Searched refs:auditstate (Results 1 – 5 of 5) sorted by relevance
/titanic_44/usr/src/cmd/uadmin/ |
H A D | uadmin.c | 379 int auditstate; in turnoff_auditd() local 382 if ((auditon(A_GETCOND, (caddr_t)&auditstate, in turnoff_auditd() 383 sizeof (auditstate)) == 0) && in turnoff_auditd() 384 (auditstate == AUC_AUDITING)) { in turnoff_auditd()
|
/titanic_44/usr/src/lib/pam_modules/unix_cred/ |
H A D | unix_cred.c | 260 int auditstate; in pam_sm_setcred() local 262 if (auditon(A_GETCOND, (caddr_t)&auditstate, in pam_sm_setcred() 263 sizeof (auditstate)) != 0) { in pam_sm_setcred() 264 auditstate = AUC_DISABLED; in pam_sm_setcred() 267 "pam_unix_cred: state = %d, auid = %d", auditstate, in pam_sm_setcred()
|
/titanic_44/usr/src/lib/libbsm/common/ |
H A D | adt.c | 93 static int auditstate = AUC_DISABLED; /* default state */ variable 154 (void) auditon(A_GETCOND, (caddr_t)&auditstate, sizeof (auditstate)); in adt_audit_enabled() 156 return (auditstate != AUC_DISABLED); in adt_audit_enabled() 171 (void) auditon(A_GETCOND, (caddr_t)&auditstate, sizeof (auditstate)); in adt_audit_state() 173 return ((auditstate & states) ? B_TRUE : B_FALSE); in adt_audit_state() 189 if (auditstate & AUC_DISABLED) { in adt_get_mask_from_user() 742 } else if (auditstate & (AUC_AUDITING | AUC_NOSPACE)) { in adt_get_hostIP() 857 if (auditstate & AUC_NOAUDIT) { in adt_load_hostname() 931 if (auditstate & AUC_NOAUDIT) { in adt_load_ttyname() 1412 state->as_audit_state = auditstate; in adt_init()
|
/titanic_44/usr/src/uts/common/syscall/ |
H A D | auditsys.c | 1061 int auditstate; in setcond() local 1069 if (copyin(data, &auditstate, sizeof (int))) in setcond() 1072 switch (auditstate) { in setcond()
|
/titanic_44/usr/src/uts/common/c2/ |
H A D | audit_event.c | 3063 int auditstate, policy; in aus_auditsys() local 3226 if (copyin((caddr_t)a2, &auditstate, sizeof (int))) in aus_auditsys() 3228 au_uwrite(au_to_arg32(3, "setcond", (uint32_t)auditstate)); in aus_auditsys()
|