AC_LINK_IFELSE([AC_LANG_PROGRAM([[#include <sys/types.h>
#include <$ac_header_dirent>]], [[DIR *d; (void)dirfd(d);]])], [AC_DEFINE(HAVE_DIRFD)], [AC_LINK_IFELSE([AC_LANG_PROGRAM([[#include <sys/types.h>
#include <$ac_header_dirent>]], [[DIR d; memset(&d, 0, sizeof(d)); return(d.dd_fd);]])], [AC_DEFINE(HAVE_DD_FD)], [])])
-AC_CHECK_MEMBERS([struct dirent.d_type], [], [], [
+AC_CHECK_MEMBERS([struct dirent.d_type, struct dirent.d_namlen], [], [], [
AC_INCLUDES_DEFAULT
#include <$ac_header_dirent>
])
# include <inttypes.h>
#endif
#include <unistd.h>
-#ifdef HAVE_DIRENT_H
-# include <dirent.h>
-# define NAMLEN(dirent) strlen((dirent)->d_name)
-#else
-# define dirent direct
-# define NAMLEN(dirent) (dirent)->d_namlen
-# ifdef HAVE_SYS_NDIR_H
-# include <sys/ndir.h>
-# endif
-# ifdef HAVE_SYS_DIR_H
-# include <sys/dir.h>
-# endif
-# ifdef HAVE_NDIR_H
-# include <ndir.h>
-# endif
-#endif
+#include <dirent.h>
#include <errno.h>
#include <ctype.h>
#include "sudoers.h"
# include "compat/sha2.h"
#endif
+#if defined(HAVE_STRUCT_DIRENT_D_NAMLEN) && HAVE_STRUCT_DIRENT_D_NAMLEN
+# define NAMLEN(dirent) (dirent)->d_namlen
+#else
+# define NAMLEN(dirent) strlen((dirent)->d_name)
+#endif
+
int sudolineno; /* current sudoers line number. */
int last_token; /* last token that was parsed. */
char *sudoers; /* sudoers file being parsed. */
#define WANTDIGEST 6
-#line 2060 "lex.sudoers.c"
+#line 2042 "lex.sudoers.c"
/* Macros after this point can all be overridden by user definitions in
* section 1.
register char *yy_cp, *yy_bp;
register int yy_act;
-#line 138 "toke.l"
+#line 120 "toke.l"
-#line 2216 "lex.sudoers.c"
+#line 2198 "lex.sudoers.c"
if ( yy_init )
{
case 1:
YY_RULE_SETUP
-#line 139 "toke.l"
+#line 121 "toke.l"
{
LEXTRACE(", ");
LEXRETURN(',');
YY_BREAK
case 2:
YY_RULE_SETUP
-#line 144 "toke.l"
+#line 126 "toke.l"
BEGIN STARTDEFS;
YY_BREAK
case 3:
YY_RULE_SETUP
-#line 146 "toke.l"
+#line 128 "toke.l"
{
BEGIN INDEFS;
LEXTRACE("DEFVAR ");
case 4:
YY_RULE_SETUP
-#line 155 "toke.l"
+#line 137 "toke.l"
{
BEGIN STARTDEFS;
LEXTRACE(", ");
YY_BREAK
case 5:
YY_RULE_SETUP
-#line 161 "toke.l"
+#line 143 "toke.l"
{
LEXTRACE("= ");
LEXRETURN('=');
YY_BREAK
case 6:
YY_RULE_SETUP
-#line 166 "toke.l"
+#line 148 "toke.l"
{
LEXTRACE("+= ");
LEXRETURN('+');
YY_BREAK
case 7:
YY_RULE_SETUP
-#line 171 "toke.l"
+#line 153 "toke.l"
{
LEXTRACE("-= ");
LEXRETURN('-');
YY_BREAK
case 8:
YY_RULE_SETUP
-#line 176 "toke.l"
+#line 158 "toke.l"
{
LEXTRACE("BEGINSTR ");
sudoerslval.string = NULL;
YY_BREAK
case 9:
YY_RULE_SETUP
-#line 183 "toke.l"
+#line 165 "toke.l"
{
