- export sepol_context_to_sid

This commit is contained in:
Daniel J Walsh 2005-05-16 21:46:33 +00:00
parent e04378394e
commit 5d7a0aa1a4
2 changed files with 15 additions and 14 deletions

View File

@ -1,12 +1,9 @@
diff --exclude-from=exclude -N -u -r nsalibsepol/src/genbools.c libsepol-1.5.5/src/genbools.c
--- nsalibsepol/src/genbools.c 2005-04-26 12:15:36.000000000 -0400
+++ libsepol-1.5.5/src/genbools.c 2005-04-25 15:25:55.000000000 -0400
@@ -195,7 +195,7 @@
}
if (evaluate_conds(&policydb) < 0) {
- __sepol_debug_printf("%s: Error while re-evaluating conditionals\n",
+ __sepol_debug_printf("%s: Error while re-evaluating conditionals\n",
__FUNCTION__);
errno = EINVAL;
goto err;
diff --exclude-from=exclude -N -u -r nsalibsepol/src/libsepol.map libsepol-1.5.8/src/libsepol.map
--- nsalibsepol/src/libsepol.map 2005-04-14 07:22:14.000000000 -0400
+++ libsepol-1.5.8/src/libsepol.map 2005-05-16 17:43:48.000000000 -0400
@@ -1,4 +1,4 @@
{
- global: sepol_genbools*; sepol_set_policydb_from_file; sepol_check_context; sepol_genusers; sepol_debug; sepol_set_delusers;
+ global: sepol_genbools*; sepol_set_policydb_from_file; sepol_check_context; sepol_genusers; sepol_debug; sepol_set_delusers; sepol_context_to_sid; sepol_compute_av_reason;
local: *;
};

View File

@ -1,10 +1,11 @@
Summary: SELinux binary policy manipulation library
Name: libsepol
Version: 1.5.8
Release: 1
Release: 2
License: GPL
Group: System Environment/Libraries
Source: http://www.nsa.gov/selinux/archives/libsepol-%{version}.tgz
Patch: libsepol-rhat.patch
Prefix: %{_prefix}
BuildRoot: %{_tmppath}/%{name}-buildroot
Provides: libsepol.so
@ -36,7 +37,7 @@ needed for developing applications that manipulate binary policies.
%prep
%setup -q
%patch -p1 -b .rhat
%build
make CFLAGS="%{optflags}"
@ -71,6 +72,9 @@ rm -rf ${RPM_BUILD_ROOT}
/%{_lib}/libsepol.so.1
%changelog
* Mon May 16 2005 Dan Walsh <dwalsh@redhat.com> 1.5.8-2
- export sepol_context_to_sid
* Mon May 16 2005 Dan Walsh <dwalsh@redhat.com> 1.5.8-1
- Upgrade to latest from NSA
* Added sepol_ prefix to Flask types to avoid