Home
last modified time | relevance | path

Searched full:audit (Results 1 – 25 of 82) sorted by relevance

1234

/openbmc/openbmc/meta-openembedded/meta-oe/recipes-security/audit/
H A Daudit_4.0.3.bb2 DESCRIPTION = "The audit package contains the user space utilities for \
3 storing and searching the audit records generated by the audit subsystem \
5 HOMEPAGE = "http://people.redhat.com/sgrubb/audit/"
10 SRC_URI = "git://github.com/linux-audit/${BPN}-userspace.git;branch=master;protocol=https \
25 SYSTEMD_SERVICE:auditd = "auditd.service audit-rules.service"
50 SUMMARY:audispd-plugins = "Plugins for the audit event dispatcher"
52 interface to the audit system, audispd. These plugins can do things \
61 ${datadir}/audit-rules/* ${libexecdir}/* \
63 FILES:audispd-plugins = "${sysconfdir}/audit/audisp-remote.conf \
64 ${sysconfdir}/audit/plugins.d/au-remote.conf \
[all …]
/openbmc/docs/designs/
H A Dphosphor-audit.md1 # phosphor-audit
71 The phosphor-audit service represents a service that provides user activity
74 The key benefit of using phosphor-audit is that all action handling will be kept
82 +----------------+ audit event +-----------------+
88 +----------------+ | | audit | | +-------------+ |
102 The audit event from diagram generated by an application to track user activity.
103 The application sends 'signal' to audit service via D-Bus. What is happening
104 next in audit service's handler depends on user requirements and needs. It is
108 ### Audit event call
110 Audit event call performs preprocessing of incoming data at application side
[all …]
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-security/audit/audit/
H A Dauditd8 # Short-Description: Audit Daemon
9 # Description: Collects audit information from Linux 2.6 Kernels.
19 DESC="audit daemon"
49 if [ -f /etc/audit/audit.rules ]
51 /sbin/auditctl -R /etc/audit/audit.rules >/dev/null
87 if [ ! -e /var/log/audit ]; then
88 mkdir -p /var/log/audit
89 [ -x /sbin/restorecon ] && /sbin/restorecon -F $(readlink -f /var/log/audit)
H A D0001-Fixed-swig-host-contamination-issue.patch6 The audit build uses swig to generate a python wrapper.
36 audit.py audit_wrap.c: ${srcdir}/../src/auditswig.i
40 CLEANFILES = audit.py* audit_wrap.c *~
50 -%include "/usr/include/linux/audit.h"
51 +%include "../lib/audit.h"
54 %include "../lib/audit-records.h"
/openbmc/phosphor-debug-collector/tools/dreport.d/plugins.d/
H A Dauditlog4 # @brief: Save the audit log
10 # Multiple audit.log files can exist in the $log_path
12 desc="Audit Log"
13 log_path="/var/log/audit/"
/openbmc/openbmc/meta-security/recipes-ids/aide/
H A Daide_0.18.8.bb20 ${@bb.utils.contains('DISTRO_FEATURES', 'selinux', 'selinux audit', '', d)} \
27 PACKAGECONFIG[audit] = "--with-audit, --without-audit,audit"
/openbmc/openbmc/meta-security/recipes-core/packagegroup/
H A Dpackagegroup-core-security.bb12 packagegroup-security-audit \
22 packagegroup-security-audit \
64 SUMMARY:packagegroup-security-audit = "Security Audit tools "
65 RDEPENDS:packagegroup-security-audit = " \
/openbmc/openbmc/poky/meta/recipes-extended/sudo/
H A Dsudo.inc25 PACKAGECONFIG[audit] = "--with-linux-audit,--without-linux-audit,audit"
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-core/basu/
H A Dbasu_0.2.1.bb19 PACKAGECONFIG[audit] = "-Daudit=enabled,-Daudit=disabled,audit"
