audit_sudo_selected(int sorf)
{
auditinfo_addr_t ainfo_addr;
-#ifdef BSM_AUDIT_COMPAT
- auditinfo_t ainfo;
-#endif
struct au_mask *mask;
int rc;
debug_decl(audit_sudo_selected, SUDOERS_DEBUG_AUDIT)
if (getaudit_addr(&ainfo_addr, sizeof(ainfo_addr)) < 0) {
#ifdef BSM_AUDIT_COMPAT
if (errno == ENOSYS) {
+ auditinfo_t ainfo;
+
/* Fall back to older BSM API. */
if (getaudit(&ainfo) < 0) {
sudo_warn("getaudit");
bsm_audit_success(char *exec_args[])
{
auditinfo_addr_t ainfo_addr;
- auditinfo_t ainfo;
token_t *tok;
au_id_t auid;
long au_cond;
getuid(), pid, pid, &ainfo_addr.ai_termid);
#ifdef BSM_AUDIT_COMPAT
} else if (errno == ENOSYS) {
+ auditinfo_t ainfo;
+
/*
* NB: We should probably watch out for ERANGE here.
*/
bsm_audit_failure(char *exec_args[], char const *const fmt, va_list ap)
{
auditinfo_addr_t ainfo_addr;
- auditinfo_t ainfo;
char text[256];
token_t *tok;
long au_cond;
getuid(), pid, pid, &ainfo_addr.ai_termid);
#ifdef BSM_AUDIT_COMPAT
} else if (errno == ENOSYS) {
+ auditinfo_t ainfo;
+
if (getaudit(&ainfo) < 0) {
sudo_warn("getaudit");
debug_return_int(-1);
if (entry->u.ppid != key->u.ppid) {
sudo_debug_printf(SUDO_DEBUG_DEBUG,
"%s:%u record ppid mismatch (want %d, got %d)", __func__, recno,
- key->u.ppid, entry->u.ppid);
+ (int)key->u.ppid, (int)entry->u.ppid);
debug_return_bool(false);
}
if (sudo_timespeccmp(&entry->start_time, &key->start_time, !=)) {