The OpenNET Project / Index page

[ новости /+++ | форум | теги | ]

Интерактивная система просмотра системных руководств (man-ов)

 ТемаНаборКатегория 
 
 [Cписок руководств | Печать]

au_to_new_socket (3)
  • >> au_to_new_socket (3) ( Solaris man: Библиотечные вызовы )
  • 
    NAME
         au_to,  au_to_arg,  au_to_attr,  au_to_data,   au_to_groups,
         au_to_in_addr,   au_to_ipc,   au_to_ipc_perm,   au_to_iport,
         au_to_me,       au_to_new_in_addr,        au_to_new_process,
         au_to_new_socket,      au_to_new_subject,      au_to_opaque,
         au_to_path,   au_to_process,   au_to_return,   au_to_socket,
         au_to_subject, au_to_text - create audit record tokens
    
    SYNOPSIS
         cc [ flag ... ] file ... -lbsm -lsocket -lnsl -lintl [ library ... ]
         #include <sys/types.h>
         #include <sys/vnode.h>
         #include <netinet/in.h>
         #include <bsm/libbsm.h>
    
         token_t *au_to_arg(char n, char *text, u_long v);
    
         token_t *au_to_attr(struct vattr *attr);
    
         token_t *au_to_cmd(u_long argc, char **argv, char **envp);
    
         token_t *au_to_data(char unit_print,  char  unit_type,  char
         unit_count, char *p);
    
         token_t *au_to_groups(int *groups);
    
         token_t *au_to_in_addr(struct inaddr *internet_addr);
    
         token_t *au_to_new_in_addr(struct inaddr *internet_addr);
    
         token_t *au_to_iport(u_short_t iport);
    
         token_t *au_to_ipc(int id);
    
         token_t *au_to_ipc_perm(struct ipc_perm *perm);
    
         token_t *au_to_iport(u_short_t iport);
    
         token_t *au_to_me(void);
    
         token_t *au_to_newgroups(int n, int *groups);
    
         token_t *au_to_opaque(char *data, short bytes);
    
         token_t *au_to_path(char *path);
    
         token_t *au_to_process(au_id_t auid, uid_t euid, gid_t egid,
         uid_t  ruid,  gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t
         *tid);
    
         token_t *au_to_new_process(au_id_t auid, uid_t  euid,  gid_t
         egid,  uid_t  ruid,  gid_t  rgid,  pid_t pid, au_asid_t sid,
         au_tid_addr_t *tid);
    
         token_t *au_to_return(char number, uint_t value);
    
         token_t *au_to_socket(struct socket *so);
    
         token_t *au_to_new_socket(struct socket *so);
    
         token_t *au_to_subject(au_id_t auid, uid_t euid, gid_t egid,
         uid_t  ruid,  gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t
         *tid);
    
         token_t *au_to_new_subject(au_id_t auid, uid_t  euid,  gid_t
         egid,  uid_t  ruid,  gid_t  rgid,  pid_t pid, au_asid_t sid,
         au_tid_addr_t *tid);
    
         token_t *au_to_text(char *text);
    
    DESCRIPTION
         The au_to_arg() function formats  the  data  in  v  into  an
         ``argument  token.''  The  n argument indicates the argument
         number. The  text  argument  is  a  null  terminated  string
         describing the argument.
    
         The au_to_attr() function formats the  data  pointed  to  by
         attr into a ``vnode attribute token.''
    
         The au_to_data() function formats the data pointed to  by  p
         into  an  ``arbitrary data token.'' The unit_print parameter
         determines the preferred display base of the data and is one
         of   AUP_BINARY,   AUP_OCTAL,   AUP_DECIMAL,   AUP_HEX,   or
         AUP_STRING.
          The unit_type parameter defines the basic unit of data  and
         is  one  of  AUR_BYTE,   AUR_CHAR,  AUR_SHORT,  AUR_INT,  or
         AUR_LONG.  The unit_count parameter specifies the number  of
         basic data units to be used and must be positive.
    
         The au_to_groups() function formats the array of 16 integers
         pointed to by groups into a ``groups token.''
    
