version 1.1.1.4, 2013/07/22 10:46:12
|
version 1.1.1.5, 2013/10/14 07:56:35
|
Line 31
|
Line 31
|
|
|
#include <pathnames.h> |
#include <pathnames.h> |
#include "missing.h" |
#include "missing.h" |
#include "error.h" | #include "fatal.h" |
#include "alloc.h" |
#include "alloc.h" |
#include "list.h" |
#include "list.h" |
#include "fileops.h" |
#include "fileops.h" |
Line 68 struct sudo_user {
|
Line 68 struct sudo_user {
|
char *ttypath; |
char *ttypath; |
char *host; |
char *host; |
char *shost; |
char *shost; |
|
char *runhost; |
|
char *srunhost; |
char *prompt; |
char *prompt; |
char *cmnd; |
char *cmnd; |
char *cmnd_args; |
char *cmnd_args; |
Line 192 struct sudo_user {
|
Line 194 struct sudo_user {
|
#define user_prompt (sudo_user.prompt) |
#define user_prompt (sudo_user.prompt) |
#define user_host (sudo_user.host) |
#define user_host (sudo_user.host) |
#define user_shost (sudo_user.shost) |
#define user_shost (sudo_user.shost) |
|
#define user_runhost (sudo_user.runhost) |
|
#define user_srunhost (sudo_user.srunhost) |
#define user_ccname (sudo_user.krb5_ccname) |
#define user_ccname (sudo_user.krb5_ccname) |
#define safe_cmnd (sudo_user.cmnd_safe) |
#define safe_cmnd (sudo_user.cmnd_safe) |
#define login_class (sudo_user.class_name) |
#define login_class (sudo_user.class_name) |
Line 210 struct sudo_user {
|
Line 214 struct sudo_user {
|
#endif |
#endif |
#define ROOT_GID 0 |
#define ROOT_GID 0 |
|
|
/* |
|
* We used to use the system definition of PASS_MAX or _PASSWD_LEN, |
|
* but that caused problems with various alternate authentication |
|
* methods. So, we just define our own and assume that it is >= the |
|
* system max. |
|
*/ |
|
#define SUDO_PASS_MAX 256 |
|
|
|
struct lbuf; |
struct lbuf; |
struct passwd; |
struct passwd; |
struct stat; |
struct stat; |
Line 287 void dump_auth_methods(void);
|
Line 283 void dump_auth_methods(void);
|
/* getspwuid.c */ |
/* getspwuid.c */ |
char *sudo_getepw(const struct passwd *); |
char *sudo_getepw(const struct passwd *); |
|
|
/* zero_bytes.c */ |
|
void zero_bytes(volatile void *, size_t); |
|
|
|
/* sudo_nss.c */ |
/* sudo_nss.c */ |
void display_privs(struct sudo_nss_list *, struct passwd *); |
void display_privs(struct sudo_nss_list *, struct passwd *); |
bool display_cmnd(struct sudo_nss_list *, struct passwd *); |
bool display_cmnd(struct sudo_nss_list *, struct passwd *); |
Line 325 char *get_timestr(time_t, int);
|
Line 318 char *get_timestr(time_t, int);
|
/* atobool.c */ |
/* atobool.c */ |
int atobool(const char *str); |
int atobool(const char *str); |
|
|
|
/* atoid.c */ |
|
int atoid(const char *str, const char *sep, char **endp, const char **errstr); |
|
|
/* boottime.c */ |
/* boottime.c */ |
int get_boottime(struct timeval *); |
int get_boottime(struct timeval *); |
|
|
Line 338 char *expand_iolog_path(const char *prefix, const char
|
Line 334 char *expand_iolog_path(const char *prefix, const char
|
|
|
/* env.c */ |
/* env.c */ |
char **env_get(void); |
char **env_get(void); |
void env_merge(char * const envp[], bool overwrite); | void env_merge(char * const envp[]); |
void env_init(char * const envp[]); |
void env_init(char * const envp[]); |
void init_envtables(void); |
void init_envtables(void); |
void insert_env_vars(char * const envp[]); |
void insert_env_vars(char * const envp[]); |
Line 380 int group_plugin_query(const char *user, const char *g
|
Line 376 int group_plugin_query(const char *user, const char *g
|
|
|
/* setgroups.c */ |
/* setgroups.c */ |
int sudo_setgroups(int ngids, const GETGROUPS_T *gids); |
int sudo_setgroups(int ngids, const GETGROUPS_T *gids); |
|
|
|
/* gidlist.c */ |
|
int parse_gid_list(const char *gidstr, const gid_t *basegid, GETGROUPS_T **gidsp); |
|
|
#ifndef _SUDO_MAIN |
#ifndef _SUDO_MAIN |
extern struct sudo_user sudo_user; |
extern struct sudo_user sudo_user; |