summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorEamon Walsh <ewalsh@epoch.ncsc.mil>2004-05-05 20:07:37 +0000
committerEamon Walsh <ewalsh@epoch.ncsc.mil>2004-05-05 20:07:37 +0000
commitb91c0b6cffcfbceb2b9aac4261345ae2eb5d4787 (patch)
treec94111209605f0c022eee5220884d304285cf4e3
parentbd01a8fc8f645eb7a869d9441de156937e9b87bd (diff)
downloadxorg-proto-xextproto-XACE-SELINUX.tar.gz
Modify XC-SECURITY and XC-APPGROUP extensions to work with XACEXACE-SELINUX
-rw-r--r--Xagsrv.h4
-rw-r--r--security.h39
2 files changed, 3 insertions, 40 deletions
diff --git a/Xagsrv.h b/Xagsrv.h
index b9c50aa..d95d73a 100644
--- a/Xagsrv.h
+++ b/Xagsrv.h
@@ -53,7 +53,9 @@ extern ClientPtr XagLeader(
);
extern void XagCallClientStateChange(
- ClientPtr /* client */
+ CallbackListPtr* /* pcbl */,
+ pointer /* nulldata */,
+ pointer /* calldata */
);
extern Bool XagIsControlledRoot (
diff --git a/security.h b/security.h
index 188ad55..ac31ac7 100644
--- a/security.h
+++ b/security.h
@@ -142,50 +142,11 @@ typedef struct {
Bool valid; /* did anyone recognize it? if so, set to TRUE */
} SecurityValidateGroupInfoRec;
-/* Proc vectors for untrusted clients, swapped and unswapped versions.
- * These are the same as the normal proc vectors except that extensions
- * that haven't declared themselves secure will have ProcBadRequest plugged
- * in for their major opcode dispatcher. This prevents untrusted clients
- * from guessing extension major opcodes and using the extension even though
- * the extension can't be listed or queried.
- */
-extern int (*UntrustedProcVector[256])(ClientPtr client);
-extern int (*SwappedUntrustedProcVector[256])(ClientPtr client);
-
-extern Bool SecurityCheckDeviceAccess(ClientPtr client, DeviceIntPtr dev,
- Bool fromRequest);
-
-extern void SecurityAudit(char *format, ...);
-
-#ifdef LBX
-extern Bool SecuritySameLevel(ClientPtr client, XID authId);
-#endif
-
extern int XSecurityOptions(int argc, char **argv, int i);
/* Give this value or higher to the -audit option to get security messages */
#define SECURITY_AUDIT_LEVEL 4
-extern void SecurityCensorImage(
- ClientPtr client,
- RegionPtr pVisibleRegion,
- long widthBytesLine,
- DrawablePtr pDraw,
- int x, int y, int w, int h,
- unsigned int format,
- char * pBuf);
-
-#define SecurityAllowOperation 0
-#define SecurityIgnoreOperation 1
-#define SecurityErrorOperation 2
-
-char
-SecurityCheckPropertyAccess(
- ClientPtr client,
- WindowPtr pWin,
- ATOM propertyName,
- Mask access_mode);
-
#define SECURITY_POLICY_FILE_VERSION "version-1"
char **SecurityGetSitePolicyStrings(int *n);