Home
last modified time | relevance | path

Searched refs:auditstate (Results 1 – 5 of 5) sorted by relevance

/titanic_44/usr/src/cmd/uadmin/
H A Duadmin.c379 int auditstate; in turnoff_auditd() local
382 if ((auditon(A_GETCOND, (caddr_t)&auditstate, in turnoff_auditd()
383 sizeof (auditstate)) == 0) && in turnoff_auditd()
384 (auditstate == AUC_AUDITING)) { in turnoff_auditd()
/titanic_44/usr/src/lib/pam_modules/unix_cred/
H A Dunix_cred.c260 int auditstate; in pam_sm_setcred() local
262 if (auditon(A_GETCOND, (caddr_t)&auditstate, in pam_sm_setcred()
263 sizeof (auditstate)) != 0) { in pam_sm_setcred()
264 auditstate = AUC_DISABLED; in pam_sm_setcred()
267 "pam_unix_cred: state = %d, auid = %d", auditstate, in pam_sm_setcred()
/titanic_44/usr/src/lib/libbsm/common/
H A Dadt.c93 static int auditstate = AUC_DISABLED; /* default state */ variable
154 (void) auditon(A_GETCOND, (caddr_t)&auditstate, sizeof (auditstate)); in adt_audit_enabled()
156 return (auditstate != AUC_DISABLED); in adt_audit_enabled()
171 (void) auditon(A_GETCOND, (caddr_t)&auditstate, sizeof (auditstate)); in adt_audit_state()
173 return ((auditstate & states) ? B_TRUE : B_FALSE); in adt_audit_state()
189 if (auditstate & AUC_DISABLED) { in adt_get_mask_from_user()
742 } else if (auditstate & (AUC_AUDITING | AUC_NOSPACE)) { in adt_get_hostIP()
857 if (auditstate & AUC_NOAUDIT) { in adt_load_hostname()
931 if (auditstate & AUC_NOAUDIT) { in adt_load_ttyname()
1412 state->as_audit_state = auditstate; in adt_init()
/titanic_44/usr/src/uts/common/syscall/
H A Dauditsys.c1061 int auditstate; in setcond() local
1069 if (copyin(data, &auditstate, sizeof (int))) in setcond()
1072 switch (auditstate) { in setcond()
/titanic_44/usr/src/uts/common/c2/
H A Daudit_event.c3063 int auditstate, policy; in aus_auditsys() local
3226 if (copyin((caddr_t)a2, &auditstate, sizeof (int))) in aus_auditsys()
3228 au_uwrite(au_to_arg32(3, "setcond", (uint32_t)auditstate)); in aus_auditsys()