SecCodeRef code = process.currentGuest();
if (!code) {
secdebug("codesign", "no code base: fail");
return false;
}
SecCodeRef code = process.currentGuest();
if (!code) {
secdebug("codesign", "no code base: fail");
return false;
}
if (SecRequirementRef requirement = verifier.requirement()) {
// If the ACL contains a code signature (requirement), we won't match against unsigned code at all.
// The legacy hash is ignored (it's for use by pre-Leopard systems).
secdebug("codesign", "CS requirement present; ignoring legacy hashes");
Server::active().longTermActivity();
if (SecRequirementRef requirement = verifier.requirement()) {
// If the ACL contains a code signature (requirement), we won't match against unsigned code at all.
// The legacy hash is ignored (it's for use by pre-Leopard systems).
secdebug("codesign", "CS requirement present; ignoring legacy hashes");
Server::active().longTermActivity();
- secdebug("codesign", "validation fails with rc=%ld, rejecting", rc);
+ secdebug("codesign", "validation fails with rc=%d, rejecting", int32_t(rc));
// Ah well. Establish mediator objects for database signature links
AclIdentity aclIdentity(signature, path);
// Ah well. Establish mediator objects for database signature links
AclIdentity aclIdentity(signature, path);