const gid_t* list_of_db_gids,
size_t list_size) DEPRECATED;
+/**
+ * Run before any privilege modification.
+ * @return PC_OPERATION_SUCCESS on success, PC_ERR_* on error
+ */
+int perm_begin(void);
+
+/**
+ * Run after any privilege modification.
+ * @return PC_OPERATION_SUCCESS on success, PC_ERR_* on error
+ */
+int perm_end(void);
+
+/**
+ * Add additional rules to libprivilege.
+ * The rules can use wild-cards and labels.
+ *
+ * @param set_smack_rule_set an array of rules, NULL terminated
+ * @return PC_OPERATION_SUCCESS on success, PC_ERR_* on error
+ */
+int perm_add_additional_rules(const char** set_smack_rule_set);
+
#ifdef __cplusplus
}
#endif // __cplusplus
DECISION_LABEL = 1
};
+API int perm_begin(void)
+{
+ SECURE_C_LOGD("Entering function: %s.", __func__);
+// return rdb_modification_start();
+ return PC_OPERATION_SUCCESS;
+}
+
+API int perm_end(void)
+{
+ SECURE_C_LOGD("Entering function: %s.", __func__);
+
+// rdb_modification_finish();
+// sync();
+ return PC_OPERATION_SUCCESS;
+}
+
API int control_privilege(void)//deprecated
{
SECURE_C_LOGD("Entering function: %s.", __func__);
return ret;
}
+
+API int perm_add_additional_rules(const char** smack_rules){
+ SECURE_C_LOGD("Entering function: %s.", __func__);
+/* int ret;
+ if (!smack_rules){
+ C_LOGE("smack_rules is NULL");
+ return PC_ERR_INVALID_PARAM;
+ }
+
+ ret = rdb_add_additional_rules(smack_rules);
+ if (ret != PC_OPERATION_SUCCESS) {
+ C_LOGE("RDB rdb_add_additional_rules failed with: %d", ret);
+ return ret;
+ }*/
+
+ return PC_OPERATION_SUCCESS;
+}