/freebsd/tests/sys/capsicum/ |
H A D | Makefile | 3 TESTSDIR= ${TESTSBASE}/sys/capsicum 12 .PATH: ${SRCTOP}/contrib/capsicum-test 14 GTESTS+= capsicum-test 15 GTESTS_WRAPPER_SH.capsicum-test= functional 21 SRCS.capsicum-test+= \ 22 capsicum-test-main.cc \ 23 capsicum-test.cc \ 41 LIBADD.capsicum-test+= gtest pthread procstat 42 TEST_METADATA.capsicum-test= required_user="unprivileged" 61 WARNS.capsicum-test= 3
|
H A D | functional.sh | 31 CAPSICUM_TEST_BIN=capsicum-test
|
/freebsd/contrib/capsicum-test/ |
H A D | makefile | 1 all: capsicum-test smoketest mini-me mini-me.noexec mini-me.setuid $(EXTRA_PROGS) 2 OBJECTS=capsicum-test-main.o capsicum-test.o capability-fd.o copy_file_range.o fexecve.o procdesc.o… 10 capsicum-test: $(OBJECTS) libgtest.a $(LOCAL_LIBS) 28 test: capsicum-test mini-me mini-me.noexec mini-me.setuid $(EXTRA_PROGS) 29 ./capsicum-test 36 …rm -rf gtest-all.o libgtest.a capsicum-test mini-me mini-me.noexec smoketest $(SMOKETEST_OBJECTS) …
|
H A D | README.md | 3 This directory holds unit tests for [Capsicum](http://www.cl.cam.ac.uk/research/security/capsicum/) 6 [capsicum-linux](http://github.com/google/capsicum-linux) project). 18 …gitweb/?p=chromiumos/third_party/kernel-capsicum.git;a=tree;f=tools/testing/capsicum_tests;hb=refs…
|
H A D | .gitignore | 1 capsicum-test
|
H A D | GNUmakefile | 46 LIBCAPRIGHTS_OBJS=libcaprights/capsicum.o libcaprights/linux-bpf-capmode.o libcaprights/procdesc.o …
|
/freebsd/contrib/openbsm/bin/auditdistd/ |
H A D | sandbox.c | 63 sandbox(const char *user, bool capsicum, const char *fmt, ...) in sandbox() argument 177 if (capsicum) { in sandbox() 178 capsicum = (cap_enter() == 0); in sandbox() 179 if (!capsicum) { in sandbox() 185 capsicum = false; in sandbox() 223 capsicum ? "capsicum+" : "", jailed ? "jail" : "chroot"); in sandbox()
|
H A D | sandbox.h | 35 int sandbox(const char *user, bool capsicum, const char *fmt, ...);
|
/freebsd/sbin/hastd/ |
H A D | subr.c | 160 bool capsicum, jailed; in drop_privs() local 228 capsicum = (cap_enter() == 0); in drop_privs() 229 if (!capsicum) { in drop_privs() 275 capsicum = false; in drop_privs() 295 capsicum ? "capsicum+" : "", jailed ? "jail" : "chroot"); in drop_privs()
|
/freebsd/usr.bin/diff/ |
H A D | diffreg_new.c | 145 diffreg_new(char *file1, char *file2, int flags, int capsicum) in diffreg_new() argument 181 if (capsicum) { in diffreg_new()
|
H A D | diffreg.c | 67 #include <sys/capsicum.h> 228 diffreg(char *file1, char *file2, int flags, int capsicum) in diffreg() argument 238 return diffreg_new(file1, file2, flags, capsicum); in diffreg() 243 return diffreg_stone(file1, file2, flags, capsicum); in diffreg() 247 return diffreg_new(file1, file2, flags, capsicum); in diffreg() 249 return diffreg_stone(file1, file2, flags, capsicum); in diffreg() 268 diffreg_stone(char *file1, char *file2, int flags, int capsicum) in diffreg_stone() argument 377 if (capsicum) { in diffreg_stone()
|
/freebsd/tests/sys/ |
H A D | Makefile | 10 TESTS_SUBDIRS+= capsicum
|
/freebsd/secure/libexec/sshd-session/ |
H A D | Makefile | 17 sandbox-seccomp-filter.c sandbox-capsicum.c sandbox-pledge.c \
|
/freebsd/contrib/tcpdump/ |
H A D | configure.in | 206 AC_ARG_WITH(sandbox-capsicum, 207 AS_HELP_STRING([--with-sandbox-capsicum], 219 # capsicum sandboxing. 224 if test ! -z "$with_sandbox-capsicum" && test "$with_sandbox-capsicum" != "no" ; then 229 AC_MSG_CHECKING([whether to sandbox using capsicum]) 231 AC_DEFINE(HAVE_CAPSICUM, 1, [capsicum support available])
|
H A D | configure.ac | 238 AC_ARG_WITH(sandbox-capsicum, 239 AS_HELP_STRING([--with-sandbox-capsicum], 251 # capsicum sandboxing. 260 AC_CHECK_HEADER(sys/capsicum.h, 272 AC_MSG_CHECKING([whether to sandbox using capsicum]) 274 AC_DEFINE(HAVE_CAPSICUM, 1, [capsicum support available])
|
H A D | cmakeconfig.h.in | 12 /* capsicum support available */
|
H A D | config.h.in | 15 /* capsicum support available */
|
H A D | CHANGES | 69 Fix for backends which doesn't support capsicum. 364 Include the correct capsicum header. 554 Fix capsicum support to work with zerocopy buffers in bpf 764 added FreeBSD capsicum
|
H A D | configure | 4963 { printf "%s\n" "$as_me:${as_lineno-$LINENO}: checking whether to sandbox using capsicum" >&5 4964 printf %s "checking whether to sandbox using capsicum... " >&6; }
|
H A D | CMakeLists.txt | 1018 check_include_files("sys/capsicum.h" HAVE_SYS_CAPSICUM_H)
|
/freebsd/ |
H A D | MAINTAINERS | 40 contrib/capsicum-test ngie,#capsicum,#test Pre-commit review requested.
|
/freebsd/etc/mtree/ |
H A D | BSD.tests.dist | 554 capsicum
|
/freebsd/tools/build/ |
H A D | Makefile | 242 SYSINCS+= ${SRCTOP}/sys/sys/capsicum.h
|
/freebsd/share/man/man4/ |
H A D | Makefile | 89 capsicum.4 \
|
/freebsd/crypto/openssh/ |
H A D | configure.ac | 553 # sys/capsicum.h requires sys/types.h 554 AC_CHECK_HEADERS([sys/capsicum.h capsicum_helpers.h], [], [], [ 3672 …[ --with-sandbox=style Specify privilege separation sandbox (no, capsicum, darwin, rlimit, sec… 3834 AC_MSG_ERROR([capsicum sandbox requires sys/capsicum.h header]) 3836 AC_MSG_ERROR([capsicum sandbox requires cap_rights_limit function]) 3837 SANDBOX_STYLE="capsicum" 3838 AC_DEFINE([SANDBOX_CAPSICUM], [1], [Sandbox using capsicum])
|