Home
last modified time | relevance | path

Searched refs:capsicum (Results 1 – 25 of 29) sorted by relevance

12

/freebsd/tests/sys/capsicum/
H A DMakefile3 TESTSDIR= ${TESTSBASE}/sys/capsicum
12 .PATH: ${SRCTOP}/contrib/capsicum-test
14 GTESTS+= capsicum-test
15 GTESTS_WRAPPER_SH.capsicum-test= functional
21 SRCS.capsicum-test+= \
22 capsicum-test-main.cc \
23 capsicum-test.cc \
41 LIBADD.capsicum-test+= gtest pthread procstat
42 TEST_METADATA.capsicum-test= required_user="unprivileged"
61 WARNS.capsicum-test= 3
H A Dfunctional.sh31 CAPSICUM_TEST_BIN=capsicum-test
/freebsd/contrib/capsicum-test/
H A Dmakefile1 all: capsicum-test smoketest mini-me mini-me.noexec mini-me.setuid $(EXTRA_PROGS)
2 OBJECTS=capsicum-test-main.o capsicum-test.o capability-fd.o copy_file_range.o fexecve.o procdesc.o…
10 capsicum-test: $(OBJECTS) libgtest.a $(LOCAL_LIBS)
28 test: capsicum-test mini-me mini-me.noexec mini-me.setuid $(EXTRA_PROGS)
29 ./capsicum-test
36 …rm -rf gtest-all.o libgtest.a capsicum-test mini-me mini-me.noexec smoketest $(SMOKETEST_OBJECTS) …
H A DREADME.md3 This directory holds unit tests for [Capsicum](http://www.cl.cam.ac.uk/research/security/capsicum/)
6 [capsicum-linux](http://github.com/google/capsicum-linux) project).
18 …gitweb/?p=chromiumos/third_party/kernel-capsicum.git;a=tree;f=tools/testing/capsicum_tests;hb=refs…
H A D.gitignore1 capsicum-test
H A DGNUmakefile46 LIBCAPRIGHTS_OBJS=libcaprights/capsicum.o libcaprights/linux-bpf-capmode.o libcaprights/procdesc.o …
/freebsd/contrib/openbsm/bin/auditdistd/
H A Dsandbox.c63 sandbox(const char *user, bool capsicum, const char *fmt, ...) in sandbox() argument
177 if (capsicum) { in sandbox()
178 capsicum = (cap_enter() == 0); in sandbox()
179 if (!capsicum) { in sandbox()
185 capsicum = false; in sandbox()
223 capsicum ? "capsicum+" : "", jailed ? "jail" : "chroot"); in sandbox()
H A Dsandbox.h35 int sandbox(const char *user, bool capsicum, const char *fmt, ...);
/freebsd/sbin/hastd/
H A Dsubr.c160 bool capsicum, jailed; in drop_privs() local
228 capsicum = (cap_enter() == 0); in drop_privs()
229 if (!capsicum) { in drop_privs()
275 capsicum = false; in drop_privs()
295 capsicum ? "capsicum+" : "", jailed ? "jail" : "chroot"); in drop_privs()
/freebsd/usr.bin/diff/
H A Ddiffreg_new.c145 diffreg_new(char *file1, char *file2, int flags, int capsicum) in diffreg_new() argument
181 if (capsicum) { in diffreg_new()
H A Ddiffreg.c67 #include <sys/capsicum.h>
228 diffreg(char *file1, char *file2, int flags, int capsicum) in diffreg() argument
238 return diffreg_new(file1, file2, flags, capsicum); in diffreg()
243 return diffreg_stone(file1, file2, flags, capsicum); in diffreg()
247 return diffreg_new(file1, file2, flags, capsicum); in diffreg()
249 return diffreg_stone(file1, file2, flags, capsicum); in diffreg()
268 diffreg_stone(char *file1, char *file2, int flags, int capsicum) in diffreg_stone() argument
377 if (capsicum) { in diffreg_stone()
/freebsd/tests/sys/
H A DMakefile10 TESTS_SUBDIRS+= capsicum
/freebsd/secure/libexec/sshd-session/
H A DMakefile17 sandbox-seccomp-filter.c sandbox-capsicum.c sandbox-pledge.c \
/freebsd/contrib/tcpdump/
H A Dconfigure.in206 AC_ARG_WITH(sandbox-capsicum,
207 AS_HELP_STRING([--with-sandbox-capsicum],
219 # capsicum sandboxing.
224 if test ! -z "$with_sandbox-capsicum" && test "$with_sandbox-capsicum" != "no" ; then
229 AC_MSG_CHECKING([whether to sandbox using capsicum])
231 AC_DEFINE(HAVE_CAPSICUM, 1, [capsicum support available])
H A Dconfigure.ac238 AC_ARG_WITH(sandbox-capsicum,
239 AS_HELP_STRING([--with-sandbox-capsicum],
251 # capsicum sandboxing.
260 AC_CHECK_HEADER(sys/capsicum.h,
272 AC_MSG_CHECKING([whether to sandbox using capsicum])
274 AC_DEFINE(HAVE_CAPSICUM, 1, [capsicum support available])
H A Dcmakeconfig.h.in12 /* capsicum support available */
H A Dconfig.h.in15 /* capsicum support available */
H A DCHANGES69 Fix for backends which doesn't support capsicum.
364 Include the correct capsicum header.
554 Fix capsicum support to work with zerocopy buffers in bpf
764 added FreeBSD capsicum
H A Dconfigure4963 { printf "%s\n" "$as_me:${as_lineno-$LINENO}: checking whether to sandbox using capsicum" >&5
4964 printf %s "checking whether to sandbox using capsicum... " >&6; }
H A DCMakeLists.txt1018 check_include_files("sys/capsicum.h" HAVE_SYS_CAPSICUM_H)
/freebsd/
H A DMAINTAINERS40 contrib/capsicum-test ngie,#capsicum,#test Pre-commit review requested.
/freebsd/etc/mtree/
H A DBSD.tests.dist554 capsicum
/freebsd/tools/build/
H A DMakefile242 SYSINCS+= ${SRCTOP}/sys/sys/capsicum.h
/freebsd/share/man/man4/
H A DMakefile89 capsicum.4 \
/freebsd/crypto/openssh/
H A Dconfigure.ac553 # sys/capsicum.h requires sys/types.h
554 AC_CHECK_HEADERS([sys/capsicum.h capsicum_helpers.h], [], [], [
3672 …[ --with-sandbox=style Specify privilege separation sandbox (no, capsicum, darwin, rlimit, sec…
3834 AC_MSG_ERROR([capsicum sandbox requires sys/capsicum.h header])
3836 AC_MSG_ERROR([capsicum sandbox requires cap_rights_limit function])
3837 SANDBOX_STYLE="capsicum"
3838 AC_DEFINE([SANDBOX_CAPSICUM], [1], [Sandbox using capsicum])

12