diff options
Diffstat (limited to 'auth.c')
-rw-r--r-- | auth.c | 20 |
1 files changed, 10 insertions, 10 deletions
@@ -252,7 +252,7 @@ auth_log(Authctxt *authctxt, int authenticated, char *method, char *info) | |||
252 | record_failed_login(authctxt->user, | 252 | record_failed_login(authctxt->user, |
253 | get_canonical_hostname(options.use_dns), "ssh"); | 253 | get_canonical_hostname(options.use_dns), "ssh"); |
254 | #endif | 254 | #endif |
255 | #ifdef AUDIT_EVENTS | 255 | #ifdef SSH_AUDIT_EVENTS |
256 | if (authenticated == 0 && !authctxt->postponed) { | 256 | if (authenticated == 0 && !authctxt->postponed) { |
257 | ssh_audit_event_t event; | 257 | ssh_audit_event_t event; |
258 | 258 | ||
@@ -265,15 +265,15 @@ auth_log(Authctxt *authctxt, int authenticated, char *method, char *info) | |||
265 | */ | 265 | */ |
266 | event = audit_classify_auth(method); | 266 | event = audit_classify_auth(method); |
267 | switch(event) { | 267 | switch(event) { |
268 | case AUTH_FAIL_NONE: | 268 | case SSH_AUTH_FAIL_NONE: |
269 | case AUTH_FAIL_PASSWD: | 269 | case SSH_AUTH_FAIL_PASSWD: |
270 | case AUTH_FAIL_KBDINT: | 270 | case SSH_AUTH_FAIL_KBDINT: |
271 | if (geteuid() == 0) | 271 | if (geteuid() == 0) |
272 | audit_event(event); | 272 | audit_event(event); |
273 | break; | 273 | break; |
274 | case AUTH_FAIL_PUBKEY: | 274 | case SSH_AUTH_FAIL_PUBKEY: |
275 | case AUTH_FAIL_HOSTBASED: | 275 | case SSH_AUTH_FAIL_HOSTBASED: |
276 | case AUTH_FAIL_GSSAPI: | 276 | case SSH_AUTH_FAIL_GSSAPI: |
277 | /* | 277 | /* |
278 | * This is required to handle the case where privsep | 278 | * This is required to handle the case where privsep |
279 | * is enabled but it's root logging in, since | 279 | * is enabled but it's root logging in, since |
@@ -515,9 +515,9 @@ getpwnamallow(const char *user) | |||
515 | record_failed_login(user, | 515 | record_failed_login(user, |
516 | get_canonical_hostname(options.use_dns), "ssh"); | 516 | get_canonical_hostname(options.use_dns), "ssh"); |
517 | #endif | 517 | #endif |
518 | #ifdef AUDIT_EVENTS | 518 | #ifdef SSH_AUDIT_EVENTS |
519 | audit_event(INVALID_USER); | 519 | audit_event(SSH_INVALID_USER); |
520 | #endif /* AUDIT_EVENTS */ | 520 | #endif /* SSH_AUDIT_EVENTS */ |
521 | return (NULL); | 521 | return (NULL); |
522 | } | 522 | } |
523 | if (!allowed_user(pw)) | 523 | if (!allowed_user(pw)) |