version 1.1.1.3, 2013/07/22 10:46:12
|
version 1.1.1.4, 2013/10/14 07:56:35
|
Line 97 bsdauth_init(struct passwd *pw, sudo_auth *auth)
|
Line 97 bsdauth_init(struct passwd *pw, sudo_auth *auth)
|
if (auth_setitem(state.as, AUTHV_STYLE, login_style) < 0 || |
if (auth_setitem(state.as, AUTHV_STYLE, login_style) < 0 || |
auth_setitem(state.as, AUTHV_NAME, pw->pw_name) < 0 || |
auth_setitem(state.as, AUTHV_NAME, pw->pw_name) < 0 || |
auth_setitem(state.as, AUTHV_CLASS, login_class) < 0) { |
auth_setitem(state.as, AUTHV_CLASS, login_class) < 0) { |
log_warning(NO_MAIL, N_("unable to setup authentication")); | log_warning(NO_MAIL, N_("unable to initialize BSD authentication")); |
auth_close(state.as); |
auth_close(state.as); |
login_close(state.lc); |
login_close(state.lc); |
debug_return_int(AUTH_FATAL); |
debug_return_int(AUTH_FATAL); |
Line 156 bsdauth_verify(struct passwd *pw, char *prompt, sudo_a
|
Line 156 bsdauth_verify(struct passwd *pw, char *prompt, sudo_a
|
|
|
if (pass) { |
if (pass) { |
authok = auth_userresponse(as, pass, 1); |
authok = auth_userresponse(as, pass, 1); |
zero_bytes(pass, strlen(pass)); | memset_s(pass, SUDO_CONV_REPL_MAX, 0, strlen(pass)); |
} |
} |
|
|
/* restore old signal handler */ |
/* restore old signal handler */ |