aboutsummaryrefslogtreecommitdiff
path: root/sys/security
diff options
context:
space:
mode:
authorRobert Watson <rwatson@FreeBSD.org>2006-08-26 08:17:58 +0000
committerRobert Watson <rwatson@FreeBSD.org>2006-08-26 08:17:58 +0000
commit1c4d2797dd88fe53db1eafa4a358a096caeefcf8 (patch)
treeac1900c782723514580e177d7a0ee77286c2115b /sys/security
parent98c38adbfdebce054f9a000691e3c3b91a0892ca (diff)
downloadsrc-1c4d2797dd88fe53db1eafa4a358a096caeefcf8.tar.gz
src-1c4d2797dd88fe53db1eafa4a358a096caeefcf8.zip
Update kernel OpenBSM parts, especially src/sys/bsm, for the OpenBSM
1.0 alpha 9 import. See the OpenBSM import commit message for a detailed summary of changes. Obtained from: TrustedBSD Project
Notes
Notes: svn path=/head/; revision=161635
Diffstat (limited to 'sys/security')
-rw-r--r--sys/security/audit/audit_bsm.c2
-rw-r--r--sys/security/audit/audit_bsm_token.c5
2 files changed, 4 insertions, 3 deletions
diff --git a/sys/security/audit/audit_bsm.c b/sys/security/audit/audit_bsm.c
index 8252b9358d33..9beb68e39e94 100644
--- a/sys/security/audit/audit_bsm.c
+++ b/sys/security/audit/audit_bsm.c
@@ -118,7 +118,7 @@ kau_close(struct au_record *rec, struct timespec *ctime, short event)
token_t *cur, *hdr, *trail;
struct timeval tm;
- tot_rec_size = rec->len + BSM_HEADER_SIZE + BSM_TRAILER_SIZE;
+ tot_rec_size = rec->len + AUDIT_HEADER_SIZE + AUDIT_TRAILER_SIZE;
if (tot_rec_size <= MAX_AUDIT_RECORD_SIZE) {
/* Create the header token */
tm.tv_usec = ctime->tv_nsec / 1000;
diff --git a/sys/security/audit/audit_bsm_token.c b/sys/security/audit/audit_bsm_token.c
index fb40fcd9bf3c..7b9abe5c688c 100644
--- a/sys/security/audit/audit_bsm_token.c
+++ b/sys/security/audit/audit_bsm_token.c
@@ -30,6 +30,7 @@
* IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
* POSSIBILITY OF SUCH DAMAGE.
*
+ * $P4: //depot/projects/trustedbsd/audit3/sys/security/audit/audit_bsm_token.c#23 $
* $FreeBSD$
*/
@@ -269,7 +270,7 @@ token_t *
au_to_groups(int *groups)
{
- return (au_to_newgroups(BSM_MAX_GROUPS, groups));
+ return (au_to_newgroups(AUDIT_MAX_GROUPS, groups));
}
/*
@@ -1113,7 +1114,7 @@ au_to_header32_tm(int rec_size, au_event_t e_type, au_emod_t e_mod,
ADD_U_CHAR(dptr, AUT_HEADER32);
ADD_U_INT32(dptr, rec_size);
- ADD_U_CHAR(dptr, HEADER_VERSION);
+ ADD_U_CHAR(dptr, AUDIT_HEADER_VERSION_OPENBSM);
ADD_U_INT16(dptr, e_type);
ADD_U_INT16(dptr, e_mod);