char *identifier, kauth_scope_callback_t callback, void *idata);
122 static kauth_listener_t kauth_alloc_listener(const char *identifier, kauth_scope_callback_t callback, void *idata);
184 kauth_alloc_scope(const char *identifier, kauth_scope_callback_t callback, void *idata) argument
195 sp->ks_identifier = identifier;
202 kauth_alloc_listener(const char *identifier, kauth_scope_callback_t callback, void *idata) argument
212 lsp->kl_identifier = identifier;
219 kauth_register_scope(const char *identifier, kauth_scope_callback_t callback, void *idata) argument
224 if ((sp = kauth_alloc_scope(identifier, callback, idata)) == NULL)
233 if (strncmp(tsp->ks_identifier, identifier,
301 kauth_listen_scope(const char *identifier, kauth_scope_callback_ argument
[all...]
/xnu-2422.115.4/iokit/IOKit/
H A DIOStatistics.h177 char identifier[kIOStatisticsDriverNameLength]; member in struct:IOStatisticsKextIdentifier
/xnu-2422.115.4/iokit/Kernel/
H A DIOUserClient.cpp1466 const OSSymbol *identifier = NULL; local
1483 identifier = my_obj->getKmodName();
1485 if (!identifier) {
1489 my_cstr = identifier->getCStringNoCopy();
1491 strlcpy(bundle_name, identifier->getCStringNoCopy(), sizeof(io_name_t));
H A DIOStatistics.cpp1004 strncpy(kextIDs->identifier, ke->kext->getIdentifierCString(), kIOStatisticsDriverNameLength);
/xnu-2422.115.4/libkern/c++/
H A DOSKext.cpp284 /* name */ kOSKextKernelIdentifier, // bundle identifier
1747 /* If we don't have an existing kext with this identifier,
1766 /* If we have a kext with this identifier that's already loaded/prelinked,
1960 /* The very next thing to get is the bundle identifier. Unlike
1961 * in user space, a kext with no bundle identifier gets axed
1979 "Can't copy bundle identifier as symbol for kext %s.",
3278 "Received kext load request with no kext identifier.");
3564 /* If the kext has no identifier, it failed to init
3912 * A kext must have a bundle identifier to even survive initialization;
4483 * in sKernelRequests for this bundle identifier
10310 compactIdentifier( const char * identifier, char * identifier_out, char ** identifier_out_end) argument
[all...]
/xnu-2422.115.4/bsd/net/
H A Dpf.c551 u_int32_t identifier; member in struct:pf_pptp_ctrl_echo_req
556 u_int32_t identifier; member in struct:pf_pptp_ctrl_echo_rpy

Completed in 194 milliseconds