audit.log.5 (155364) | audit.log.5 (159985) |
---|---|
1.\"- 2.\" Copyright (c) 2005 Robert N. M. Watson 3.\" All rights reserved. 4.\" 5.\" Redistribution and use in source and binary forms, with or without 6.\" modification, are permitted provided that the following conditions 7.\" are met: 8.\" 1. Redistributions of source code must retain the above copyright --- 9 unchanged lines hidden (view full) --- 18.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 19.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 20.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 21.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 22.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 23.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 24.\" SUCH DAMAGE. 25.\" | 1.\"- 2.\" Copyright (c) 2005 Robert N. M. Watson 3.\" All rights reserved. 4.\" 5.\" Redistribution and use in source and binary forms, with or without 6.\" modification, are permitted provided that the following conditions 7.\" are met: 8.\" 1. Redistributions of source code must retain the above copyright --- 9 unchanged lines hidden (view full) --- 18.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 19.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 20.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 21.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 22.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 23.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 24.\" SUCH DAMAGE. 25.\" |
26.\" $P4: //depot/projects/trustedbsd/openbsm/man/audit.log.5#8 $ | 26.\" $P4: //depot/projects/trustedbsd/openbsm/man/audit.log.5#9 $ |
27.\" 28.Dd May 1, 2005 29.Dt AUDIT.LOG 5 30.Os 31.Sh NAME 32.Nm audit 33.Nd "Basic Security Module (BSM) File Format" 34.Sh DESCRIPTION --- 178 unchanged lines hidden (view full) --- 213.It Li "Type of Service" Ta "1 byte" Ta "IP TOS field" 214.It Li "Length" Ta "2 bytes" Ta "IP packet length in network byte order" 215.It Li "ID" Ta "2 bytes" Ta "IP header ID for reassembly" 216.It Li "Offset" Ta "2 bytes" Ta "IP fragment offset and flags, network byte order" 217.It Li "TTL" Ta "1 byte" Ta "IP Time-to-Live" 218.It Li "Protocol" Ta "1 byte" Ta "IP protocol number" 219.It Li "Checksum" Ta "2 bytes" Ta "IP header checksum, network byte order" 220.It Li "Source Address" Ta "4 bytes" Ta "IPv4 source address" | 27.\" 28.Dd May 1, 2005 29.Dt AUDIT.LOG 5 30.Os 31.Sh NAME 32.Nm audit 33.Nd "Basic Security Module (BSM) File Format" 34.Sh DESCRIPTION --- 178 unchanged lines hidden (view full) --- 213.It Li "Type of Service" Ta "1 byte" Ta "IP TOS field" 214.It Li "Length" Ta "2 bytes" Ta "IP packet length in network byte order" 215.It Li "ID" Ta "2 bytes" Ta "IP header ID for reassembly" 216.It Li "Offset" Ta "2 bytes" Ta "IP fragment offset and flags, network byte order" 217.It Li "TTL" Ta "1 byte" Ta "IP Time-to-Live" 218.It Li "Protocol" Ta "1 byte" Ta "IP protocol number" 219.It Li "Checksum" Ta "2 bytes" Ta "IP header checksum, network byte order" 220.It Li "Source Address" Ta "4 bytes" Ta "IPv4 source address" |
221.It Li "Desintation Address" Ta "4 bytes" Ta "IPv4 destination address" | 221.It Li "Destination Address" Ta "4 bytes" Ta "IPv4 destination address" |
222.El 223.Ss Expanded ip Token 224The 225.Dv expanded ip 226token ... 227.Bl -column -offset ind ".Sy Field Name Width XX" ".Sy XX Bytes XXXX" ".Sy Description" 228.It Sy "Field" Ta Sy Bytes Ta Sy Description 229.It Li "Token ID" Ta "1 byte" Ta "Token ID" --- 396 unchanged lines hidden --- | 222.El 223.Ss Expanded ip Token 224The 225.Dv expanded ip 226token ... 227.Bl -column -offset ind ".Sy Field Name Width XX" ".Sy XX Bytes XXXX" ".Sy Description" 228.It Sy "Field" Ta Sy Bytes Ta Sy Description 229.It Li "Token ID" Ta "1 byte" Ta "Token ID" --- 396 unchanged lines hidden --- |