|
version 1.1.1.4, 2013/07/22 10:46:13
|
version 1.1.1.5, 2013/10/14 07:56:35
|
|
Line 32
|
Line 32
|
| |
|
| #include "missing.h" |
#include "missing.h" |
| #include "alloc.h" |
#include "alloc.h" |
| #include "error.h" | #include "fatal.h" |
| #include "fileops.h" |
#include "fileops.h" |
| #include "list.h" |
#include "list.h" |
| #include "sudo_conf.h" |
#include "sudo_conf.h" |
|
Line 76
|
Line 76
|
| #define MODE_LONG_LIST 0x01000000 |
#define MODE_LONG_LIST 0x01000000 |
| |
|
| /* |
/* |
| * We used to use the system definition of PASS_MAX or _PASSWD_LEN, |
|
| * but that caused problems with various alternate authentication |
|
| * methods. So, we just define our own and assume that it is >= the |
|
| * system max. |
|
| */ |
|
| #define SUDO_PASS_MAX 256 |
|
| |
|
| /* |
|
| * Flags for tgetpass() |
* Flags for tgetpass() |
| */ |
*/ |
| #define TGP_NOECHO 0x00 /* turn echo off reading pw (default) */ |
#define TGP_NOECHO 0x00 /* turn echo off reading pw (default) */ |
|
Line 178 void cleanup(int);
|
Line 170 void cleanup(int);
|
| char *tgetpass(const char *, int, int); |
char *tgetpass(const char *, int, int); |
| int tty_present(void); |
int tty_present(void); |
| |
|
| /* zero_bytes.c */ |
|
| void zero_bytes(volatile void *, size_t); |
|
| |
|
| /* exec.c */ |
/* exec.c */ |
| int pipe_nonblock(int fds[2]); |
int pipe_nonblock(int fds[2]); |
| int sudo_execute(struct command_details *details, struct command_status *cstat); |
int sudo_execute(struct command_details *details, struct command_status *cstat); |
|
Line 198 char *fmt_string(const char *var, const char *value);
|
Line 187 char *fmt_string(const char *var, const char *value);
|
| /* atobool.c */ |
/* atobool.c */ |
| bool atobool(const char *str); |
bool atobool(const char *str); |
| |
|
| |
/* atoid.c */ |
| |
id_t atoid(const char *str, const char *sep, char **endp, const char **errstr); |
| |
|
| /* parse_args.c */ |
/* parse_args.c */ |
| int parse_args(int argc, char **argv, int *nargc, char ***nargv, |
int parse_args(int argc, char **argv, int *nargc, char ***nargv, |
| char ***settingsp, char ***env_addp); |
char ***settingsp, char ***env_addp); |
|
Line 214 bool exec_setup(struct command_details *details, const
|
Line 206 bool exec_setup(struct command_details *details, const
|
| int policy_init_session(struct command_details *details); |
int policy_init_session(struct command_details *details); |
| int run_command(struct command_details *details); |
int run_command(struct command_details *details); |
| int os_init_common(int argc, char *argv[], char *envp[]); |
int os_init_common(int argc, char *argv[], char *envp[]); |
| extern const char *list_user, *runas_user, *runas_group; | extern const char *list_user; |
| extern struct user_details user_details; |
extern struct user_details user_details; |
| |
|
| /* sudo_edit.c */ |
/* sudo_edit.c */ |
|
Line 271 int sudo_sigaction(int signo, struct sigaction *sa, st
|
Line 263 int sudo_sigaction(int signo, struct sigaction *sa, st
|
| void init_signals(void); |
void init_signals(void); |
| void restore_signals(void); |
void restore_signals(void); |
| void save_signals(void); |
void save_signals(void); |
| |
|
| |
/* gidlist.c */ |
| |
int parse_gid_list(const char *gidstr, const gid_t *basegid, GETGROUPS_T **gidsp); |
| |
|
| #endif /* _SUDO_SUDO_H */ |
#endif /* _SUDO_SUDO_H */ |