au_mask.3 (155131) | au_mask.3 (155364) |
---|---|
1.\"- 2.\" Copyright (c) 2005 Robert N. M. Watson 3.\" All rights reserved. 4.\" 5.\" Redistribution and use in source and binary forms, with or without 6.\" modification, are permitted provided that the following conditions 7.\" are met: 8.\" 1. Redistributions of source code must retain the above copyright --- 9 unchanged lines hidden (view full) --- 18.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 19.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 20.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 21.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 22.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 23.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 24.\" SUCH DAMAGE. 25.\" | 1.\"- 2.\" Copyright (c) 2005 Robert N. M. Watson 3.\" All rights reserved. 4.\" 5.\" Redistribution and use in source and binary forms, with or without 6.\" modification, are permitted provided that the following conditions 7.\" are met: 8.\" 1. Redistributions of source code must retain the above copyright --- 9 unchanged lines hidden (view full) --- 18.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 19.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 20.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 21.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 22.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 23.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 24.\" SUCH DAMAGE. 25.\" |
26.\" $P4: //depot/projects/trustedbsd/openbsm/libbsm/au_mask.3#2 $ | 26.\" $P4: //depot/projects/trustedbsd/openbsm/libbsm/au_mask.3#3 $ |
27.\" 28.Dd April 19, 2005 29.Dt AU_MASK 3 30.Os 31.Sh NAME 32.Nm au_preselect , 33.Nm getauditflagsbin , 34.Nm getauditflagschar --- 69 unchanged lines hidden (view full) --- 104and 105.Fn getauditflagschar 106returns 0 on success, or -1 if there is a failure, in which case 107.Va errno 108will be set to indicate the error. 109.Sh IMPLEMENTATION NOTES 110.Fn au_preselect 111makes implicit use of various audit database routines, and may influence | 27.\" 28.Dd April 19, 2005 29.Dt AU_MASK 3 30.Os 31.Sh NAME 32.Nm au_preselect , 33.Nm getauditflagsbin , 34.Nm getauditflagschar --- 69 unchanged lines hidden (view full) --- 104and 105.Fn getauditflagschar 106returns 0 on success, or -1 if there is a failure, in which case 107.Va errno 108will be set to indicate the error. 109.Sh IMPLEMENTATION NOTES 110.Fn au_preselect 111makes implicit use of various audit database routines, and may influence |
112the behavior of simultaenous or interleaved processing of those databases by | 112the behavior of simultaneous or interleaved processing of those databases by |
113other code. 114.Sh SEE ALSO 115.Xr libbsm 3 , 116.Xr audit_class 5 117.Sh AUTHORS 118This software was created by Robert Watson, Wayne Salamon, and Suresh 119Krishnaswamy for McAfee Research, the security research division of McAfee, 120Inc., under contract to Apple Computer, Inc. --- 20 unchanged lines hidden --- | 113other code. 114.Sh SEE ALSO 115.Xr libbsm 3 , 116.Xr audit_class 5 117.Sh AUTHORS 118This software was created by Robert Watson, Wayne Salamon, and Suresh 119Krishnaswamy for McAfee Research, the security research division of McAfee, 120Inc., under contract to Apple Computer, Inc. --- 20 unchanged lines hidden --- |