summaryrefslogtreecommitdiffstats
path: root/contrib/openbsm/man
diff options
context:
space:
mode:
authorrwatson <rwatson@FreeBSD.org>2008-11-12 23:48:20 +0000
committerrwatson <rwatson@FreeBSD.org>2008-11-12 23:48:20 +0000
commit2bd138f9edd4a43ef97291f03523af35e1ae18f8 (patch)
treee103f4f6bb4ebb161c9702d64560b216d1990d94 /contrib/openbsm/man
parent280c17909566cfd4eff091c2747edb9d747f7343 (diff)
downloadFreeBSD-src-2bd138f9edd4a43ef97291f03523af35e1ae18f8.zip
FreeBSD-src-2bd138f9edd4a43ef97291f03523af35e1ae18f8.tar.gz
Flatten OpenBSM vendor tree in preparation for new OpenBSM vendor
import.
Diffstat (limited to 'contrib/openbsm/man')
-rw-r--r--contrib/openbsm/man/Makefile22
-rw-r--r--contrib/openbsm/man/Makefile.am24
-rw-r--r--contrib/openbsm/man/Makefile.in448
-rw-r--r--contrib/openbsm/man/audit.2104
-rw-r--r--contrib/openbsm/man/audit.log.5682
-rw-r--r--contrib/openbsm/man/audit_class.580
-rw-r--r--contrib/openbsm/man/audit_control.5209
-rw-r--r--contrib/openbsm/man/audit_event.584
-rw-r--r--contrib/openbsm/man/audit_user.5120
-rw-r--r--contrib/openbsm/man/audit_warn.576
-rw-r--r--contrib/openbsm/man/auditctl.279
-rw-r--r--contrib/openbsm/man/auditon.2344
-rw-r--r--contrib/openbsm/man/getaudit.285
-rw-r--r--contrib/openbsm/man/getauid.277
-rw-r--r--contrib/openbsm/man/setaudit.285
-rw-r--r--contrib/openbsm/man/setauid.277
16 files changed, 0 insertions, 2596 deletions
diff --git a/contrib/openbsm/man/Makefile b/contrib/openbsm/man/Makefile
deleted file mode 100644
index 1fbbc31..0000000
--- a/contrib/openbsm/man/Makefile
+++ /dev/null
@@ -1,22 +0,0 @@
-#
-# $P4: //depot/projects/trustedbsd/openbsm/man/Makefile#7 $
-#
-
-MAN= audit.2 \
- auditctl.2 \
- auditon.2 \
- getaudit.2 \
- getauid.2 \
- setaudit.2 \
- setauid.2 \
- audit.log.5 \
- audit_class.5 \
- audit_control.5 \
- audit_event.5 \
- audit_user.5 \
- audit_warn.5
-
-MLINKS= getaudit.2 getaudit_addr.2 \
- setaudit.2 setaudit_addr.2
-
-.include <bsd.prog.mk>
diff --git a/contrib/openbsm/man/Makefile.am b/contrib/openbsm/man/Makefile.am
deleted file mode 100644
index e65a68c..0000000
--- a/contrib/openbsm/man/Makefile.am
+++ /dev/null
@@ -1,24 +0,0 @@
-#
-# $P4: //depot/projects/trustedbsd/openbsm/man/Makefile.am#1 $
-#
-
-man2_MANS = \
- audit.2 \
- auditctl.2 \
- auditon.2 \
- getaudit.2 \
- getauid.2 \
- setaudit.2 \
- setauid.2
-
-man5_MANS = \
- audit.log.5 \
- audit_class.5 \
- audit_control.5 \
- audit_event.5 \
- audit_user.5 \
- audit_warn.5
-
-# How to do MLINKS in automake?
-# MLINKS= getaudit.2 getaudit_addr.2 \
-# setaudit.2 setaudit_addr.2
diff --git a/contrib/openbsm/man/Makefile.in b/contrib/openbsm/man/Makefile.in
deleted file mode 100644
index 13a0d76..0000000
--- a/contrib/openbsm/man/Makefile.in
+++ /dev/null
@@ -1,448 +0,0 @@
-# Makefile.in generated by automake 1.10 from Makefile.am.
-# @configure_input@
-
-# Copyright (C) 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2001, 2002,
-# 2003, 2004, 2005, 2006 Free Software Foundation, Inc.
-# This Makefile.in is free software; the Free Software Foundation
-# gives unlimited permission to copy and/or distribute it,
-# with or without modifications, as long as this notice is preserved.
-
-# This program is distributed in the hope that it will be useful,
-# but WITHOUT ANY WARRANTY, to the extent permitted by law; without
-# even the implied warranty of MERCHANTABILITY or FITNESS FOR A
-# PARTICULAR PURPOSE.
-
-@SET_MAKE@
-
-#
-# $P4: //depot/projects/trustedbsd/openbsm/man/Makefile.in#4 $
-#
-VPATH = @srcdir@
-pkgdatadir = $(datadir)/@PACKAGE@
-pkglibdir = $(libdir)/@PACKAGE@
-pkgincludedir = $(includedir)/@PACKAGE@
-am__cd = CDPATH="$${ZSH_VERSION+.}$(PATH_SEPARATOR)" && cd
-install_sh_DATA = $(install_sh) -c -m 644
-install_sh_PROGRAM = $(install_sh) -c
-install_sh_SCRIPT = $(install_sh) -c
-INSTALL_HEADER = $(INSTALL_DATA)
-transform = $(program_transform_name)
-NORMAL_INSTALL = :
-PRE_INSTALL = :
-POST_INSTALL = :
-NORMAL_UNINSTALL = :
-PRE_UNINSTALL = :
-POST_UNINSTALL = :
-build_triplet = @build@
-host_triplet = @host@
-subdir = man
-DIST_COMMON = $(srcdir)/Makefile.am $(srcdir)/Makefile.in
-ACLOCAL_M4 = $(top_srcdir)/aclocal.m4
-am__aclocal_m4_deps = $(top_srcdir)/configure.ac
-am__configure_deps = $(am__aclocal_m4_deps) $(CONFIGURE_DEPENDENCIES) \
- $(ACLOCAL_M4)
-mkinstalldirs = $(install_sh) -d
-CONFIG_HEADER = $(top_builddir)/config/config.h
-CONFIG_CLEAN_FILES =
-SOURCES =
-DIST_SOURCES =
-man2dir = $(mandir)/man2
-am__installdirs = "$(DESTDIR)$(man2dir)" "$(DESTDIR)$(man5dir)"
-man5dir = $(mandir)/man5
-NROFF = nroff
-MANS = $(man2_MANS) $(man5_MANS)
-DISTFILES = $(DIST_COMMON) $(DIST_SOURCES) $(TEXINFOS) $(EXTRA_DIST)
-ACLOCAL = @ACLOCAL@
-AMTAR = @AMTAR@
-AR = @AR@
-AUTOCONF = @AUTOCONF@
-AUTOHEADER = @AUTOHEADER@
-AUTOMAKE = @AUTOMAKE@
-AWK = @AWK@
-CC = @CC@
-CCDEPMODE = @CCDEPMODE@
-CFLAGS = @CFLAGS@
-CPP = @CPP@
-CPPFLAGS = @CPPFLAGS@
-CXX = @CXX@
-CXXCPP = @CXXCPP@
-CXXDEPMODE = @CXXDEPMODE@
-CXXFLAGS = @CXXFLAGS@
-CYGPATH_W = @CYGPATH_W@
-DEFS = @DEFS@
-DEPDIR = @DEPDIR@
-ECHO = @ECHO@
-ECHO_C = @ECHO_C@
-ECHO_N = @ECHO_N@
-ECHO_T = @ECHO_T@
-EGREP = @EGREP@
-EXEEXT = @EXEEXT@
-F77 = @F77@
-FFLAGS = @FFLAGS@
-GREP = @GREP@
-INSTALL = @INSTALL@
-INSTALL_DATA = @INSTALL_DATA@
-INSTALL_PROGRAM = @INSTALL_PROGRAM@
-INSTALL_SCRIPT = @INSTALL_SCRIPT@
-INSTALL_STRIP_PROGRAM = @INSTALL_STRIP_PROGRAM@
-LDFLAGS = @LDFLAGS@
-LIBOBJS = @LIBOBJS@
-LIBS = @LIBS@
-LIBTOOL = @LIBTOOL@
-LN_S = @LN_S@
-LTLIBOBJS = @LTLIBOBJS@
-MAINT = @MAINT@
-MAKEINFO = @MAKEINFO@
-MKDIR_P = @MKDIR_P@
-OBJEXT = @OBJEXT@
-PACKAGE = @PACKAGE@
-PACKAGE_BUGREPORT = @PACKAGE_BUGREPORT@
-PACKAGE_NAME = @PACKAGE_NAME@
-PACKAGE_STRING = @PACKAGE_STRING@
-PACKAGE_TARNAME = @PACKAGE_TARNAME@
-PACKAGE_VERSION = @PACKAGE_VERSION@
-PATH_SEPARATOR = @PATH_SEPARATOR@
-RANLIB = @RANLIB@
-SED = @SED@
-SET_MAKE = @SET_MAKE@
-SHELL = @SHELL@
-STRIP = @STRIP@
-VERSION = @VERSION@
-abs_builddir = @abs_builddir@
-abs_srcdir = @abs_srcdir@
-abs_top_builddir = @abs_top_builddir@
-abs_top_srcdir = @abs_top_srcdir@
-ac_ct_CC = @ac_ct_CC@
-ac_ct_CXX = @ac_ct_CXX@
-ac_ct_F77 = @ac_ct_F77@
-am__include = @am__include@
-am__leading_dot = @am__leading_dot@
-am__quote = @am__quote@
-am__tar = @am__tar@
-am__untar = @am__untar@
-bindir = @bindir@
-build = @build@
-build_alias = @build_alias@
-build_cpu = @build_cpu@
-build_os = @build_os@
-build_vendor = @build_vendor@
-builddir = @builddir@
-datadir = @datadir@
-datarootdir = @datarootdir@
-docdir = @docdir@
-dvidir = @dvidir@
-exec_prefix = @exec_prefix@
-host = @host@
-host_alias = @host_alias@
-host_cpu = @host_cpu@
-host_os = @host_os@
-host_vendor = @host_vendor@
-htmldir = @htmldir@
-includedir = @includedir@
-infodir = @infodir@
-install_sh = @install_sh@
-libdir = @libdir@
-libexecdir = @libexecdir@
-localedir = @localedir@
-localstatedir = @localstatedir@
-mandir = @mandir@
-mkdir_p = @mkdir_p@
-oldincludedir = @oldincludedir@
-pdfdir = @pdfdir@
-prefix = @prefix@
-program_transform_name = @program_transform_name@
-psdir = @psdir@
-sbindir = @sbindir@
-sharedstatedir = @sharedstatedir@
-srcdir = @srcdir@
-sysconfdir = @sysconfdir@
-target_alias = @target_alias@
-top_builddir = @top_builddir@
-top_srcdir = @top_srcdir@
-man2_MANS = \
- audit.2 \
- auditctl.2 \
- auditon.2 \
- getaudit.2 \
- getauid.2 \
- setaudit.2 \
- setauid.2
-
-man5_MANS = \
- audit.log.5 \
- audit_class.5 \
- audit_control.5 \
- audit_event.5 \
- audit_user.5 \
- audit_warn.5
-
-all: all-am
-
-.SUFFIXES:
-$(srcdir)/Makefile.in: @MAINTAINER_MODE_TRUE@ $(srcdir)/Makefile.am $(am__configure_deps)
- @for dep in $?; do \
- case '$(am__configure_deps)' in \
- *$$dep*) \
- cd $(top_builddir) && $(MAKE) $(AM_MAKEFLAGS) am--refresh \
- && exit 0; \
- exit 1;; \
- esac; \
- done; \
- echo ' cd $(top_srcdir) && $(AUTOMAKE) --foreign man/Makefile'; \
- cd $(top_srcdir) && \
- $(AUTOMAKE) --foreign man/Makefile
-.PRECIOUS: Makefile
-Makefile: $(srcdir)/Makefile.in $(top_builddir)/config.status
- @case '$?' in \
- *config.status*) \
- cd $(top_builddir) && $(MAKE) $(AM_MAKEFLAGS) am--refresh;; \
- *) \
- echo ' cd $(top_builddir) && $(SHELL) ./config.status $(subdir)/$@ $(am__depfiles_maybe)'; \
- cd $(top_builddir) && $(SHELL) ./config.status $(subdir)/$@ $(am__depfiles_maybe);; \
- esac;
-
-$(top_builddir)/config.status: $(top_srcdir)/configure $(CONFIG_STATUS_DEPENDENCIES)
- cd $(top_builddir) && $(MAKE) $(AM_MAKEFLAGS) am--refresh
-
-$(top_srcdir)/configure: @MAINTAINER_MODE_TRUE@ $(am__configure_deps)
- cd $(top_builddir) && $(MAKE) $(AM_MAKEFLAGS) am--refresh
-$(ACLOCAL_M4): @MAINTAINER_MODE_TRUE@ $(am__aclocal_m4_deps)
