NAME
au_to, au_to_arg, au_to_attr, au_to_data, au_to_groups,
au_to_in_addr, au_to_ipc, au_to_ipc_perm, au_to_iport,
au_to_me, au_to_new_in_addr, au_to_new_process,
au_to_new_socket, au_to_new_subject, au_to_opaque,
au_to_path, au_to_process, au_to_return, au_to_socket,
au_to_subject, au_to_text - create audit record tokens
SYNOPSIS
cc [ flag ... ] file ... -lbsm -lsocket -lnsl -lintl [ library ... ]
#include <sys/types.h>
#include <sys/vnode.h>
#include <netinet/in.h>
#include <bsm/libbsm.h>
token_t *au_to_arg(char n, char *text, u_long v);
token_t *au_to_attr(struct vattr *attr);
token_t *au_to_cmd(u_long argc, char **argv, char **envp);
token_t *au_to_data(char unit_print, char unit_type, char
unit_count, char *p);
token_t *au_to_groups(int *groups);
token_t *au_to_in_addr(struct inaddr *internet_addr);
token_t *au_to_new_in_addr(struct inaddr *internet_addr);
token_t *au_to_iport(u_short_t iport);
token_t *au_to_ipc(int id);
token_t *au_to_ipc_perm(struct ipc_perm *perm);
token_t *au_to_iport(u_short_t iport);
token_t *au_to_me(void);
token_t *au_to_newgroups(int n, int *groups);
token_t *au_to_opaque(char *data, short bytes);
token_t *au_to_path(char *path);
token_t *au_to_process(au_id_t auid, uid_t euid, gid_t egid,
uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t
*tid);
token_t *au_to_new_process(au_id_t auid, uid_t euid, gid_t
egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid,
au_tid_addr_t *tid);
token_t *au_to_return(char number, uint_t value);
token_t *au_to_socket(struct socket *so);
token_t *au_to_new_socket(struct socket *so);
token_t *au_to_subject(au_id_t auid, uid_t euid, gid_t egid,
uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t
*tid);
token_t *au_to_new_subject(au_id_t auid, uid_t euid, gid_t
egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid,
au_tid_addr_t *tid);
token_t *au_to_text(char *text);
DESCRIPTION
The au_to_arg() function formats the data in v into an
``argument token.'' The n argument indicates the argument
number. The text argument is a null terminated string
describing the argument.
The au_to_attr() function formats the data pointed to by
attr into a ``vnode attribute token.''
The au_to_data() function formats the data pointed to by p
into an ``arbitrary data token.'' The unit_print parameter
determines the preferred display base of the data and is one
of AUP_BINARY, AUP_OCTAL, AUP_DECIMAL, AUP_HEX, or
AUP_STRING.
The unit_type parameter defines the basic unit of data and
is one of AUR_BYTE, AUR_CHAR, AUR_SHORT, AUR_INT, or
AUR_LONG. The unit_count parameter specifies the number of
basic data units to be used and must be positive.
The au_to_groups() function formats the array of 16 integers
pointed to by groups into a ``groups token.''
The au_to_in_addr() function formats the data pointed to by
internet_addr into an ``internet address token.''
The au_to_new_in_addr() function formats the data pointed to
by internet_addr into an ``internet address token.'' The
internet_addr is one containing an IPv6 IP address.
The au_to_ipc() function formats the data in the id parame-
ter into an ``interprocess communications ID token.''
The au_to_ipc_perm() function formats the data pointed to by
perm into an ``interprocess communications permission
token.''
The au_to_iport() function formats the data pointed to by
iport into an ``ip port address token.''
The au_to_me() function collects audit information from the
current process and creates a ``subject token'' by calling
au_to_subject().
The au_to_newgroups() function formats the array of n
integers pointed to by groups into a ``newgroups token.''
The au_to_subject() function formats an auid (audit user
ID), an euid (effective user ID), an egid (effective group
ID), a ruid (real user ID), an rgid (real group ID), a pid
(process ID), an sid (audit session ID), an tid (audit ter-
minal ID), into a ``subject token.''
The au_to_new_subject() function formats an auid (audit user
ID), an euid (effective user ID), an egid (effective group
ID), a ruid (real user ID), an rgid (real group ID), a pid
(process ID), an sid (audit session ID), an tid (audit ter-
minal ID), into a ``subject token.'' The audit terminal ID
is one that contains an IPv6 IP address.
The au_to_opaque() function formats the bytes bytes pointed
to by data into an ``opaque token.'' The value of size must
be positive.
The au_to_path() function formats the path name pointed to
by path into a ``path token.''
The au_to_process() function formats an auid (audit user
ID), an euid (effective user ID), an egid (effective group
ID), a ruid (real user ID), a rgid (real group ID), a pid
(process ID), an sid (audit session ID), and a tid (audit
terminal ID), into a ``process token.'' A process token
should be used when the process is the object of an action
(ie. when the process is the receiver of a signal).
The au_to_new_process() function formats an auid (audit user
ID), an euid (effective user ID), an egid (effective group
ID), a ruid (real user ID), a rgid (real group ID), a pid
(process ID), an sid (audit session ID), and a tid (audit
terminal ID), into a ``process token.'' A process token
should be used when the process is the object of an action
(ie. when the process is the receiver of a signal). The
audit terminal ID is one that contains an IPv6 IP address.
The au_to_return() function formats an error number number
and a return value value into a ``return value token.''
The au_to_socket() function format the data pointed to by so
into a ``socket token.''
The au_to_new_socket() function format the data pointed to
by so into a ``socket token.'' The socket contains IPv6 IP
addresses.
The au_to_text() function formats the null-terminated string
pointed to by text into a ``text token.''
RETURN VALUES
These functions return NULL if memory cannot be allocated to
put the resultant token into, or if an error in the input is
detected.
ATTRIBUTES
See attributes(5) for a description of the following attri-
butes:
____________________________________________________________
| ATTRIBUTE TYPE | ATTRIBUTE VALUE |
|_____________________________|_____________________________|
| MT-Level | MT-Safe |
|_____________________________|_____________________________|
SEE ALSO
bsmconv(1M), au_open(3BSM), attributes(5)
NOTES
The functionality described in this man page is available
only if the Basic Security Module (BSM) has been enabled.
See bsmconv(1M) for more information.
|
Закладки на сайте Проследить за страницей |
Created 1996-2025 by Maxim Chirkov Добавить, Поддержать, Вебмастеру |