for (start = users; (NULL != start) && ('\0' != *start); start = end) {
end = strchr (start, ',');
if (NULL != end) {
- len = end - start;
+ len = (size_t) (end - start);
end++;
} else {
len = strlen (start);
user);
#ifdef WITH_AUDIT
audit_logger (AUDIT_USER_CHAUTHTOK, Prog,
- "adding to group", user, -1, 0);
+ "adding to group",
+ user, AUDIT_NO_ID, 0);
#endif
fail_exit (1);
}
if (!amroot) {
#ifdef WITH_AUDIT
audit_logger (AUDIT_USER_CHAUTHTOK, Prog,
- "Listing administrators", NULL,
- bywho, 0);
+ "Listing administrators",
+ NULL, (unsigned int) bywho, 0);
#endif
failure ();
}
if (!amroot) {
#ifdef WITH_AUDIT
audit_logger (AUDIT_USER_CHAUTHTOK, Prog,
- "listing members", NULL, bywho,
- 0);
+ "listing members",
+ NULL, (unsigned int) bywho, 0);
#endif
failure ();
}
SYSLOG ((LOG_WARN, "failed to get lock for /etc/group"));
#ifdef WITH_AUDIT
audit_logger (AUDIT_USER_CHAUTHTOK, Prog,
- "locking /etc/group", group, -1, 0);
+ "locking /etc/group",
+ group, AUDIT_NO_ID, 0);
#endif
fail_exit (1);
}
SYSLOG ((LOG_WARN, "failed to get lock for /etc/gshadow"));
#ifdef WITH_AUDIT
audit_logger (AUDIT_USER_CHAUTHTOK, Prog,
- "locking /etc/gshadow", group, -1, 0);
+ "locking /etc/gshadow",
+ group, AUDIT_NO_ID, 0);
#endif
fail_exit (1);
}
SYSLOG ((LOG_WARN, "cannot open /etc/group"));
#ifdef WITH_AUDIT
audit_logger (AUDIT_USER_CHAUTHTOK, Prog,
- "opening /etc/group", group, -1, 0);
+ "opening /etc/group",
+ group, AUDIT_NO_ID, 0);
#endif
fail_exit (1);
}
SYSLOG ((LOG_WARN, "cannot open /etc/gshadow"));
#ifdef WITH_AUDIT
audit_logger (AUDIT_USER_CHAUTHTOK, Prog,
- "opening /etc/gshadow", group, -1, 0);
+ "opening /etc/gshadow",
+ group, AUDIT_NO_ID, 0);
#endif
fail_exit (1);
}
SYSLOG ((LOG_WARN, "cannot re-write /etc/group"));
#ifdef WITH_AUDIT
audit_logger (AUDIT_USER_CHAUTHTOK, Prog,
- "rewriting /etc/group", group, -1, 0);
+ "rewriting /etc/group",
+ group, AUDIT_NO_ID, 0);
#endif
fail_exit (1);
}
SYSLOG ((LOG_WARN, "cannot re-write /etc/gshadow"));
#ifdef WITH_AUDIT
audit_logger (AUDIT_USER_CHAUTHTOK, Prog,
- "rewriting /etc/gshadow", group, -1, 0);
+ "rewriting /etc/gshadow",
+ group, AUDIT_NO_ID, 0);
#endif
fail_exit (1);
}
fprintf (stderr, _("%s: can't unlock file\n"), Prog);
#ifdef WITH_AUDIT
audit_logger (AUDIT_USER_CHAUTHTOK, Prog,
- "unlocking group file", group, -1, 0);
+ "unlocking group file",
+ group, AUDIT_NO_ID, 0);
#endif
exit (1);
}
if (!amroot && !is_on_list (sg->sg_adm, myname)) {
#ifdef WITH_AUDIT
audit_logger (AUDIT_USER_CHAUTHTOK, Prog,
- "modify group", group, -1, 0);
+ "modify group",
+ group, AUDIT_NO_ID, 0);
#endif
failure ();
}
if (gr->gr_mem[0] == (char *) 0) {
#ifdef WITH_AUDIT
audit_logger (AUDIT_USER_CHAUTHTOK, Prog,
- "modifying group", group, -1, 0);
+ "modifying group",
+ group, AUDIT_NO_ID, 0);
#endif
failure ();
}
if (strcmp (gr->gr_mem[0], myname) != 0) {
#ifdef WITH_AUDIT