- cd $(top_builddir) && $(MAKE) $(AM_MAKEFLAGS) am--refresh
-
-mostlyclean-libtool:
- -rm -f *.lo
-
-clean-libtool:
- -rm -rf .libs _libs
-install-man2: $(man2_MANS) $(man_MANS)
- @$(NORMAL_INSTALL)
- test -z "$(man2dir)" || $(MKDIR_P) "$(DESTDIR)$(man2dir)"
- @list='$(man2_MANS) $(dist_man2_MANS) $(nodist_man2_MANS)'; \
- l2='$(man_MANS) $(dist_man_MANS) $(nodist_man_MANS)'; \
- for i in $$l2; do \
- case "$$i" in \
- *.2*) list="$$list $$i" ;; \
- esac; \
- done; \
- for i in $$list; do \
- if test -f $(srcdir)/$$i; then file=$(srcdir)/$$i; \
- else file=$$i; fi; \
- ext=`echo $$i | sed -e 's/^.*\\.//'`; \
- case "$$ext" in \
- 2*) ;; \
- *) ext='2' ;; \
- esac; \
- inst=`echo $$i | sed -e 's/\\.[0-9a-z]*$$//'`; \
- inst=`echo $$inst | sed -e 's/^.*\///'`; \
- inst=`echo $$inst | sed '$(transform)'`.$$ext; \
- echo " $(INSTALL_DATA) '$$file' '$(DESTDIR)$(man2dir)/$$inst'"; \
- $(INSTALL_DATA) "$$file" "$(DESTDIR)$(man2dir)/$$inst"; \
- done
-uninstall-man2:
- @$(NORMAL_UNINSTALL)
- @list='$(man2_MANS) $(dist_man2_MANS) $(nodist_man2_MANS)'; \
- l2='$(man_MANS) $(dist_man_MANS) $(nodist_man_MANS)'; \
- for i in $$l2; do \
- case "$$i" in \
- *.2*) list="$$list $$i" ;; \
- esac; \
- done; \
- for i in $$list; do \
- ext=`echo $$i | sed -e 's/^.*\\.//'`; \
- case "$$ext" in \
- 2*) ;; \
- *) ext='2' ;; \
- esac; \
- inst=`echo $$i | sed -e 's/\\.[0-9a-z]*$$//'`; \
- inst=`echo $$inst | sed -e 's/^.*\///'`; \
- inst=`echo $$inst | sed '$(transform)'`.$$ext; \
- echo " rm -f '$(DESTDIR)$(man2dir)/$$inst'"; \
- rm -f "$(DESTDIR)$(man2dir)/$$inst"; \
- done
-install-man5: $(man5_MANS) $(man_MANS)
- @$(NORMAL_INSTALL)
- test -z "$(man5dir)" || $(MKDIR_P) "$(DESTDIR)$(man5dir)"
- @list='$(man5_MANS) $(dist_man5_MANS) $(nodist_man5_MANS)'; \
- l2='$(man_MANS) $(dist_man_MANS) $(nodist_man_MANS)'; \
- for i in $$l2; do \
- case "$$i" in \
- *.5*) list="$$list $$i" ;; \
- esac; \
- done; \
- for i in $$list; do \
- if test -f $(srcdir)/$$i; then file=$(srcdir)/$$i; \
- else file=$$i; fi; \
- ext=`echo $$i | sed -e 's/^.*\\.//'`; \
- case "$$ext" in \
- 5*) ;; \
- *) ext='5' ;; \
- esac; \
- inst=`echo $$i | sed -e 's/\\.[0-9a-z]*$$//'`; \
- inst=`echo $$inst | sed -e 's/^.*\///'`; \
- inst=`echo $$inst | sed '$(transform)'`.$$ext; \
- echo " $(INSTALL_DATA) '$$file' '$(DESTDIR)$(man5dir)/$$inst'"; \
- $(INSTALL_DATA) "$$file" "$(DESTDIR)$(man5dir)/$$inst"; \
- done
-uninstall-man5:
- @$(NORMAL_UNINSTALL)
- @list='$(man5_MANS) $(dist_man5_MANS) $(nodist_man5_MANS)'; \
- l2='$(man_MANS) $(dist_man_MANS) $(nodist_man_MANS)'; \
- for i in $$l2; do \
- case "$$i" in \
- *.5*) list="$$list $$i" ;; \
- esac; \
- done; \
- for i in $$list; do \
- ext=`echo $$i | sed -e 's/^.*\\.//'`; \
- case "$$ext" in \
- 5*) ;; \
- *) ext='5' ;; \
- esac; \
- inst=`echo $$i | sed -e 's/\\.[0-9a-z]*$$//'`; \
- inst=`echo $$inst | sed -e 's/^.*\///'`; \
- inst=`echo $$inst | sed '$(transform)'`.$$ext; \
- echo " rm -f '$(DESTDIR)$(man5dir)/$$inst'"; \
- rm -f "$(DESTDIR)$(man5dir)/$$inst"; \
- done
-tags: TAGS
-TAGS:
-
-ctags: CTAGS
-CTAGS:
-
-
-distdir: $(DISTFILES)
- @srcdirstrip=`echo "$(srcdir)" | sed 's/[].[^$$\\*]/\\\\&/g'`; \
- topsrcdirstrip=`echo "$(top_srcdir)" | sed 's/[].[^$$\\*]/\\\\&/g'`; \
- list='$(DISTFILES)'; \
- dist_files=`for file in $$list; do echo $$file; done | \
- sed -e "s|^$$srcdirstrip/||;t" \
- -e "s|^$$topsrcdirstrip/|$(top_builddir)/|;t"`; \
- case $$dist_files in \
- */*) $(MKDIR_P) `echo "$$dist_files" | \
- sed '/\//!d;s|^|$(distdir)/|;s,/[^/]*$$,,' | \
- sort -u` ;; \
- esac; \
- for file in $$dist_files; do \
- if test -f $$file || test -d $$file; then d=.; else d=$(srcdir); fi; \
- if test -d $$d/$$file; then \
- dir=`echo "/$$file" | sed -e 's,/[^/]*$$,,'`; \
- if test -d $(srcdir)/$$file && test $$d != $(srcdir); then \
- cp -pR $(srcdir)/$$file $(distdir)$$dir || exit 1; \
- fi; \
- cp -pR $$d/$$file $(distdir)$$dir || exit 1; \
- else \
- test -f $(distdir)/$$file \
- || cp -p $$d/$$file $(distdir)/$$file \
- || exit 1; \
- fi; \
- done
-check-am: all-am
-check: check-am
-all-am: Makefile $(MANS)
-installdirs:
- for dir in "$(DESTDIR)$(man2dir)" "$(DESTDIR)$(man5dir)"; do \
- test -z "$$dir" || $(MKDIR_P) "$$dir"; \
- done
-install: install-am
-install-exec: install-exec-am
-install-data: install-data-am
-uninstall: uninstall-am
-
-install-am: all-am
- @$(MAKE) $(AM_MAKEFLAGS) install-exec-am install-data-am
-
-installcheck: installcheck-am
-install-strip:
- $(MAKE) $(AM_MAKEFLAGS) INSTALL_PROGRAM="$(INSTALL_STRIP_PROGRAM)" \
- install_sh_PROGRAM="$(INSTALL_STRIP_PROGRAM)" INSTALL_STRIP_FLAG=-s \
- `test -z '$(STRIP)' || \
- echo "INSTALL_PROGRAM_ENV=STRIPPROG='$(STRIP)'"` install
-mostlyclean-generic:
-
-clean-generic:
-
-distclean-generic:
- -test -z "$(CONFIG_CLEAN_FILES)" || rm -f $(CONFIG_CLEAN_FILES)
-
-maintainer-clean-generic:
- @echo "This command is intended for maintainers to use"
- @echo "it deletes files that may require special tools to rebuild."
-clean: clean-am
-
-clean-am: clean-generic clean-libtool mostlyclean-am
-
-distclean: distclean-am
- -rm -f Makefile
-distclean-am: clean-am distclean-generic
-
-dvi: dvi-am
-
-dvi-am:
-
-html: html-am
-
-info: info-am
-
-info-am:
-
-install-data-am: install-man
-
-install-dvi: install-dvi-am
-
-install-exec-am:
-
-install-html: install-html-am
-
-install-info: install-info-am
-
-install-man: install-man2 install-man5
-
-install-pdf: install-pdf-am
-
-install-ps: install-ps-am
-
-installcheck-am:
-
-maintainer-clean: maintainer-clean-am
- -rm -f Makefile
-maintainer-clean-am: distclean-am maintainer-clean-generic
-
-mostlyclean: mostlyclean-am
-
-mostlyclean-am: mostlyclean-generic mostlyclean-libtool
-
-pdf: pdf-am
-
-pdf-am:
-
-ps: ps-am
-
-ps-am:
-
-uninstall-am: uninstall-man
-
-uninstall-man: uninstall-man2 uninstall-man5
-
-.MAKE: install-am install-strip
-
-.PHONY: all all-am check check-am clean clean-generic clean-libtool \
- distclean distclean-generic distclean-libtool distdir dvi \
- dvi-am html html-am info info-am install install-am \
- install-data install-data-am install-dvi install-dvi-am \
- install-exec install-exec-am install-html install-html-am \
- install-info install-info-am install-man install-man2 \
- install-man5 install-pdf install-pdf-am install-ps \
- install-ps-am install-strip installcheck installcheck-am \
- installdirs maintainer-clean maintainer-clean-generic \
- mostlyclean mostlyclean-generic mostlyclean-libtool pdf pdf-am \
- ps ps-am uninstall uninstall-am uninstall-man uninstall-man2 \
- uninstall-man5
-
-
-# How to do MLINKS in automake?
-# MLINKS= getaudit.2 getaudit_addr.2 \
-# setaudit.2 setaudit_addr.2
-# Tell versions [3.59,3.63) of GNU make to not export all variables.
-# Otherwise a system limit (for SysV at least) may be exceeded.
-.NOEXPORT:
diff --git a/contrib/openbsm/man/audit.2 b/contrib/openbsm/man/audit.2
deleted file mode 100644
index a9cd143..0000000
--- a/contrib/openbsm/man/audit.2
+++ /dev/null
@@ -1,104 +0,0 @@
-.\"-
-.\" Copyright (c) 2005 Tom Rhodes
-.\" Copyright (c) 2005 Robert N. M. Watson
-.\" All rights reserved.
-.\"
-.\" Redistribution and use in source and binary forms, with or without
-.\" modification, are permitted provided that the following conditions
-.\" are met:
-.\" 1. Redistributions of source code must retain the above copyright
-.\" notice, this list of conditions and the following disclaimer.
-.\" 2. Redistributions in binary form must reproduce the above copyright
-.\" notice, this list of conditions and the following disclaimer in the
-.\" documentation and/or other materials provided with the distribution.
-.\"
-.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
-.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-.\" ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
-.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
-.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
-.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
-.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
-.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
-.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
-.\" SUCH DAMAGE.
-.\"
-.\" $P4: //depot/projects/trustedbsd/openbsm/man/audit.2#8 $
-.\"
-.Dd April 19, 2005
-.Dt AUDIT 2
-.Os
-.Sh NAME
-.Nm audit
-.Nd "commit BSM audit record to audit log"
-.Sh SYNOPSIS
-.In bsm/audit.h
-.Ft int
-.Fn audit "const char *record" "u_int length"
-.Sh DESCRIPTION
-The
-.Fn audit
-system call
-submits a completed BSM audit record to the system audit log.
-.Pp
-The
-.Fa record
-argument
-is a pointer to the specific event to be recorded and
-.Fa length
-is the size in bytes of the data to be written.
