void init_parser __P((void));
/*
- * This routine is called from the sudo.c module and tries to validate
- * the user, host and command triplet.
+ * Look up the user in the sudoers file and check to see if they are
+ * allowed to run the specified command on this host as the target user.
*/
int
-validate(check_cmnd)
+sudoers_lookup(check_cmnd)
int check_cmnd;
{
int return_code;
add_env(!(sudo_mode & MODE_SHELL)); /* add in SUDO_* envariables */
/* Validate the user but don't search for pseudo-commands. */
- validated = validate((sudo_mode != MODE_VALIDATE && sudo_mode != MODE_LIST));
+ validated = sudoers_lookup((sudo_mode != MODE_VALIDATE && sudo_mode != MODE_LIST));
switch (validated) {
case VALIDATE_OK:
};
/*
- * Return values for validate()
+ * Return values for sudoers_lookup()
* Also arguments for log_auth()
*/
#define VALIDATE_OK 0x00
int find_path __P((char *, char **));
void check_user __P((void));
void verify_user __P((void));
-int validate __P((int));
+int sudoers_lookup __P((int));
void set_perms __P((int, int));
void remove_timestamp __P((int));
int check_secureware __P((char *));