summaryrefslogtreecommitdiff
path: root/auth2.c
diff options
context:
space:
mode:
authorDarren Tucker <dtucker@zip.com.au>2005-02-08 21:52:47 +1100
committerDarren Tucker <dtucker@zip.com.au>2005-02-08 21:52:47 +1100
commit2e0cf0dca20e56eb5d95a80ba0004769c5bc4ba7 (patch)
treed03f7560b26c36b6afd48ffb962775b6424fee72 /auth2.c
parentb4d3012d2e9a0eb53c56565108c8278e45cefc77 (diff)
downloadopenssh-git-2e0cf0dca20e56eb5d95a80ba0004769c5bc4ba7.tar.gz
- (dtucker) [audit.c audit.h auth.c auth1.c auth2.c loginrec.c monitor.c
monitor_wrap.c monitor_wrap.h session.c sshd.c]: Prepend all of the audit defines and enums with SSH_ to prevent namespace collisions on some platforms (eg AIX).
Diffstat (limited to 'auth2.c')
-rw-r--r--auth2.c12
1 files changed, 6 insertions, 6 deletions
diff --git a/auth2.c b/auth2.c
index 2727e0ff..2265d311 100644
--- a/auth2.c
+++ b/auth2.c
@@ -167,8 +167,8 @@ input_userauth_request(int type, u_int32_t seq, void *ctxt)
if (options.use_pam)
PRIVSEP(start_pam(authctxt));
#endif
-#ifdef AUDIT_EVENTS
- PRIVSEP(audit_event(INVALID_USER));
+#ifdef SSH_AUDIT_EVENTS
+ PRIVSEP(audit_event(SSH_INVALID_USER));
#endif
}
setproctitle("%s%s", authctxt->valid ? user : "unknown",
@@ -219,8 +219,8 @@ userauth_finish(Authctxt *authctxt, int authenticated, char *method)
if (authenticated && authctxt->pw->pw_uid == 0 &&
!auth_root_allowed(method)) {
authenticated = 0;
-#ifdef AUDIT_EVENTS
- PRIVSEP(audit_event(LOGIN_ROOT_DENIED));
+#ifdef SSH_AUDIT_EVENTS
+ PRIVSEP(audit_event(SSH_LOGIN_ROOT_DENIED));
#endif
}
@@ -263,8 +263,8 @@ userauth_finish(Authctxt *authctxt, int authenticated, char *method)
authctxt->success = 1;
} else {
if (authctxt->failures++ > options.max_authtries) {
-#ifdef AUDIT_EVENTS
- PRIVSEP(audit_event(LOGIN_EXCEED_MAXTRIES));
+#ifdef SSH_AUDIT_EVENTS
+ PRIVSEP(audit_event(SSH_LOGIN_EXCEED_MAXTRIES));
#endif
packet_disconnect(AUTH_FAIL_MSG, authctxt->user);
}