-.Sh RETURN VALUES
-.Rv -std
-.Sh ERRORS
-The
-.Fn audit
-system call will fail and the data never written if:
-.Bl -tag -width Er
-.It Bq Er EFAULT
-The
-.Fa record
-argument is beyond the allocated address space of the process.
-.It Bq Er EINVAL
-The token ID is invalid or
-.Va length
-is larger than
-.Dv MAXAUDITDATA .
-.It Bq Er EPERM
-The process does not have sufficient permission to complete
-the operation.
-.El
-.Sh SEE ALSO
-.Xr auditon 2 ,
-.Xr getaudit 2 ,
-.Xr getaudit_addr 2 ,
-.Xr getauid 2 ,
-.Xr setaudit 2 ,
-.Xr setaudit_addr 2 ,
-.Xr setauid 2 ,
-.Xr libbsm 3
-.Sh HISTORY
-The OpenBSM implementation was created by McAfee Research, the security
-division of McAfee Inc., under contract to Apple Computer Inc.\& in 2004.
-It was subsequently adopted by the TrustedBSD Project as the foundation for
-the OpenBSM distribution.
-.Sh AUTHORS
-.An -nosplit
-This software was created by McAfee Research, the security research division
-of McAfee, Inc., under contract to Apple Computer Inc.
-Additional authors include
-.An Wayne Salamon ,
-.An Robert Watson ,
-and SPARTA Inc.
-.Pp
-The Basic Security Module (BSM) interface to audit records and audit event
-stream format were defined by Sun Microsystems.
-.Pp
-This manual page was written by
-.An Tom Rhodes Aq trhodes@FreeBSD.org .
-.Sh BUGS
-The
-.Fx
-kernel does not fully validate that the argument passed is syntactically
-valid BSM.
-Submitting invalid audit records may corrupt the audit log.
diff --git a/contrib/openbsm/man/audit.log.5 b/contrib/openbsm/man/audit.log.5
deleted file mode 100644
index d0f85ff..0000000
--- a/contrib/openbsm/man/audit.log.5
+++ /dev/null
@@ -1,682 +0,0 @@
-.\"-
-.\" Copyright (c) 2005-2006 Robert N. M. Watson
-.\" All rights reserved.
-.\"
-.\" Redistribution and use in source and binary forms, with or without
-.\" modification, are permitted provided that the following conditions
-.\" are met:
-.\" 1. Redistributions of source code must retain the above copyright
-.\" notice, this list of conditions and the following disclaimer.
-.\" 2. Redistributions in binary form must reproduce the above copyright
-.\" notice, this list of conditions and the following disclaimer in the
-.\" documentation and/or other materials provided with the distribution.
-.\"
-.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
-.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-.\" ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
-.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
-.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
-.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
-.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
-.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
-.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
-.\" SUCH DAMAGE.
-.\"
-.\" $P4: //depot/projects/trustedbsd/openbsm/man/audit.log.5#16 $
-.\"
-.Dd November 5, 2006
-.Dt AUDIT.LOG 5
-.Os
-.Sh NAME
-.Nm audit
-.Nd "Basic Security Module (BSM) file format"
-.Sh DESCRIPTION
-The
-.Nm
-file format is based on Sun's Basic Security Module (BSM) file format, a
-token-based record stream to represent system audit data.
-This file format is both flexible and extensible, able to describe a broad
-range of data types, and easily extended to describe new data types in a
-moderately backward and forward compatible way.
-.Pp
-BSM token streams typically begin and end with a
-.Dq file
-token, which provides time stamp and file name information for the stream;
-when processing a BSM token stream from a stream as opposed to a single file
-source, file tokens may be seen at any point between ordinary records
-identifying when particular parts of the stream begin and end.
-All other tokens will appear in the context of a complete BSM audit record,
-which begins with a
-.Dq header
-token, and ends with a
-.Dq trailer
-token, which describe the audit record.
-Between these two tokens will appear a variety of data tokens, such as
-process information, file path names, IPC object information, MAC labels,
-socket information, and so on.
-.Pp
-The BSM file format defines specific token orders for each record event type;
-however, some variation may occur depending on the operating system in use,
-what system options, such as mandatory access control, are present.
-.Pp
-This manual page documents the common token types and their binary format, and
-is intended for reference purposes only.
-It is recommended that application programmers use the
-.Xr libbsm 3
-interface to read and write tokens, rather than parsing or constructing
-records by hand.
-.Ss File Token
-The
-.Dq file
-token is used at the beginning and end of an audit log file to indicate
-when the audit log begins and ends.
-It includes a pathname so that, if concatenated together, original file
-boundaries are still observable, and gaps in the audit log can be identified.
-A
-.Dq file
-token can be created using
-.Xr au_to_file 3 .
-.Bl -column -offset 3n ".No Terminal Address Type/Length" ".No N bytes + 1 NUL"
-.It Sy "Field Bytes Description"
-.It "Token ID 1 byte Token ID"
-.It "Seconds 4 bytes File time stamp"
-.It "Microseconds 4 bytes File time stamp"
-.It "File name lengh 2 bytes File name of audit trail"
-.It "File pathname N bytes + 1 NUL File name of audit trail"
-.El
-.Ss Header Token
-The
-.Dq header
-token is used to mark the beginning of a complete audit record, and includes
-the length of the total record in bytes, a version number for the record
-layout, the event type and subtype, and the time at which the event occurred.
-A 32-bit
-.Dq header
-token can be created using
-.Xr au_to_header32 3 ;
-a 64-bit
-.Dq header
-token can be created using
-.Xr au_to_header64 3 .
-.Bl -column -offset 3n ".No Terminal Address Type/Length" ".No N bytes + 1 NUL"
-.It Sy "Field Bytes Description"
-.It "Token ID 1 byte Token ID"
-.It "Record Byte Count 4 bytes Number of bytes in record"
-.It "Version Number 2 bytes Record version number"
-.It "Event Type 2 bytes Event type"
-.It "Event Modifier 2 bytes Event sub-type"
-.It "Seconds 4/8 bytes Record time stamp (32/64-bits)"
-.It "Nanoseconds 4/8 bytes Record time stamp (32/64-bits)"
-.El
-.Ss Expanded Header Token
-The
-.Dq expanded header
-token is an expanded version of the
-.Dq header
-token, with the addition of a machine IPv4 or IPv6 address.
-A 32-bit extended
-.Dq header
-token can be created using
-.Xr au_to_header32_ex 3 ;
-a 64-bit extended
-.Dq header
-token can be created using
-.Xr au_to_header64_ex 3 .
-.Bl -column -offset 3n ".No Terminal Address Type/Length" ".No N bytes + 1 NUL"
-.It Sy "Field Bytes Description"
-.It "Token ID 1 byte Token ID"
-.It "Record Byte Count 4 bytes Number of bytes in record"
-.It "Version Number 2 bytes Record version number"
-.It "Event Type 2 bytes Event type"
-.It "Event Modifier 2 bytes Event sub-type"
-.It "Address Type/Length 1 byte Host address type and length"
-.It "Machine Address 4/16 bytes IPv4 or IPv6 address"
-.It "Seconds 4/8 bytes Record time stamp (32/64-bits)"
-.It "Nanoseconds 4/8 bytes Record time stamp (32/64-bits)"
-.El
-.Ss Trailer Token
-The
-.Dq trailer
-terminates a BSM audit record, and contains a magic number,
-.Dv TRAILER_PAD_MAGIC
-and length that can be used to validate that the record was read properly.
-A
-.Dq trailer
-token can be created using
-.Xr au_to_trailer 3 .
-.Bl -column -offset 3n ".No Terminal Address Type/Length" ".No N bytes + 1 NUL"
-.It Sy "Field Bytes Description"
-.It "Token ID 1 byte Token ID"
-.It "Trailer Magic 2 bytes Trailer magic number"
-.It "Record Byte Count 4 bytes Number of bytes in record"
-.El
-.Ss Arbitrary Data Token
-The
-.Dq arbitrary data
-token contains a byte stream of opaque (untyped) data.
-The size of the data is calculated as the size of each unit of data
-multipled by the number of units of data.
-A
-.Dq How to print
-field is present to specify how to print the data, but interpretation of
-that field is not currently defined.
-An
-.Dq arbitrary data
-token can be created using
-.Xr au_to_data 3 .
-.Bl -column -offset 3n ".No Terminal Address Type/Length" ".No N bytes + 1 NUL"
-.It Sy "Field Bytes Description"
-.It "Token ID 1 byte Token ID"
-.It "How to Print 1 byte User-defined printing information"
-.It "Basic Unit 1 byte Size of a unit in bytes"
-.It "Unit Count 1 byte Number of units of data present"
-.It "Data Items Variable User data"
-.El
-.Ss in_addr Token
-The
-.Dq in_addr
-token holds a network byte order IPv4 or IPv6 address.
-An
-.Dq in_addr
-token can be created using
-.Xr au_to_in_addr 3
-for an IPv4 address, or
-.Xr au_to_in_addr_ex 3
-for an IPv6 address.
-.Pp
-See the
-.Sx BUGS
-section for information on the storage of this token.
-.Pp
-.Bl -column -offset 3n ".No Terminal Address Type/Length" ".No N bytes + 1 NUL"
-.It Sy "Field Bytes Description"
-.It "Token ID 1 byte Token ID"
-.It "IP Address Type 1 byte Type of address"
-.It "IP Address 4/16 bytes IPv4 or IPv6 address"
-.El
-.Ss Expanded in_addr Token
-The
-.Dq expanded in_addr
-token ...
-.Pp
-See the
-.Sx BUGS
-section for information on the storage of this token.
-.Bl -column -offset 3n ".No Terminal Address Type/Length" ".No N bytes + 1 NUL"
-.It Sy "Field Bytes Description"
-.It "Token ID 1 byte Token ID"
-.It XXXX
-.El
-.Ss ip Token
-The
-.Dq ip
-token contains an IP packet header in network byte order.
-An
-.Dq ip
-token can be created using
-.Xr au_to_ip 3 .
-.Bl -column -offset 3n ".No Terminal Address Type/Length" ".No N bytes + 1 NUL"
-.It Sy "Field Bytes Description"
-.It "Token ID 1 byte Token ID"
-.It "Version and IHL 1 byte Version and IP header length"
-.It "Type of Service 1 byte IP TOS field"
-.It "Length 2 bytes IP packet length in network byte order"
-.It "ID 2 bytes IP header ID for reassembly"
-.It "Offset 2 bytes IP fragment offset and flags, network byte order"
-.It "TTL 1 byte IP Time-to-Live"
-.It "Protocol 1 byte IP protocol number"
-.It "Checksum 2 bytes IP header checksum, network byte order"
-.It "Source Address 4 bytes IPv4 source address"
-.It "Destination Address 4 bytes IPv4 destination address"
-.El
-.Ss Expanded ip Token
-The
-.Dq expanded ip
-token ...
-.Bl -column -offset 3n ".No Terminal Address Type/Length" ".No N bytes + 1 NUL"
-.It Sy "Field Bytes Description"
-.It "Token ID 1 byte Token ID"
-.It XXXX
-.El
-.Ss iport Token
-The
-.Dq iport
-token stores an IP port number in network byte order.
-An
-.Dq iport
-token can be created using
-.Xr au_to_iport 3 .
-.Bl -column -offset 3n ".No Terminal Address Type/Length" ".No N bytes + 1 NUL"
-.It Sy "Field Bytes Description"
-.It "Token ID 1 byte Token ID"
-.It "Port Number 2 bytes Port number in network byte order"
-.El
-.Ss Path Token
-The
-.Dq path
-token contains a pathname.
-A
-.Dq path
-token can be created using
-.Xr au_to_path 3 .
-.Bl -column -offset 3n ".No Terminal Address Type/Length" ".No N bytes + 1 NUL"
-.It Sy "Field Bytes Description"
-.It "Token ID 1 byte Token ID"
-.It "Path Length 2 bytes Length of path in bytes"
-.It "Path N bytes + 1 NUL Path name"
-.El
-.Ss path_attr Token
-The
-.Dq path_attr
-token contains a set of NUL-terminated path names.
-The
-.Xr libbsm 3
-API cannot currently create a
-.Dq path_attr
-token.
-.Bl -column -offset 3n ".No Terminal Address Type/Length" ".No N bytes + 1 NUL"
-.It Sy "Field Bytes Description"
-.It "Token ID 1 byte Token ID"
-.It "Count 2 bytes Number of NUL-terminated string(s) in token"
-.It "Path Variable count NUL-terminated string(s)"
-.El
-.Ss Process Token
-The
-.Dq process
-token contains a description of the security properties of a process
-involved as the target of an auditable event, such as the destination for
-signal delivery.
