/openbmc/openbmc/meta-openembedded/meta-oe/recipes-security/audit/ |
H A D | audit_4.0.3.bb | 2 DESCRIPTION = "The audit package contains the user space utilities for \ 3 storing and searching the audit records generated by the audit subsystem \ 5 HOMEPAGE = "http://people.redhat.com/sgrubb/audit/" 10 SRC_URI = "git://github.com/linux-audit/${BPN}-userspace.git;branch=master;protocol=https \ 25 SYSTEMD_SERVICE:auditd = "auditd.service audit-rules.service" 50 SUMMARY:audispd-plugins = "Plugins for the audit event dispatcher" 52 interface to the audit system, audispd. These plugins can do things \ 61 ${datadir}/audit-rules/* ${libexecdir}/* \ 63 FILES:audispd-plugins = "${sysconfdir}/audit/audisp-remote.conf \ 64 ${sysconfdir}/audit/plugins.d/au-remote.conf \ [all …]
|
/openbmc/docs/designs/ |
H A D | phosphor-audit.md | 1 # phosphor-audit 71 The phosphor-audit service represents a service that provides user activity 74 The key benefit of using phosphor-audit is that all action handling will be kept 82 +----------------+ audit event +-----------------+ 88 +----------------+ | | audit | | +-------------+ | 102 The audit event from diagram generated by an application to track user activity. 103 The application sends 'signal' to audit service via D-Bus. What is happening 104 next in audit service's handler depends on user requirements and needs. It is 108 ### Audit event call 110 Audit event call performs preprocessing of incoming data at application side [all …]
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-security/audit/audit/ |
H A D | auditd | 8 # Short-Description: Audit Daemon 9 # Description: Collects audit information from Linux 2.6 Kernels. 19 DESC="audit daemon" 49 if [ -f /etc/audit/audit.rules ] 51 /sbin/auditctl -R /etc/audit/audit.rules >/dev/null 87 if [ ! -e /var/log/audit ]; then 88 mkdir -p /var/log/audit 89 [ -x /sbin/restorecon ] && /sbin/restorecon -F $(readlink -f /var/log/audit)
|
H A D | 0001-Fixed-swig-host-contamination-issue.patch | 6 The audit build uses swig to generate a python wrapper. 36 audit.py audit_wrap.c: ${srcdir}/../src/auditswig.i 40 CLEANFILES = audit.py* audit_wrap.c *~ 50 -%include "/usr/include/linux/audit.h" 51 +%include "../lib/audit.h" 54 %include "../lib/audit-records.h"
|
/openbmc/phosphor-debug-collector/tools/dreport.d/plugins.d/ |
H A D | auditlog | 4 # @brief: Save the audit log 10 # Multiple audit.log files can exist in the $log_path 12 desc="Audit Log" 13 log_path="/var/log/audit/"
|
/openbmc/openbmc/meta-security/recipes-ids/aide/ |
H A D | aide_0.18.8.bb | 20 ${@bb.utils.contains('DISTRO_FEATURES', 'selinux', 'selinux audit', '', d)} \ 27 PACKAGECONFIG[audit] = "--with-audit, --without-audit,audit"
|
/openbmc/openbmc/meta-security/recipes-core/packagegroup/ |
H A D | packagegroup-core-security.bb | 12 packagegroup-security-audit \ 22 packagegroup-security-audit \ 64 SUMMARY:packagegroup-security-audit = "Security Audit tools " 65 RDEPENDS:packagegroup-security-audit = " \
|
/openbmc/openbmc/poky/meta/recipes-extended/sudo/ |
H A D | sudo.inc | 25 PACKAGECONFIG[audit] = "--with-linux-audit,--without-linux-audit,audit"
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-core/basu/ |
H A D | basu_0.2.1.bb | 19 PACKAGECONFIG[audit] = "-Daudit=enabled,-Daudit=disabled,audit"
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-extended/md5deep/ |
H A D | md5deep_git.bb | 1 SUMMARY = "md5deep and hashdeep to compute and audit hashsets of amounts of files." 2 …bitrary number of files. This package also includes hashdeep which is also able to audit hashsets."
