summaryrefslogtreecommitdiff
path: root/auth.c
diff options
context:
space:
mode:
Diffstat (limited to 'auth.c')
-rw-r--r--auth.c20
1 files changed, 10 insertions, 10 deletions
diff --git a/auth.c b/auth.c
index 4b62ad8f7..e6dcab209 100644
--- a/auth.c
+++ b/auth.c
@@ -252,7 +252,7 @@ auth_log(Authctxt *authctxt, int authenticated, char *method, char *info)
252 record_failed_login(authctxt->user, 252 record_failed_login(authctxt->user,
253 get_canonical_hostname(options.use_dns), "ssh"); 253 get_canonical_hostname(options.use_dns), "ssh");
254#endif 254#endif
255#ifdef AUDIT_EVENTS 255#ifdef SSH_AUDIT_EVENTS
256 if (authenticated == 0 && !authctxt->postponed) { 256 if (authenticated == 0 && !authctxt->postponed) {
257 ssh_audit_event_t event; 257 ssh_audit_event_t event;
258 258
@@ -265,15 +265,15 @@ auth_log(Authctxt *authctxt, int authenticated, char *method, char *info)
265 */ 265 */
266 event = audit_classify_auth(method); 266 event = audit_classify_auth(method);
267 switch(event) { 267 switch(event) {
268 case AUTH_FAIL_NONE: 268 case SSH_AUTH_FAIL_NONE:
269 case AUTH_FAIL_PASSWD: 269 case SSH_AUTH_FAIL_PASSWD:
270 case AUTH_FAIL_KBDINT: 270 case SSH_AUTH_FAIL_KBDINT:
271 if (geteuid() == 0) 271 if (geteuid() == 0)
272 audit_event(event); 272 audit_event(event);
273 break; 273 break;
274 case AUTH_FAIL_PUBKEY: 274 case SSH_AUTH_FAIL_PUBKEY:
275 case AUTH_FAIL_HOSTBASED: 275 case SSH_AUTH_FAIL_HOSTBASED:
276 case AUTH_FAIL_GSSAPI: 276 case SSH_AUTH_FAIL_GSSAPI:
277 /* 277 /*
278 * This is required to handle the case where privsep 278 * This is required to handle the case where privsep
279 * is enabled but it's root logging in, since 279 * is enabled but it's root logging in, since
@@ -515,9 +515,9 @@ getpwnamallow(const char *user)
515 record_failed_login(user, 515 record_failed_login(user,
516 get_canonical_hostname(options.use_dns), "ssh"); 516 get_canonical_hostname(options.use_dns), "ssh");
517#endif 517#endif
518#ifdef AUDIT_EVENTS 518#ifdef SSH_AUDIT_EVENTS
519 audit_event(INVALID_USER); 519 audit_event(SSH_INVALID_USER);
520#endif /* AUDIT_EVENTS */ 520#endif /* SSH_AUDIT_EVENTS */
521 return (NULL); 521 return (NULL);
522 } 522 }
523 if (!allowed_user(pw)) 523 if (!allowed_user(pw))