LEXTRACE("WORD(2) ");
if (!fill(sudoerstext, sudoersleng))
case 10:
YY_RULE_SETUP
-#line 192 "toke.l"
+#line 174 "toke.l"
{
/* Line continuation char followed by newline. */
sudolineno++;
YY_BREAK
case 11:
YY_RULE_SETUP
-#line 198 "toke.l"
+#line 180 "toke.l"
{
LEXTRACE("ENDSTR ");
BEGIN prev_state;
YY_BREAK
case 12:
YY_RULE_SETUP
-#line 230 "toke.l"
+#line 212 "toke.l"
{
LEXTRACE("BACKSLASH ");
if (!append(sudoerstext, sudoersleng))
YY_BREAK
case 13:
YY_RULE_SETUP
-#line 236 "toke.l"
+#line 218 "toke.l"
{
LEXTRACE("STRBODY ");
if (!append(sudoerstext, sudoersleng))
case 14:
YY_RULE_SETUP
-#line 244 "toke.l"
+#line 226 "toke.l"
{
/* quoted fnmatch glob char, pass verbatim */
LEXTRACE("QUOTEDCHAR ");
YY_BREAK
case 15:
YY_RULE_SETUP
-#line 252 "toke.l"
+#line 234 "toke.l"
{
/* quoted sudoers special char, strip backslash */
LEXTRACE("QUOTEDCHAR ");
YY_BREAK
case 16:
YY_RULE_SETUP
-#line 260 "toke.l"
+#line 242 "toke.l"
{
BEGIN INITIAL;
yyless(0);
YY_BREAK
case 17:
YY_RULE_SETUP
-#line 266 "toke.l"
+#line 248 "toke.l"
{
LEXTRACE("ARG ");
if (!fill_args(sudoerstext, sudoersleng, sawspace))
case 18:
YY_RULE_SETUP
-#line 274 "toke.l"
+#line 256 "toke.l"
{
/* Only return DIGEST if the length is correct. */
if (sudoersleng == digest_len * 2) {
YY_BREAK
case 19:
YY_RULE_SETUP
-#line 287 "toke.l"
+#line 269 "toke.l"
{
/* Only return DIGEST if the length is correct. */
int len;
YY_BREAK
case 20:
YY_RULE_SETUP
-#line 308 "toke.l"
+#line 290 "toke.l"
{
char *path;
YY_BREAK
case 21:
YY_RULE_SETUP
-#line 326 "toke.l"
+#line 308 "toke.l"
{
char *path;
YY_BREAK
case 22:
YY_RULE_SETUP
-#line 347 "toke.l"
+#line 329 "toke.l"
{
char deftype;
int n;
YY_BREAK
case 23:
YY_RULE_SETUP
-#line 387 "toke.l"
+#line 369 "toke.l"
{
int n;
YY_BREAK
case 24:
YY_RULE_SETUP
-#line 413 "toke.l"
+#line 395 "toke.l"
{
/* cmnd does not require passwd for this user */
LEXTRACE("NOPASSWD ");
YY_BREAK
case 25:
YY_RULE_SETUP
-#line 419 "toke.l"
+#line 401 "toke.l"
{
/* cmnd requires passwd for this user */
LEXTRACE("PASSWD ");
YY_BREAK
case 26:
YY_RULE_SETUP
-#line 425 "toke.l"
+#line 407 "toke.l"
{
LEXTRACE("NOEXEC ");
LEXRETURN(NOEXEC);
YY_BREAK
case 27:
YY_RULE_SETUP
-#line 430 "toke.l"
+#line 412 "toke.l"
{
LEXTRACE("EXEC ");
LEXRETURN(EXEC);
YY_BREAK
case 28:
YY_RULE_SETUP
-#line 435 "toke.l"
+#line 417 "toke.l"
{
LEXTRACE("SETENV ");
LEXRETURN(SETENV);
YY_BREAK
case 29:
YY_RULE_SETUP
-#line 440 "toke.l"
+#line 422 "toke.l"
{
LEXTRACE("NOSETENV ");
LEXRETURN(NOSETENV);
YY_BREAK
case 30:
YY_RULE_SETUP
-#line 445 "toke.l"
+#line 427 "toke.l"
{
LEXTRACE("LOG_OUTPUT ");
