/* Define to 1 if you have the `sig2str' function. */
#undef HAVE_SIG2STR
-/* Define to 1 if the system has the type `sigaction_t'. */
-#undef HAVE_SIGACTION_T
-
/* Define to 1 if you use S/Key. */
#undef HAVE_SKEY
else
$as_echo "#define sig_atomic_t int" >>confdefs.h
-fi
-
-ac_fn_c_check_type "$LINENO" "sigaction_t" "ac_cv_type_sigaction_t" "#include <sys/types.h>
-#include <signal.h>
-"
-if test "x$ac_cv_type_sigaction_t" = xyes; then :
-
-cat >>confdefs.h <<_ACEOF
-#define HAVE_SIGACTION_T 1
-_ACEOF
-
-
fi
ac_fn_c_check_type "$LINENO" "struct in6_addr" "ac_cv_type_struct_in6_addr" "#include <sys/types.h>
#include <time.h>])
AC_CHECK_TYPE([sig_atomic_t], [], [AC_DEFINE(sig_atomic_t, int)], [#include <sys/types.h>
#include <signal.h>])
-AC_CHECK_TYPES([sigaction_t], [], [], [#include <sys/types.h>
-#include <signal.h>])
AC_CHECK_TYPES([struct in6_addr], [], [], [#include <sys/types.h>
#include <netinet/in.h>])
AC_TYPE_LONG_LONG_INT
# define HAVE_INNETGR 1
#endif /* HAVE__INNETGR */
-/*
- * Add IRIX-like sigaction_t for those without it.
- */
-#ifndef HAVE_SIGACTION_T
-typedef struct sigaction sigaction_t;
-#endif
-
/*
* The nitems macro may be defined in sys/param.h
*/
static int
tcsetattr_nobg(int fd, int flags, struct termios *tp)
{
- sigaction_t sa, osa;
+ struct sigaction sa, osa;
int rc;
/*
char *s;
size_t len;
int authok = 0;
- sigaction_t sa, osa;
+ struct sigaction sa, osa;
auth_session_t *as = ((struct bsdauth_state *) auth->data)->as;
debug_decl(bsdauth_verify, SUDOERS_DEBUG_AUTH)
int ret, status, success = AUTH_FAILURE;
sudo_auth *auth;
sigset_t mask, omask;
- sigaction_t sa, saved_sigtstp;
+ struct sigaction sa, saved_sigtstp;
debug_decl(verify_user, SUDOERS_DEBUG_AUTH)
/* Make sure we have at least one auth method. */
bool interactive;
struct write_closure wc;
char buf[LINE_MAX];
- sigaction_t sa;
+ struct sigaction sa;
int idx;
debug_decl(replay_session, SUDO_DEBUG_UTIL)
static void
setup_signals(void)
{
- sigaction_t sa;
+ struct sigaction sa;
debug_decl(setup_signals, SUDOERS_DEBUG_UTIL)
/*
{
struct monitor_closure mc = { 0 };
struct command_status cstat;
- sigaction_t sa;
+ struct sigaction sa;
int errpipe[2];
debug_decl(exec_monitor, SUDO_DEBUG_EXEC);
* resume, potentially stopping sudo with SIGTTOU while the command
* continues to run.
*/
- sigaction_t sa, osa;
+ struct sigaction sa, osa;
pid_t saved_pgrp = -1;
int fd, signo = WSTOPSIG(status);
suspend_sudo(int signo, pid_t ppgrp)
{
char signame[SIG2STR_MAX];
- sigaction_t sa, osa;
+ struct sigaction sa, osa;
int ret = 0;
debug_decl(suspend_sudo, SUDO_DEBUG_EXEC);
struct exec_closure_pty ec = { 0 };
struct plugin_container *plugin;
sigset_t set, oset;
- sigaction_t sa;
+ struct sigaction sa;
pid_t ppgrp;
int sv[2];
debug_decl(exec_pty, SUDO_DEBUG_EXEC)
static struct signal_state {
int signo;
int restore;
- sigaction_t sa;
+ struct sigaction sa;
} saved_signals[] = {
{ SIGALRM }, /* SAVED_SIGALRM */
{ SIGCHLD }, /* SAVED_SIGCHLD */
* signal. However, we want to avoid having sudo dump core itself.
*/
if (WIFSIGNALED(status)) {
- sigaction_t sa;
+ struct sigaction sa;
if (WCOREDUMP(status))
disable_coredump(false);
int
tcsetpgrp_nobg(int fd, pid_t pgrp_id)
{
- sigaction_t sa, osa;
+ struct sigaction sa, osa;
int rc;
/*
tgetpass(const char *prompt, int timeout, int flags,
struct sudo_conv_callback *callback)
{
- sigaction_t sa, savealrm, saveint, savehup, savequit, saveterm;
- sigaction_t savetstp, savettin, savettou;
+ struct sigaction sa, savealrm, saveint, savehup, savequit, saveterm;
+ struct sigaction savetstp, savettin, savettou;
char *pass;
static const char *askpass;
static char buf[SUDO_CONV_REPL_MAX + 1];