/freebsd-12-stable/sys/bsm/ |
H A D | audit_record.h | 203 int au_write(int d, token_t *m); 206 int au_close_token(token_t *tok, u_char *buffer, size_t *buflen); 208 token_t *au_to_file(const char *file, struct timeval tm); 210 token_t *au_to_header32_tm(int rec_size, au_event_t e_type, au_emod_t e_mod, 212 token_t *au_to_header32_ex_tm(int rec_size, au_event_t e_type, au_emod_t e_mod, 214 token_t *au_to_header64_tm(int rec_size, au_event_t e_type, au_emod_t e_mod, 217 token_t *au_to_header(int rec_size, au_event_t e_type, au_emod_t e_mod); 218 token_t *au_to_header_ex(int rec_size, au_event_t e_type, au_emod_t e_mod); 219 token_t *au_to_header32(int rec_size, au_event_t e_type, au_emod_t e_mod); 220 token_t *au_to_header6 [all...] |
H A D | audit.h | 249 * Contents of token_t are opaque outside of libbsm. 251 typedef struct au_token token_t; typedef in typeref:struct:au_token
|
/freebsd-12-stable/contrib/openbsm/sys/bsm/ |
H A D | audit_record.h | 196 int au_write(int d, token_t *m); 199 int au_close_token(token_t *tok, u_char *buffer, size_t *buflen); 201 token_t *au_to_file(const char *file, struct timeval tm); 203 token_t *au_to_header32_tm(int rec_size, au_event_t e_type, au_emod_t e_mod, 205 token_t *au_to_header32_ex_tm(int rec_size, au_event_t e_type, au_emod_t e_mod, 207 token_t *au_to_header64_tm(int rec_size, au_event_t e_type, au_emod_t e_mod, 210 token_t *au_to_header(int rec_size, au_event_t e_type, au_emod_t e_mod); 211 token_t *au_to_header_ex(int rec_size, au_event_t e_type, au_emod_t e_mod); 212 token_t *au_to_header32(int rec_size, au_event_t e_type, au_emod_t e_mod); 213 token_t *au_to_header6 [all...] |
H A D | audit.h | 245 * Contents of token_t are opaque outside of libbsm. 247 typedef struct au_token token_t; typedef in typeref:struct:au_token
|
/freebsd-12-stable/sys/security/audit/ |
H A D | bsm_token.c | 63 t = malloc(sizeof(token_t), M_AUDITBSM, M_WAITOK); \ 75 token_t * 80 token_t *t; 100 token_t * 105 token_t *t; 127 token_t * 130 token_t *t; 149 token_t * 152 token_t *t; 171 token_t * [all...] |
H A D | audit_private.h | 450 token_t *kau_to_socket(struct socket_au_info *soi);
|
H A D | audit_bsm.c | 123 token_t *cur, *hdr, *trail;
|
/freebsd-12-stable/contrib/openbsm/libbsm/ |
H A D | bsm_token.c | 80 (t) = malloc(sizeof(token_t)); \ 99 token_t * 104 token_t *t; 125 token_t * 130 token_t *t; 153 token_t * 156 token_t *t; 177 token_t * 180 token_t *t; 201 token_t * [all...] |
H A D | bsm_audit.c | 73 * This call frees a token_t and its internal data. 76 au_free_token(token_t *tok) 175 au_write(int d, token_t *tok) 226 token_t *header, *tok, *trailer; 307 token_t *tok; 431 * au_close_token() returns the byte format of a token_t. This won't 436 au_close_token(token_t *tok, u_char *buffer, size_t *buflen)
|
H A D | bsm_wrappers.c | 69 token_t *token; 297 audit_write(short event_code, token_t *subject, token_t *misctok, char retval, 302 token_t *rettok; 359 audit_write_success(short event_code, token_t *tok, au_id_t auid, uid_t euid, 364 token_t *subject = NULL; 382 audit_write_success_self(short event_code, token_t *tok) 384 token_t *subject; 408 token_t *subject, *errtok; 437 token_t *subjec [all...] |
/freebsd-12-stable/contrib/openbsm/test/bsm/ |
H A D | generate.c | 95 write_token(const char *directory, const char *filename, token_t *tok) 113 write_record(const char *directory, const char *filename, token_t *tok, 138 token_t *file_token; 149 token_t *file_token; 166 token_t *trailer_token; 182 token_t *header32_token; 203 token_t *data_token; 215 token_t *data_token; 230 token_t *ipc_token; 241 token_t *ipc_toke [all...] |
/freebsd-12-stable/sbin/iscontrol/ |
H A D | iscontrol.h | 98 } token_t; typedef in typeref:struct:token 109 extern token_t AuthMethods[]; 110 extern token_t DigestMethods[]; 150 int lookup(token_t *tbl, char *m);
|
H A D | iscontrol.c | 68 token_t AuthMethods[] = { 78 token_t DigestMethods[] = { 129 lookup(token_t *tbl, char *m) 131 token_t *tp;
|
H A D | login.c | 76 selectFrom(char *str, token_t *list) 79 token_t *lp;
|
/freebsd-12-stable/usr.bin/login/ |
H A D | login_audit.c | 65 token_t *tok; 118 token_t *tok; 175 token_t *tok;
|
/freebsd-12-stable/contrib/openbsm/bsm/ |
H A D | libbsm.h | 952 * @summary - au_free_token() deallocates a token_t created by any of 955 * The BSM API generally manages deallocation of token_t objects. However, 956 * if au_write() is passed a bad audit descriptor, the token_t * parameter 958 * token_t using au_free_token() if desired. This is, in fact, what 962 * @param tok - A token_t * generated by one of the au_to_*() BSM API 968 void au_free_token(token_t *tok); 1044 * Note on memory management: audit_write() guarantees that the token_t *s 1047 * underlying BSM API in which token_t *s are usually but not always 1053 * @param subject - A token_t * generated by au_to_subject(), 1057 * @param misctok - A token_t * generate [all...] |
/freebsd-12-stable/contrib/openbsm/libauditd/ |
H A D | auditd_lib.c | 1056 token_t *tok;
|