summaryrefslogtreecommitdiff
path: root/audit.c
diff options
context:
space:
mode:
authorDarren Tucker <dtucker@zip.com.au>2005-02-08 21:52:47 +1100
committerDarren Tucker <dtucker@zip.com.au>2005-02-08 21:52:47 +1100
commit2e0cf0dca20e56eb5d95a80ba0004769c5bc4ba7 (patch)
treed03f7560b26c36b6afd48ffb962775b6424fee72 /audit.c
parentb4d3012d2e9a0eb53c56565108c8278e45cefc77 (diff)
- (dtucker) [audit.c audit.h auth.c auth1.c auth2.c loginrec.c monitor.c
monitor_wrap.c monitor_wrap.h session.c sshd.c]: Prepend all of the audit defines and enums with SSH_ to prevent namespace collisions on some platforms (eg AIX).
Diffstat (limited to 'audit.c')
-rw-r--r--audit.c56
1 files changed, 28 insertions, 28 deletions
diff --git a/audit.c b/audit.c
index 13852a05e..18fc41047 100644
--- a/audit.c
+++ b/audit.c
@@ -1,4 +1,4 @@
1/* $Id: audit.c,v 1.1 2005/02/02 13:37:14 dtucker Exp $ */ 1/* $Id: audit.c,v 1.2 2005/02/08 10:52:48 dtucker Exp $ */
2 2
3/* 3/*
4 * Copyright (c) 2004, 2005 Darren Tucker. All rights reserved. 4 * Copyright (c) 2004, 2005 Darren Tucker. All rights reserved.
@@ -26,7 +26,7 @@
26 26
27#include "includes.h" 27#include "includes.h"
28 28
29#ifdef AUDIT_EVENTS 29#ifdef SSH_AUDIT_EVENTS
30 30
31#include "audit.h" 31#include "audit.h"
32#include "log.h" 32#include "log.h"
@@ -44,22 +44,22 @@ ssh_audit_event_t
44audit_classify_auth(const char *method) 44audit_classify_auth(const char *method)
45{ 45{
46 if (strcmp(method, "none") == 0) 46 if (strcmp(method, "none") == 0)
47 return AUTH_FAIL_NONE; 47 return SSH_AUTH_FAIL_NONE;
48 else if (strcmp(method, "password") == 0) 48 else if (strcmp(method, "password") == 0)
49 return AUTH_FAIL_PASSWD; 49 return SSH_AUTH_FAIL_PASSWD;
50 else if (strcmp(method, "publickey") == 0 || 50 else if (strcmp(method, "publickey") == 0 ||
51 strcmp(method, "rsa") == 0) 51 strcmp(method, "rsa") == 0)
52 return AUTH_FAIL_PUBKEY; 52 return SSH_AUTH_FAIL_PUBKEY;
53 else if (strncmp(method, "keyboard-interactive", 20) == 0 || 53 else if (strncmp(method, "keyboard-interactive", 20) == 0 ||
54 strcmp(method, "challenge-response") == 0) 54 strcmp(method, "challenge-response") == 0)
55 return AUTH_FAIL_KBDINT; 55 return SSH_AUTH_FAIL_KBDINT;
56 else if (strcmp(method, "hostbased") == 0 || 56 else if (strcmp(method, "hostbased") == 0 ||
57 strcmp(method, "rhosts-rsa") == 0) 57 strcmp(method, "rhosts-rsa") == 0)
58 return AUTH_FAIL_HOSTBASED; 58 return SSH_AUTH_FAIL_HOSTBASED;
59 else if (strcmp(method, "gssapi-with-mic") == 0) 59 else if (strcmp(method, "gssapi-with-mic") == 0)
60 return AUTH_FAIL_GSSAPI; 60 return SSH_AUTH_FAIL_GSSAPI;
61 else 61 else
62 return AUDIT_UNKNOWN; 62 return SSH_AUDIT_UNKNOWN;
