Deleted Added
full compact
au_io.3 (155131) au_io.3 (168777)
1.\"-
2.\" Copyright (c) 2005 Robert N. M. Watson
3.\" All rights reserved.
4.\"
5.\" Redistribution and use in source and binary forms, with or without
6.\" modification, are permitted provided that the following conditions
7.\" are met:
8.\" 1. Redistributions of source code must retain the above copyright
9.\" notice, this list of conditions and the following disclaimer.
10.\" 2. Redistributions in binary form must reproduce the above copyright
11.\" notice, this list of conditions and the following disclaimer in the
12.\" documentation and/or other materials provided with the distribution.
1.\"-
2.\" Copyright (c) 2005 Robert N. M. Watson
3.\" All rights reserved.
4.\"
5.\" Redistribution and use in source and binary forms, with or without
6.\" modification, are permitted provided that the following conditions
7.\" are met:
8.\" 1. Redistributions of source code must retain the above copyright
9.\" notice, this list of conditions and the following disclaimer.
10.\" 2. Redistributions in binary form must reproduce the above copyright
11.\" notice, this list of conditions and the following disclaimer in the
12.\" documentation and/or other materials provided with the distribution.
13.\"
13.\"
14.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
15.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
16.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
17.\" ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
18.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
19.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
20.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
21.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
22.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
23.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
24.\" SUCH DAMAGE.
25.\"
14.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
15.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
16.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
17.\" ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
18.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
19.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
20.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
21.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
22.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
23.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
24.\" SUCH DAMAGE.
25.\"
26.\" $P4: //depot/projects/trustedbsd/openbsm/libbsm/au_io.3#2 $
26.\" $P4: //depot/projects/trustedbsd/openbsm/libbsm/au_io.3#5 $
27.\"
28.Dd April 19, 2005
29.Dt AU_IO 3
30.Os
31.Sh NAME
32.Nm au_fetch_tok ,
33.Nm au_print_tok ,
34.Nm au_read_rec
27.\"
28.Dd April 19, 2005
29.Dt AU_IO 3
30.Os
31.Sh NAME
32.Nm au_fetch_tok ,
33.Nm au_print_tok ,
34.Nm au_read_rec
35.Nd "Perform I/O involving an audit record"
35.Nd "perform I/O involving an audit record"
36.Sh LIBRARY
37.Lb libbsm
38.Sh SYNOPSIS
36.Sh LIBRARY
37.Lb libbsm
38.Sh SYNOPSIS
39.In libbsm.h
39.In bsm/libbsm.h
40.Ft int
41.Fn au_fetch_tok "tokenstr_t *tok" "u_char *buf" "int len"
42.Ft void
40.Ft int
41.Fn au_fetch_tok "tokenstr_t *tok" "u_char *buf" "int len"
42.Ft void
43.Fn au_print_tok "FILE outfp" "tokenstr_t *tok" "char *del" "char raw" "char sfrm"
43.Fo au_print_tok
44.Fa "FILE *outfp" "tokenstr_t *tok" "char *del" "char raw" "char sfrm"
45.Fc
44.Ft int
45.Fn au_read_rec "FILE *fp" "u_char **buf"
46.Sh DESCRIPTION
47These interfaces support input and output (I/O) involving audit records,
48internalizing an audit record from a byte stream, converting a token to
49either a raw or default string, and reading a single record from a file.
50.Pp
46.Ft int
47.Fn au_read_rec "FILE *fp" "u_char **buf"
48.Sh DESCRIPTION
49These interfaces support input and output (I/O) involving audit records,
50internalizing an audit record from a byte stream, converting a token to
51either a raw or default string, and reading a single record from a file.
52.Pp
53The
51.Fn au_fetch_tok
54.Fn au_fetch_tok
55function
52reads a token from the passed buffer
56reads a token from the passed buffer
53.Va buf
57.Fa buf
54of length
58of length
55.Va len
59.Fa len
56bytes, and returns a pointer to the token via
60bytes, and returns a pointer to the token via
57.Va tok .
61.Fa tok .
58.Pp
62.Pp
63The
59.Fn au_print_tok
64.Fn au_print_tok
65function
60prints a string form of the token
66prints a string form of the token
61.Va tok
67.Fa tok
62to the file output stream
68to the file output stream
63.Va outfp,
69.Fa outfp ,
64either in default mode, or raw mode if
70either in default mode, or raw mode if
65.Va raw
71.Fa raw
66is set non-zero.
67The delimiter
72is set non-zero.
73The delimiter
68.Va del
74.Fa del
69is used when printing.
70.Pp
75is used when printing.
76.Pp
77The
71.Fn au_read_rec
78.Fn au_read_rec
79function
72reads an audit record from the file stream
80reads an audit record from the file stream
73.Va fp ,
81.Fa fp ,
74and returns an allocated memory buffer containing the record via
82and returns an allocated memory buffer containing the record via
75.Va *buf ,
83.Fa *buf ,
76which must be freed by the caller using
77.Xr free 3 .
78.Pp
79A typical use of these routines might open a file with
80.Xr fopen 3 ,
81then read records from the file sequentially by calling
82.Fn au_read_rec .
83Each record would be broken down into components tokens through sequential