-It should not be confused with the
-.Dq subject
-token, which describes the subject performing an auditable event.
-This includes both the traditional
-.Ux
-security properties, such as user IDs and group IDs, but also audit
-information such as the audit user ID and session.
-A
-.Dq process
-token can be created using
-.Xr au_to_process32 3
-or
-.Xr au_to_process64 3 .
-.Bl -column -offset 3n ".No Terminal Address Type/Length" ".No N bytes + 1 NUL"
-.It Sy "Field Bytes Description"
-.It "Token ID 1 byte Token ID"
-.It "Audit ID 4 bytes Audit user ID"
-.It "Effective User ID 4 bytes Effective user ID"
-.It "Effective Group ID 4 bytes Effective group ID"
-.It "Real User ID 4 bytes Real user ID"
-.It "Real Group ID 4 bytes Real group ID"
-.It "Process ID 4 bytes Process ID"
-.It "Session ID 4 bytes Audit session ID"
-.It "Terminal Port ID 4/8 bytes Terminal port ID (32/64-bits)"
-.It "Terminal Machine Address 4 bytes IP address of machine"
-.El
-.Ss Expanded Process Token
-The
-.Dq expanded process
-token contains the contents of the
-.Dq process
-token, with the addition of a machine address type and variable length
-address storage capable of containing IPv6 addresses.
-An
-.Dq expanded process
-token can be created using
-.Xr au_to_process32_ex 3
-or
-.Xr au_to_process64_ex 3 .
-.Bl -column -offset 3n ".No Terminal Address Type/Length" ".No N bytes + 1 NUL"
-.It Sy "Field Bytes Description"
-.It "Token ID 1 byte Token ID"
-.It "Audit ID 4 bytes Audit user ID"
-.It "Effective User ID 4 bytes Effective user ID"
-.It "Effective Group ID 4 bytes Effective group ID"
-.It "Real User ID 4 bytes Real user ID"
-.It "Real Group ID 4 bytes Real group ID"
-.It "Process ID 4 bytes Process ID"
-.It "Session ID 4 bytes Audit session ID"
-.It "Terminal Port ID 4/8 bytes Terminal port ID (32/64-bits)"
-.It "Terminal Address Type/Length 1 byte Length of machine address"
-.It "Terminal Machine Address 4 bytes IPv4 or IPv6 address of machine"
-.El
-.Ss Return Token
-The
-.Dq return
-token contains a system call or library function return condition, including
-return value and error number associated with the global variable
-.Er errno .
-A
-.Dq return
-token can be created using
-.Xr au_to_return32 3
-or
-.Xr au_to_return64 3 .
-.Bl -column -offset 3n ".No Terminal Address Type/Length" ".No N bytes + 1 NUL"
-.It Sy "Field Bytes Description"
-.It "Token ID 1 byte Token ID"
-.It "Error Number 1 byte Errno value, or 0 if undefined"
-.It "Return Value 4/8 bytes Return value (32/64-bits)"
-.El
-.Ss Subject Token
-The
-.Dq subject
-token contains information on the subject performing the operation described
-by an audit record, and includes similar information to that found in the
-.Dq process
-and
-.Dq expanded process
-tokens.
-However, those tokens are used where the process being described is the
-target of the operation, not the authorizing party.
-A
-.Dq subject
-token can be created using
-.Xr au_to_subject32 3
-and
-.Xr au_to_subject64 3 .
-.Bl -column -offset 3n ".No Terminal Address Type/Length" ".No N bytes + 1 NUL"
-.It Sy "Field Bytes Description"
-.It "Token ID 1 byte Token ID"
-.It "Audit ID 4 bytes Audit user ID"
-.It "Effective User ID 4 bytes Effective user ID"
-.It "Effective Group ID 4 bytes Effective group ID"
-.It "Real User ID 4 bytes Real user ID"
-.It "Real Group ID 4 bytes Real group ID"
-.It "Process ID 4 bytes Process ID"
-.It "Session ID 4 bytes Audit session ID"
-.It "Terminal Port ID 4/8 bytes Terminal port ID (32/64-bits)"
-.It "Terminal Machine Address 4 bytes IP address of machine"
-.El
-.Ss Expanded Subject Token
-The
-.Dq expanded subject
-token consists of the same elements as the
-.Dq subject
-token, with the addition of type/length and variable size machine address
-information in the terminal ID.
-An
-.Dq expanded subject
-token can be created using
-.Xr au_to_subject32_ex 3
-or
-.Xr au_to_subject64_ex 3 .
-.Bl -column -offset 3n ".No Terminal Address Type/Length" ".No N bytes + 1 NUL"
-.It Sy "Field Bytes Description"
-.It "Token ID 1 byte Token ID"
-.It "Audit ID 4 bytes Audit user ID"
-.It "Effective User ID 4 bytes Effective user ID"
-.It "Effective Group ID 4 bytes Effective group ID"
-.It "Real User ID 4 bytes Real user ID"
-.It "Real Group ID 4 bytes Real group ID"
-.It "Process ID 4 bytes Process ID"
-.It "Session ID 4 bytes Audit session ID"
-.It "Terminal Port ID 4/8 bytes Terminal port ID (32/64-bits)"
-.It "Terminal Address Type/Length 1 byte Length of machine address"
-.It "Terminal Machine Address 4 bytes IPv4 or IPv6 address of machine"
-.El
-.Ss System V IPC Token
-The
-.Dq System V IPC
-token contains the System V IPC message handle, semaphore handle or shared
-memory handle.
-A System V IPC token may be created using
-+.Xr au_to_ipc 3 .
-.Bl -column -offset 3n ".No Terminal Address Type/Length" ".No N bytes + 1 NUL"
-.It Sy "Field Bytes Description"
-.It "Token ID 1 byte Token ID"
-.It "Object ID type 1 byte Object ID"
-.It "Object ID 4 bytes Object ID"
-.El
-.Ss Text Token
-The
-.Dq text
-token contains a single NUL-terminated text string.
-A
-.Dq text
-token may be created using
-.Xr au_to_text 3 .
-.Bl -column -offset 3n ".No Terminal Address Type/Length" ".No N bytes + 1 NUL"
-.It Sy "Field Bytes Description"
-.It "Token ID 1 byte Token ID"
-.It "Text Length 2 bytes Length of text string including NUL"
-.It "Text N bytes + 1 NUL Text string including NUL"
-.El
-.Ss Attribute Token
-The
-.Dq attribute
-token describes the attributes of a file associated with the audit event.
-As files may be identified by 0, 1, or many path names, a path name is not
-included with the attribute block for a file; optional
-.Dq path
-tokens may also be present in an audit record indicating which path, if any,
-was used to reach the object.
-An
-.Dq attribute
-token can be created using
-.Xr au_to_attr32 3
-or
-.Xr au_to_attr64 3 .
-.Bl -column -offset 3n ".No Terminal Address Type/Length" ".No N bytes + 1 NUL"
-.It Sy "Field Bytes Description"
-.It "Token ID 1 byte Token ID"
-.It "File Access Mode 1 byte mode_t associated with file"
-.It "Owner User ID 4 bytes uid_t associated with file"
-.It "Owner Group ID 4 bytes gid_t associated with file"
-.It "File System ID 4 bytes fsid_t associated with file"
-.It "File System Node ID 8 bytes ino_t associated with file"
-.It "Device 4/8 bytes Device major/minor number (32/64-bit)"
-.El
-.Ss Groups Token
-The
-.Dq groups
-token contains a list of group IDs associated with the audit event.
-A
-.Dq groups
-token can be created using
-.Xr au_to_groups 3 .
-.Bl -column -offset 3n ".No Terminal Address Type/Length" ".No N bytes + 1 NUL"
-.It Sy "Field Bytes Description"
-.It "Token ID 1 byte Token ID"
-.It "Number of Groups 2 bytes Number of groups in token"
-.It "Group List N * 4 bytes List of N group IDs"
-.El
-.Ss System V IPC Permission Token
-The
-.Dq System V IPC permission
-token contains a System V IPC access permissions.
-A System V IPC permission token may be created using
-.Xr au_to_ipc_perm 3 .
-.Bl -column -offset 3n ".No Terminal Address Type/Length" ".No N bytes + 1 NUL"
-.It Sy "Field Bytes Description"
-.It "Token ID 1 byte Token ID"
-.It Li "Owner user ID" Ta "4 bytes" Ta "User ID of IPC owner"
-.It Li "Owner group ID" Ta "4 bytes" Ta "Group ID of IPC owner"
-.It Li "Creator user ID" Ta "4 bytes" Ta "User ID of IPC creator"
-.It Li "Creator group ID" Ta "4 bytes" Ta "Group ID of IPC creator"
-.It Li "Access mode" Ta "4 bytes" Ta "Access mode"
-.It Li "Sequnce number" Ta "4 bytes" Ta "Sequnce number"
-.It Li "Key" Ta "4 bytes" Ta "IPC key"
-.El
-.Ss Arg Token
-The
-.Dq arg
-token contains informations about arguments of the system call.
-Depending on the size of the desired argument value, an Arg token may be
-created using
-.Xr au_to_arg32 3
-or
-.Xr au_to_arg64 3 .
-.Bl -column -offset 3n ".No Terminal Address Type/Length" ".No N bytes + 1 NUL"
-.It Sy "Field Bytes Description"
-.It "Token ID 1 byte Token ID"
-.It Li "Argument ID" Ta "1 byte" Ta "Argument ID"
-.It Li "Argument value" Ta "4/8 bytes" Ta "Argument value"
-.It Li "Length" Ta "2 bytes" Ta "Length of the text"
-.It Li "Text" Ta "N bytes + 1 nul" Ta "The string including nul"
-.El
-.Ss exec_args Token
-The
-.Dq exec_args
-token contains informations about arguements of the exec() system call.
-An exec_args token may be created using
-.Xr au_to_exec_args 3 .
-.Bl -column -offset 3n ".No Terminal Address Type/Length" ".No N bytes + 1 NUL"
-.It Sy "Field Bytes Description"
-.It "Token ID 1 byte Token ID"
-.It Li "Count" Ta "4 bytes" Ta "Number of arguments"
-.It Li "Text" Ta "* bytes" Ta "Count null-terminated strings"
-.El
-.Ss exec_env Token
-The
-.Dq exec_env
-token contains current eviroment variables to an exec() system call.
-An exec_args token may be created using
-.Xr au_to_exec_env 3 .
-.Bl -column -offset 3n ".No Terminal Address Type/Length" ".No N bytes + 1 NUL"
-.It Sy "Field Bytes Description"
-.It "Token ID 1 byte Token ID"
-.It Li "Count ID" Ta "4 bytes" Ta "Number of variables"
-.It Li "Text" Ta "* bytes" Ta "Count nul-terminated strings"
-.El
-.Ss Exit Token
-The
-.Dq exit
-token contains process exit/return code information.
-An
-.Dq exit
-token can be created using
-.Xr au_to_exit 3 .
-.Bl -column -offset 3n ".No Terminal Address Type/Length" ".No N bytes + 1 NUL"
-.It Sy "Field Bytes Description"
-.It "Token ID 1 byte Token ID"
-.It "Status 4 bytes Process status on exit"
-.It "Return Value 4 bytes Process return value on exit"
-.El
-.Ss Socket Token
-The
-.Dq socket
-token contains informations about UNIX domain and Internet sockets.
-Each token has four or eight fields.
-Depend on type of socket a socket token may be created using
-.Xr au_to_sock_unix 3 ,
-.Xr au_to_sock_inet32 3 or
-.Xr au_to_sock_inet128 3 .
-.Bl -column -offset ind ".Sy Field Name Width XX" ".Sy XX Bytes XXXX" ".Sy Description"
-.It Sy "Field" Ta Sy Bytes Ta Sy Description
-.It Li "Token ID" Ta "1 byte" Ta "Token ID"
-.It Li "Socket family" Ta "2 bytes" Ta "Socket family"
-.It Li "Local port" Ta "2 bytes" Ta "Local port"
-.It Li "Socket address" Ta "4 bytes" Ta "Socket address"
-.El
-.Bl -column -offset 3n ".No Terminal Address Type/Length" ".No N bytes + 1 NUL"
-.It Sy "Field Bytes Description"
-.It "Token ID 1 byte Token ID"
-+.It Li "Socket domain" Ta "4 bytes" Ta "Socket domain"
-+.It Li "Socket family" Ta "2 bytes" Ta "Socket family"
-+.It Li "Address type" Ta "1 byte" Ta "Address type (IPv4/IPv6)"
-+.It Li "Local port" Ta "2 bytes" Ta "Local port"
-+.It Li "Local IP address" Ta "4/16 bytes" Ta "Local IP address"
-+.It Li "Remote port" Ta "2 bytes" Ta "Remote port"
-+.It Li "Remote IP address" Ta "4/16 bytes" Ta "Remote IP address"
-.El
-.Ss Expanded Socket Token
-The
-.Dq expanded socket
-token ...