|
/openbmc/openbmc/poky/meta/recipes-extended/cronie/ |
H A D | cronie_1.7.2.bb | 36 PACKAGECONFIG[audit] = "--with-audit,--without-audit,audit,"
|
/openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/BIOSConfig/ |
H A D | SecureBoot.interface.yaml | 54 - name: Audit 56 UEFI Secure Boot is currently in Audit Mode.
|
/openbmc/openbmc/meta-security/dynamic-layers/meta-perl/recipes-security/bastille/files/ |
H A D | upgrade_options_processing.patch | 67 "a" => \$audit, 81 -&setOptions($debug,$log_only,$verbose,$audit,$auditnobrowser,$os_version); 86 + auditonly => $audit,
|
H A D | config | 41 # Q: ICMP services to audit: [ ] 69 # Q: TCP services to audit: [telnet ftp imap pop3 finger sunrpc exec login linuxconf ssh] 75 # Q: UDP services to audit: [31337]
|
/openbmc/openbmc/poky/meta/recipes-extended/shadow/ |
H A D | shadow_4.17.4.bb | 76 PACKAGECONFIG[audit] = "--with-audit,--without-audit,audit"
|
/openbmc/openbmc/meta-security/recipes-ids/samhain/ |
H A D | samhain.inc | 47 ${@bb.utils.contains('DISTRO_FEATURES', 'selinux', 'selinux audit', '', d)} \ 59 PACKAGECONFIG[audit] = "ac_cv_header_auparse_h=yes,ac_cv_header_auparse_h=no,audit"
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-extended/cfengine/ |
H A D | cfengine-masterfiles_3.21.5.bb | 9 its lifecycle. CFEngine takes systems from Build to Deploy, Manage and Audit. \
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-core/dbus/ |
H A D | dbus-broker_36.bb | 9 ${@bb.utils.contains('DISTRO_FEATURES', 'selinux', 'audit (>= 3.0)', '', d)} \
|
/openbmc/openbmc/poky/meta/recipes-devtools/binutils/binutils/ |
H A D | 0012-Only-generate-an-RPATH-entry-if-LD_RUN_PATH-is-not-e.patch | 30 @@ -1811,6 +1814,8 @@ ldelf_before_allocation (char *audit, char *depaudit,
|
/openbmc/openbmc/meta-security/meta-integrity/ |
H A D | README.md | 219 Enabling the audit kernel subsystem may help to debug appraisal 222 SRC_URI:append:pn-linux-yocto = " file://audit.cfg" 232 more complete set of events in /var/log/audit/ and search in
|
/openbmc/openbmc/poky/meta/classes-recipe/ |
H A D | kernel-yocto.bbclass | 517 CONFIG_AUDIT_FILE ?= "${WORKDIR}/config-audit.txt" 543 for action in ["analysis","audit"]: 552 if action == "audit": 581 bb.note( "kernel config audit disabled, skipping .." ) 605 bb.fatal( "Cannot gather config fragments for audit: %s" % e.output.decode("utf-8") ) 612 # if config check visibility is "1", that's the lowest level of audit. So 674 # if the audit level is greater than two, we report if a fragment has overriden
|
/openbmc/openbmc/meta-security/dynamic-layers/meta-python/recipes-security/mfa/ |
H A D | python3-privacyidea_3.9.1.bb | 1 SUMMARY = "identity, multifactor authentication (OTP), authorization, audit"
|
/openbmc/openbmc/poky/bitbake/lib/bb/fetch2/ |
H A D | README | 8 i) audit the sources used (i.e. for license/manifest reasons)
|
/openbmc/openbmc/meta-openembedded/meta-gnome/recipes-gnome/gdm/ |
H A D | gdm_48.0.bb | 7 audit \
|
/openbmc/openbmc/poky/meta/recipes-extended/pam/ |
H A D | libpam_1.7.0.bb | 39 PACKAGECONFIG[audit] = "-Daudit=enabled,-Daudit=disabled,audit,"
|