Deleted Added
full compact
au_control.3 (162621) au_control.3 (168777)
1.\"-
2.\" Copyright (c) 2005-2006 Robert N. M. Watson
3.\" All rights reserved.
4.\"
5.\" Redistribution and use in source and binary forms, with or without
6.\" modification, are permitted provided that the following conditions
7.\" are met:
8.\" 1. Redistributions of source code must retain the above copyright
9.\" notice, this list of conditions and the following disclaimer.
10.\" 2. Redistributions in binary form must reproduce the above copyright
11.\" notice, this list of conditions and the following disclaimer in the
12.\" documentation and/or other materials provided with the distribution.
1.\"-
2.\" Copyright (c) 2005-2006 Robert N. M. Watson
3.\" All rights reserved.
4.\"
5.\" Redistribution and use in source and binary forms, with or without
6.\" modification, are permitted provided that the following conditions
7.\" are met:
8.\" 1. Redistributions of source code must retain the above copyright
9.\" notice, this list of conditions and the following disclaimer.
10.\" 2. Redistributions in binary form must reproduce the above copyright
11.\" notice, this list of conditions and the following disclaimer in the
12.\" documentation and/or other materials provided with the distribution.
13.\"
13.\"
14.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
15.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
16.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
17.\" ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
18.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
19.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
20.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
21.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
22.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
23.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
24.\" SUCH DAMAGE.
25.\"
14.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
15.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
16.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
17.\" ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
18.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
19.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
20.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
21.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
22.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
23.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
24.\" SUCH DAMAGE.
25.\"
26.\" $P4: //depot/projects/trustedbsd/openbsm/libbsm/au_control.3#5 $
26.\" $P4: //depot/projects/trustedbsd/openbsm/libbsm/au_control.3#8 $
27.\"
28.Dd April 19, 2005
29.Dt AU_CONTROL 3
30.Os
31.Sh NAME
32.Nm setac ,
33.Nm endac ,
34.Nm getacdir ,
35.Nm getacmin ,
36.Nm getacfilesz ,
37.Nm getacflg ,
38.Nm getacna ,
39.Nm getacpol ,
27.\"
28.Dd April 19, 2005
29.Dt AU_CONTROL 3
30.Os
31.Sh NAME
32.Nm setac ,
33.Nm endac ,
34.Nm getacdir ,
35.Nm getacmin ,
36.Nm getacfilesz ,
37.Nm getacflg ,
38.Nm getacna ,
39.Nm getacpol ,
40.Nm au_poltostr
40.Nm au_poltostr ,
41.Nm au_strtopol
41.Nm au_strtopol
42.Nd "Look up information from the audit_control database"
42.Nd "look up information from the audit_control database"
43.Sh LIBRARY
44.Lb libbsm
45.Sh SYNOPSIS
43.Sh LIBRARY
44.Lb libbsm
45.Sh SYNOPSIS
46.In libbsm.h
46.In bsm/libbsm.h
47.Ft void
47.Ft void
48.Fn setac "void"
48.Fn setac void
49.Ft void
49.Ft void
50.Fn endac "void"
50.Fn endac void
51.Ft int
52.Fn getacdir "char *name" "int len"
53.Ft int
54.Fn getacmin "int *min_val"
55.Ft int
56.Fn getacfilesz "size_t *size_val"
57.Ft int
58.Fn getacflg "char *auditstr" "int len"

--- 5 unchanged lines hidden (view full) ---

64.Fn au_poltostr "long policy" "size_t maxsize" "char *buf"
65.Ft int
66.Fn au_strtopol "const char *polstr" "long *policy"
67.Sh DESCRIPTION
68These interfaces may be used to look up information from the
69.Xr audit_control 5
70database, which contains various audit-related administrative parameters.
71.Pp
51.Ft int
52.Fn getacdir "char *name" "int len"
53.Ft int
54.Fn getacmin "int *min_val"
55.Ft int
56.Fn getacfilesz "size_t *size_val"
57.Ft int
58.Fn getacflg "char *auditstr" "int len"