audit_logger (AUDIT_USER_CHAUTHTOK, Prog,
- "modifying group", myname, -1, 0);
+ "modifying group",
+ myname, AUDIT_NO_ID, 0);
#endif
failure ();
}
if (!amroot) {
#ifdef WITH_AUDIT
audit_logger (AUDIT_USER_CHAUTHTOK, Prog,
- "modifying group", group, -1, 0);
+ "modifying group",
+ group, AUDIT_NO_ID, 0);
#endif
failure ();
}
SYSLOG ((LOG_WARN, "cannot update /etc/group"));
#ifdef WITH_AUDIT
audit_logger (AUDIT_USER_CHAUTHTOK, Prog,
- "updating /etc/group", group, -1, 0);
+ "updating /etc/group",
+ group, AUDIT_NO_ID, 0);
#endif
fail_exit (1);
}
SYSLOG ((LOG_WARN, "cannot update /etc/gshadow"));
#ifdef WITH_AUDIT
audit_logger (AUDIT_USER_CHAUTHTOK, Prog,
- "updating /etc/gshadow", group, -1, 0);
+ "updating /etc/gshadow",
+ group, AUDIT_NO_ID, 0);
#endif
fail_exit (1);
}
SYSLOG ((LOG_WARN, "cannot open /etc/group"));
#ifdef WITH_AUDIT
audit_logger (AUDIT_USER_CHAUTHTOK, Prog,
- "opening /etc/group", group, -1, 0);
+ "opening /etc/group",
+ group, AUDIT_NO_ID, 0);
#endif
fail_exit (1);
}
fprintf (stderr, _("unknown group: %s\n"), group);
#ifdef WITH_AUDIT
audit_logger (AUDIT_USER_CHAUTHTOK, Prog,
- "group lookup", group, -1, 0);
+ "group lookup",
+ group, AUDIT_NO_ID, 0);
#endif
failure ();
}
SYSLOG ((LOG_WARN, "cannot close /etc/group"));
#ifdef WITH_AUDIT
audit_logger (AUDIT_USER_CHAUTHTOK, Prog,
- "closing /etc/group", group, -1, 0);
+ "closing /etc/group",
+ group, AUDIT_NO_ID, 0);
#endif
fail_exit (1);
}
SYSLOG ((LOG_WARN, "cannot open /etc/gshadow"));
#ifdef WITH_AUDIT
audit_logger (AUDIT_USER_CHAUTHTOK, Prog,
- "opening /etc/gshadow", group, -1, 0);
+ "opening /etc/gshadow",
+ group, AUDIT_NO_ID, 0);
#endif
fail_exit (1);
}
SYSLOG ((LOG_WARN, "cannot close /etc/gshadow"));
#ifdef WITH_AUDIT
audit_logger (AUDIT_USER_CHAUTHTOK, Prog,
- "closing /etc/gshadow", group, -1, 0);
+ "closing /etc/gshadow",
+ group, AUDIT_NO_ID, 0);
#endif
fail_exit (1);
}
puts (_("They don't match; try again"));
#ifdef WITH_AUDIT
audit_logger (AUDIT_USER_CHAUTHTOK, Prog,
- "changing password", group, -1, 0);
+ "changing password",
+ group, AUDIT_NO_ID, 0);
#endif
}
}
}
#ifdef WITH_AUDIT
audit_logger (AUDIT_USER_CHAUTHTOK, Prog,
- "changing password", group, -1, 1);
+ "changing password",
+ group, AUDIT_NO_ID, 1);
#endif
SYSLOG ((LOG_INFO, "change the password for group %s by %s", group,
myname));
if (NULL == pw) {
fputs (_("Who are you?\n"), stderr);
#ifdef WITH_AUDIT
- audit_logger (AUDIT_USER_CHAUTHTOK, Prog, "user lookup", NULL,
- bywho, 0);
+ audit_logger (AUDIT_USER_CHAUTHTOK, Prog,
+ "user lookup",
+ NULL, (unsigned int) bywho, 0);
#endif
failure ();
}
#endif
#ifdef WITH_AUDIT
audit_logger (AUDIT_USER_CHAUTHTOK, Prog,
- "deleting group password", group, -1, 1);
+ "deleting group password",
+ group, AUDIT_NO_ID, 1);
#endif
SYSLOG ((LOG_INFO, "remove password from group %s by %s",
group, myname));
#endif
#ifdef WITH_AUDIT
