summaryrefslogtreecommitdiff
path: root/uidswap.c
diff options
context:
space:
mode:
authorBen Lindstrom <mouring@eviladmin.org>2002-06-06 20:38:49 +0000
committerBen Lindstrom <mouring@eviladmin.org>2002-06-06 20:38:49 +0000
commitabff1dd050ef0a275a67718b80bfae235f0264eb (patch)
tree06338433b9f76b4d36edd895961ead4cb1170ee3 /uidswap.c
parent105ccbe192391735f499d31207618757c37426e2 (diff)
- stevesk@cvs.openbsd.org 2002/05/28 17:28:02
[uidswap.c] format spec change/casts and some KNF; ok markus@
Diffstat (limited to 'uidswap.c')
-rw-r--r--uidswap.c19
1 files changed, 9 insertions, 10 deletions
diff --git a/uidswap.c b/uidswap.c
index 9b16a6b51..af7e86e84 100644
--- a/uidswap.c
+++ b/uidswap.c
@@ -12,7 +12,7 @@
12 */ 12 */
13 13
14#include "includes.h" 14#include "includes.h"
15RCSID("$OpenBSD: uidswap.c,v 1.20 2002/04/01 21:50:51 stevesk Exp $"); 15RCSID("$OpenBSD: uidswap.c,v 1.21 2002/05/28 17:28:02 stevesk Exp $");
16 16
17#include "log.h" 17#include "log.h"
18#include "uidswap.h" 18#include "uidswap.h"
@@ -52,8 +52,8 @@ temporarily_use_uid(struct passwd *pw)
52#ifdef SAVED_IDS_WORK_WITH_SETEUID 52#ifdef SAVED_IDS_WORK_WITH_SETEUID
53 saved_euid = geteuid(); 53 saved_euid = geteuid();
54 saved_egid = getegid(); 54 saved_egid = getegid();
55 debug("temporarily_use_uid: %d/%d (e=%d)", 55 debug("temporarily_use_uid: %u/%u (e=%u)",
56 pw->pw_uid, pw->pw_gid, saved_euid); 56 (u_int)pw->pw_uid, (u_int)pw->pw_gid, (u_int)saved_euid);
57 if (saved_euid != 0) { 57 if (saved_euid != 0) {
58 privileged = 0; 58 privileged = 0;
59 return; 59 return;
@@ -94,10 +94,10 @@ temporarily_use_uid(struct passwd *pw)
94 debug("setuid %u: %.100s", (u_int) geteuid(), strerror(errno)); 94 debug("setuid %u: %.100s", (u_int) geteuid(), strerror(errno));
95#endif /* SAVED_IDS_WORK_WITH_SETEUID */ 95#endif /* SAVED_IDS_WORK_WITH_SETEUID */
96 if (setegid(pw->pw_gid) < 0) 96 if (setegid(pw->pw_gid) < 0)
97 fatal("setegid %u: %.100s", (u_int) pw->pw_gid, 97 fatal("setegid %u: %.100s", (u_int)pw->pw_gid,
98 strerror(errno)); 98 strerror(errno));
99 if (seteuid(pw->pw_uid) == -1) 99 if (seteuid(pw->pw_uid) == -1)
100 fatal("seteuid %u: %.100s", (u_int) pw->pw_uid, 100 fatal("seteuid %u: %.100s", (u_int)pw->pw_uid,
101 strerror(errno)); 101 strerror(errno));
102} 102}
103 103
@@ -117,10 +117,9 @@ restore_uid(void)
117#ifdef SAVED_IDS_WORK_WITH_SETEUID 117#ifdef SAVED_IDS_WORK_WITH_SETEUID
118 /* Set the effective uid back to the saved privileged uid. */ 118 /* Set the effective uid back to the saved privileged uid. */
119 if (seteuid(saved_euid) < 0) 119 if (seteuid(saved_euid) < 0)
120 fatal("seteuid %u: %.100s", (u_int) saved_euid, strerror(errno)); 120 fatal("seteuid %u: %.100s", (u_int)saved_euid, strerror(errno));
121 if (setegid(saved_egid) < 0) 121 if (setegid(saved_egid) < 0)
122 fatal("setegid %u: %.100s", (u_int) saved_egid, 122 fatal("setegid %u: %.100s", (u_int)saved_egid, strerror(errno));
123 strerror(errno));
124#else /* SAVED_IDS_WORK_WITH_SETEUID */ 123#else /* SAVED_IDS_WORK_WITH_SETEUID */
125 /* 124 /*
126 * We are unable to restore the real uid to its unprivileged value. 125 * We are unable to restore the real uid to its unprivileged value.
@@ -148,7 +147,7 @@ permanently_set_uid(struct passwd *pw)
148 if (temporarily_use_uid_effective) 147 if (temporarily_use_uid_effective)
149 fatal("restore_uid: temporarily_use_uid effective"); 148 fatal("restore_uid: temporarily_use_uid effective");
150 if (setgid(pw->pw_gid) < 0) 149 if (setgid(pw->pw_gid) < 0)
151 fatal("setgid %u: %.100s", (u_int) pw->pw_gid, strerror(errno)); 150 fatal("setgid %u: %.100s", (u_int)pw->pw_gid, strerror(errno));
152 if (setuid(pw->pw_uid) < 0) 151 if (setuid(pw->pw_uid) < 0)
153 fatal("setuid %u: %.100s", (u_int) pw->pw_uid, strerror(errno)); 152 fatal("setuid %u: %.100s", (u_int)pw->pw_uid, strerror(errno));
154} 153}