platform_external_selinux/libselinux/man/man3/getsockcreatecon.3
Stephen Smalley 9eb9c93275 Get rid of security_context_t and fix const declarations.
In attempting to enable building various part of Android with -Wall -Werror,
we found that the const security_context_t declarations in libselinux
are incorrect; const char * was intended, but const security_context_t
translates to char * const and triggers warnings on passing
const char * from the caller.   Easiest fix is to replace them all with
const char *.  And while we are at it, just get rid of all usage of
security_context_t itself as it adds no value - there is no true
encapsulation of the security context strings and callers already
directly use string functions on them.  typedef left to permit
building legacy users until such a time as all are updated.

This is a port of Change-Id I2f9df7bb9f575f76024c3e5f5b660345da2931a7
from Android, augmented to deal with all of the other code in upstream
libselinux and updating the man pages too.

Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
Acked-by: Eric Paris <eparis@redhat.com>
2014-02-19 16:11:48 -05:00

57 lines
1.7 KiB
Groff

.TH "getsockcreatecon" "3" "24 September 2008" "dwalsh@redhat.com" "SELinux API documentation"
.SH "NAME"
getsockcreatecon, setsockcreatecon \- get or set the SELinux security context used for creating a new labeled sockets
.
.SH "SYNOPSIS"
.B #include <selinux/selinux.h>
.sp
.BI "int getsockcreatecon(char **" con );
.sp
.BI "int getsockcreatecon_raw(char **" con );
.sp
.BI "int setsockcreatecon(char * "context );
.sp
.BI "int setsockcreatecon_raw(char * "context );
.
.SH "DESCRIPTION"
.BR getsockcreatecon ()
retrieves the context used for creating a new labeled network socket.
This returned context should be freed with
.BR freecon (3)
if non-NULL.
.BR getsockcreatecon ()
sets *con to NULL if no sockcreate context has been explicitly
set by the program (i.e. using the default policy behavior).
.BR setsockcreatecon ()
sets the context used for creating a new labeled network sockets
NULL can be passed to
.BR setsockcreatecon ()
to reset to the default policy behavior.
The sockcreate context is automatically reset after the next
.BR execve (2),
so a program doesn't need to explicitly sanitize it upon startup.
.BR setsockcreatecon ()
can be applied prior to library
functions that internally perform an file creation,
in order to set an file context on the objects.
.BR getsockcreatecon_raw ()
and
.BR setsockcreatecon_raw ()
behave identically to their non-raw counterparts but do not perform context
translation.
.B Note:
Signal handlers that perform a
.BR setsockcreatecon ()
must take care to
save, reset, and restore the sockcreate context to avoid unexpected behavior.
.
.SH "RETURN VALUE"
On error \-1 is returned.
On success 0 is returned.
.
.SH "SEE ALSO"
.BR selinux "(8), " freecon "(3), " getcon "(3)