         The au_to_in_addr() function formats the data pointed to  by
         internet_addr into an ``internet address token.''
    
         The au_to_new_in_addr() function formats the data pointed to
         by   internet_addr  into  an ``internet address token.'' The
         internet_addr is one containing an IPv6 IP address.
    
         The au_to_ipc() function formats the data in the id  parame-
         ter into an ``interprocess communications ID token.''
    
         The au_to_ipc_perm() function formats the data pointed to by
         perm   into   an  ``interprocess  communications  permission
         token.''
    
         The au_to_iport() function formats the data  pointed  to  by
         iport into an ``ip port address token.''
    
         The au_to_me() function collects audit information from  the
         current  process and creates  a ``subject token'' by calling
         au_to_subject().
    
         The au_to_newgroups()  function  formats  the  array  of   n
         integers pointed to by groups into a ``newgroups token.''
    
         The au_to_subject() function formats  an  auid  (audit  user
         ID),  an  euid (effective user ID), an egid (effective group
         ID), a ruid (real user ID), an rgid (real group ID),  a  pid
         (process  ID), an sid (audit session ID), an tid (audit ter-
         minal ID), into a ``subject token.''
    
         The au_to_new_subject() function formats an auid (audit user
         ID),  an  euid (effective user ID), an egid (effective group
         ID), a ruid (real user ID), an rgid (real group ID),  a  pid
         (process  ID), an sid (audit session ID), an tid (audit ter-
         minal ID), into a ``subject token.'' The audit  terminal  ID
         is one that contains an IPv6 IP address.
    
         The au_to_opaque() function formats the bytes bytes  pointed
         to  by data into an ``opaque token.'' The value of size must
         be positive.
    
         The au_to_path() function formats the path name  pointed  to
         by path into a ``path token.''
    
         The au_to_process() function formats  an  auid  (audit  user
         ID),  an  euid (effective user ID), an egid (effective group
         ID), a ruid (real user ID), a rgid (real group  ID),  a  pid
         (process  ID),  an  sid (audit session ID), and a tid (audit
         terminal ID), into a ``process  token.''   A  process  token
         should  be  used when the process is the object of an action
         (ie. when the process is the receiver of a signal).
    
         The au_to_new_process() function formats an auid (audit user
         ID),  an  euid (effective user ID), an egid (effective group
         ID), a ruid (real user ID), a rgid (real group  ID),  a  pid
         (process  ID),  an  sid (audit session ID), and a tid (audit
         terminal ID), into a ``process  token.''   A  process  token
         should  be  used when the process is the object of an action
         (ie. when the process is the  receiver  of  a  signal).  The
         audit terminal ID is one that contains an IPv6 IP address.
    
         The au_to_return() function formats an error  number  number
         and a return value value into a ``return value token.''
    
         The au_to_socket() function format the data pointed to by so
         into a ``socket token.''
    
         The au_to_new_socket() function format the data  pointed  to
         by  so  into a ``socket token.'' The socket contains IPv6 IP
         addresses.
    
         The au_to_text() function formats the null-terminated string
         pointed to by text into a ``text token.''
    
    RETURN VALUES
         These functions return NULL if memory cannot be allocated to
         put the resultant token into, or if an error in the input is
         detected.
    
    ATTRIBUTES
         See attributes(5) for a description of the following  attri-
         butes:
    
         ____________________________________________________________
        |       ATTRIBUTE TYPE        |       ATTRIBUTE VALUE       |
        |_____________________________|_____________________________|
        | MT-Level                    | MT-Safe                     |
        |_____________________________|_____________________________|
    
    
    SEE ALSO
         bsmconv(1M), au_open(3BSM), attributes(5)
    
    NOTES
         The functionality described in this man  page  is  available
         only  if  the  Basic Security Module (BSM) has been enabled.
         See bsmconv(1M) for more information.
    
    
    
    


    Поиск по тексту MAN-ов: 




    Партнёры:
    PostgresPro
    Inferno Solutions
    Hosting by Hoster.ru
    Хостинг:

    Закладки на сайте
    Проследить за страницей
    Created 1996-2024 by Maxim Chirkov
    Добавить, Поддержать, Вебмастеру