-.Bl -column -offset 3n ".No Terminal Address Type/Length" ".No N bytes + 1 NUL"
-.It Sy "Field Bytes Description"
-.It "Token ID 1 byte Token ID"
-.It XXXXX
-.El
-.Ss Seq Token
-The
-.Dq seq
-token contains a unique and monotonically increasing audit event sequence ID.
-Due to the limited range of 32 bits, serial number arithmetic and caution
-should be used when comparing sequence numbers.
-.Bl -column -offset 3n ".No Terminal Address Type/Length" ".No N bytes + 1 NUL"
-.It Sy "Field Bytes Description"
-.It "Token ID 1 byte Token ID"
-.It "Sequence Number 4 bytes Audit event sequence number"
-.El
-.Ss privilege Token
-The
-.Dq privilege
-token ...
-.Bl -column -offset 3n ".No Terminal Address Type/Length" ".No N bytes + 1 NUL"
-.It Sy "Field Bytes Description"
-.It "Token ID 1 byte Token ID"
-.It XXXXX
-.El
-.Ss Use-of-auth Token
-The
-.Dq use-of-auth
-token ...
-.Bl -column -offset 3n ".No Terminal Address Type/Length" ".No N bytes + 1 NUL"
-.It Sy "Field Bytes Description"
-.It "Token ID 1 byte Token ID"
-.It XXXXX
-.El
-.Ss Command Token
-The
-.Dq command
-token ...
-.Bl -column -offset 3n ".No Terminal Address Type/Length" ".No N bytes + 1 NUL"
-.It Sy "Field Bytes Description"
-.It "Token ID 1 byte Token ID"
-.It XXXXX
-.El
-.Ss ACL Token
-The
-.Dq ACL
-token ...
-.Bl -column -offset 3n ".No Terminal Address Type/Length" ".No N bytes + 1 NUL"
-.It Sy "Field Bytes Description"
-.It "Token ID 1 byte Token ID"
-.It XXXXX
-.El
-.Ss Zonename Token
-The
-.Dq zonename
-token ...
-.Bl -column -offset 3n ".No Terminal Address Type/Length" ".No N bytes + 1 NUL"
-.It Sy "Field Bytes Description"
-.It "Token ID 1 byte Token ID"
-.It XXXXX
-.El
-.Sh SEE ALSO
-.Xr auditreduce 1 ,
-.Xr praudit 1 ,
-.Xr libbsm 3 ,
-.Xr audit 4 ,
-.Xr auditpipe 4 ,
-.Xr audit 8
-.Sh HISTORY
-The OpenBSM implementation was created by McAfee Research, the security
-division of McAfee Inc., under contract to Apple Computer Inc.\& in 2004.
-It was subsequently adopted by the TrustedBSD Project as the foundation for
-the OpenBSM distribution.
-.Sh AUTHORS
-The Basic Security Module (BSM) interface to audit records and audit event
-stream format were defined by Sun Microsystems.
-.Pp
-This manual page was written by
-.An Robert Watson Aq rwatson@FreeBSD.org .
-.Sh BUGS
-The
-.Dq How to print
-field in the
-.Dq arbitrary data
-token has undefined values.
-.Pp
-The
-.Dq in_addr
-and
-.Dq in_addr_ex
-token layout documented here appears to be in conflict with the
-.Xr libbsm 3
-implementations of
-.Xr au_to_in_addr 3
-and
-.Xr au_to_in_addr_ex 3 .
diff --git a/contrib/openbsm/man/audit_class.5 b/contrib/openbsm/man/audit_class.5
deleted file mode 100644
index cc5b122f..0000000
--- a/contrib/openbsm/man/audit_class.5
+++ /dev/null
@@ -1,80 +0,0 @@
-.\" Copyright (c) 2004 Apple Computer, Inc.
-.\" All rights reserved.
-.\"
-.\" Redistribution and use in source and binary forms, with or without
-.\" modification, are permitted provided that the following conditions
-.\" are met:
-.\" 1. Redistributions of source code must retain the above copyright
-.\" notice, this list of conditions and the following disclaimer.
-.\" 2. Redistributions in binary form must reproduce the above copyright
-.\" notice, this list of conditions and the following disclaimer in the
-.\" documentation and/or other materials provided with the distribution.
-.\" 3. Neither the name of Apple Computer, Inc. ("Apple") nor the names of
-.\" its contributors may be used to endorse or promote products derived
-.\" from this software without specific prior written permission.
-.\"
-.\" THIS SOFTWARE IS PROVIDED BY APPLE AND ITS CONTRIBUTORS "AS IS" AND
-.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-.\" ARE DISCLAIMED. IN NO EVENT SHALL APPLE OR ITS CONTRIBUTORS BE LIABLE FOR
-.\" ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
-.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
-.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
-.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
-.\" STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
-.\" IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
-.\" POSSIBILITY OF SUCH DAMAGE.
-.\"
-.\" $P4: //depot/projects/trustedbsd/openbsm/man/audit_class.5#10 $
-.\"
-.Dd January 24, 2004
-.Dt AUDIT_CLASS 5
-.Os
-.Sh NAME
-.Nm audit_class
-.Nd "audit event class descriptions"
-.Sh DESCRIPTION
-The
-.Nm
-file contains descriptions of the auditable event classes on the system.
-Each auditable event is a member of an event class.
-Each line maps an audit event
-mask (bitmap) to a class and a description.
-Entries are of the form:
-.Pp
-.D1 Ar classmask Ns : Ns Ar eventclass Ns : Ns Ar description
-.Pp
-Example entries in this file are:
-.Bd -literal -offset indent
-0x00000000:no:invalid class
-0x00000001:fr:file read
-0x00000002:fw:file write
-0x00000004:fa:file attribute access
-0x00000080:pc:process
-0xffffffff:all:all flags set
-.Ed
-.Sh FILES
-.Bl -tag -width ".Pa /etc/security/audit_class" -compact
-.It Pa /etc/security/audit_class
-.El
-.Sh SEE ALSO
-.Xr audit 4 ,
-.Xr audit_control 5 ,
-.Xr audit_event 5 ,
-.Xr audit_user 5
-.Sh HISTORY
-The OpenBSM implementation was created by McAfee Research, the security
-division of McAfee Inc., under contract to Apple Computer Inc.\& in 2004.
-It was subsequently adopted by the TrustedBSD Project as the foundation for
-the OpenBSM distribution.
-.Sh AUTHORS
-.An -nosplit
-This software was created by McAfee Research, the security research division
-of McAfee, Inc., under contract to Apple Computer Inc.
-Additional authors include
-.An Wayne Salamon ,
-.An Robert Watson ,
-and SPARTA Inc.
-.Pp
-The Basic Security Module (BSM) interface to audit records and audit event
-stream format were defined by Sun Microsystems.
diff --git a/contrib/openbsm/man/audit_control.5 b/contrib/openbsm/man/audit_control.5
deleted file mode 100644
index a91f504..0000000
--- a/contrib/openbsm/man/audit_control.5
+++ /dev/null
@@ -1,209 +0,0 @@
-.\" Copyright (c) 2004 Apple Computer, Inc.
-.\" Copyright (c) 2006 Robert N. M. Watson
-.\" All rights reserved.
-.\"
-.\" Redistribution and use in source and binary forms, with or without
-.\" modification, are permitted provided that the following conditions
-.\" are met:
-.\" 1. Redistributions of source code must retain the above copyright
-.\" notice, this list of conditions and the following disclaimer.
-.\" 2. Redistributions in binary form must reproduce the above copyright
-.\" notice, this list of conditions and the following disclaimer in the
-.\" documentation and/or other materials provided with the distribution.
-.\" 3. Neither the name of Apple Computer, Inc. ("Apple") nor the names of
-.\" its contributors may be used to endorse or promote products derived
-.\" from this software without specific prior written permission.
-.\"
-.\" THIS SOFTWARE IS PROVIDED BY APPLE AND ITS CONTRIBUTORS "AS IS" AND
-.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-.\" ARE DISCLAIMED. IN NO EVENT SHALL APPLE OR ITS CONTRIBUTORS BE LIABLE FOR
-.\" ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
-.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
-.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
-.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
-.\" STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
-.\" IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
-.\" POSSIBILITY OF SUCH DAMAGE.
-.\"
-.\" $P4: //depot/projects/trustedbsd/openbsm/man/audit_control.5#17 $
-.\"
-.Dd January 4, 2006
-.Dt AUDIT_CONTROL 5
-.Os
-.Sh NAME
-.Nm audit_control
-.Nd "audit system parameters"
-.Sh DESCRIPTION
-The
-.Nm
-file contains several audit system parameters.
-Each line of this file is of the form:
-.Pp
-.D1 Ar parameter Ns : Ns Ar value
-.Pp
-The parameters are:
-.Bl -tag -width indent
-.It Va dir
-The directory where audit log files are stored.
-There may be more than one of these entries.
-Changes to this entry can only be enacted by restarting the
-audit system.
-See
-.Xr audit 8
-for a description of how to restart the audit system.
-.It Va flags
-Specifies which audit event classes are audited for all users.
-.Xr audit_user 5
-describes how to audit events for individual users.
-See the information below for the format of the audit flags.
-.It Va naflags
-Contains the audit flags that define what classes of events are audited when
-an action cannot be attributed to a specific user.
-.It Va minfree
-The minimum free space required on the file system audit logs are being written to.
-When the free space falls below this limit a warning will be issued.
-Not currently used as the value of 20 percent is chosen by the kernel.
-.It Va policy
-A list of global audit policy flags specifying various behaviors, such as
-fail stop, auditing of paths and arguments, etc.
-.It Va filesz
-Maximum trail size in bytes; if set to a non-0 value, the audit daemon will
-rotate the audit trail file at around this size.
-Sizes less than the minimum trail size (default of 512K) will be rejected as
-invalid.
-If 0, trail files will not be automatically rotated based on file size.
-.El
-.Sh AUDIT FLAGS
-Audit flags are a comma-delimited list of audit classes as defined in the
-.Xr audit_class 5
-file.
-Event classes may be preceded by a prefix which changes their interpretation.
-The following prefixes may be used for each class:
-.Pp
-.Bl -tag -width indent -compact -offset indent
-.It (none)
-Record both successful and failed events.
-.It Li +
-Record successful events.
-.It Li -
-Record failed events.
-.It Li ^
-Record neither successful nor failed events.
-.It Li ^+
-Do not record successful events.
-.It Li ^-
-Do not record failed events.
-.El
-.Sh AUDIT POLICY FLAGS
-The policy flags field is a comma-delimited list of policy flags from the
-following list:
-.Pp
-.Bl -tag -width ".Cm zonename" -compact -offset indent
-.It Cm cnt
-Allow processes to continue running even though events are not being audited.
-If not set, processes will be suspended when the audit store space is
-exhausted.
-Currently, this is not a recoverable state.
-.It Cm ahlt
-Fail stop the system if unable to audit an event\[em]this consists of first
-draining pending records to disk, and then halting the operating system.
-.It Cm argv
-Audit command line arguments to
-.Xr execve 2 .
-.It Cm arge
-Audit environmental variable arguments to
-.Xr execve 2 .
-.It Cm seq
-Include a unique audit sequence number token in generated audit records (not
-implemented on
-.Fx
-or Darwin).
-.It Cm group
-Include supplementary groups list in generated audit records (not implemented
-on
-.Fx
-or Darwin; supplementary groups are never included in records on
-these systems).
-.It Cm trail
-Append a trailer token to each audit record (not implemented on
-.Fx
-or
-Darwin; trailers are always included in records on these systems).
-.It Cm path
-Include secondary file paths in audit records (not implemented on
-.Fx
-or
-Darwin; secondary paths are never included in records on these systems).
-.It Cm zonename
-Include a zone ID token with each audit record (not implemented on
-.Fx
-or
-Darwin;
-.Fx
-audit records do not currently include the jail ID or name).
