version 1.1.1.4, 2013/07/22 10:46:13
|
version 1.1.1.5, 2013/10/14 07:56:35
|
Line 32
|
Line 32
|
|
|
#include "missing.h" |
#include "missing.h" |
#include "alloc.h" |
#include "alloc.h" |
#include "error.h" | #include "fatal.h" |
#include "fileops.h" |
#include "fileops.h" |
#include "list.h" |
#include "list.h" |
#include "sudo_conf.h" |
#include "sudo_conf.h" |
Line 76
|
Line 76
|
#define MODE_LONG_LIST 0x01000000 |
#define MODE_LONG_LIST 0x01000000 |
|
|
/* |
/* |
* We used to use the system definition of PASS_MAX or _PASSWD_LEN, |
|
* but that caused problems with various alternate authentication |
|
* methods. So, we just define our own and assume that it is >= the |
|
* system max. |
|
*/ |
|
#define SUDO_PASS_MAX 256 |
|
|
|
/* |
|
* Flags for tgetpass() |
* Flags for tgetpass() |
*/ |
*/ |
#define TGP_NOECHO 0x00 /* turn echo off reading pw (default) */ |
#define TGP_NOECHO 0x00 /* turn echo off reading pw (default) */ |
Line 178 void cleanup(int);
|
Line 170 void cleanup(int);
|
char *tgetpass(const char *, int, int); |
char *tgetpass(const char *, int, int); |
int tty_present(void); |
int tty_present(void); |
|
|
/* zero_bytes.c */ |
|
void zero_bytes(volatile void *, size_t); |
|
|
|
/* exec.c */ |
/* exec.c */ |
int pipe_nonblock(int fds[2]); |
int pipe_nonblock(int fds[2]); |
int sudo_execute(struct command_details *details, struct command_status *cstat); |
int sudo_execute(struct command_details *details, struct command_status *cstat); |
Line 198 char *fmt_string(const char *var, const char *value);
|
Line 187 char *fmt_string(const char *var, const char *value);
|
/* atobool.c */ |
/* atobool.c */ |
bool atobool(const char *str); |
bool atobool(const char *str); |
|
|
|
/* atoid.c */ |
|
id_t atoid(const char *str, const char *sep, char **endp, const char **errstr); |
|
|
/* parse_args.c */ |
/* parse_args.c */ |
int parse_args(int argc, char **argv, int *nargc, char ***nargv, |
int parse_args(int argc, char **argv, int *nargc, char ***nargv, |
char ***settingsp, char ***env_addp); |
char ***settingsp, char ***env_addp); |
Line 214 bool exec_setup(struct command_details *details, const
|
Line 206 bool exec_setup(struct command_details *details, const
|
int policy_init_session(struct command_details *details); |
int policy_init_session(struct command_details *details); |
int run_command(struct command_details *details); |
int run_command(struct command_details *details); |
int os_init_common(int argc, char *argv[], char *envp[]); |
int os_init_common(int argc, char *argv[], char *envp[]); |
extern const char *list_user, *runas_user, *runas_group; | extern const char *list_user; |
extern struct user_details user_details; |
extern struct user_details user_details; |
|
|
/* sudo_edit.c */ |
/* sudo_edit.c */ |
Line 271 int sudo_sigaction(int signo, struct sigaction *sa, st
|
Line 263 int sudo_sigaction(int signo, struct sigaction *sa, st
|
void init_signals(void); |
void init_signals(void); |
void restore_signals(void); |
void restore_signals(void); |
void save_signals(void); |
void save_signals(void); |
|
|
|
/* gidlist.c */ |
|
int parse_gid_list(const char *gidstr, const gid_t *basegid, GETGROUPS_T **gidsp); |
|
|
#endif /* _SUDO_SUDO_H */ |
#endif /* _SUDO_SUDO_H */ |