Searched refs:audit_write (Results 1 - 3 of 3) sorted by relevance
/freebsd-10.1-release/sys/security/audit/ |
H A D | audit_trigger.c | 124 audit_write(struct cdev *dev, struct uio *uio, int ioflag) function 156 .d_write = audit_write,
|
/freebsd-10.1-release/contrib/openbsm/libbsm/ |
H A D | bsm_wrappers.c | 291 audit_write(short event_code, token_t *subject, token_t *misctok, char retval, function 295 char *func = "audit_write()"; 349 * Same caveats as audit_write(). In addition, this function explicitly 368 return (audit_write(event_code, subject, tok, 0, 0)); 372 * Same caveats as audit_write(). In addition, this function explicitly 386 return (audit_write(event_code, subject, tok, 0, 0)); 390 * Same caveats as audit_write(). In addition, this function explicitly 417 return (audit_write(event_code, subject, errtok, -1, errcode)); 421 * Same caveats as audit_write(). In addition, this function explicitly 443 return (audit_write(event_cod [all...] |
/freebsd-10.1-release/contrib/openbsm/bsm/ |
H A D | libbsm.h | 923 * Error return codes for audit_set_terminal_id(), audit_write() and its 972 * audit_write() does, in keeping with the existing memory management model 1049 * audit_write() 1051 * @summary - audit_write() is the basis for the other audit_write_*() 1057 * Note on memory management: audit_write() guarantees that the token_t *s 1086 int audit_write(short event_code, token_t *subject, token_t *misctok, 1095 * from the information passed in and uses that to invoke audit_write(). 1161 * from the information passed in and uses that to invoke audit_write().
|
Completed in 68 milliseconds