LEXRETURN(LOG_OUTPUT);
YY_BREAK
case 31:
YY_RULE_SETUP
-#line 450 "toke.l"
+#line 432 "toke.l"
{
LEXTRACE("NOLOG_OUTPUT ");
LEXRETURN(NOLOG_OUTPUT);
YY_BREAK
case 32:
YY_RULE_SETUP
-#line 455 "toke.l"
+#line 437 "toke.l"
{
LEXTRACE("LOG_INPUT ");
LEXRETURN(LOG_INPUT);
YY_BREAK
case 33:
YY_RULE_SETUP
-#line 460 "toke.l"
+#line 442 "toke.l"
{
LEXTRACE("NOLOG_INPUT ");
LEXRETURN(NOLOG_INPUT);
YY_BREAK
case 34:
YY_RULE_SETUP
-#line 465 "toke.l"
+#line 447 "toke.l"
{
LEXTRACE("MAIL ");
LEXRETURN(MAIL);
YY_BREAK
case 35:
YY_RULE_SETUP
-#line 470 "toke.l"
+#line 452 "toke.l"
{
LEXTRACE("NOMAIL ");
LEXRETURN(NOMAIL);
YY_BREAK
case 36:
YY_RULE_SETUP
-#line 475 "toke.l"
+#line 457 "toke.l"
{
/* empty group or netgroup */
LEXTRACE("ERROR ");
YY_BREAK
case 37:
YY_RULE_SETUP
-#line 481 "toke.l"
+#line 463 "toke.l"
{
/* netgroup */
if (!fill(sudoerstext, sudoersleng))
YY_BREAK
case 38:
YY_RULE_SETUP
-#line 489 "toke.l"
+#line 471 "toke.l"
{
/* group */
if (!fill(sudoerstext, sudoersleng))
YY_BREAK
case 39:
YY_RULE_SETUP
-#line 497 "toke.l"
+#line 479 "toke.l"
{
if (!fill(sudoerstext, sudoersleng))
yyterminate();
YY_BREAK
case 40:
YY_RULE_SETUP
-#line 504 "toke.l"
+#line 486 "toke.l"
{
if (!fill(sudoerstext, sudoersleng))
yyterminate();
YY_BREAK
case 41:
YY_RULE_SETUP
-#line 511 "toke.l"
+#line 493 "toke.l"
{
if (!ipv6_valid(sudoerstext)) {
LEXTRACE("ERROR ");
YY_BREAK
case 42:
YY_RULE_SETUP
-#line 522 "toke.l"
+#line 504 "toke.l"
{
if (!ipv6_valid(sudoerstext)) {
LEXTRACE("ERROR ");
YY_BREAK
case 43:
YY_RULE_SETUP
-#line 533 "toke.l"
+#line 515 "toke.l"
{
LEXTRACE("ALL ");
LEXRETURN(ALL);
YY_BREAK
case 44:
YY_RULE_SETUP
-#line 539 "toke.l"
+#line 521 "toke.l"
{
#ifdef HAVE_SELINUX
LEXTRACE("ROLE ");
YY_BREAK
case 45:
YY_RULE_SETUP
-#line 548 "toke.l"
+#line 530 "toke.l"
{
#ifdef HAVE_SELINUX
LEXTRACE("TYPE ");
YY_BREAK
case 46:
YY_RULE_SETUP
-#line 556 "toke.l"
+#line 538 "toke.l"
{
#ifdef HAVE_PRIV_SET
LEXTRACE("PRIVS ");
YY_BREAK
case 47:
YY_RULE_SETUP
-#line 565 "toke.l"
+#line 547 "toke.l"
{
#ifdef HAVE_PRIV_SET
LEXTRACE("LIMITPRIVS ");
YY_BREAK
case 48:
YY_RULE_SETUP
-#line 574 "toke.l"
+#line 556 "toke.l"
{
got_alias:
if (!fill(sudoerstext, sudoersleng))
YY_BREAK
case 49:
YY_RULE_SETUP
-#line 582 "toke.l"
+#line 564 "toke.l"
{
/* XXX - no way to specify digest for command */
/* no command args allowed for Defaults!/path */
YY_BREAK
case 50:
YY_RULE_SETUP
-#line 591 "toke.l"
+#line 573 "toke.l"
{
digest_len = SHA224_DIGEST_LENGTH;
BEGIN WANTDIGEST;
YY_BREAK
case 51:
YY_RULE_SETUP
-#line 598 "toke.l"
+#line 580 "toke.l"
{
