1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
|
/**
* @file
*
* Provides a way for setools to make queries about permissive types
* within a policy. The caller obtains a query object,
* fills in its parameters, and then runs the query; it obtains a
* vector of results. Searches are conjunctive -- all fields of the
* search query must match for a datum to be added to the results
* query.
*
* @author Steve Lawrence slawrence@tresys.com
*
* Copyright (C) 2006-2007 Tresys Technology, LLC
*
* This library is free software; you can redistribute it and/or
* modify it under the terms of the GNU Lesser General Public
* License as published by the Free Software Foundation; either
* version 2.1 of the License, or (at your option) any later version.
*
* This library is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
* Lesser General Public License for more details.
*
* You should have received a copy of the GNU Lesser General Public
* License along with this library; if not, write to the Free Software
* Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
*/
#include "policy-query-internal.h"
#include <errno.h>
struct apol_permissive_query
{
char *permissive_name;
unsigned int flags;
regex_t *regex;
};
int apol_permissive_get_by_query(const apol_policy_t * p, apol_permissive_query_t * q, apol_vector_t ** v)
{
qpol_iterator_t *iter;
int retval = -1;
*v = NULL;
if (qpol_policy_get_permissive_iter(p->p, &iter) < 0) {
return -1;
}
if ((*v = apol_vector_create(NULL)) == NULL) {
ERR(p, "%s", strerror(errno));
goto cleanup;
}
for (; !qpol_iterator_end(iter); qpol_iterator_next(iter)) {
const qpol_permissive_t *permissive;
if (qpol_iterator_get_item(iter, (void **)&permissive) < 0) {
goto cleanup;
}
if (q != NULL) {
int compval = apol_compare_permissive(p,
permissive, q->permissive_name,
q->flags, &(q->regex));
if (compval < 0) {
goto cleanup;
} else if (compval == 0) {
continue;
}
}
if (apol_vector_append(*v, (void *)permissive)) {
ERR(p, "%s", strerror(ENOMEM));
goto cleanup;
}
}
retval = 0;
cleanup:
if (retval != 0) {
apol_vector_destroy(v);
}
qpol_iterator_destroy(&iter);
return retval;
}
apol_permissive_query_t *apol_permissive_query_create(void)
{
return calloc(1, sizeof(apol_permissive_query_t));
}
void apol_permissive_query_destroy(apol_permissive_query_t ** q)
{
if (*q != NULL) {
free((*q)->permissive_name);
apol_regex_destroy(&(*q)->regex);
free(*q);
*q = NULL;
}
}
int apol_permissive_query_set_name(const apol_policy_t * p, apol_permissive_query_t * q, const char *name)
{
return apol_query_set(p, &q->permissive_name, &q->regex, name);
}
int apol_permissive_query_set_regex(const apol_policy_t * p, apol_permissive_query_t * q, int is_regex)
{
return apol_query_set_regex(p, &q->flags, is_regex);
}
|