audit_logger (AUDIT_USER_CHAUTHTOK, Prog,
- "restrict access to group", group, -1, 1);
+ "restrict access to group",
+ group, AUDIT_NO_ID, 1);
#endif
SYSLOG ((LOG_INFO, "restrict access to group %s by %s",
group, myname));
}
#endif
#ifdef WITH_AUDIT
- audit_logger (AUDIT_USER_CHAUTHTOK, Prog, "adding group member",
- user, -1, 1);
+ audit_logger (AUDIT_USER_CHAUTHTOK, Prog,
+ "adding group member",
+ user, AUDIT_NO_ID, 1);
#endif
SYSLOG ((LOG_INFO, "add member %s to group %s by %s", user,
group, myname));
Prog, user);
#ifdef WITH_AUDIT
audit_logger (AUDIT_USER_CHAUTHTOK, Prog,
- "deleting member", user, -1, 0);
+ "deleting member",
+ user, AUDIT_NO_ID, 0);
#endif
fail_exit (1);
}
#ifdef WITH_AUDIT
- audit_logger (AUDIT_USER_CHAUTHTOK, Prog, "deleting member",
- user, -1, 1);
+ audit_logger (AUDIT_USER_CHAUTHTOK, Prog,
+ "deleting member",
+ user, AUDIT_NO_ID, 1);
#endif
SYSLOG ((LOG_INFO, "remove member %s from group %s by %s",
user, group, myname));
}
#ifdef SHADOWGRP
/*
- * Replacing the entire list of administators is simple. Check the
+ * Replacing the entire list of administrators is simple. Check the
* list to make sure everyone is a real user. Then slap the new list
* in place.
*/
if (Aflg) {
#ifdef WITH_AUDIT
- audit_logger (AUDIT_USER_CHAUTHTOK, Prog, "setting group admin",
- group, -1, 1);
+ audit_logger (AUDIT_USER_CHAUTHTOK, Prog,
+ "setting group admin",
+ group, AUDIT_NO_ID, 1);
#endif
SYSLOG ((LOG_INFO, "set administrators of %s to %s",
group, admins));
if (Mflg) {
#ifdef WITH_AUDIT
audit_logger (AUDIT_USER_CHAUTHTOK, Prog,
- "setting group members", group, -1, 1);
+ "setting group members",
+ group, AUDIT_NO_ID, 1);
#endif
SYSLOG ((LOG_INFO, "set members of %s to %s", group, members));
#ifdef SHADOWGRP
if ((isatty (0) == 0) || (isatty (1) == 0)) {
fprintf (stderr, _("%s: Not a tty\n"), Prog);
#ifdef WITH_AUDIT
- audit_logger (AUDIT_USER_CHAUTHTOK, Prog, "changing password",
- group, -1, 0);
+ audit_logger (AUDIT_USER_CHAUTHTOK, Prog,
+ "changing password",
+ group, AUDIT_NO_ID, 0);
#endif
fail_exit (1);
}
catch_signals (0); /* save tty modes */
- signal (SIGHUP, catch_signals);
- signal (SIGINT, catch_signals);
- signal (SIGQUIT, catch_signals);
- signal (SIGTERM, catch_signals);
+ (void) signal (SIGHUP, catch_signals);
+ (void) signal (SIGINT, catch_signals);
+ (void) signal (SIGQUIT, catch_signals);
+ (void) signal (SIGTERM, catch_signals);
#ifdef SIGTSTP
- signal (SIGTSTP, catch_signals);
+ (void) signal (SIGTSTP, catch_signals);
#endif
/* Prompt for the new password */
fputs (_("Cannot change ID to root.\n"), stderr);
SYSLOG ((LOG_ERR, "can't setuid(0)"));
#ifdef WITH_AUDIT
- audit_logger (AUDIT_USER_CHAUTHTOK, Prog, "changing id to root",
- group, -1, 0);
+ audit_logger (AUDIT_USER_CHAUTHTOK, Prog,
+ "changing id to root",
+ group, AUDIT_NO_ID, 0);
#endif
closelog ();
fail_exit (1);
exit (E_SUCCESS);
}
+