Commit Graph

440 Commits

Author SHA1 Message Date
sin
5aede71236 Use a bitwise-xor to determine incompatible flags 2014-06-30 16:40:52 +01:00
sin
06dcf39b3a Add some error checking to util/recurse.c
Some more stylistic changes and simplification.
2014-06-30 16:06:15 +01:00
sin
968ccce951 Sync util/recurse.c with that of sbase 2014-06-30 15:45:16 +01:00
sin
693de34f88 Mention config.h in README 2014-06-30 14:23:08 +01:00
sin
fc26e2932d Add comment to clarify "$6$" 2014-06-30 14:22:08 +01:00
sin
4cce54b8e9 Add readahead.8 2014-06-30 14:19:57 +01:00
sin
22e7bed99b Add David to LICENSE 2014-06-30 14:13:00 +01:00
sin
67d38a7e43 Import strl{cpy,cat}() from sbase 2014-06-30 14:10:51 +01:00
sin
f5ebc6350b Import sys/queue.h and move over existing tools
We should stop rolling data structure implementations in every
tool.
2014-06-30 13:06:07 +01:00
sin
716321e765 Update TODO 2014-06-28 23:43:29 +01:00
sin
4c967b5995 Update README 2014-06-28 21:03:39 +01:00
sin
1e7acf4c54 No need to include sys/ioctl.h in watch(1) 2014-06-28 11:29:21 +01:00
sin
88c61c17e8 Check some more ioctl() calls for errors 2014-06-28 11:29:15 +01:00
sin
debcf4447d Add readahead(8) 2014-06-27 17:07:56 +01:00
sin
32efa14595 Fix switch_root delete_content() 2014-06-27 12:55:33 +01:00
sin
941ffd2aed Bail out on path truncation 2014-06-27 11:52:17 +01:00
sin
b5c3bcda7d Ensure that path[0] == '\0' upon entry to delete_content()
As a quick fix, staticise path to ensure that it is zero-filled
upon initial entry to the function.

In rare cases there's a possible buffer overflow and/or path
mess up on the first call to strlcat() with path[0] != '\0'.

The proper fix is to utilize util/recurse.c but the traversal
order cannot be specified at the moment.

Expect a better fix in the future.
2014-06-27 11:52:10 +01:00
sin
32bc548228 Update program list in TODO 2014-06-26 16:42:58 +01:00
sin
9a0cf7c359 Add a misc section in TODO 2014-06-26 16:39:51 +01:00
sin
36049e2925 Add more programs to TODO 2014-06-26 16:33:48 +01:00
sin
23678b96cd Check FIFREEZE/FITHAW ioctl for failure 2014-06-26 16:26:20 +01:00
sin
c88ba3750e Add freeramdisk(8) 2014-06-26 16:26:14 +01:00
sin
35a9479141 Style fix for insmod.8 2014-06-26 16:09:01 +01:00
sin
c1a96ddb4c Add fsfreeze.8 2014-06-26 16:07:11 +01:00
sin
6b83c2ce92 Fix missing paren 2014-06-14 20:40:40 +01:00
sin
5d85bb0cfe Add fsfreeze(8) 2014-06-14 16:49:43 +01:00
sin
816199471f Replace fgets() with agetline() 2014-06-14 13:15:03 +01:00
sin
191cc71cee sysctl: Add support for loading key:value pairs from file 2014-06-13 15:25:33 +01:00
sin
db0ea785f0 Implement -g and -u for id(1) 2014-06-11 15:47:23 +01:00
sin
d3e332c72d Ensure a select() failure is properly signalled to the caller 2014-06-11 13:08:16 +01:00
sin
d2c215f9ab Re-order some code in dd(1) 2014-06-11 13:05:12 +01:00
sin
0ca8e52bc1 Use select() in dd(1)
Avoid blocking in a call to splice() when no input is available.
We can now break out of dd using ^C even if the input is coming from
/dev/stdin.

Use tabs instead of spaces.
2014-06-11 13:02:58 +01:00
sin
c94dfdc99d Update dd usage 2014-06-11 12:00:23 +01:00
sin
c80061b08f Add dd(1) manpage
Formatting is a bit weird, will need fixing.
2014-06-11 11:54:38 +01:00
sin
3754c402ca Fix dd(1) usage line 2014-06-11 11:54:32 +01:00
sin
924fc8449b Disable core dumps in case passwd(1) crashes
Avoids leaking the shadow db.
2014-06-10 11:44:33 +01:00
sin
5eeef920f0 Add password cipher type in config.def.h - default to SHA-512 2014-06-09 16:51:59 +01:00
sin
ed5167e2c1 Add passwd.1 to MAN1 2014-06-09 16:47:08 +01:00
sin
5980da83e7 Add passwd manpage 2014-06-09 16:44:47 +01:00
sin
60500e376a Print "incorrect password" when checking empty passwords as well 2014-06-09 13:08:18 +01:00
sin
d745889805 Fix pw_check() semantics and style - it is now similar to pw_copy() 2014-06-09 13:05:24 +01:00
sin
78192e87d9 Simplify a bit pw_check() 2014-06-09 12:57:45 +01:00
sin
1b6fab85d6 Fix passwd semantics 2014-06-09 12:52:49 +01:00
sin
834279b4a9 If root starts passwd don't ask for current password 2014-06-09 12:37:54 +01:00
sin
4c38dffade If the user password is empty check it against the provided pass as well 2014-06-09 12:13:22 +01:00
sin
4b05ca07cc Port login(1) to pw_check() 2014-06-09 11:13:12 +01:00
sin
12083d49e5 Port su(1) to use pw_check() 2014-06-09 11:13:07 +01:00
sin
77a2f9f92c Add initial pw_check() 2014-06-09 11:12:53 +01:00
Hiltjo Posthuma
1abf7518ad mount: remove stat, not needed since we use realpath 2014-06-07 19:16:50 +01:00
Hiltjo Posthuma
01bbe2820a mount: resolve path given
this allows: cd /mnt; mount somename.
2014-06-07 19:16:42 +01:00