--- 5 unchanged lines hidden (view full) ---

64.Fn au_poltostr "long policy" "size_t maxsize" "char *buf"
65.Ft int
66.Fn au_strtopol "const char *polstr" "long *policy"
67.Sh DESCRIPTION
68These interfaces may be used to look up information from the
69.Xr audit_control 5
70database, which contains various audit-related administrative parameters.
71.Pp
72The
72.Fn setac
73.Fn setac
74function
73resets the database iterator to the beginning of the database; see the
75resets the database iterator to the beginning of the database; see the
74BUGS section for more information.
76.Sx BUGS
77section for more information.
75.Pp
78.Pp
79The
76.Fn sendac
80.Fn sendac
81function
77closes the
78.Xr audit_control 5
79database.
80.Pp
82closes the
83.Xr audit_control 5
84database.
85.Pp
86The
81.Fn getacdir
87.Fn getacdir
88function
82returns the name of the directory where log data is stored via the passed
83character buffer
89returns the name of the directory where log data is stored via the passed
90character buffer
84.Va name
91.Fa name
85of length
92of length
86.Va len .
93.Fa len .
87.Pp
94.Pp
95The
88.Fn getacmin
96.Fn getacmin
97function
89returns the minimum free disk space for the audit log target file system via
90the passed
98returns the minimum free disk space for the audit log target file system via
99the passed
91.Va min_val
100.Fa min_val
92variable.
93.Pp
101variable.
102.Pp
103The
94.Fn getacfilesz
104.Fn getacfilesz
95returns the audit trail rotation size in the passed size_t buffer
105function
106returns the audit trail rotation size in the passed
107.Vt size_t
108buffer
96.Fa size_val .
97.Pp
109.Fa size_val .
110.Pp
111The
98.Fn getacflg
112.Fn getacflg
113function
99returns the audit system flags via the the passed character buffer
114returns the audit system flags via the the passed character buffer
100.Va auditstr
115.Fa auditstr
101of length
116of length
102.Va len .
117.Fa len .
103.Pp
118.Pp
119The
104.Fn getacna
120.Fn getacna
121function
105returns the non-attributable flags via the passed character buffer
122returns the non-attributable flags via the passed character buffer
106.Va auditstr
123.Fa auditstr
107of length
124of length
108.Va len .
125.Fa len .
109.Pp
126.Pp
127The
110.Fn getacpol
128.Fn getacpol
129function
111returns the audit policy flags via the passed character buffer
130returns the audit policy flags via the passed character buffer
112.Va auditstr
131.Fa auditstr
113of length
132of length
114.Va len .
133.Fa len .
115.Pp
134.Pp
135The
116.Fn au_poltostr
136.Fn au_poltostr
137function
117converts a numeric audit policy mask,
138converts a numeric audit policy mask,
118.Va policy ,
119value to a string in the passed character buffer
120.Va buf
139.Fa policy ,
140to a string in the passed character buffer
141.Fa buf
121of lenth
142of lenth
122.Va maxsize .
143.Fa maxsize .
123.Pp
144.Pp
145The
124.Fn au_strtopol
146.Fn au_strtopol
147function
125converts an audit policy flags string,
148converts an audit policy flags string,
126.Va polstr ,
149.Fa polstr ,
127to a numeric audit policy mask returned via
150to a numeric audit policy mask returned via
128.Va policy .
151.Fa policy .
129.Sh RETURN VALULES
152.Sh RETURN VALULES
153The
130.Fn getacdir ,
131.Fn getacmin ,
132.Fn getacflg ,
133.Fn getacna ,
134.Fn getacpol ,
135and
136.Fn au_strtopol
154.Fn getacdir ,
155.Fn getacmin ,
156.Fn getacflg ,
157.Fn getacna ,
158.Fn getacpol ,
159and
160.Fn au_strtopol
161functions
137return 0 on success, or a negative value on failure, along with error
138information in
139.Va errno .
140.Pp
162return 0 on success, or a negative value on failure, along with error
163information in
164.Va errno .
165.Pp
166The
141.Fn au_poltostr
167.Fn au_poltostr
168function
142returns a string length of 0 or more on success, or a negative value on
143if there is a failure.
144.Pp
145Functions that return a string value will return a failure if there is
146insufficient room in the passed character buffer for the full string.
147.Sh SEE ALSO
148.Xr libbsm 3 ,
149.Xr audit_control 5
169returns a string length of 0 or more on success, or a negative value on
170if there is a failure.
171.Pp
172Functions that return a string value will return a failure if there is
173insufficient room in the passed character buffer for the full string.
174.Sh SEE ALSO
175.Xr libbsm 3 ,
176.Xr audit_control 5
150.Sh AUTHORS
151This software was created by Robert Watson, Wayne Salamon, and Suresh
152Krishnaswamy for McAfee Research, the security research division of McAfee,
153Inc., under contract to Apple Computer, Inc.
154.Pp
155The Basic Security Module (BSM) interface to audit records and audit event
156stream format were defined by Sun Microsystems.
157.Sh HISTORY
158The OpenBSM implementation was created by McAfee Research, the security
159division of McAfee Inc., under contract to Apple Computer, Inc., in 2004.
160It was subsequently adopted by the TrustedBSD Project as the foundation for
161the OpenBSM distribution.
177.Sh HISTORY
178The OpenBSM implementation was created by McAfee Research, the security
179division of McAfee Inc., under contract to Apple Computer, Inc., in 2004.
180It was subsequently adopted by the TrustedBSD Project as the foundation for
181the OpenBSM distribution.
182.Sh AUTHORS
183.An -nosplit
184This software was created by
185.An Robert Watson ,
186.An Wayne Salamon ,
187and
188.An Suresh Krishnaswamy
189for McAfee Research, the security research division of McAfee,
190Inc., under contract to Apple Computer, Inc.
191.Pp
192The Basic Security Module (BSM) interface to audit records and audit event
193stream format were defined by Sun Microsystems.
162.Sh BUGS
163These routines cannot currently distinguish between an entry not being found
164and an error accessing the database.
165The implementation should be changed to return an error via
166.Va errno
167when
168.Dv NULL
169is returned.
170.Sh BUGS
171There is no reason for the
172.Fn setac
173interface to be exposed as part of the public API, as it is called implicitly
174by other access functions and iteration is not supported.
175.Pp
176These interfaces inconsistently return various negative values depending on
177the failure mode, and do not always set
178.Va errno
179on failure.
194.Sh BUGS
195These routines cannot currently distinguish between an entry not being found
196and an error accessing the database.
197The implementation should be changed to return an error via
198.Va errno
199when
200.Dv NULL
201is returned.
202.Sh BUGS
203There is no reason for the
204.Fn setac
205interface to be exposed as part of the public API, as it is called implicitly
206by other access functions and iteration is not supported.
207.Pp
208These interfaces inconsistently return various negative values depending on
209the failure mode, and do not always set
210.Va errno
211on failure.