Searched refs:audit_event (Results 1 – 15 of 15) sorted by relevance
/freebsd/usr.sbin/auditd/ |
H A D | Makefile | 15 CONFS+= ${OPENBSMETCDIR}/audit_event 16 CONFSMODE_${OPENBSMETCDIR}/audit_event= 444 30 audit_event.5 \
|
/freebsd/contrib/openbsm/man/ |
H A D | Makefile.am | 14 audit_event.5 \
|
H A D | Makefile.in | 292 audit_event.5 \
|
/freebsd/crypto/openssh/ |
H A D | audit.h | 51 void audit_event(struct ssh *, ssh_audit_event_t);
|
H A D | audit-linux.c | 100 audit_event(struct ssh *ssh, ssh_audit_event_t event) in audit_event() function
|
H A D | audit.c | 134 audit_event(struct ssh *ssh, ssh_audit_event_t event) in audit_event() function
|
H A D | README.platform | 77 If you enable BSM auditing on Solaris, you need to update audit_event(4) 79 added to /etc/security/audit_event:
|
H A D | auth.c | 324 audit_event(ssh, audit_classify_auth(method)); in auth_log() 509 audit_event(ssh, SSH_INVALID_USER); in getpwnamallow()
|
H A D | audit-bsm.c | 395 audit_event(struct ssh *ssh, ssh_audit_event_t event) in audit_event() function
|
H A D | sshd-session.c | 1359 audit_event(ssh, SSH_AUTH_SUCCESS); in main() 1517 audit_event(the_active_state, SSH_CONNECTION_ABANDON); in cleanup_exit()
|
H A D | monitor.c | 1707 audit_event(ssh, event); in mm_answer_audit_event()
|
H A D | ChangeLog | 554 where the code from upstream was merged before the audit_event call when
|
/freebsd/lib/libbsm/ |
H A D | Makefile |
|
/freebsd/contrib/blocklist/diff/ |
H A D | ssh.diff | 109 PRIVSEP(audit_event(SSH_INVALID_USER));
|
/freebsd/contrib/openbsm/ |
H A D | NEWS | 62 - Fix audit_event definitions of AUE_OPENAT_RWT and AUE_OPENAT_RWTC.
|