/macosx-10.9.5/sudo-72/src/ |
H A D | bsm_audit.c | 74 au_id_t auid; local 96 if (getauid(&auid) < 0) 101 tok = au_to_subject_ex(auid, geteuid(), getegid(), getuid(), 109 tok = au_to_subject(auid, geteuid(), getegid(), getuid(), 136 au_id_t auid; local 153 if (getauid(&auid) < 0) 158 tok = au_to_subject_ex(auid, geteuid(), getegid(), getuid(), 163 tok = au_to_subject(auid, geteuid(), getegid(), getuid(),
|
/macosx-10.9.5/Security-55471.14.18/include/security_utilities/ |
H A D | ccaudit.h | 92 void create(uint64_t flags, uid_t auid = AU_DEFAUDITID); 140 AuditSession(au_id_t auid, au_asid_t sid) argument 141 : mAuditId(auid), mSessionId(sid) { } 147 void auditId(au_id_t auid) { mAuditId = auid; } argument
|
H A D | ccaudit.cpp | 83 void AuditInfo::create(uint64_t flags, uid_t auid /* = AU_DEFAUDITID */) 86 ai_auid = auid;
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_utilities/lib/ |
H A D | ccaudit.h | 92 void create(uint64_t flags, uid_t auid = AU_DEFAUDITID); 140 AuditSession(au_id_t auid, au_asid_t sid) argument 141 : mAuditId(auid), mSessionId(sid) { } 147 void auditId(au_id_t auid) { mAuditId = auid; } argument
|
H A D | ccaudit.cpp | 83 void AuditInfo::create(uint64_t flags, uid_t auid /* = AU_DEFAUDITID */) 86 ai_auid = auid;
|
/macosx-10.9.5/xnu-2422.115.4/bsd/bsm/ |
H A D | audit_record.h | 236 token_t *au_to_process(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 238 token_t *au_to_process32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 240 token_t *au_to_process64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 242 token_t *au_to_process_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 244 token_t *au_to_process32_ex(au_id_t auid, uid_t euid, gid_t egid, 247 token_t *au_to_process64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 259 token_t *au_to_subject(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 261 token_t *au_to_subject32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 263 token_t *au_to_subject64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 265 token_t *au_to_subject_ex(au_id_t auid, uid_ [all...] |
/macosx-10.9.5/Security-55471.14.18/authd/ |
H A D | authtypes.h | 10 uid_t auid; member in struct:__anon3486
|
H A D | agent.c | 133 LOGV("agent[%i]: Stored auid %d fetched auid %d", agent->agentPid, audit_info->auid, tempAddr.ai_auid); 134 uid_t auid = tempAddr.ai_auid; local 142 if ((int32_t)auid != -1) { 144 xpc_connection_set_target_uid(agent->agentStubConnection, auid);
|
H A D | ccaudit.c | 143 token_t * token = au_to_subject32(ccaudit->auditInfo.auid, ccaudit->auditInfo.euid, ccaudit->auditInfo.egid,
|
H A D | server.c | 273 audit_token_to_au32(*token, &info->auid, &info->euid,
|
/macosx-10.9.5/xnu-2422.115.4/bsd/security/audit/ |
H A D | audit.c | 447 au_id_t auid; local 507 auid = ar->k_ar.ar_subj_auid; 525 if (audit_pipe_preselect(auid, event, class, sorf, 580 au_id_t auid; local 609 auid = cred->cr_audit.as_aia_p->ai_auid; 610 if (auid == AU_DEFAUDITID) 648 } else if (audit_pipe_preselect(auid, event, class, AU_PRS_BOTH, 0)) { 710 au_id_t auid; local 727 auid = cred->cr_audit.as_aia_p->ai_auid; 733 if (auid 785 au_id_t auid; local [all...] |
H A D | audit_pipe.c | 85 * and optionally expressing per-auid masks. The following data structure is 86 * the per-auid mask description. The global state is stored in the audit 90 * usage patterns for per-auid specifications are clear. 152 * interest specifications by auid. 266 * Find an audit pipe preselection specification for an auid, if any. 269 audit_pipe_preselect_find(struct audit_pipe *ap, au_id_t auid) argument 276 if (app->app_auid == auid) 283 * Query the per-pipe mask for a specific auid. 286 audit_pipe_preselect_get(struct audit_pipe *ap, au_id_t auid, argument 293 app = audit_pipe_preselect_find(ap, auid); 308 audit_pipe_preselect_set(struct audit_pipe *ap, au_id_t auid, au_mask_t mask) argument 335 audit_pipe_preselect_delete(struct audit_pipe *ap, au_id_t auid) argument 389 audit_pipe_preselect_check(struct audit_pipe *ap, au_id_t auid, au_event_t event, au_class_t class, int sorf, int trail_preselect) argument 426 audit_pipe_preselect(au_id_t auid, au_event_t event, au_class_t class, int sorf, int trail_preselect) argument 507 audit_pipe_submit(au_id_t auid, au_event_t event, au_class_t class, int sorf, int trail_select, void *record, u_int record_len) argument 761 au_id_t auid; local [all...] |