63} 63}
64 64
65/* helper to return supplied username */ 65/* helper to return supplied username */
@@ -84,32 +84,32 @@ audit_event_lookup(ssh_audit_event_t ev)
84 ssh_audit_event_t event; 84 ssh_audit_event_t event;
85 const char *name; 85 const char *name;
86 } event_lookup[] = { 86 } event_lookup[] = {
87 {LOGIN_EXCEED_MAXTRIES, "LOGIN_EXCEED_MAXTRIES"}, 87 {SSH_LOGIN_EXCEED_MAXTRIES, "LOGIN_EXCEED_MAXTRIES"},
88 {LOGIN_ROOT_DENIED, "LOGIN_ROOT_DENIED"}, 88 {SSH_LOGIN_ROOT_DENIED, "LOGIN_ROOT_DENIED"},
89 {AUTH_SUCCESS, "AUTH_SUCCESS"}, 89 {SSH_AUTH_SUCCESS, "AUTH_SUCCESS"},
90 {AUTH_FAIL_NONE, "AUTH_FAIL_NONE"}, 90 {SSH_AUTH_FAIL_NONE, "AUTH_FAIL_NONE"},
91 {AUTH_FAIL_PASSWD, "AUTH_FAIL_PASSWD"}, 91 {SSH_AUTH_FAIL_PASSWD, "AUTH_FAIL_PASSWD"},
92 {AUTH_FAIL_KBDINT, "AUTH_FAIL_KBDINT"}, 92 {SSH_AUTH_FAIL_KBDINT, "AUTH_FAIL_KBDINT"},
93 {AUTH_FAIL_PUBKEY, "AUTH_FAIL_PUBKEY"}, 93 {SSH_AUTH_FAIL_PUBKEY, "AUTH_FAIL_PUBKEY"},
94 {AUTH_FAIL_HOSTBASED, "AUTH_FAIL_HOSTBASED"}, 94 {SSH_AUTH_FAIL_HOSTBASED, "AUTH_FAIL_HOSTBASED"},
95 {AUTH_FAIL_GSSAPI, "AUTH_FAIL_GSSAPI"}, 95 {SSH_AUTH_FAIL_GSSAPI, "AUTH_FAIL_GSSAPI"},
96 {INVALID_USER, "INVALID_USER"}, 96 {SSH_INVALID_USER, "INVALID_USER"},
97 {NOLOGIN, "NOLOGIN"}, 97 {SSH_NOLOGIN, "NOLOGIN"},
98 {CONNECTION_CLOSE, "CONNECTION_CLOSE"}, 98 {SSH_CONNECTION_CLOSE, "CONNECTION_CLOSE"},
99 {CONNECTION_ABANDON, "CONNECTION_ABANDON"}, 99 {SSH_CONNECTION_ABANDON, "CONNECTION_ABANDON"},
100 {AUDIT_UNKNOWN, "AUDIT_UNKNOWN"} 100 {SSH_AUDIT_UNKNOWN, "AUDIT_UNKNOWN"}
101 }; 101 };
102 102
103 for (i = 0; event_lookup[i].event != AUDIT_UNKNOWN; i++) 103 for (i = 0; event_lookup[i].event != SSH_AUDIT_UNKNOWN; i++)
104 if (event_lookup[i].event == ev) 104 if (event_lookup[i].event == ev)
105 break; 105 break;
106 return(event_lookup[i].name); 106 return(event_lookup[i].name);
107} 107}
108 108
109# ifndef CUSTOM_AUDIT_EVENTS 109# ifndef CUSTOM_SSH_AUDIT_EVENTS
110/* 110/*
111 * Null implementations of audit functions. 111 * Null implementations of audit functions.
112 * These get used if AUDIT_EVENTS is defined but no audit module is enabled. 112 * These get used if SSH_AUDIT_EVENTS is defined but no audit module is enabled.
113 */ 113 */
114 114
115/* 115/*
@@ -177,5 +177,5 @@ audit_run_command(const char *command)
177 debug("audit run command euid %d user %s command '%.200s'", geteuid(), 177 debug("audit run command euid %d user %s command '%.200s'", geteuid(),
178 audit_username(), command); 178 audit_username(), command);
179} 179}
180# endif /* !defined CUSTOM_AUDIT_EVENTS */ 180# endif /* !defined CUSTOM_SSH_AUDIT_EVENTS */
181#endif /* AUDIT_EVENTS */ 181#endif /* SSH_AUDIT_EVENTS */