digest_len = SHA256_DIGEST_LENGTH;
BEGIN WANTDIGEST;
YY_BREAK
case 52:
YY_RULE_SETUP
-#line 605 "toke.l"
+#line 587 "toke.l"
{
digest_len = SHA384_DIGEST_LENGTH;
BEGIN WANTDIGEST;
YY_BREAK
case 53:
YY_RULE_SETUP
-#line 612 "toke.l"
+#line 594 "toke.l"
{
digest_len = SHA512_DIGEST_LENGTH;
BEGIN WANTDIGEST;
YY_BREAK
case 54:
YY_RULE_SETUP
-#line 619 "toke.l"
+#line 601 "toke.l"
{
BEGIN GOTCMND;
LEXTRACE("COMMAND ");
YY_BREAK
case 55:
YY_RULE_SETUP
-#line 626 "toke.l"
+#line 608 "toke.l"
{
/* directories can't have args... */
if (sudoerstext[sudoersleng - 1] == '/') {
YY_BREAK
case 56:
YY_RULE_SETUP
-#line 641 "toke.l"
+#line 623 "toke.l"
{
LEXTRACE("BEGINSTR ");
sudoerslval.string = NULL;
YY_BREAK
case 57:
YY_RULE_SETUP
-#line 648 "toke.l"
+#line 630 "toke.l"
{
/* a word */
if (!fill(sudoerstext, sudoersleng))
YY_BREAK
case 58:
YY_RULE_SETUP
-#line 656 "toke.l"
+#line 638 "toke.l"
{
LEXTRACE("( ");
LEXRETURN('(');
YY_BREAK
case 59:
YY_RULE_SETUP
-#line 661 "toke.l"
+#line 643 "toke.l"
{
LEXTRACE(") ");
LEXRETURN(')');
YY_BREAK
case 60:
YY_RULE_SETUP
-#line 666 "toke.l"
+#line 648 "toke.l"
{
LEXTRACE(", ");
LEXRETURN(',');
YY_BREAK
case 61:
YY_RULE_SETUP
-#line 671 "toke.l"
+#line 653 "toke.l"
{
LEXTRACE("= ");
LEXRETURN('=');
YY_BREAK
case 62:
YY_RULE_SETUP
-#line 676 "toke.l"
+#line 658 "toke.l"
{
LEXTRACE(": ");
LEXRETURN(':');
YY_BREAK
case 63:
YY_RULE_SETUP
-#line 681 "toke.l"
+#line 663 "toke.l"
{
if (sudoersleng & 1) {
LEXTRACE("!");
YY_BREAK
case 64:
YY_RULE_SETUP
-#line 688 "toke.l"
+#line 670 "toke.l"
{
if (YY_START == INSTR) {
LEXTRACE("ERROR ");
YY_BREAK
case 65:
YY_RULE_SETUP
-#line 700 "toke.l"
+#line 682 "toke.l"
{ /* throw away space/tabs */
sawspace = true; /* but remember for fill_args */
}
YY_BREAK
case 66:
YY_RULE_SETUP
-#line 704 "toke.l"
+#line 686 "toke.l"
{
sawspace = true; /* remember for fill_args */
sudolineno++;
YY_BREAK
case 67:
YY_RULE_SETUP
-#line 710 "toke.l"
+#line 692 "toke.l"
{
if (sudoerstext[sudoersleng - 1] == '\n') {
/* comment ending in a newline */
YY_BREAK
case 68:
YY_RULE_SETUP
-#line 724 "toke.l"
+#line 706 "toke.l"
{
LEXTRACE("ERROR ");
LEXRETURN(ERROR);
case YY_STATE_EOF(INDEFS):
case YY_STATE_EOF(INSTR):
case YY_STATE_EOF(WANTDIGEST):
-#line 729 "toke.l"
+#line 711 "toke.l"
{
if (YY_START != INITIAL) {
BEGIN INITIAL;
YY_BREAK
case 69:
YY_RULE_SETUP
-#line 739 "toke.l"
+#line 721 "toke.l"
ECHO;
YY_BREAK
-#line 3118 "lex.sudoers.c"
+#line 3100 "lex.sudoers.c"
case YY_END_OF_BUFFER:
{
return 0;
}
#endif
-#line 739 "toke.l"
+#line 721 "toke.l"
struct path_list {
SLIST_ENTRY(path_list) entries;