summaryrefslogtreecommitdiff
path: root/monitor_wrap.h
diff options
context:
space:
mode:
authorColin Watson <cjwatson@debian.org>2005-06-17 12:44:30 +0000
committerColin Watson <cjwatson@debian.org>2005-06-17 12:44:30 +0000
commit4c2d1c67cea075107aadaa6d81fe456687c69e67 (patch)
tree4f31813c8306491c908948bd75254912385ed651 /monitor_wrap.h
parentbed4bb0fe9380912ecb90e5f918bce8825ec0a38 (diff)
Manoj Srivastava:
- Added SELinux capability, and turned it on be default. Added restorecon calls in preinst and postinst (should not matter if the machine is not SELinux aware). By and large, the changes made should have no effect unless the rules file calls --with-selinux; and even then there should be no performance hit for machines not actively running SELinux. - Modified the preinst and postinst to call restorecon to set the security context for the generated public key files. - Added a comment to /etc/pam.d/ssh to indicate that an SELinux system may want to also include pam_selinux.so.
Diffstat (limited to 'monitor_wrap.h')
-rw-r--r--monitor_wrap.h2
1 files changed, 1 insertions, 1 deletions
diff --git a/monitor_wrap.h b/monitor_wrap.h
index 310b42513..5e8d4bf5a 100644
--- a/monitor_wrap.h
+++ b/monitor_wrap.h
@@ -43,7 +43,7 @@ struct Authctxt;
43int mm_is_monitor(void); 43int mm_is_monitor(void);
44DH *mm_choose_dh(int, int, int); 44DH *mm_choose_dh(int, int, int);
45int mm_key_sign(Key *, u_char **, u_int *, u_char *, u_int); 45int mm_key_sign(Key *, u_char **, u_int *, u_char *, u_int);
46void mm_inform_authserv(char *, char *); 46void mm_inform_authserv(char *, char *, char *);
47struct passwd *mm_getpwnamallow(const char *); 47struct passwd *mm_getpwnamallow(const char *);
48char *mm_auth2_read_banner(void); 48char *mm_auth2_read_banner(void);
49int mm_auth_password(struct Authctxt *, char *); 49int mm_auth_password(struct Authctxt *, char *);