Home
last modified time | relevance | path

Searched refs:audit_event (Results 1 – 15 of 15) sorted by relevance

/freebsd/usr.sbin/auditd/
H A DMakefile15 CONFS+= ${OPENBSMETCDIR}/audit_event
16 CONFSMODE_${OPENBSMETCDIR}/audit_event= 444
30 audit_event.5 \
/freebsd/contrib/openbsm/man/
H A DMakefile.am14 audit_event.5 \
H A DMakefile.in292 audit_event.5 \
/freebsd/crypto/openssh/
H A Daudit.h51 void audit_event(struct ssh *, ssh_audit_event_t);
H A Daudit-linux.c100 audit_event(struct ssh *ssh, ssh_audit_event_t event) in audit_event() function
H A Daudit.c134 audit_event(struct ssh *ssh, ssh_audit_event_t event) in audit_event() function
H A DREADME.platform77 If you enable BSM auditing on Solaris, you need to update audit_event(4)
79 added to /etc/security/audit_event:
H A Dauth.c324 audit_event(ssh, audit_classify_auth(method)); in auth_log()
509 audit_event(ssh, SSH_INVALID_USER); in getpwnamallow()
H A Daudit-bsm.c395 audit_event(struct ssh *ssh, ssh_audit_event_t event) in audit_event() function
H A Dsshd-session.c1359 audit_event(ssh, SSH_AUTH_SUCCESS); in main()
1517 audit_event(the_active_state, SSH_CONNECTION_ABANDON); in cleanup_exit()
H A Dmonitor.c1707 audit_event(ssh, event); in mm_answer_audit_event()
H A DChangeLog554 where the code from upstream was merged before the audit_event call when
/freebsd/lib/libbsm/
H A DMakefile
/freebsd/contrib/blocklist/diff/
H A Dssh.diff109 PRIVSEP(audit_event(SSH_INVALID_USER));
/freebsd/contrib/openbsm/
H A DNEWS62 - Fix audit_event definitions of AUE_OPENAT_RWT and AUE_OPENAT_RWTC.