/freebsd-11-stable/sys/bsm/ |
H A D | audit_record.h | 201 int au_write(int d, token_t *m); 204 int au_close_token(token_t *tok, u_char *buffer, size_t *buflen); 206 token_t *au_to_file(const char *file, struct timeval tm); 208 token_t *au_to_header32_tm(int rec_size, au_event_t e_type, au_emod_t e_mod, 210 token_t *au_to_header32_ex_tm(int rec_size, au_event_t e_type, au_emod_t e_mod, 212 token_t *au_to_header64_tm(int rec_size, au_event_t e_type, au_emod_t e_mod, 215 token_t *au_to_header(int rec_size, au_event_t e_type, au_emod_t e_mod); 216 token_t *au_to_header_ex(int rec_size, au_event_t e_type, au_emod_t e_mod); 217 token_t *au_to_header32(int rec_size, au_event_t e_type, au_emod_t e_mod); 218 token_t *au_to_header6 [all...] |
H A D | audit.h | 239 * Contents of token_t are opaque outside of libbsm. 241 typedef struct au_token token_t; typedef in typeref:struct:au_token
|
/freebsd-11-stable/contrib/openbsm/sys/bsm/ |
H A D | audit_record.h | 189 int au_write(int d, token_t *m); 192 int au_close_token(token_t *tok, u_char *buffer, size_t *buflen); 194 token_t *au_to_file(const char *file, struct timeval tm); 196 token_t *au_to_header32_tm(int rec_size, au_event_t e_type, au_emod_t e_mod, 198 token_t *au_to_header32_ex_tm(int rec_size, au_event_t e_type, au_emod_t e_mod, 200 token_t *au_to_header64_tm(int rec_size, au_event_t e_type, au_emod_t e_mod, 203 token_t *au_to_header(int rec_size, au_event_t e_type, au_emod_t e_mod); 204 token_t *au_to_header_ex(int rec_size, au_event_t e_type, au_emod_t e_mod); 205 token_t *au_to_header32(int rec_size, au_event_t e_type, au_emod_t e_mod); 206 token_t *au_to_header6 [all...] |
H A D | audit.h | 237 * Contents of token_t are opaque outside of libbsm. 239 typedef struct au_token token_t; typedef in typeref:struct:au_token
|
/freebsd-11-stable/sys/security/audit/ |
H A D | bsm_token.c | 61 t = malloc(sizeof(token_t), M_AUDITBSM, M_WAITOK); \ 73 token_t * 78 token_t *t; 98 token_t * 103 token_t *t; 125 token_t * 128 token_t *t; 147 token_t * 150 token_t *t; 169 token_t * [all...] |
H A D | audit_private.h | 380 token_t *kau_to_socket(struct socket_au_info *soi);
|
H A D | audit_bsm.c | 114 token_t *cur, *hdr, *trail;
|
/freebsd-11-stable/contrib/openbsm/libbsm/ |
H A D | bsm_token.c | 80 (t) = malloc(sizeof(token_t)); \ 99 token_t * 104 token_t *t; 125 token_t * 130 token_t *t; 153 token_t * 156 token_t *t; 177 token_t * 180 token_t *t; 201 token_t * [all...] |
H A D | bsm_audit.c | 73 * This call frees a token_t and its internal data. 76 au_free_token(token_t *tok) 175 au_write(int d, token_t *tok) 226 token_t *header, *tok, *trailer; 307 token_t *tok; 431 * au_close_token() returns the byte format of a token_t. This won't 436 au_close_token(token_t *tok, u_char *buffer, size_t *buflen)
|
H A D | bsm_wrappers.c | 63 token_t *token; 289 audit_write(short event_code, token_t *subject, token_t *misctok, char retval, 294 token_t *rettok; 351 audit_write_success(short event_code, token_t *tok, au_id_t auid, uid_t euid, 356 token_t *subject = NULL; 374 audit_write_success_self(short event_code, token_t *tok) 376 token_t *subject; 400 token_t *subject, *errtok; 429 token_t *subjec [all...] |
/freebsd-11-stable/contrib/openbsm/test/bsm/ |
H A D | generate.c | 95 write_token(const char *directory, const char *filename, token_t *tok) 113 write_record(const char *directory, const char *filename, token_t *tok, 138 token_t *file_token; 149 token_t *file_token; 166 token_t *trailer_token; 182 token_t *header32_token; 203 token_t *data_token; 215 token_t *data_token; 230 token_t *ipc_token; 241 token_t *ipc_toke [all...] |
/freebsd-11-stable/sbin/iscontrol/ |
H A D | iscontrol.h | 98 } token_t; typedef in typeref:struct:token 109 extern token_t AuthMethods[]; 110 extern token_t DigestMethods[]; 150 int lookup(token_t *tbl, char *m);
|
H A D | iscontrol.c | 68 token_t AuthMethods[] = { 78 token_t DigestMethods[] = { 129 lookup(token_t *tbl, char *m) 131 token_t *tp;
|
H A D | login.c | 76 selectFrom(char *str, token_t *list) 79 token_t *lp;
|
/freebsd-11-stable/usr.bin/login/ |
H A D | login_audit.c | 63 token_t *tok; 116 token_t *tok; 173 token_t *tok;
|
/freebsd-11-stable/contrib/openbsm/bsm/ |
H A D | libbsm.h | 948 * @summary - au_free_token() deallocates a token_t created by any of 951 * The BSM API generally manages deallocation of token_t objects. However, 952 * if au_write() is passed a bad audit descriptor, the token_t * parameter 954 * token_t using au_free_token() if desired. This is, in fact, what 958 * @param tok - A token_t * generated by one of the au_to_*() BSM API 964 void au_free_token(token_t *tok); 1040 * Note on memory management: audit_write() guarantees that the token_t *s 1043 * underlying BSM API in which token_t *s are usually but not always 1049 * @param subject - A token_t * generated by au_to_subject(), 1053 * @param misctok - A token_t * generate [all...] |
/freebsd-11-stable/contrib/openbsm/libauditd/ |
H A D | auditd_lib.c | 1002 token_t *tok;
|