/dports/security/sudo/sudo-1.9.8p2/plugins/python/ |
H A D | python_plugin_policy.c | 97 char **argv_out[], char **user_env_out[], const char **errstr) in python_plugin_policy_check() argument 104 *command_info_out = *argv_out = *user_env_out = NULL; in python_plugin_policy_check() 149 *user_env_out = py_str_array_from_tuple(py_user_env_out); in python_plugin_policy_check() 159 free(*user_env_out); in python_plugin_policy_check() 160 *command_info_out = *argv_out = *user_env_out = NULL; in python_plugin_policy_check()
|
H A D | example_policy_plugin.py | 77 user_env_out = sudo.options_from_dict(self.user_env) + env_add 85 return (sudo.RC.ACCEPT, command_info_out, argv, user_env_out)
|
/dports/security/sudo/sudo-1.9.8p2/plugins/sudoers/regress/fuzz/ |
H A D | fuzz_policy.c | 233 char **command_info = NULL, **argv_out = NULL, **user_env_out = NULL; in LLVMFuzzerTestOneInput() local 388 env_add.entries, &command_info, &argv_out, &user_env_out, in LLVMFuzzerTestOneInput() 392 env_add.entries, &command_info, &argv_out, &user_env_out, in LLVMFuzzerTestOneInput() 401 env_add.entries, &command_info, &argv_out, &user_env_out, in LLVMFuzzerTestOneInput() 405 env_add.entries, &command_info, &argv_out, &user_env_out, in LLVMFuzzerTestOneInput() 413 env_add.entries, &command_info, &argv_out, &user_env_out, in LLVMFuzzerTestOneInput() 421 env_add.entries, &command_info, &argv_out, &user_env_out, in LLVMFuzzerTestOneInput() 425 env_add.entries, &command_info, &argv_out, &user_env_out, in LLVMFuzzerTestOneInput()
|
/dports/security/sudo/sudo-1.9.8p2/plugins/python/regress/ |
H A D | check_python_examples.c | 744 char **argv_out, **user_env_out, **command_info_out; // free to contain garbage 747 &command_info_out, &argv_out, &user_env_out, &errstr), 752 VERIFY_STR_SET(user_env_out, 5, "USER_ENV1=VALUE1", "USER_ENV2=value2", 760 VERIFY_STR_SET(user_env_out, 6, "USER_ENV1=VALUE1", "USER_ENV2=value2", 769 str_array_free(&user_env_out); 791 char **argv_out, **user_env_out, **command_info_out; // free to contain garbage 799 VERIFY_INT(python_policy->init_session(NULL, &user_env_out, &errstr), SUDO_RC_ACCEPT); 807 str_array_free(&user_env_out); 829 char **argv_out, **user_env_out, **command_info_out; // free to contain garbage 838 VERIFY_PTR(user_env_out, NULL); [all …]
|
/dports/security/sudo/sudo-1.9.8p2/include/ |
H A D | sudo_plugin.h | 175 char **argv_out[], char **user_env_out[], const char **errstr); 180 int (*init_session)(struct passwd *pwd, char **user_env_out[],
|
/dports/security/sudo/sudo-1.9.8p2/plugins/sample/ |
H A D | sample_plugin.c | 300 char **argv_out[], char **user_env_out[]) in policy_check() argument 337 *user_env_out = plugin_state.envp; in policy_check()
|
/dports/security/sudo/sudo-1.9.8p2/src/ |
H A D | sudo_plugin_int.h | 47 char **argv_out[], char **user_env_out[]);
|
H A D | exec_intercept.c | 291 char **user_env_out = NULL; in intercept_check_policy() local 328 &command_info, &run_argv, &user_env_out, &closure->errstr); in intercept_check_policy()
|
/dports/security/sudo/sudo-1.9.8p2/plugins/sudoers/ |
H A D | policy.c | 1052 char **command_infop[], char **argv_out[], char **user_env_out[], in sudoers_policy_check() argument 1072 exec_args.envp = user_env_out; in sudoers_policy_check()
|
/dports/security/sudo/sudo-1.9.8p2/ |
H A D | ChangeLog | 21164 Pass updated user_env_out, not envp, to the I/O open function.
|