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-extended/md5deep/
H A Dmd5deep_git.bb1 SUMMARY = "md5deep and hashdeep to compute and audit hashsets of amounts of files."
2 …bitrary number of files. This package also includes hashdeep which is also able to audit hashsets."
/openbmc/openbmc/poky/meta/recipes-extended/cronie/
H A Dcronie_1.7.2.bb36 PACKAGECONFIG[audit] = "--with-audit,--without-audit,audit,"
/openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/BIOSConfig/
H A DSecureBoot.interface.yaml54 - name: Audit
56 UEFI Secure Boot is currently in Audit Mode.
/openbmc/openbmc/meta-security/dynamic-layers/meta-perl/recipes-security/bastille/files/
H A Dupgrade_options_processing.patch67 "a" => \$audit,
81 -&setOptions($debug,$log_only,$verbose,$audit,$auditnobrowser,$os_version);
86 + auditonly => $audit,
H A Dconfig41 # Q: ICMP services to audit: [ ]
69 # Q: TCP services to audit: [telnet ftp imap pop3 finger sunrpc exec login linuxconf ssh]
75 # Q: UDP services to audit: [31337]
/openbmc/openbmc/poky/meta/recipes-extended/shadow/
H A Dshadow_4.17.4.bb76 PACKAGECONFIG[audit] = "--with-audit,--without-audit,audit"
/openbmc/openbmc/meta-security/recipes-ids/samhain/
H A Dsamhain.inc47 ${@bb.utils.contains('DISTRO_FEATURES', 'selinux', 'selinux audit', '', d)} \
59 PACKAGECONFIG[audit] = "ac_cv_header_auparse_h=yes,ac_cv_header_auparse_h=no,audit"
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-extended/cfengine/
H A Dcfengine-masterfiles_3.21.5.bb9 its lifecycle. CFEngine takes systems from Build to Deploy, Manage and Audit. \
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-core/dbus/
H A Ddbus-broker_36.bb9 ${@bb.utils.contains('DISTRO_FEATURES', 'selinux', 'audit (>= 3.0)', '', d)} \
/openbmc/openbmc/poky/meta/recipes-devtools/binutils/binutils/
H A D0012-Only-generate-an-RPATH-entry-if-LD_RUN_PATH-is-not-e.patch30 @@ -1811,6 +1814,8 @@ ldelf_before_allocation (char *audit, char *depaudit,
/openbmc/openbmc/meta-security/meta-integrity/
H A DREADME.md219 Enabling the audit kernel subsystem may help to debug appraisal
222 SRC_URI:append:pn-linux-yocto = " file://audit.cfg"
232 more complete set of events in /var/log/audit/ and search in
/openbmc/openbmc/poky/meta/classes-recipe/
H A Dkernel-yocto.bbclass517 CONFIG_AUDIT_FILE ?= "${WORKDIR}/config-audit.txt"
543 for action in ["analysis","audit"]:
552 if action == "audit":
581 bb.note( "kernel config audit disabled, skipping .." )
605 bb.fatal( "Cannot gather config fragments for audit: %s" % e.output.decode("utf-8") )
612 # if config check visibility is "1", that's the lowest level of audit. So
674 # if the audit level is greater than two, we report if a fragment has overriden
/openbmc/openbmc/meta-security/dynamic-layers/meta-python/recipes-security/mfa/
H A Dpython3-privacyidea_3.9.1.bb1 SUMMARY = "identity, multifactor authentication (OTP), authorization, audit"
/openbmc/openbmc/poky/bitbake/lib/bb/fetch2/
H A DREADME8 i) audit the sources used (i.e. for license/manifest reasons)
/openbmc/openbmc/meta-openembedded/meta-gnome/recipes-gnome/gdm/
H A Dgdm_48.0.bb7 audit \
/openbmc/openbmc/poky/meta/recipes-extended/pam/
H A Dlibpam_1.7.0.bb39 PACKAGECONFIG[audit] = "-Daudit=enabled,-Daudit=disabled,audit,"

1234