/illumos-gate/usr/src/lib/libbsm/common/ |
H A D | getfaudflgs.c | 50 if (auditon(A_GETAMASK, (caddr_t)&masks, sizeof (masks)) == -1) {
|
H A D | audit_reboot.c | 81 (void) auditon(A_GETCOND, (caddr_t)&cond, sizeof (cond));
|
H A D | au_usermask.c | 81 if (auditon(A_GETAMASK, (caddr_t)mask, sizeof (*mask)) == -1) {
|
H A D | audit_halt.c | 96 (void) auditon(A_GETCOND, (caddr_t)&cond, sizeof (cond));
|
H A D | bsm.c | 90 auditon(int cmd, caddr_t data, int length) function
|
H A D | generic.c | 89 if (auditon(A_GETCOND, (caddr_t)&cond, sizeof (cond))) { 306 if (auditon(A_GETKMASK, (caddr_t)&mask, sizeof (mask)) != 0) { 382 if (auditon(A_GETPOLICY, (caddr_t)&policy, sizeof (policy))) {
|
H A D | audit_allocate.c | 109 if (auditon(A_GETPOLICY, (caddr_t)&policy, 0) < 0) {
|
H A D | audit_crontab.c | 285 if (auditon(A_GETPINFO_ADDR, (caddr_t)&info, sizeof (info)) != 0)
|
H A D | libbsm.h | 188 extern int auditon(int, caddr_t, int);
|
H A D | adt.c | 85 * The only values returned by auditon(A_GETCOND) are: 133 * AUC_DISABLED since auditon returns ENOTSUP in that case. Any 134 * auditon error is considered the same as ENOTSUP for our 135 * purpose. auditstate is not changed by auditon if an error 154 (void) auditon(A_GETCOND, (caddr_t)&auditstate, sizeof (auditstate)); 171 (void) auditon(A_GETCOND, (caddr_t)&auditstate, sizeof (auditstate)); 213 } else if (auditon(A_GETKMASK, (caddr_t)mask, sizeof (*mask)) == -1) { 286 * to the kernel via auditon(), it must be squeezed into a 32 749 if (auditon(A_GETKAUDIT, (caddr_t)&audit_info, 1468 auditon(A_GETPOLIC [all...] |
H A D | au_open.c | 204 if (auditon(A_GETKAUDIT, (caddr_t)&audit_info,
|
H A D | audit_ftpd.c | 227 (void) auditon(A_GETKMASK, (caddr_t)&mask, sizeof (mask));
|
H A D | audit_rexd.c | 93 (void) auditon(A_GETKMASK, (caddr_t)&mask, sizeof (mask));
|
H A D | audit_rexecd.c | 65 (void) auditon(A_GETKMASK, (caddr_t)&mask, sizeof (mask));
|
H A D | audit_rshd.c | 182 (void) auditon(A_GETKMASK, (caddr_t)&mask, sizeof (mask));
|
/illumos-gate/usr/src/cmd/auditset/ |
H A D | svc-auditset.c | 52 if (auditon(cmd, (caddr_t)&bmask, sizeof (bmask)) == -1) { 98 if (auditon(A_GETPOLICY, (caddr_t)&policy, 0) == -1) {
|
/illumos-gate/usr/src/cmd/auditd/ |
H A D | auditd.c | 37 * (AUDITD_FMRI/smf(5)) and the auditon system call. 115 static int auditing_set = 0; /* 1 if auditon(A_SETCOND, on... */ 128 * err_exit() - exit function after the unsuccessful call to auditon(); 161 (void) auditon(A_SETCOND, (caddr_t)&turn_audit_off, 218 if (auditon(A_SETCOND, (caddr_t)&turn_audit_on, sizeof (int)) != 220 DPRINT((dbfp, "auditon(A_SETCOND...) failed (exit)\n")); 600 if (auditon(A_GETPOLICY, (char *)&policy, 0) == -1) { 601 DPRINT((dbfp, "auditon(A_GETPOLICY...) failed (exit)\n")); 613 if (auditon(A_GETCOND, (caddr_t)&acresult, sizeof (int)) != 0) { 614 DPRINT((dbfp, "auditon(A_GETCON [all...] |
/illumos-gate/usr/src/cmd/smserverd/ |
H A D | myaudit.c | 68 if (auditon(A_GETCOND, (caddr_t)&cond, sizeof (cond))) { 83 if (auditon(A_GETPOLICY, (caddr_t)&policy, sizeof (policy))) { 132 ret_val = auditon(A_GETPINFO_ADDR, (caddr_t)&door_dp->audit_ap, 170 if (auditon(A_GETKMASK, (caddr_t)&mask, sizeof (mask)) != 0) {
|
/illumos-gate/usr/src/cmd/audit/ |
H A D | audit.c | 287 if (auditon(A_GETPOLICY, (char *)&policy, 0) == -1) { 379 * First check to see if c2audit is loaded via the auditon() 388 if (auditon(A_GETCOND, (caddr_t)&audit_state,
|
/illumos-gate/usr/src/cmd/uadmin/ |
H A D | uadmin.c | 382 if ((auditon(A_GETCOND, (caddr_t)&auditstate, 438 while (retries-- && auditon(A_GETSTAT, (caddr_t)&au_stat, NULL) == 0) {
|
/illumos-gate/usr/src/cmd/auditstat/ |
H A D | auditstat.c | 171 if (auditon(cmd, data, length) == -1) { 172 perror("auditstat: auditon");
|
/illumos-gate/usr/src/boot/sys/sys/bsm/ |
H A D | audit.h | 96 * auditon(2) commands. 309 int auditon(int, void *, int);
|
/illumos-gate/usr/src/man/man2/ |
H A D | Makefile | 39 auditon.2 \
|
/illumos-gate/usr/src/lib/libadt_jni/common/ |
H A D | adt_jni.c | 329 if (auditon(A_GETCOND, (caddr_t)&condition, sizeof (condition)))
|
/illumos-gate/usr/src/cmd/auditconfig/ |
H A D | auditconfig.c | 1009 if (auditon(A_GETCLASS, (caddr_t)&cmap, len) == -1) { 2175 if (auditon(cmd, data, length) == -1) 2176 exit_error(gettext("auditon(2) failed.")); 2196 if (auditon(A_GETKAUDIT, (char *)ai, size) < 0) 2197 exit_error(gettext("auditon: A_GETKAUDIT failed.")); 2203 if (auditon(A_SETKAUDIT, (char *)ai, size) < 0) 2204 exit_error(gettext("auditon: A_SETKAUDIT failed.")); 2478 (void) auditon(A_GETPOLICY, (caddr_t)&curp, 0);
|