-.It Cm perzone
-Enable auditing for each local zone (not implemented on
-.Fx
-or Darwin; on
-.Fx ,
-audit records are collected from all jails and placed in a single
-global trail, and only limited audit controls are permitted within a jail).
-.El
-.Pp
-It is recommended that installations set the
-.Cm cnt
-flag but not
-.Cm ahlt
-flag unless it is intended that audit logs exceeding available disk space
-halt the system.
-.Sh DEFAULT
-The following settings appear in the default
-.Nm
-file:
-.Bd -literal -offset indent
-dir:/var/audit
-flags:lo
-minfree:20
-naflags:lo
-policy:cnt
-filesz:0
-.Ed
-.Pp
-The
-.Va flags
-parameter above specifies the system-wide mask corresponding to login/logout
-events.
-The
-.Va policy
-parameter specifies that the system should neither fail stop nor suspend
-processes when the audit store fills.
-The trail file will not be automatically rotated by the audit daemon based on
-file size.
-.Sh FILES
-.Bl -tag -width ".Pa /etc/security/audit_control" -compact
-.It Pa /etc/security/audit_control
-.El
-.Sh SEE ALSO
-.Xr audit 4 ,
-.Xr audit_class 5 ,
-.Xr audit_event 5 ,
-.Xr audit_user 5 ,
-.Xr audit 8 ,
-.Xr auditd 8
-.Sh HISTORY
-The OpenBSM implementation was created by McAfee Research, the security
-division of McAfee Inc., under contract to Apple Computer Inc.\& in 2004.
-It was subsequently adopted by the TrustedBSD Project as the foundation for
-the OpenBSM distribution.
-.Sh AUTHORS
-.An -nosplit
-This software was created by McAfee Research, the security research division
-of McAfee, Inc., under contract to Apple Computer Inc.
-Additional authors include
-.An Wayne Salamon ,
-.An Robert Watson ,
-and SPARTA Inc.
-.Pp
-The Basic Security Module (BSM) interface to audit records and audit event
-stream format were defined by Sun Microsystems.
diff --git a/contrib/openbsm/man/audit_event.5 b/contrib/openbsm/man/audit_event.5
deleted file mode 100644
index 75e67aa..0000000
--- a/contrib/openbsm/man/audit_event.5
+++ /dev/null
@@ -1,84 +0,0 @@
-.\" Copyright (c) 2004 Apple Computer, Inc.
-.\" All rights reserved.
-.\"
-.\" Redistribution and use in source and binary forms, with or without
-.\" modification, are permitted provided that the following conditions
-.\" are met:
-.\" 1. Redistributions of source code must retain the above copyright
-.\" notice, this list of conditions and the following disclaimer.
-.\" 2. Redistributions in binary form must reproduce the above copyright
-.\" notice, this list of conditions and the following disclaimer in the
-.\" documentation and/or other materials provided with the distribution.
-.\" 3. Neither the name of Apple Computer, Inc. ("Apple") nor the names of
-.\" its contributors may be used to endorse or promote products derived
-.\" from this software without specific prior written permission.
-.\"
-.\" THIS SOFTWARE IS PROVIDED BY APPLE AND ITS CONTRIBUTORS "AS IS" AND
-.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-.\" ARE DISCLAIMED. IN NO EVENT SHALL APPLE OR ITS CONTRIBUTORS BE LIABLE FOR
-.\" ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
-.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
-.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
-.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
-.\" STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
-.\" IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
-.\" POSSIBILITY OF SUCH DAMAGE.
-.\"
-.\" $P4: //depot/projects/trustedbsd/openbsm/man/audit_event.5#11 $
-.\"
-.Dd January 24, 2004
-.Dt AUDIT_EVENT 5
-.Os
-.Sh NAME
-.Nm audit_event
-.Nd "audit event descriptions"
-.Sh DESCRIPTION
-The
-.Nm
-file contains descriptions of the auditable events on the system.
-Each line maps an audit event number to a name, a description, and a class.
-Entries are of the form:
-.Pp
-.Sm off
-.D1 Ar eventnum : eventname : description : eventclass
-.Sm on
-.Pp
-Each
-.Ar eventclass
-should have a corresponding entry in the
-.Xr audit_class 5
-file.
-.Pp
-Example entries in this file are:
-.Bd -literal -offset indent
-0:AUE_NULL:indir system call:no
-1:AUE_EXIT:exit(2):pc
-2:AUE_FORK:fork(2):pc
-3:AUE_OPEN:open(2):fa
-.Ed
-.Sh FILES
-.Bl -tag -width ".Pa /etc/security/audit_event" -compact
-.It Pa /etc/security/audit_event
-.El
-.Sh SEE ALSO
-.Xr audit 4 ,
-.Xr audit_class 5 ,
-.Xr audit_control 5 ,
-.Xr audit_user 5
-.Sh HISTORY
-The OpenBSM implementation was created by McAfee Research, the security
-division of McAfee Inc., under contract to Apple Computer Inc.\& in 2004.
-It was subsequently adopted by the TrustedBSD Project as the foundation for
-the OpenBSM distribution.
-.Sh AUTHORS
-.An -nosplit
-This software was created by McAfee Research, the security research division
-of McAfee, Inc., under contract to Apple Computer Inc.
-Additional authors include
-.An Wayne Salamon ,
-.An Robert Watson ,
-and SPARTA Inc.
-.Pp
-The Basic Security Module (BSM) interface to audit records and audit event
-stream format were defined by Sun Microsystems.
diff --git a/contrib/openbsm/man/audit_user.5 b/contrib/openbsm/man/audit_user.5
deleted file mode 100644
index 1779941..0000000
--- a/contrib/openbsm/man/audit_user.5
+++ /dev/null
@@ -1,120 +0,0 @@
-.\" Copyright (c) 2004 Apple Computer, Inc.
-.\" All rights reserved.
-.\"
-.\" Redistribution and use in source and binary forms, with or without
-.\" modification, are permitted provided that the following conditions
-.\" are met:
-.\" 1. Redistributions of source code must retain the above copyright
-.\" notice, this list of conditions and the following disclaimer.
-.\" 2. Redistributions in binary form must reproduce the above copyright
-.\" notice, this list of conditions and the following disclaimer in the
-.\" documentation and/or other materials provided with the distribution.
-.\" 3. Neither the name of Apple Computer, Inc. ("Apple") nor the names of
-.\" its contributors may be used to endorse or promote products derived
-.\" from this software without specific prior written permission.
-.\"
-.\" THIS SOFTWARE IS PROVIDED BY APPLE AND ITS CONTRIBUTORS "AS IS" AND
-.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-.\" ARE DISCLAIMED. IN NO EVENT SHALL APPLE OR ITS CONTRIBUTORS BE LIABLE FOR
-.\" ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
-.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
-.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
-.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
-.\" STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
-.\" IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
-.\" POSSIBILITY OF SUCH DAMAGE.
-.\"
-.\" $P4: //depot/projects/trustedbsd/openbsm/man/audit_user.5#12 $
-.\"
-.Dd February 5, 2006
-.Dt AUDIT_USER 5
-.Os
-.Sh NAME
-.Nm audit_user
-.Nd "events to be audited for given users"
-.Sh DESCRIPTION
-The
-.Nm
-file specifies which audit event classes are to be audited for the given users.
-If specified, these flags are combined with the system-wide audit flags in the
-.Xr audit_control 5
-file to determine which classes of events to audit for that user.
-These settings take effect when the user logs in.
-.Pp
-Each line maps a user name to a list of classes that should be audited and a
-list of classes that should not be audited.
-Entries are of the form:
-.Pp
-.D1 Ar username Ns : Ns Ar alwaysaudit Ns : Ns Ar neveraudit
-.Pp
-In the format above,
-.Ar alwaysaudit
-is a set of event classes that are always audited, and
-.Ar neveraudit
-is a set of event classes that should not be audited.
-These sets can indicate
-the inclusion or exclusion of multiple classes, and whether to audit successful
-or failed events.
-See
-.Xr audit_control 5
-for more information about audit flags.
-.Pp
-Example entries in this file are:
-.Bd -literal -offset indent
-root:lo,ad:no
-jdoe:-fc,ad:+fw
-.Ed
-.Pp
-These settings would cause login/logout and administrative events that
-succeed on behalf of user
-.Dq Li root
-to be audited.
-No failure events are audited.
-For the user
-.Dq Li jdoe ,
-failed file creation events are audited, administrative events are
-audited, and successful file write events are never audited.
-.Sh IMPLEMENTATION NOTES
-Per-user and global audit preselection configuration are evaluated at time of
-login, so users must log out and back in again for audit changes relating to
-preselection to take effect.
-.Pp
-Audit record preselection occurs with respect to the audit identifier
-associated with a process, rather than with respect to the UNIX user or group
-ID.
-The audit identifier is set as part of the user credential context as part of
-login, and typically does not change as a result of running setuid or setgid
-applications, such as
-.Xr su 1 .
-This has the advantage that events that occur after running
-.Xr su 1
-can be audited to the original authenticated user, as required by CAPP, but
-may be surprising if not expected.
-.Sh FILES
-.Bl -tag -width ".Pa /etc/security/audit_user" -compact
-.It Pa /etc/security/audit_user
-.El
-.Sh SEE ALSO
-.Xr login 1 ,
-.Xr su 1 ,
-.Xr audit 4 ,
-.Xr audit_class 5 ,
-.Xr audit_control 5 ,
-.Xr audit_event 5
-.Sh HISTORY
-The OpenBSM implementation was created by McAfee Research, the security
-division of McAfee Inc., under contract to Apple Computer Inc.\& in 2004.
-It was subsequently adopted by the TrustedBSD Project as the foundation for
-the OpenBSM distribution.
-.Sh AUTHORS
-.An -nosplit
-This software was created by McAfee Research, the security research division
-of McAfee, Inc., under contract to Apple Computer Inc.
-Additional authors include
-.An Wayne Salamon ,
-.An Robert Watson ,
-and SPARTA Inc.
-.Pp
-The Basic Security Module (BSM) interface to audit records and audit event
-stream format were defined by Sun Microsystems.
diff --git a/contrib/openbsm/man/audit_warn.5 b/contrib/openbsm/man/audit_warn.5
deleted file mode 100644
index d7b20b6..0000000
--- a/contrib/openbsm/man/audit_warn.5
+++ /dev/null
@@ -1,76 +0,0 @@
-.\" Copyright (c) 2004 Apple Computer, Inc.
-.\" All rights reserved.
-.\"
-.\" Redistribution and use in source and binary forms, with or without
-.\" modification, are permitted provided that the following conditions
-.\" are met:
-.\" 1. Redistributions of source code must retain the above copyright
-.\" notice, this list of conditions and the following disclaimer.
-.\" 2. Redistributions in binary form must reproduce the above copyright
-.\" notice, this list of conditions and the following disclaimer in the
-.\" documentation and/or other materials provided with the distribution.
-.\" 3. Neither the name of Apple Computer, Inc. ("Apple") nor the names of
-.\" its contributors may be used to endorse or promote products derived
-.\" from this software without specific prior written permission.
-.\"
-.\" THIS SOFTWARE IS PROVIDED BY APPLE AND ITS CONTRIBUTORS "AS IS" AND
-.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-.\" ARE DISCLAIMED. IN NO EVENT SHALL APPLE OR ITS CONTRIBUTORS BE LIABLE FOR
-.\" ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
-.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
-.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
-.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
-.\" STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
-.\" IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
-.\" POSSIBILITY OF SUCH DAMAGE.
-.\"
-.\" $P4: //depot/projects/trustedbsd/openbsm/man/audit_warn.5#9 $
-.\"
-.Dd March 17, 2004
-.Dt AUDIT_WARN 5
-.Os
-.Sh NAME
-.Nm audit_warn
-.Nd "alert when audit daemon issues warnings"
-.Sh DESCRIPTION
-The
-.Nm
-script
-runs when
-.Xr auditd 8
-generates warning messages.
-.Pp
-The default
-.Nm
-is a script whose first parameter is the type of warning; the script
-appends its arguments to
-.Pa /etc/security/audit_messages .
-Administrators may replace this script: a more comprehensive one would take
-different actions based on the type of warning.
-For example, a low-space warning
-could result in an email message being sent to the administrator.
