|
|
| version 1.1.1.3, 2013/07/22 10:46:12 | version 1.1.1.4, 2013/10/14 07:56:35 |
|---|---|
| Line 97 bsdauth_init(struct passwd *pw, sudo_auth *auth) | Line 97 bsdauth_init(struct passwd *pw, sudo_auth *auth) |
| if (auth_setitem(state.as, AUTHV_STYLE, login_style) < 0 || | if (auth_setitem(state.as, AUTHV_STYLE, login_style) < 0 || |
| auth_setitem(state.as, AUTHV_NAME, pw->pw_name) < 0 || | auth_setitem(state.as, AUTHV_NAME, pw->pw_name) < 0 || |
| auth_setitem(state.as, AUTHV_CLASS, login_class) < 0) { | auth_setitem(state.as, AUTHV_CLASS, login_class) < 0) { |
| log_warning(NO_MAIL, N_("unable to setup authentication")); | log_warning(NO_MAIL, N_("unable to initialize BSD authentication")); |
| auth_close(state.as); | auth_close(state.as); |
| login_close(state.lc); | login_close(state.lc); |
| debug_return_int(AUTH_FATAL); | debug_return_int(AUTH_FATAL); |
| Line 156 bsdauth_verify(struct passwd *pw, char *prompt, sudo_a | Line 156 bsdauth_verify(struct passwd *pw, char *prompt, sudo_a |
| if (pass) { | if (pass) { |
| authok = auth_userresponse(as, pass, 1); | authok = auth_userresponse(as, pass, 1); |
| zero_bytes(pass, strlen(pass)); | memset_s(pass, SUDO_CONV_REPL_MAX, 0, strlen(pass)); |
| } | } |
| /* restore old signal handler */ | /* restore old signal handler */ |