NAME au_to, au_to_arg, au_to_attr, au_to_data, au_to_groups, au_to_in_addr, au_to_ipc, au_to_ipc_perm, au_to_iport, au_to_me, au_to_new_in_addr, au_to_new_process, au_to_new_socket, au_to_new_subject, au_to_opaque, au_to_path, au_to_process, au_to_return, au_to_socket, au_to_subject, au_to_text - create audit record tokens SYNOPSIS cc [ flag ... ] file ... -lbsm -lsocket -lnsl -lintl [ library ... ] #include <sys/types.h> #include <sys/vnode.h> #include <netinet/in.h> #include <bsm/libbsm.h> token_t *au_to_arg(char n, char *text, u_long v); token_t *au_to_attr(struct vattr *attr); token_t *au_to_cmd(u_long argc, char **argv, char **envp); token_t *au_to_data(char unit_print, char unit_type, char unit_count, char *p); token_t *au_to_groups(int *groups); token_t *au_to_in_addr(struct inaddr *internet_addr); token_t *au_to_new_in_addr(struct inaddr *internet_addr); token_t *au_to_iport(u_short_t iport); token_t *au_to_ipc(int id); token_t *au_to_ipc_perm(struct ipc_perm *perm); token_t *au_to_iport(u_short_t iport); token_t *au_to_me(void); token_t *au_to_newgroups(int n, int *groups); token_t *au_to_opaque(char *data, short bytes); token_t *au_to_path(char *path); token_t *au_to_process(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid); token_t *au_to_new_process(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid); token_t *au_to_return(char number, uint_t value); token_t *au_to_socket(struct socket *so); token_t *au_to_new_socket(struct socket *so); token_t *au_to_subject(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid); token_t *au_to_new_subject(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid); token_t *au_to_text(char *text); DESCRIPTION The au_to_arg() function formats the data in v into an ``argument token.'' The n argument indicates the argument number. The text argument is a null terminated string describing the argument. The au_to_attr() function formats the data pointed to by attr into a ``vnode attribute token.'' The au_to_data() function formats the data pointed to by p into an ``arbitrary data token.'' The unit_print parameter determines the preferred display base of the data and is one of AUP_BINARY, AUP_OCTAL, AUP_DECIMAL, AUP_HEX, or AUP_STRING. The unit_type parameter defines the basic unit of data and is one of AUR_BYTE, AUR_CHAR, AUR_SHORT, AUR_INT, or AUR_LONG. The unit_count parameter specifies the number of basic data units to be used and must be positive. The au_to_groups() function formats the array of 16 integers pointed to by groups into a ``groups token.'' The au_to_in_addr() function formats the data pointed to by internet_addr into an ``internet address token.'' The au_to_new_in_addr() function formats the data pointed to by internet_addr into an ``internet address token.'' The internet_addr is one containing an IPv6 IP address. The au_to_ipc() function formats the data in the id parame- ter into an ``interprocess communications ID token.'' The au_to_ipc_perm() function formats the data pointed to by perm into an ``interprocess communications permission token.'' The au_to_iport() function formats the data pointed to by iport into an ``ip port address token.'' The au_to_me() function collects audit information from the current process and creates a ``subject token'' by calling au_to_subject(). The au_to_newgroups() function formats the array of n integers pointed to by groups into a ``newgroups token.'' The au_to_subject() function formats an auid (audit user ID), an euid (effective user ID), an egid (effective group ID), a ruid (real user ID), an rgid (real group ID), a pid (process ID), an sid (audit session ID), an tid (audit ter- minal ID), into a ``subject token.'' The au_to_new_subject() function formats an auid (audit user ID), an euid (effective user ID), an egid (effective group ID), a ruid (real user ID), an rgid (real group ID), a pid (process ID), an sid (audit session ID), an tid (audit ter- minal ID), into a ``subject token.'' The audit terminal ID is one that contains an IPv6 IP address. The au_to_opaque() function formats the bytes bytes pointed to by data into an ``opaque token.'' The value of size must be positive. The au_to_path() function formats the path name pointed to by path into a ``path token.'' The au_to_process() function formats an auid (audit user ID), an euid (effective user ID), an egid (effective group ID), a ruid (real user ID), a rgid (real group ID), a pid (process ID), an sid (audit session ID), and a tid (audit terminal ID), into a ``process token.'' A process token should be used when the process is the object of an action (ie. when the process is the receiver of a signal). The au_to_new_process() function formats an auid (audit user ID), an euid (effective user ID), an egid (effective group ID), a ruid (real user ID), a rgid (real group ID), a pid (process ID), an sid (audit session ID), and a tid (audit terminal ID), into a ``process token.'' A process token should be used when the process is the object of an action (ie. when the process is the receiver of a signal). The audit terminal ID is one that contains an IPv6 IP address. The au_to_return() function formats an error number number and a return value value into a ``return value token.'' The au_to_socket() function format the data pointed to by so into a ``socket token.'' The au_to_new_socket() function format the data pointed to by so into a ``socket token.'' The socket contains IPv6 IP addresses. The au_to_text() function formats the null-terminated string pointed to by text into a ``text token.'' RETURN VALUES These functions return NULL if memory cannot be allocated to put the resultant token into, or if an error in the input is detected. ATTRIBUTES See attributes(5) for a description of the following attri- butes: ____________________________________________________________ | ATTRIBUTE TYPE | ATTRIBUTE VALUE | |_____________________________|_____________________________| | MT-Level | MT-Safe | |_____________________________|_____________________________| SEE ALSO bsmconv(1M), au_open(3BSM), attributes(5) NOTES The functionality described in this man page is available only if the Basic Security Module (BSM) has been enabled. See bsmconv(1M) for more information.
Закладки на сайте Проследить за страницей |
Created 1996-2024 by Maxim Chirkov Добавить, Поддержать, Вебмастеру |