-.Sh FILES
-.Bl -tag -width ".Pa /etc/security/audit_messages" -compact
-.It Pa /etc/security/audit_warn
-.It Pa /etc/security/audit_messages
-.El
-.Sh SEE ALSO
-.Xr audit 4 ,
-.Xr auditd 8
-.Sh HISTORY
-The OpenBSM implementation was created by McAfee Research, the security
-division of McAfee Inc., under contract to Apple Computer Inc.\& in 2004.
-It was subsequently adopted by the TrustedBSD Project as the foundation for
-the OpenBSM distribution.
-.Sh AUTHORS
-.An -nosplit
-This software was created by McAfee Research, the security research division
-of McAfee, Inc., under contract to Apple Computer Inc.
-Additional authors include
-.An Wayne Salamon ,
-.An Robert Watson ,
-and SPARTA Inc.
-.Pp
-The Basic Security Module (BSM) interface to audit records and audit event
-stream format were defined by Sun Microsystems.
diff --git a/contrib/openbsm/man/auditctl.2 b/contrib/openbsm/man/auditctl.2
deleted file mode 100644
index ac3c41a..0000000
--- a/contrib/openbsm/man/auditctl.2
+++ /dev/null
@@ -1,79 +0,0 @@
-.\"-
-.\" Copyright (c) 2005-2006 Robert N. M. Watson
-.\" All rights reserved.
-.\"
-.\" Redistribution and use in source and binary forms, with or without
-.\" modification, are permitted provided that the following conditions
-.\" are met:
-.\" 1. Redistributions of source code must retain the above copyright
-.\" notice, this list of conditions and the following disclaimer.
-.\" 2. Redistributions in binary form must reproduce the above copyright
-.\" notice, this list of conditions and the following disclaimer in the
-.\" documentation and/or other materials provided with the distribution.
-.\"
-.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
-.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-.\" ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
-.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
-.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
-.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
-.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
-.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
-.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
-.\" SUCH DAMAGE.
-.\"
-.\" $P4: //depot/projects/trustedbsd/openbsm/man/auditctl.2#7 $
-.\"
-.Dd April 19, 2005
-.Dt AUDITCTL 2
-.Os
-.Sh NAME
-.Nm auditctl
-.Nd "configure system audit parameters"
-.Sh SYNOPSIS
-.In bsm/audit.h
-.Ft int
-.Fn auditctl "const char *path"
-.Sh DESCRIPTION
-The
-.Fn auditctl
-system call directs the kernel to open a new audit trail log file.
-It requires an appropriate privilege.
-In the
-.Fx
-implementation,
-.Fn auditctl
-opens new files, but
-.Xr auditon 2
-is used to disable the audit log.
-In the Mac OS X implementation, passing
-.Dv NULL
-to
-.Fn auditctl
-will disable the audit log.
-.Sh RETURN VALUES
-.Rv -std
-.Sh SEE ALSO
-.Xr auditon 2 ,
-.Xr libbsm 3 ,
-.Xr auditd 8
-.Sh HISTORY
-The OpenBSM implementation was created by McAfee Research, the security
-division of McAfee Inc., under contract to Apple Computer Inc.\& in 2004.
-It was subsequently adopted by the TrustedBSD Project as the foundation for
-the OpenBSM distribution.
-.Sh AUTHORS
-.An -nosplit
-This software was created by McAfee Research, the security research division
-of McAfee, Inc., under contract to Apple Computer Inc.
-Additional authors include
-.An Wayne Salamon ,
-.An Robert Watson ,
-and SPARTA Inc.
-.Pp
-The Basic Security Module (BSM) interface to audit records and audit event
-stream format were defined by Sun Microsystems.
-.Pp
-This manual page was written by
-.An Robert Watson Aq rwatson@FreeBSD.org .
diff --git a/contrib/openbsm/man/auditon.2 b/contrib/openbsm/man/auditon.2
deleted file mode 100644
index 953484c..0000000
--- a/contrib/openbsm/man/auditon.2
+++ /dev/null
@@ -1,344 +0,0 @@
-.\"-
-.\" Copyright (c) 2005 Robert N. M. Watson
-.\" Copyright (c) 2005 Tom Rhodes
-.\" Copyright (c) 2005 Wayne J. Salamon
-.\" All rights reserved.
-.\"
-.\" Redistribution and use in source and binary forms, with or without
-.\" modification, are permitted provided that the following conditions
-.\" are met:
-.\" 1. Redistributions of source code must retain the above copyright
-.\" notice, this list of conditions and the following disclaimer.
-.\" 2. Redistributions in binary form must reproduce the above copyright
-.\" notice, this list of conditions and the following disclaimer in the
-.\" documentation and/or other materials provided with the distribution.
-.\"
-.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
-.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-.\" ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
-.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
-.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
-.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
-.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
-.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
-.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
-.\" SUCH DAMAGE.
-.\"
-.\" $P4: //depot/projects/trustedbsd/openbsm/man/auditon.2#11 $
-.\"
-.Dd April 19, 2005
-.Dt AUDITON 2
-.Os
-.Sh NAME
-.Nm auditon
-.Nd "configure system audit parameters"
-.Sh SYNOPSIS
-.In bsm/audit.h
-.Ft int
-.Fn auditon "int cmd" "void *data" "u_int length"
-.Sh DESCRIPTION
-The
-.Fn auditon
-system call is used to manipulate various audit control operations.
-The
-.Fa data
-argument
-should point to a structure whose type depends on the command.
-The
-.Fa length
-argument
-specifies the size of
-.Fa *data
-in bytes.
-The
-.Fa cmd
-argument
-may be any of the following:
-.Bl -tag -width ".It Dv A_GETPINFO_ADDR"
-.It Dv A_SETPOLICY
-Set audit policy flags.
-The
-.Fa data
-argument
-must point to a
-.Vt long
-value set to one of the audit
-policy control values defined in
-.In bsm/audit.h .
-Currently, only
-.Dv AUDIT_CNT
-and
-.Dv AUDIT_AHLT
-are implemented.
-In the
-.Dv AUDIT_CNT
-case, the action will continue regardless if
-an event will not be audited.
-In the
-.Dv AUDIT_AHLT
-case, a
-.Xr panic 9
-will result if an event will not be written to the
-audit log file.
-.It Dv A_SETKAUDIT
-Return
-.Er ENOSYS .
-.It Dv A_SETKMASK
-Set the kernel preselection masks (success and failure).
-The
-.Fa data
-argument
-must point to a
-.Vt au_mask_t
-structure containing the mask values.
-These masks are used for non-attributable audit event preselection.
-.It Dv A_SETQCTRL
-Set kernel audit queue parameters.
-The
-.Fa data
-argument
-must point to a
-.Vt au_qctrl_t
-structure containing the
-kernel audit queue control settings:
-.Dq "high water" ,
-.Dq "low water" ,
-.Dq "output buffer size" ,
-.Dq "percent min free disk space" ,
-and
-.Dq delay
-(not currently used).
-.It Dv A_SETSTAT
-Return
-.Er ENOSYS .
-.It Dv A_SETUMASK
-Return
-.Er ENOSYS .
-.It Dv A_SETSMASK
-Return
-.Er ENOSYS .
-.It Dv A_SETCOND
-Set the current auditing condition.
-The
-.Fa data
-argument
-must point to a
-.Vt long
-value containing the new
-audit condition, one of
-.Dv AUC_AUDITING ,
-.Dv AUC_NOAUDIT ,
-or
-.Dv AUC_DISABLED .
-.It Dv A_SETCLASS
-Set the event class preselection mask for an audit event.
-The
-.Fa data
-argument
-must point to a
-.Vt au_evclass_map_t
-structure containing the audit event and mask.
-.It Dv A_SETPMASK
-Set the preselection masks for a process.
-The
-.Fa data
-argument
-must point to a
-.Vt auditpinfo_t
-structure that contains the given process's audit
-preselection masks for both success and failure.
-.It Dv A_SETFSIZE
-Set the maximum size of the audit log file.
-The
-.Fa data
-argument
-must point to a
-.Vt au_fstat_t
-structure with the
-.Va af_filesz
-field set to the maximum audit log file size.
-A value of 0
-indicates no limit to the size.
-.It Dv A_SETKAUDIT
-Return
-.Er ENOSYS .
-.It Dv A_GETCLASS
-Return the event to class mapping for the designated audit event.
-The
-.Fa data
-argument
-must point to a
-.Vt au_evclass_map_t
-structure.
-.It Dv A_GETKAUDIT
-Return
-.Er ENOSYS .
-.It Dv A_GETPINFO
-Return the audit settings for a process.
-The
-.Fa data
-argument
-must point to a
-.Vt auditpinfo_t
-structure which will be set to contain
-the audit ID, preselection mask, terminal ID, and audit session
-ID of the given process.
-.It Dv A_GETPINFO_ADDR
-Return
-.Er ENOSYS .
-.It Dv A_GETKMASK
-Return the current kernel preselection masks.
-The
-.Fa data
-argument
-must point to a
-.Vt au_mask_t
-structure which will be set to
-the current kernel preselection masks for non-attributable events.
-.It Dv A_GETPOLICY
-Return the current audit policy setting.
-The
-.Fa data
-argument
-must point to a
-.Vt long
-value which will be set to
-one of the current audit policy flags.
-Currently, only
-.Dv AUDIT_CNT
-and
-.Dv AUDIT_AHLT
-are implemented.
-.It Dv A_GETQCTRL
-Return the current kernel audit queue control parameters.
-The
-.Fa data
-argument
-must point to a
-.Vt au_qctrl_t
-structure which will be set to the current
-kernel audit queue control parameters.
-.It Dv A_GETFSIZE
-Returns the maximum size of the audit log file.
-The
-.Fa data
-argument
-must point to a
-.Vt au_fstat_t
-structure.
-The
-.Va af_filesz
-field will be set to the maximum audit log file size.
-A value of 0 indicates no limit to the size.
-The
-.Va af_currsz
-field
-will be set to the current audit log file size.
-.It Dv A_GETCWD
-.\" [COMMENTED OUT]: Valid description, not yet implemented.
-.\" Return the current working directory as stored in the audit subsystem.
-Return
-.Er ENOSYS .
-.It Dv A_GETCAR
-.\" [COMMENTED OUT]: Valid description, not yet implemented.
-.\"Stores and returns the current active root as stored in the audit
-.\"subsystem.
-Return
-.Er ENOSYS .
-.It Dv A_GETSTAT
-.\" [COMMENTED OUT]: Valid description, not yet implemented.
-.\"Return the statistics stored in the audit system.
-Return
-.Er ENOSYS .
-.It Dv A_GETCOND
-Return the current auditing condition.
-The
-.Fa data
-argument
-must point to a
-.Vt long
-value which will be set to
-the current audit condition, either
-.Dv AUC_AUDITING
-or
-.Dv AUC_NOAUDIT .
-.It Dv A_SENDTRIGGER
-Send a trigger to the audit daemon.
-The
-.Fa data
-argument
-must point to a
-.Vt long
-value set to one of the acceptable
-trigger values:
-.Dv AUDIT_TRIGGER_LOW_SPACE
-(low disk space where the audit log resides),
-.Dv AUDIT_TRIGGER_OPEN_NEW
-(open a new audit log file),
-.Dv AUDIT_TRIGGER_READ_FILE
-(read the
-.Pa audit_control
-file),
-.Dv AUDIT_TRIGGER_CLOSE_AND_DIE
-(close the current log file and exit),
-or
-.Dv AUDIT_TRIGGER_NO_SPACE
-(no disk space left for audit log file).
-.El
-.Sh RETURN VALUES
-.Rv -std
-.Sh ERRORS
-The
-.Fn auditon
-function will fail if:
-.Bl -tag -width Er
-.It Bq Er ENOSYS
-Returned by options not yet implemented.
-.It Bq Er EFAULT
-A failure occurred while data transferred to or from
-the kernel failed.
-.It Bq Er EINVAL
-Illegal argument was passed by a system call.
-.It Bq Er EPERM
-The process does not have sufficient permission to complete
-the operation.
-.El
-.Pp
-The
-.Dv A_SENDTRIGGER
-command is specific to the
-.Fx
-and Mac OS X implementations, and is not present in Solaris.
-.Sh SEE ALSO
-.Xr audit 2 ,
-.Xr auditctl 2 ,
-.Xr getaudit 2 ,
-.Xr getaudit_addr 2 ,
-.Xr getauid 2 ,
-.Xr setaudit 2 ,
-.Xr setaudit_addr 2 ,
-.Xr setauid 2 ,
-.Xr libbsm 3
-.Sh HISTORY
-The OpenBSM implementation was created by McAfee Research, the security
-division of McAfee Inc., under contract to Apple Computer Inc.\& in 2004.
