selinux/libselinux/src/get_initial_context.c
Stephen Smalley 9eb9c93275 Get rid of security_context_t and fix const declarations.
In attempting to enable building various part of Android with -Wall -Werror,
we found that the const security_context_t declarations in libselinux
are incorrect; const char * was intended, but const security_context_t
translates to char * const and triggers warnings on passing
const char * from the caller.   Easiest fix is to replace them all with
const char *.  And while we are at it, just get rid of all usage of
security_context_t itself as it adds no value - there is no true
encapsulation of the security context strings and callers already
directly use string functions on them.  typedef left to permit
building legacy users until such a time as all are updated.

This is a port of Change-Id I2f9df7bb9f575f76024c3e5f5b660345da2931a7
from Android, augmented to deal with all of the other code in upstream
libselinux and updating the man pages too.

Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
Acked-by: Eric Paris <eparis@redhat.com>
2014-02-19 16:11:48 -05:00

73 lines
1.2 KiB
C

#include <unistd.h>
#include <sys/types.h>
#include <fcntl.h>
#include <stdlib.h>
#include <stdio.h>
#include <errno.h>
#include <string.h>
#include "selinux_internal.h"
#include "policy.h"
#include <limits.h>
#define SELINUX_INITCON_DIR "/initial_contexts/"
int security_get_initial_context_raw(const char * name, char ** con)
{
char path[PATH_MAX];
char *buf;
size_t size;
int fd, ret;
if (!selinux_mnt) {
errno = ENOENT;
return -1;
}
snprintf(path, sizeof path, "%s%s%s",
selinux_mnt, SELINUX_INITCON_DIR, name);
fd = open(path, O_RDONLY);
if (fd < 0)
return -1;
size = selinux_page_size;
buf = malloc(size);
if (!buf) {
ret = -1;
goto out;
}
memset(buf, 0, size);
ret = read(fd, buf, size - 1);
if (ret < 0)
goto out2;
*con = strdup(buf);
if (!(*con)) {
ret = -1;
goto out2;
}
ret = 0;
out2:
free(buf);
out:
close(fd);
return ret;
}
hidden_def(security_get_initial_context_raw)
int security_get_initial_context(const char * name, char ** con)
{
int ret;
char * rcon;
ret = security_get_initial_context_raw(name, &rcon);
if (!ret) {
ret = selinux_raw_to_trans_context(rcon, con);
freecon(rcon);
}
return ret;
}
hidden_def(security_get_initial_context)