H A D | audit_bsm_token.c | 590 au_to_process32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument 599 ADD_U_INT32(dptr, auid); 613 au_to_process64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument 623 ADD_U_INT32(dptr, auid); 637 au_to_process(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument 641 return (au_to_process32(auid, euid, egid, ruid, rgid, pid, sid, 660 au_to_process32_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, argument 676 ADD_U_INT32(dptr, auid); 694 au_to_process64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, argument 713 ADD_U_INT32(dptr, auid); 733 au_to_process_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument 961 au_to_subject32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument 984 au_to_subject64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument 1008 au_to_subject(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument 1031 au_to_subject32_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument 1065 au_to_subject64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument 1102 au_to_subject_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument [all...] |
H A D | audit_worker.c | 322 au_id_t auid; local 360 auid = ar->k_ar.ar_subj_auid; 390 audit_pipe_submit(auid, event, class, sorf, 400 audit_sdev_submit(auid, ar->k_ar.ar_subj_asid, bsm->data,
|
H A D | audit.h | 217 void audit_arg_auid(struct kaudit_record *ar, uid_t auid); 269 void audit_sdev_submit(au_id_t auid, au_asid_t asid, void *record,
|
H A D | audit_private.h | 425 int audit_pipe_preselect(au_id_t auid, au_event_t event, 427 void audit_pipe_submit(au_id_t auid, au_event_t event, au_class_t class,
|
H A D | audit_syscalls.c | 757 error = copyout((void *)&id, uap->auid, sizeof(id)); 773 error = copyin(uap->auid, &id, sizeof(id)); 776 AUDIT_ARG(auid, id);
|
H A D | audit_arg.c | 394 audit_arg_auid(struct kaudit_record *ar, uid_t auid) argument 397 ar->k_ar.ar_arg_auid = auid;
|
H A D | audit_session.c | 586 * ruid, rgid, egid, pid, auid, asid, amask, and term_addr 1562 audit_sdev_submit(__unused au_id_t auid, __unused au_asid_t asid, void *record, argument 1583 if ((/* XXXss auid == asdev->asdev_auid && */
|
/macosx-10.9.5/shell_cmds-175/su/ |
H A D | su.c | 186 au_id_t auid; local 247 if (getauid(&auid) < 0 && errno != ENOSYS) { 254 if (audit_submit(AUE_su, auid, 288 if (audit_submit(AUE_su, auid, EPERM, 1, 329 if (audit_submit(AUE_su, auid, EPERM, 1, "bad su %s to %s on %s", 338 if (audit_submit(AUE_su, auid, 0, 0, "successful authentication")) 350 if (audit_submit(AUE_su, auid, EPERM, 1, 366 if (audit_submit(AUE_su, auid, EPERM, 1, 377 if (audit_submit(AUE_su, auid, EPERM, 1, "pam_acct_mgmt: %s", 393 if (audit_submit(AUE_su, auid, EPER [all...] |
/macosx-10.9.5/xnu-2422.115.4/security/ |
H A D | mac_audit.c | 131 mac_proc_check_setauid(struct proc *curp, uid_t auid) argument 141 MAC_CHECK(proc_check_setauid, cred, auid); 356 mac_proc_check_setauid(__unused struct proc *curp, __unused uid_t auid) argument
|
H A D | mac_framework.h | 355 int mac_proc_check_setauid(proc_t proc, uid_t auid);
|
H A D | mac_policy.h | 3287 @param auid Audit user ID 3298 uid_t auid
|
/macosx-10.9.5/eap8021x-180/EAP8021X.fproj/ |
H A D | eapfast_plugin.c | 109 AuthorityIDDataGetType(const AuthorityIDDataRef auid) argument 111 return (net_uint16_get(auid->auid_type)); 115 AuthorityIDDataGetLength(const AuthorityIDDataRef auid) argument 117 return (net_uint16_get(auid->auid_length)); 729 const void * auid, uint16_t auid_length, 759 || memcmp(auid, CFDataGetBytePtr(this_auid), auid_length) != 0) { 827 pac_dict_copy(const void * auid, uint16_t auid_length, argument 838 i = pac_list_find_pac(pac_list, auid, auid_length, 1078 CFDataRef auid; local 1086 auid 728 pac_list_find_pac(CFArrayRef pac_list, const void * auid, uint16_t auid_length, const uint8_t * initiator, int initiator_length) argument 1161 const void * auid; local 1685 const void * auid = NULL; local 1784 const void * auid; local 3669 AuthorityIDDataRef auid = (AuthorityIDDataRef)data_ptr; local [all...] |
/macosx-10.9.5/Libnotify-121.20.1/notifyd/ |
H A D | notify_proc.c | 1120 uid_t auid = (uid_t)-1; local 1122 *status = server_preflight(name, nameCnt, audit, -1, &auid, NULL, NULL, NULL); 1130 if (auid != 0)
|