bool is_valid_user_name (const char *name)
{
- long maxlen;
+ long maxsize;
- /*
- * User name length should be limited by the kernel
- */
errno = 0;
- maxlen = sysconf(_SC_LOGIN_NAME_MAX);
- if (maxlen == -1 && errno != 0)
- maxlen = LOGIN_NAME_MAX;
- if (maxlen != -1 && strlen(name) >= (size_t)maxlen)
+ maxsize = sysconf(_SC_LOGIN_NAME_MAX);
+ if (maxsize == -1 && errno != 0)
+ maxsize = LOGIN_NAME_MAX;
+ if (maxsize != -1 && strlen(name) >= (size_t)maxsize)
return false;
return is_valid_name (name);
extern int remove_tree (const char *root, bool remove_root);
/* rlogin.c */
-extern int do_rlogin (const char *remote_host, char *name, size_t namelen,
- char *term, size_t termlen);
+extern int do_rlogin(const char *remote_host, char *name, size_t namesize,
+ char *term, size_t termsize);
/* root_flag.c */
extern void process_root_flag (const char* short_opt, int argc, char **argv);
{ -1, -1}
};
-static void get_remote_string (char *buf, size_t size)
+
+static void
+get_remote_string(char *buf, size_t size)
{
for (;;) {
if (read (0, buf, 1) != 1) {
++buf;
}
}
- /*NOTREACHED*/}
+ /*NOTREACHED*/
+}
+
int
-do_rlogin (const char *remote_host, char *name, size_t namelen, char *term,
- size_t termlen)
+do_rlogin(const char *remote_host, char *name, size_t namesize, char *term,
+ size_t termsize)
{
struct passwd *pwd;
char remote_name[32];
int i;
TERMIO termio;
- get_remote_string (remote_name, sizeof remote_name);
- get_remote_string (name, namelen);
- get_remote_string (term, termlen);
+ get_remote_string(remote_name, sizeof(remote_name));
+ get_remote_string(name, namesize);
+ get_remote_string(term, termsize);
cp = strchr (term, '/');
if (NULL != cp) {
#endif
}
#endif /* RLOGIN */
-