diff options
author | Colin Watson <cjwatson@debian.org> | 2005-06-17 12:44:30 +0000 |
---|---|---|
committer | Colin Watson <cjwatson@debian.org> | 2005-06-17 12:44:30 +0000 |
commit | 4c2d1c67cea075107aadaa6d81fe456687c69e67 (patch) | |
tree | 4f31813c8306491c908948bd75254912385ed651 /monitor_wrap.h | |
parent | bed4bb0fe9380912ecb90e5f918bce8825ec0a38 (diff) |
Manoj Srivastava:
- Added SELinux capability, and turned it on be default. Added
restorecon calls in preinst and postinst (should not matter if the
machine is not SELinux aware). By and large, the changes made should
have no effect unless the rules file calls --with-selinux; and even
then there should be no performance hit for machines not actively
running SELinux.
- Modified the preinst and postinst to call restorecon to set the
security context for the generated public key files.
- Added a comment to /etc/pam.d/ssh to indicate that an SELinux system
may want to also include pam_selinux.so.
Diffstat (limited to 'monitor_wrap.h')
-rw-r--r-- | monitor_wrap.h | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/monitor_wrap.h b/monitor_wrap.h index 310b42513..5e8d4bf5a 100644 --- a/monitor_wrap.h +++ b/monitor_wrap.h | |||
@@ -43,7 +43,7 @@ struct Authctxt; | |||
43 | int mm_is_monitor(void); | 43 | int mm_is_monitor(void); |
44 | DH *mm_choose_dh(int, int, int); | 44 | DH *mm_choose_dh(int, int, int); |
45 | int mm_key_sign(Key *, u_char **, u_int *, u_char *, u_int); | 45 | int mm_key_sign(Key *, u_char **, u_int *, u_char *, u_int); |
46 | void mm_inform_authserv(char *, char *); | 46 | void mm_inform_authserv(char *, char *, char *); |
47 | struct passwd *mm_getpwnamallow(const char *); | 47 | struct passwd *mm_getpwnamallow(const char *); |
48 | char *mm_auth2_read_banner(void); | 48 | char *mm_auth2_read_banner(void); |
49 | int mm_auth_password(struct Authctxt *, char *); | 49 | int mm_auth_password(struct Authctxt *, char *); |