-It was subsequently adopted by the TrustedBSD Project as the foundation for
-the OpenBSM distribution.
-.Sh AUTHORS
-.An -nosplit
-This software was created by McAfee Research, the security research division
-of McAfee, Inc., under contract to Apple Computer Inc.
-Additional authors include
-.An Wayne Salamon ,
-.An Robert Watson ,
-and SPARTA Inc.
-.Pp
-The Basic Security Module (BSM) interface to audit records and audit event
-stream format were defined by Sun Microsystems.
-.Pp
-This manual page was written by
-.An Tom Rhodes Aq trhodes@FreeBSD.org ,
-.An Robert Watson Aq rwatson@FreeBSD.org ,
-and
-.An Wayne Salamon Aq wsalamon@FreeBSD.org .
diff --git a/contrib/openbsm/man/getaudit.2 b/contrib/openbsm/man/getaudit.2
deleted file mode 100644
index 0592721..0000000
--- a/contrib/openbsm/man/getaudit.2
+++ /dev/null
@@ -1,85 +0,0 @@
-.\"-
-.\" Copyright (c) 2005 Robert N. M. Watson
-.\" All rights reserved.
-.\"
-.\" Redistribution and use in source and binary forms, with or without
-.\" modification, are permitted provided that the following conditions
-.\" are met:
-.\" 1. Redistributions of source code must retain the above copyright
-.\" notice, this list of conditions and the following disclaimer.
-.\" 2. Redistributions in binary form must reproduce the above copyright
-.\" notice, this list of conditions and the following disclaimer in the
-.\" documentation and/or other materials provided with the distribution.
-.\"
-.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
-.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-.\" ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
-.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
-.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
-.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
-.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
-.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
-.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
-.\" SUCH DAMAGE.
-.\"
-.\" $P4: //depot/projects/trustedbsd/openbsm/man/getaudit.2#7 $
-.\"
-.Dd April 19, 2005
-.Dt GETAUDIT 2
-.Os
-.Sh NAME
-.Nm getaudit ,
-.Nm getaudit_addr
-.Nd "retrieve audit session state"
-.Sh SYNOPSIS
-.In bsm/audit.h
-.Ft int
-.Fn getaudit "auditinfo_t *auditinfo"
-.Ft int
-.Fn getaudit_addr "auditinfo_addr_t *auditinfo_addr" "u_int length"
-.Sh DESCRIPTION
-The
-.Fn getaudit
-system call
-retrieves the active audit session state for the current process via the
-.Vt auditinfo_t
-pointed to by
-.Fa auditinfo .
-The
-.Fn getaudit_addr
-system call
-retrieves extended state via
-.Fa auditinfo_addr
-and
-.Fa length .
-.Pp
-These system calls require an appropriate privilege to complete.
-.Sh RETURN VALUES
-.Rv -std getaudit getaudit_addr
-.Sh SEE ALSO
-.Xr audit 2 ,
-.Xr auditon 2 ,
-.Xr getauid 2 ,
-.Xr setaudit 2 ,
-.Xr setauid 2 ,
-.Xr libbsm 3
-.Sh HISTORY
-The OpenBSM implementation was created by McAfee Research, the security
-division of McAfee Inc., under contract to Apple Computer Inc.\& in 2004.
-It was subsequently adopted by the TrustedBSD Project as the foundation for
-the OpenBSM distribution.
-.Sh AUTHORS
-.An -nosplit
-This software was created by McAfee Research, the security research division
-of McAfee, Inc., under contract to Apple Computer Inc.
-Additional authors include
-.An Wayne Salamon ,
-.An Robert Watson ,
-and SPARTA Inc.
-.Pp
-The Basic Security Module (BSM) interface to audit records and audit event
-stream format were defined by Sun Microsystems.
-.Pp
-This manual page was written by
-.An Robert Watson Aq rwatson@FreeBSD.org .
diff --git a/contrib/openbsm/man/getauid.2 b/contrib/openbsm/man/getauid.2
deleted file mode 100644
index 2624f1e..0000000
--- a/contrib/openbsm/man/getauid.2
+++ /dev/null
@@ -1,77 +0,0 @@
-.\"-
-.\" Copyright (c) 2005 Robert N. M. Watson
-.\" All rights reserved.
-.\"
-.\" Redistribution and use in source and binary forms, with or without
-.\" modification, are permitted provided that the following conditions
-.\" are met:
-.\" 1. Redistributions of source code must retain the above copyright
-.\" notice, this list of conditions and the following disclaimer.
-.\" 2. Redistributions in binary form must reproduce the above copyright
-.\" notice, this list of conditions and the following disclaimer in the
-.\" documentation and/or other materials provided with the distribution.
-.\"
-.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
-.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-.\" ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
-.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
-.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
-.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
-.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
-.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
-.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
-.\" SUCH DAMAGE.
-.\"
-.\" $P4: //depot/projects/trustedbsd/openbsm/man/getauid.2#7 $
-.\"
-.Dd April 19, 2005
-.Dt GETAUID 2
-.Os
-.Sh NAME
-.Nm getauid
-.Nd "retrieve audit session ID"
-.Sh SYNOPSIS
-.In bsm/audit.h
-.Ft int
-.Fn getauid "au_id_t *auid"
-.Sh DESCRIPTION
-The
-.Fn getauid
-system call
-retrieves the active audit session ID for the current process via the
-.Vt au_id_t
-pointed to by
-.Fa auid .
-.Pp
-This system call requires an appropriate privilege to complete.
-.Sh RETURN VALUES
-.Rv -std
-.Sh SEE ALSO
-.Xr audit 2 ,
-.Xr auditon 2 ,
-.Xr getaudit 2 ,
-.Xr getaudit_addr 2 ,
-.Xr setaudit 2 ,
-.Xr setaudit_addr 2 ,
-.Xr setauid 2 ,
-.Xr libbsm 3
-.Sh HISTORY
-The OpenBSM implementation was created by McAfee Research, the security
-division of McAfee Inc., under contract to Apple Computer Inc.\& in 2004.
-It was subsequently adopted by the TrustedBSD Project as the foundation for
-the OpenBSM distribution.
-.Sh AUTHORS
-.An -nosplit
-This software was created by McAfee Research, the security research division
-of McAfee, Inc., under contract to Apple Computer Inc.
-Additional authors include
-.An Wayne Salamon ,
-.An Robert Watson ,
-and SPARTA Inc.
-.Pp
-The Basic Security Module (BSM) interface to audit records and audit event
-stream format were defined by Sun Microsystems.
-.Pp
-This manual page was written by
-.An Robert Watson Aq rwatson@FreeBSD.org .
diff --git a/contrib/openbsm/man/setaudit.2 b/contrib/openbsm/man/setaudit.2
deleted file mode 100644
index 22e2192..0000000
--- a/contrib/openbsm/man/setaudit.2
+++ /dev/null
@@ -1,85 +0,0 @@
-.\"-
-.\" Copyright (c) 2005 Robert N. M. Watson
-.\" All rights reserved.
-.\"
-.\" Redistribution and use in source and binary forms, with or without
-.\" modification, are permitted provided that the following conditions
-.\" are met:
-.\" 1. Redistributions of source code must retain the above copyright
-.\" notice, this list of conditions and the following disclaimer.
-.\" 2. Redistributions in binary form must reproduce the above copyright
-.\" notice, this list of conditions and the following disclaimer in the
-.\" documentation and/or other materials provided with the distribution.
-.\"
-.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
-.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-.\" ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
-.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
-.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
-.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
-.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
-.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
-.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
-.\" SUCH DAMAGE.
-.\"
-.\" $P4: //depot/projects/trustedbsd/openbsm/man/setaudit.2#7 $
-.\"
-.Dd April 19, 2005
-.Dt SETAUDIT 2
-.Os
-.Sh NAME
-.Nm setaudit ,
-.Nm setaudit_addr
-.Nd "set audit session state"
-.Sh SYNOPSIS
-.In bsm/audit.h
-.Ft int
-.Fn setaudit "auditinfo_t *auditinfo"
-.Ft int
-.Fn setaudit_addr "auditinfo_addr_t *auditinfo_addr" "u_int length"
-.Sh DESCRIPTION
-The
-.Fn setaudit
-system call
-sets the active audit session state for the current process via the
-.Vt auditinfo_t
-pointed to by
-.Fa auditinfo .
-The
-.Fn setaudit_addr
-system call
-sets extended state via
-.Fa auditinfo_addr
-and
-.Fa length .
-.Pp
-These system calls require an appropriate privilege to complete.
-.Sh RETURN VALUES
-.Rv -std setaudit setaudit_addr
-.Sh SEE ALSO
-.Xr audit 2 ,
-.Xr auditon 2 ,
-.Xr getaudit 2 ,
-.Xr getauid 2 ,
-.Xr setauid 2 ,
-.Xr libbsm 3
-.Sh HISTORY
-The OpenBSM implementation was created by McAfee Research, the security
-division of McAfee Inc., under contract to Apple Computer Inc.\& in 2004.
-It was subsequently adopted by the TrustedBSD Project as the foundation for
-the OpenBSM distribution.
-.Sh AUTHORS
-.An -nosplit
-This software was created by McAfee Research, the security research division
-of McAfee, Inc., under contract to Apple Computer Inc.
-Additional authors include
-.An Wayne Salamon ,
-.An Robert Watson ,
-and SPARTA Inc.
-.Pp
-The Basic Security Module (BSM) interface to audit records and audit event
-stream format were defined by Sun Microsystems.
-.Pp
-This manual page was written by
-.An Robert Watson Aq rwatson@FreeBSD.org .
diff --git a/contrib/openbsm/man/setauid.2 b/contrib/openbsm/man/setauid.2
deleted file mode 100644
index a736a34..0000000
--- a/contrib/openbsm/man/setauid.2
+++ /dev/null
@@ -1,77 +0,0 @@
-.\"-
-.\" Copyright (c) 2005 Robert N. M. Watson
-.\" All rights reserved.
-.\"
-.\" Redistribution and use in source and binary forms, with or without
-.\" modification, are permitted provided that the following conditions
-.\" are met:
-.\" 1. Redistributions of source code must retain the above copyright
-.\" notice, this list of conditions and the following disclaimer.
-.\" 2. Redistributions in binary form must reproduce the above copyright
-.\" notice, this list of conditions and the following disclaimer in the
-.\" documentation and/or other materials provided with the distribution.
-.\"
-.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
-.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-.\" ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
-.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
-.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
-.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
-.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
-.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
-.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
-.\" SUCH DAMAGE.
-.\"
-.\" $P4: //depot/projects/trustedbsd/openbsm/man/setauid.2#7 $
-.\"
-.Dd April 19, 2005
-.Dt SETAUID 2
-.Os
-.Sh NAME
-.Nm setauid
-.Nd "set audit session ID"
-.Sh SYNOPSIS
-.In bsm/audit.h
-.Ft int
-.Fn setauid "au_id_t *auid"
-.Sh DESCRIPTION
-The
-.Fn setauid
-system call
-sets the active audit session ID for the current process from the
-.Vt au_id_t
-pointed to by
-.Fa auid .
-.Pp
-This system call requires an appropriate privilege to complete.
-.Sh RETURN VALUES
-.Rv -std
-.Sh SEE ALSO
-.Xr audit 2 ,
-.Xr auditon 2 ,
-.Xr getaudit 2 ,
-.Xr getaudit_addr 2 ,
-.Xr getauid 2 ,
-.Xr setaudit 2 ,
-.Xr setaudit_addr 2 ,
-.Xr libbsm 3
-.Sh HISTORY
-The OpenBSM implementation was created by McAfee Research, the security
-division of McAfee Inc., under contract to Apple Computer Inc.\& in 2004.
-It was subsequently adopted by the TrustedBSD Project as the foundation for
-the OpenBSM distribution.
-.Sh AUTHORS
-.An -nosplit
-This software was created by McAfee Research, the security research division
-of McAfee, Inc., under contract to Apple Computer Inc.
-Additional authors include
-.An Wayne Salamon ,
-.An Robert Watson ,
-and SPARTA Inc.
-.Pp
-The Basic Security Module (BSM) interface to audit records and audit event
-stream format were defined by Sun Microsystems.
-.Pp
-This manual page was written by
-.An Robert Watson Aq rwatson@FreeBSD.org .
OpenPOWER on IntegriCloud