AC_ARG_WITH(AFS, [ --with-AFS enable AFS support],
[case $with_AFS in
yes) AC_DEFINE(HAVE_AFS)
---- sudo-1.6.8p12/sudo.c.login 2006-07-16 15:39:26.000000000 +0200
-+++ sudo-1.6.8p12/sudo.c 2006-07-16 15:41:42.000000000 +0200
-@@ -109,7 +109,7 @@
- static struct passwd *get_authpw __P((void));
- extern int sudo_edit __P((int, char **));
- extern void list_matches __P((void));
--extern char **rebuild_env __P((char **, int, int));
-+extern char **rebuild_env __P((char **, int));
- extern char **zero_env __P((char **));
- extern struct passwd *sudo_getpwnam __P((const char *));
- extern struct passwd *sudo_getpwuid __P((uid_t));
-@@ -140,6 +140,7 @@
+--- sudo-1.6.9p3/sudo.c.orig 2007-08-04 22:30:23.307231082 +0200
++++ sudo-1.6.9p3/sudo.c 2007-08-04 22:31:28.238931329 +0200
+@@ -164,6 +164,7 @@
+ char *login_style;
#endif /* HAVE_BSD_AUTH_H */
- sigaction_t saved_sa_int, saved_sa_quit, saved_sa_tstp, saved_sa_chld;
- void (*set_perms) __P((int));
+ sigaction_t saved_sa_int, saved_sa_quit, saved_sa_tstp;
+int sudo_mode;
-
- int
-@@ -151,7 +152,6 @@
+ #ifdef WITH_SELINUX
+ security_context_t setup_tty_context(int fd, char *ttyn, security_context_t new_context) {
+@@ -319,7 +320,6 @@
int validated;
int fd;
int cmnd_status;
- int sudo_mode;
int pwflag;
- char **new_environ;
sigaction_t sa;
-@@ -368,7 +368,7 @@
-
- /* Build a new environment that avoids any nasty bits if we have a cmnd. */
- if (ISSET(sudo_mode, MODE_RUN))
-- new_environ = rebuild_env(envp, sudo_mode, ISSET(validated, FLAG_NOEXEC));
-+ new_environ = rebuild_env(envp, ISSET(validated, FLAG_NOEXEC));
- else
- new_environ = envp;
-
+ extern int printmatches;
--- sudo-1.6.8p12/auth/pam.c.login 2006-07-16 15:41:59.000000000 +0200
+++ sudo-1.6.8p12/auth/pam.c 2006-07-16 15:45:15.000000000 +0200
@@ -89,7 +89,12 @@
if (pam_status != PAM_SUCCESS) {
log_error(USE_ERRNO|NO_EXIT|NO_MAIL, "unable to initialize PAM");
return(AUTH_FATAL);
---- sudo-1.6.8p12/env.c.login 2006-07-16 15:40:14.000000000 +0200
-+++ sudo-1.6.8p12/env.c 2006-07-16 15:57:19.000000000 +0200
-@@ -77,7 +77,7 @@
- /*
- * Prototypes
- */
--char **rebuild_env __P((char **, int, int));
-+char **rebuild_env __P((char **, int));
- char **zero_env __P((char **));
- static void insert_env __P((char *, int));
- static char *format_env __P((char *, ...));
-@@ -321,9 +321,8 @@
- * Also adds sudo-specific variables (SUDO_*).
- */
- char **
--rebuild_env(envp, sudo_mode, noexec)
-+rebuild_env(envp, noexec)
- char **envp;
-- int sudo_mode;
- int noexec;
- {
- char **ep, *cp, *ps1;
---- sudo-1.6.8p12/sudo.h.login 2006-07-16 15:59:08.000000000 +0200
-+++ sudo-1.6.8p12/sudo.h 2006-07-16 15:59:38.000000000 +0200
-@@ -251,6 +251,7 @@
+--- sudo-1.6.9p3/sudo.h.orig 2007-07-06 16:14:34.000000000 +0200
++++ sudo-1.6.9p3/sudo.h 2007-08-04 22:32:18.353787210 +0200
+@@ -268,6 +268,7 @@
extern FILE *sudoers_fp;
extern int tgetpass_flags;
extern uid_t timestamp_uid;
+extern int sudo_mode;
-
- extern void (*set_perms) __P((int));
#endif
+ #ifndef errno
+ extern int errno;
--- sudo-1.6.8p12/config.h.in.login 2006-07-16 15:32:09.000000000 +0200
+++ sudo-1.6.8p12/config.h.in 2006-07-16 15:32:56.000000000 +0200
@@ -230,6 +230,9 @@