Deleted Added
full compact
audit.log.5 (155364) audit.log.5 (159985)
1.\"-
2.\" Copyright (c) 2005 Robert N. M. Watson
3.\" All rights reserved.
4.\"
5.\" Redistribution and use in source and binary forms, with or without
6.\" modification, are permitted provided that the following conditions
7.\" are met:
8.\" 1. Redistributions of source code must retain the above copyright

--- 9 unchanged lines hidden (view full) ---

18.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
19.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
20.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
21.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
22.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
23.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
24.\" SUCH DAMAGE.
25.\"
1.\"-
2.\" Copyright (c) 2005 Robert N. M. Watson
3.\" All rights reserved.
4.\"
5.\" Redistribution and use in source and binary forms, with or without
6.\" modification, are permitted provided that the following conditions
7.\" are met:
8.\" 1. Redistributions of source code must retain the above copyright

--- 9 unchanged lines hidden (view full) ---

18.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
19.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
20.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
21.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
22.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
23.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
24.\" SUCH DAMAGE.
25.\"
26.\" $P4: //depot/projects/trustedbsd/openbsm/man/audit.log.5#8 $
26.\" $P4: //depot/projects/trustedbsd/openbsm/man/audit.log.5#9 $
27.\"
28.Dd May 1, 2005
29.Dt AUDIT.LOG 5
30.Os
31.Sh NAME
32.Nm audit
33.Nd "Basic Security Module (BSM) File Format"
34.Sh DESCRIPTION

--- 178 unchanged lines hidden (view full) ---

213.It Li "Type of Service" Ta "1 byte" Ta "IP TOS field"
214.It Li "Length" Ta "2 bytes" Ta "IP packet length in network byte order"
215.It Li "ID" Ta "2 bytes" Ta "IP header ID for reassembly"
216.It Li "Offset" Ta "2 bytes" Ta "IP fragment offset and flags, network byte order"
217.It Li "TTL" Ta "1 byte" Ta "IP Time-to-Live"
218.It Li "Protocol" Ta "1 byte" Ta "IP protocol number"
219.It Li "Checksum" Ta "2 bytes" Ta "IP header checksum, network byte order"
220.It Li "Source Address" Ta "4 bytes" Ta "IPv4 source address"
27.\"
28.Dd May 1, 2005
29.Dt AUDIT.LOG 5
30.Os
31.Sh NAME
32.Nm audit
33.Nd "Basic Security Module (BSM) File Format"
34.Sh DESCRIPTION

--- 178 unchanged lines hidden (view full) ---

213.It Li "Type of Service" Ta "1 byte" Ta "IP TOS field"
214.It Li "Length" Ta "2 bytes" Ta "IP packet length in network byte order"
215.It Li "ID" Ta "2 bytes" Ta "IP header ID for reassembly"
216.It Li "Offset" Ta "2 bytes" Ta "IP fragment offset and flags, network byte order"
217.It Li "TTL" Ta "1 byte" Ta "IP Time-to-Live"
218.It Li "Protocol" Ta "1 byte" Ta "IP protocol number"
219.It Li "Checksum" Ta "2 bytes" Ta "IP header checksum, network byte order"
220.It Li "Source Address" Ta "4 bytes" Ta "IPv4 source address"
221.It Li "Desintation Address" Ta "4 bytes" Ta "IPv4 destination address"
221.It Li "Destination Address" Ta "4 bytes" Ta "IPv4 destination address"
222.El
223.Ss Expanded ip Token
224The
225.Dv expanded ip
226token ...
227.Bl -column -offset ind ".Sy Field Name Width XX" ".Sy XX Bytes XXXX" ".Sy Description"
228.It Sy "Field" Ta Sy Bytes Ta Sy Description
229.It Li "Token ID" Ta "1 byte" Ta "Token ID"

--- 396 unchanged lines hidden ---
222.El
223.Ss Expanded ip Token
224The
225.Dv expanded ip
226token ...
227.Bl -column -offset ind ".Sy Field Name Width XX" ".Sy XX Bytes XXXX" ".Sy Description"
228.It Sy "Field" Ta Sy Bytes Ta Sy Description
229.It Li "Token ID" Ta "1 byte" Ta "Token ID"

--- 396 unchanged lines hidden ---