--- 4 unchanged lines hidden (view full) ---

88to print each token to an output stream such as
89.Dv stdout .
90On completion of the processing of each record, a call to
91.Xr free 3
92would be used to free the record buffer.
93Finally, the source stream would be closed by a call to
94.Xr fclose 3 .
95.Sh RETURN VALUES
84which must be freed by the caller using
85.Xr free 3 .
86.Pp
87A typical use of these routines might open a file with
88.Xr fopen 3 ,
89then read records from the file sequentially by calling
90.Fn au_read_rec .
91Each record would be broken down into components tokens through sequential

--- 4 unchanged lines hidden (view full) ---

96to print each token to an output stream such as
97.Dv stdout .
98On completion of the processing of each record, a call to
99.Xr free 3
100would be used to free the record buffer.
101Finally, the source stream would be closed by a call to
102.Xr fclose 3 .
103.Sh RETURN VALUES
104The
96.Fn au_fetch_tok
97and
98.Fn au_read_rec
105.Fn au_fetch_tok
106and
107.Fn au_read_rec
99return 0 on success, or -1 on failure along with additional error information
108functions
109return 0 on success, or \-1 on failure along with additional error information
100returned via
101.Va errno .
102.Sh SEE ALSO
103.Xr free 3 ,
104.Xr libbsm 3
110returned via
111.Va errno .
112.Sh SEE ALSO
113.Xr free 3 ,
114.Xr libbsm 3
105.Sh AUTHORS
106This software was created by Robert Watson, Wayne Salamon, and Suresh
107Krishnaswamy for McAfee Research, the security research division of McAfee,
108Inc., under contract to Apple Computer, Inc.
109.Pp
110The Basic Security Module (BSM) interface to audit records and audit event
111stream format were defined by Sun Microsystems.
112.Sh HISTORY
113The OpenBSM implementation was created by McAfee Research, the security
114division of McAfee Inc., under contract to Apple Computer, Inc., in 2004.
115It was subsequently adopted by the TrustedBSD Project as the foundation for
116the OpenBSM distribution.
115.Sh HISTORY
116The OpenBSM implementation was created by McAfee Research, the security
117division of McAfee Inc., under contract to Apple Computer, Inc., in 2004.
118It was subsequently adopted by the TrustedBSD Project as the foundation for
119the OpenBSM distribution.
120.Sh AUTHORS
121.An -nosplit
122This software was created by
123.An Robert Watson ,
124.An Wayne Salamon ,
125and
126.An Suresh Krishnaswamy
127for McAfee Research, the security research division of McAfee,
128Inc., under contract to Apple Computer, Inc.
129.Pp
130The Basic Security Module (BSM) interface to audit records and audit event
131stream format were defined by Sun Microsystems.
117.Sh BUGS
132.Sh BUGS
133The
118.Va errno
134.Va errno
135variable
119may not always be properly set in the event of an error.
136may not always be properly set in the event of an error.