1 |
/* |
---|
2 |
* Copyright (c) 2005-2007, OmniTI Computer Consulting, Inc. |
---|
3 |
* All rights reserved. |
---|
4 |
* |
---|
5 |
* Redistribution and use in source and binary forms, with or without |
---|
6 |
* modification, are permitted provided that the following conditions are |
---|
7 |
* met: |
---|
8 |
* |
---|
9 |
* * Redistributions of source code must retain the above copyright |
---|
10 |
* notice, this list of conditions and the following disclaimer. |
---|
11 |
* * Redistributions in binary form must reproduce the above |
---|
12 |
* copyright notice, this list of conditions and the following |
---|
13 |
* disclaimer in the documentation and/or other materials provided |
---|
14 |
* with the distribution. |
---|
15 |
* * Neither the name OmniTI Computer Consulting, Inc. nor the names |
---|
16 |
* of its contributors may be used to endorse or promote products |
---|
17 |
* derived from this software without specific prior written |
---|
18 |
* permission. |
---|
19 |
* |
---|
20 |
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS |
---|
21 |
* "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT |
---|
22 |
* LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR |
---|
23 |
* A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT |
---|
24 |
* OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, |
---|
25 |
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT |
---|
26 |
* LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, |
---|
27 |
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY |
---|
28 |
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT |
---|
29 |
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE |
---|
30 |
* OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
---|
31 |
*/ |
---|
32 |
|
---|
33 |
#ifndef _NOIT_SECURITY_H |
---|
34 |
#define _NOIT_SECURITY_H |
---|
35 |
|
---|
36 |
/*! \fn int noit_security_chroot(const char *path) |
---|
37 |
\brief chroot(2) to the specified directory. |
---|
38 |
\param path The path to chroot to. |
---|
39 |
\return Zero is returned on success. |
---|
40 |
|
---|
41 |
noit_security_chroot placing the calling application into a chroot |
---|
42 |
environment. |
---|
43 |
*/ |
---|
44 |
API_EXPORT(int) noit_security_chroot(const char *path); |
---|
45 |
|
---|
46 |
/*! \fn int noit_security_usergroup(const char *user, const char *group) |
---|
47 |
\brief change the real, effective and saved user and group |
---|
48 |
\param user The user name as either a login or a userid in string form. |
---|
49 |
\param group The group name as either a login or a groupid in string form. |
---|
50 |
\return Zero is returned on success. |
---|
51 |
|
---|
52 |
noit_security_usergroup will change the real, effective, and saved |
---|
53 |
user and group for the calling process. This is thread-safe. |
---|
54 |
*/ |
---|
55 |
API_EXPORT(int) noit_security_usergroup(const char *user, const char *group); |
---|
56 |
|
---|
57 |
#endif |
---|