Searched refs:auditon (Results 1 - 25 of 30) sorted by relevance

12

/illumos-gate/usr/src/lib/libbsm/common/
H A Dgetfaudflgs.c50 if (auditon(A_GETAMASK, (caddr_t)&masks, sizeof (masks)) == -1) {
H A Daudit_reboot.c81 (void) auditon(A_GETCOND, (caddr_t)&cond, sizeof (cond));
H A Dau_usermask.c81 if (auditon(A_GETAMASK, (caddr_t)mask, sizeof (*mask)) == -1) {
H A Daudit_halt.c96 (void) auditon(A_GETCOND, (caddr_t)&cond, sizeof (cond));
H A Dbsm.c90 auditon(int cmd, caddr_t data, int length) function
H A Dgeneric.c89 if (auditon(A_GETCOND, (caddr_t)&cond, sizeof (cond))) {
306 if (auditon(A_GETKMASK, (caddr_t)&mask, sizeof (mask)) != 0) {
382 if (auditon(A_GETPOLICY, (caddr_t)&policy, sizeof (policy))) {
H A Daudit_allocate.c109 if (auditon(A_GETPOLICY, (caddr_t)&policy, 0) < 0) {
H A Daudit_crontab.c285 if (auditon(A_GETPINFO_ADDR, (caddr_t)&info, sizeof (info)) != 0)
H A Dlibbsm.h188 extern int auditon(int, caddr_t, int);
H A Dadt.c85 * The only values returned by auditon(A_GETCOND) are:
133 * AUC_DISABLED since auditon returns ENOTSUP in that case. Any
134 * auditon error is considered the same as ENOTSUP for our
135 * purpose. auditstate is not changed by auditon if an error
154 (void) auditon(A_GETCOND, (caddr_t)&auditstate, sizeof (auditstate));
171 (void) auditon(A_GETCOND, (caddr_t)&auditstate, sizeof (auditstate));
213 } else if (auditon(A_GETKMASK, (caddr_t)mask, sizeof (*mask)) == -1) {
286 * to the kernel via auditon(), it must be squeezed into a 32
749 if (auditon(A_GETKAUDIT, (caddr_t)&audit_info,
1468 auditon(A_GETPOLIC
[all...]
H A Dau_open.c204 if (auditon(A_GETKAUDIT, (caddr_t)&audit_info,
H A Daudit_ftpd.c227 (void) auditon(A_GETKMASK, (caddr_t)&mask, sizeof (mask));
H A Daudit_rexd.c93 (void) auditon(A_GETKMASK, (caddr_t)&mask, sizeof (mask));
H A Daudit_rexecd.c65 (void) auditon(A_GETKMASK, (caddr_t)&mask, sizeof (mask));
H A Daudit_rshd.c182 (void) auditon(A_GETKMASK, (caddr_t)&mask, sizeof (mask));
/illumos-gate/usr/src/cmd/auditset/
H A Dsvc-auditset.c52 if (auditon(cmd, (caddr_t)&bmask, sizeof (bmask)) == -1) {
98 if (auditon(A_GETPOLICY, (caddr_t)&policy, 0) == -1) {
/illumos-gate/usr/src/cmd/auditd/
H A Dauditd.c37 * (AUDITD_FMRI/smf(5)) and the auditon system call.
115 static int auditing_set = 0; /* 1 if auditon(A_SETCOND, on... */
128 * err_exit() - exit function after the unsuccessful call to auditon();
161 (void) auditon(A_SETCOND, (caddr_t)&turn_audit_off,
218 if (auditon(A_SETCOND, (caddr_t)&turn_audit_on, sizeof (int)) !=
220 DPRINT((dbfp, "auditon(A_SETCOND...) failed (exit)\n"));
600 if (auditon(A_GETPOLICY, (char *)&policy, 0) == -1) {
601 DPRINT((dbfp, "auditon(A_GETPOLICY...) failed (exit)\n"));
613 if (auditon(A_GETCOND, (caddr_t)&acresult, sizeof (int)) != 0) {
614 DPRINT((dbfp, "auditon(A_GETCON
[all...]
/illumos-gate/usr/src/cmd/smserverd/
H A Dmyaudit.c68 if (auditon(A_GETCOND, (caddr_t)&cond, sizeof (cond))) {
83 if (auditon(A_GETPOLICY, (caddr_t)&policy, sizeof (policy))) {
132 ret_val = auditon(A_GETPINFO_ADDR, (caddr_t)&door_dp->audit_ap,
170 if (auditon(A_GETKMASK, (caddr_t)&mask, sizeof (mask)) != 0) {
/illumos-gate/usr/src/cmd/audit/
H A Daudit.c287 if (auditon(A_GETPOLICY, (char *)&policy, 0) == -1) {
379 * First check to see if c2audit is loaded via the auditon()
388 if (auditon(A_GETCOND, (caddr_t)&audit_state,
/illumos-gate/usr/src/cmd/uadmin/
H A Duadmin.c382 if ((auditon(A_GETCOND, (caddr_t)&auditstate,
438 while (retries-- && auditon(A_GETSTAT, (caddr_t)&au_stat, NULL) == 0) {
/illumos-gate/usr/src/cmd/auditstat/
H A Dauditstat.c171 if (auditon(cmd, data, length) == -1) {
172 perror("auditstat: auditon");
/illumos-gate/usr/src/boot/sys/sys/bsm/
H A Daudit.h96 * auditon(2) commands.
309 int auditon(int, void *, int);
/illumos-gate/usr/src/man/man2/
H A DMakefile39 auditon.2 \
/illumos-gate/usr/src/lib/libadt_jni/common/
H A Dadt_jni.c329 if (auditon(A_GETCOND, (caddr_t)&condition, sizeof (condition)))
/illumos-gate/usr/src/cmd/auditconfig/
H A Dauditconfig.c1009 if (auditon(A_GETCLASS, (caddr_t)&cmap, len) == -1) {
2175 if (auditon(cmd, data, length) == -1)
2176 exit_error(gettext("auditon(2) failed."));
2196 if (auditon(A_GETKAUDIT, (char *)ai, size) < 0)
2197 exit_error(gettext("auditon: A_GETKAUDIT failed."));
2203 if (auditon(A_SETKAUDIT, (char *)ai, size) < 0)
2204 exit_error(gettext("auditon: A_SETKAUDIT failed."));
2478 (void) auditon(A_GETPOLICY, (caddr_t)&curp, 0);

Completed in 119 milliseconds

12