aboutsummaryrefslogtreecommitdiff
path: root/loginutils/su.c
diff options
context:
space:
mode:
authorDenis Vlasenko <vda.linux@googlemail.com>2009-04-21 11:09:40 +0000
committerDenis Vlasenko <vda.linux@googlemail.com>2009-04-21 11:09:40 +0000
commit5e34ff29bcc870936ab18172f438a34d042d4e03 (patch)
treea5e7a528f2f916eb883f1161eadceacdf2dca4be /loginutils/su.c
parent8b814b4a349e2262c0ad25793b05206a14651ebb (diff)
downloadbusybox-w32-5e34ff29bcc870936ab18172f438a34d042d4e03.tar.gz
busybox-w32-5e34ff29bcc870936ab18172f438a34d042d4e03.tar.bz2
busybox-w32-5e34ff29bcc870936ab18172f438a34d042d4e03.zip
*: mass renaming of USE_XXXX to IF_XXXX
and SKIP_XXXX to IF_NOT_XXXX - the second one was especially badly named. It was not skipping anything!
Diffstat (limited to 'loginutils/su.c')
-rw-r--r--loginutils/su.c4
1 files changed, 2 insertions, 2 deletions
diff --git a/loginutils/su.c b/loginutils/su.c
index de8c18d25..a8b852b09 100644
--- a/loginutils/su.c
+++ b/loginutils/su.c
@@ -43,7 +43,7 @@ int su_main(int argc UNUSED_PARAM, char **argv)
43 the user, especially if someone su's from a su-shell. 43 the user, especially if someone su's from a su-shell.
44 But getlogin can fail -- usually due to lack of utmp entry. 44 But getlogin can fail -- usually due to lack of utmp entry.
45 in this case resort to getpwuid. */ 45 in this case resort to getpwuid. */
46 old_user = xstrdup(USE_FEATURE_UTMP(getlogin() ? : ) (pw = getpwuid(cur_uid)) ? pw->pw_name : ""); 46 old_user = xstrdup(IF_FEATURE_UTMP(getlogin() ? : ) (pw = getpwuid(cur_uid)) ? pw->pw_name : "");
47 tty = xmalloc_ttyname(2) ? : "none"; 47 tty = xmalloc_ttyname(2) ? : "none";
48 openlog(applet_name, 0, LOG_AUTH); 48 openlog(applet_name, 0, LOG_AUTH);
49 } 49 }
@@ -91,7 +91,7 @@ int su_main(int argc UNUSED_PARAM, char **argv)
91 change_identity(pw); 91 change_identity(pw);
92 /* setup_environment params: shell, clear_env, change_env, pw */ 92 /* setup_environment params: shell, clear_env, change_env, pw */
93 setup_environment(opt_shell, flags & SU_OPT_l, !(flags & SU_OPT_mp), pw); 93 setup_environment(opt_shell, flags & SU_OPT_l, !(flags & SU_OPT_mp), pw);
94 USE_SELINUX(set_current_security_context(NULL);) 94 IF_SELINUX(set_current_security_context(NULL);)
95 95
96 /* Never returns */ 96 /* Never returns */
97 run_shell(opt_shell, flags & SU_OPT_l, opt_command, (const char**)argv); 97 run_shell(opt_shell, flags & SU_OPT_l, opt_command, (const char**)argv);