/illumos-gate/usr/src/lib/libbsm/common/ |
H A D | audit_allocate.c | 137 (void) au_close(ad, 0, 0); 151 if (au_close(ad, 1, event) < 0) { 152 (void) au_close(ad, 0, 0);
|
H A D | audit_rexd.c | 243 (void) au_close(rd, 0, 0); 260 if (au_close(rd, 1, event) < 0) { 261 (void) au_close(rd, 0, 0); 360 (void) au_close(rd, 0, 0); 378 if (au_close(rd, 1, event) < 0) { 379 (void) au_close(rd, 0, 0);
|
H A D | audit_rexecd.c | 217 (void) au_close(rd, 0, 0); 232 if (au_close(rd, 1, event) < 0) { 233 (void) au_close(rd, 0, 0); 325 (void) au_close(rd, 0, 0); 339 if (au_close(rd, 1, event) < 0) { 340 (void) au_close(rd, 0, 0);
|
H A D | audit_ftpd.c | 207 if (au_close(rd, 1, AUE_ftpd) < 0) { 208 (void) au_close(rd, 0, 0); 298 if (au_close(rd, 1, AUE_ftpd_logout) < 0) { 299 (void) au_close(rd, 0, 0);
|
H A D | audit_rshd.c | 142 (void) au_close(rd, 0, 0); 168 if (au_close(rd, 1, rshd_event) < 0) { 169 (void) au_close(rd, 0, 0);
|
H A D | libbsm.h | 138 extern int au_close(int, int, au_event_t); 214 /* Flags for user-level audit routines: au_open, au_close, au_to_ */
|
H A D | generic.c | 452 if (au_close(ad, 1, aug_event) < 0) { 453 (void) au_close(ad, 0, 0);
|
H A D | au_open.c | 140 au_close(int d, int right, au_event_t e_type) function
|
H A D | adt_token.c | 86 * you're supposed to ignore; au_write and au_close return without 141 rc = au_close(event->ae_event_handle, AU_TO_WRITE, 144 adt_write_syslog("au_close failed", errno); 1068 * {AUT_HEADER, adt_to_header}, generated by au_close 1078 * {AUT_TRAILER, adt_to_trailer}, generated by au_close
|
/illumos-gate/usr/src/cmd/smserverd/ |
H A D | myaudit.c | 241 if (au_close(ad, 1, door_dp->audit_event) < 0) { 242 (void) au_close(ad, 0, 0);
|
/illumos-gate/usr/src/man/man3bsm/ |
H A D | Makefile | 33 MANLINKS= au_close.3bsm \ 89 au_close.3bsm := LINKSRC = au_open.3bsm
|
/illumos-gate/usr/src/uts/common/c2/ |
H A D | audit_event.c | 1998 au_close(kctx, &(u_ad), 0, 0, 0, NULL); 4177 au_close(kctx, &(u_ad), 0, 0, 0, NULL); 4223 au_close(kctx, &(u_ad), 0, 0, 0, NULL); 4379 au_close(kctx, &(u_ad), 0, 0, 0, NULL); 4424 au_close(kctx, &(u_ad), 0, 0, 0, NULL); 4569 au_close(kctx, &(u_ad), 0, 0, 0, NULL); 4615 au_close(kctx, &(u_ad), 0, 0, 0, NULL); 4765 au_close(kctx, &(u_ad), 0, 0, 0, NULL); 4810 au_close(kctx, &(u_ad), 0, 0, 0, NULL); 5464 au_close(kct [all...] |
H A D | audit.c | 636 au_close(kctx, &(u_ad), flag, tad->tad_event, tad->tad_evmod, NULL); 827 au_close(kctx, (caddr_t *)&(ad), AU_OK | AU_DEFER, 999 au_close(kctx, &(u_ad), flag | AU_DONTBLOCK, 2001 au_close(kctx, (caddr_t *)&ad, AU_OK, AUE_CRYPTOADM, tad->tad_evmod, 2074 au_close(kctx, (caddr_t *)&ad, AU_OK, AUE_CONFIGKSSL, tad->tad_evmod, 2207 au_close(kctx, (caddr_t *)&ad, flag, tad->tad_event, tad->tad_evmod,
|
H A D | audit_io.c | 104 au_close(au_kcontext_t *kctx, caddr_t *d, int flag, au_event_t e_type, function 195 * from both au_close() (for kernel audit) and from audit() (userland audit). 826 * Complete auditing of an async event. The AU_DONTBLOCK flag to au_close will 838 au_close(kctx, ad, AU_DONTBLOCK | AU_OK, aid, PAD_NONATTR|amod, e_time);
|
H A D | audit_start.c | 368 au_close(kctx, &(u_ad), flag, tad->tad_event, tad->tad_evmod,
|
H A D | audit_record.h | 245 * au_close flag arguments 305 void au_close(au_kcontext_t *, caddr_t *, int, au_event_t, au_emod_t,
|
/illumos-gate/usr/src/cmd/auditconfig/ |
H A D | auditconfig.c | 1204 if (au_close(rd, 1, evp->ae_number) == -1) {
|