2 .\" Copyright (c) 2005-2006 Robert N. M. Watson
3 .\" All rights reserved.
5 .\" Redistribution and use in source and binary forms, with or without
6 .\" modification, are permitted provided that the following conditions
8 .\" 1. Redistributions of source code must retain the above copyright
9 .\" notice, this list of conditions and the following disclaimer.
10 .\" 2. Redistributions in binary form must reproduce the above copyright
11 .\" notice, this list of conditions and the following disclaimer in the
12 .\" documentation and/or other materials provided with the distribution.
14 .\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
15 .\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
16 .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
17 .\" ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
18 .\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
19 .\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
20 .\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
21 .\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
22 .\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
23 .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
38 .Nd "look up information from the audit_user database"
47 .Ft "struct au_user_ent *"
49 .Ft "struct au_user_ent *"
50 .Fn getauuserent_r "struct au_user_ent *u"
51 .Ft "struct au_user_ent *"
52 .Fn getauusernam "const char *name"
53 .Ft "struct au_user_ent *"
54 .Fn getauusernam_r "struct au_user_ent *u" "const char *name"
56 .Fn au_user_mask "char *username" "au_mask_t *mask_p"
59 .Fa "au_mask_t *usremask" "au_mask_t *usrdmask" "au_mask_t *lastmask"
62 These interfaces may be used to look up information from the
64 database, which describes per-user audit configuration.
65 Audit user entries are described by a
67 which stores the user's name in
69 events to always audit in
71 and events never to audit
77 returns the next user found in the
79 database, or the first if the function has not yet been called.
81 will be returned if no further records are available.
86 looks up a user by name.
88 will be returned if no matching class can be found.
93 resets the iterator through the
95 database, causing the next call to
97 to start again from the beginning of the file.
109 calculates a new session audit mask to be returned via
111 for the user identified by
113 If the user audit configuration is not found, the default system audit
114 properties returned by
117 The resulting mask may be set via a call to
123 function generates a new process audit state by combining the audit masks
124 passed as parameters with the system audit masks.
131 The OpenBSM implementation was created by McAfee Research, the security
132 division of McAfee Inc., under contract to Apple Computer, Inc., in 2004.
133 It was subsequently adopted by the TrustedBSD Project as the foundation for
134 the OpenBSM distribution.
137 This software was created by
141 .An Suresh Krishnaswamy
142 for McAfee Research, the security research division of McAfee,
143 Inc., under contract to Apple Computer, Inc.
145 The Basic Security Module (BSM) interface to audit records and audit event
146 stream format were defined by Sun Microsystems.
148 These routines cannot currently distinguish between an entry not being found
149 and an error accessing the database.
150 The implementation should be changed to return an error via