Licenses

1debian/copyright
2License
3pam_cap/License

Notices

.pc/.quilt_patches
.pc/.quilt_series
.pc/.version
.pc/0001-fix-Makefiles.patch/pam_cap/Makefile
.pc/applied-patches
CHANGELOG
Make.Rules
Makefile
README
contrib/Makefile
contrib/bug400591/Makefile
contrib/bug400591/bug.c
contrib/pcaps4convenience
contrib/pcaps4server
contrib/pcaps4suid0
debian/README.Debian
debian/README.source
debian/capsh.8
debian/changelog
debian/compat
debian/control
debian/libcap-dev.install
debian/libcap-dev.manpages
debian/libcap2-bin.examples
debian/libcap2-bin.install
debian/libcap2-bin.lintian-overrides
debian/libcap2-bin.manpages
debian/libcap2-bin.preinst
debian/libcap2.install
debian/libpam-cap.install
debian/libpam-cap.postinst
debian/libpam-cap.prerm
debian/orig-tar.sh
debian/pam-configs/capability
debian/patches/0001-fix-Makefiles.patch
debian/patches/0003-refine-setcap-error-message.patch
debian/patches/0004-include-sys-xattr.patch
debian/patches/series
debian/rules
debian/source/format
debian/watch
doc/Makefile
doc/cap_clear.3
doc/cap_clear_flag.3
doc/cap_compare.3
doc/cap_copy_ext.3
doc/cap_copy_int.3
doc/cap_drop_bound.3
doc/cap_dup.3
doc/cap_free.3
doc/cap_from_name.3
doc/cap_from_text.3
doc/cap_get_bound.3
doc/cap_get_fd.3
doc/cap_get_file.3
doc/cap_get_flag.3
doc/cap_get_pid.3
doc/cap_get_proc.3
doc/cap_init.3
doc/cap_set_fd.3
doc/cap_set_file.3
doc/cap_set_flag.3
doc/cap_set_proc.3
doc/cap_size.3
doc/cap_to_name.3
doc/cap_to_text.3
doc/capability.notes
doc/capgetp.3
doc/capsetp.3
doc/capsh.1
doc/getcap.8
doc/libcap.3
doc/old/README
doc/old/_fgetfilecap.2
doc/old/_fsetfilecap.2
doc/old/_getfilecap.2
doc/old/_getproccap.2
doc/old/_setfilecap.2
doc/old/_setproccap.2
doc/setcap.8
libcap/.gitignore
libcap/Makefile
libcap/include/uapi/linux/capability.h
libcap/include/uapi/linux/prctl.h
libcap/include/uapi/linux/securebits.h
libcap/libcap.pc.in
pam_cap/.gitignore
pam_cap/Makefile
pam_cap/capability.conf
pam_cap/test.c
pgp.keys.asc
progs/.gitignore
progs/Makefile
progs/old/README
progs/quicktest.sh
No copyright notice found

.pc/0003-refine-setcap-error-message.patch/progs/setcap.c
progs/setcap.c
/*
 * Copyright (c) 1997,2007-8 Andrew G. Morgan  <morgan@kernel.org>
 *
 * This sets/verifies the capabilities of a given file.
 */

.pc/0004-include-sys-xattr.patch/libcap/include/sys/capability.h
libcap/include/sys/capability.h
/*
 * <sys/capability.h>
 *
 * Copyright (C) 1997   Aleph One
 * Copyright (C) 1997-8,2008 Andrew G. Morgan <morgan@kernel.org>
 *
 * defunct POSIX.1e Standard: 25.2 Capabilities           <sys/capability.h>
 */

libcap/_makenames.c
/*
 * Copyright (c) 1997-8 Andrew G. Morgan <morgan@kernel.org>
 *
 * This is a file to make the capability <-> string mappings for
 * libcap.
 */

libcap/cap_alloc.c
/*
 * Copyright (c) 1997-8 Andrew G Morgan <morgan@kernel.org>
 *
 * This file deals with allocation and deallocation of internal
 * capability sets as specified by POSIX.1e (formerlly, POSIX 6).
 */

libcap/cap_extint.c
/*
 * Copyright (c) 1997-8 Andrew G Morgan <morgan@kernel.org>
 *
 * This file deals with exchanging internal and external
 * representations of capability sets.
 */

libcap/cap_file.c
/*
 * Copyright (c) 1997,2007 Andrew G Morgan <morgan@kernel.org>
 *
 * This file deals with setting capabilities on files.
 */

libcap/cap_flag.c
/*
 * Copyright (c) 1997-8,2008 Andrew G. Morgan <morgan@kernel.org>
 *
 * This file deals with flipping of capabilities on internal
 * capability sets as specified by POSIX.1e (formerlly, POSIX 6).
 */

libcap/cap_proc.c
/*
 * Copyright (c) 1997-8,2007,2011 Andrew G Morgan <morgan@kernel.org>
 *
 * This file deals with getting and setting capabilities on processes.
 */

libcap/cap_text.c
/*
 * Copyright (c) 1997-8,2007-8 Andrew G Morgan <morgan@kernel.org>
 * Copyright (c) 1997 Andrew Main <zefram@dcs.warwick.ac.uk>
 *
 * This file deals with exchanging internal and textual
 * representations of capability sets.
 */

libcap/include/sys/securebits.h
/*
 * <sys/securebits.h>
 * Copyright (C) 2010	Serge Hallyn <serue@us.ibm.com>
 */

libcap/libcap.h
/*
 * Copyright (c) 1997 Andrew G Morgan <morgan@kernel.org>
 *
 * This file contains internal definitions for the various functions in
 * this small capability library.
 */

pam_cap/pam_cap.c
/*
 * Copyright (c) 1999,2007 Andrew G. Morgan <morgan@kernel.org>
 *
 * The purpose of this module is to enforce inheritable capability sets
 * for a specified user.
 */

progs/capsh.c
/*
 * Copyright (c) 2008-11 Andrew G. Morgan <morgan@kernel.org>
 *
 * This is a simple 'bash' wrapper program that can be used to
 * raise and lower both the bset and pI capabilities before invoking
 * /bin/bash (hardcoded right now).
 *
 * The --print option can be used as a quick test whether various
 * capability manipulations work as expected (or not).
 */

progs/getcap.c
/*
 * Copyright (c) 1997,2007 Andrew G. Morgan  <morgan@kernel.org>
 *
 * This displays the capabilities of a given file.
 */

progs/getpcaps.c
/*
 * Copyright (c) 1997,2008 Andrew G. Morgan  <morgan@kernel.org>
 *
 * This displays the capabilities of given target process(es).
 */
"usage: getcaps <pid> [<pid> ...]\n\n"
"  This program displays the capabilities on the queried process(es).\n"
"  The capabilities are displayed in the cap_from_text(3) format.\n\n"
"[Copyright (c) 1997-8,2007 Andrew G. Morgan  <morgan@kernel.org>]\n"


progs/old/execcap.c
"usage: execcap <caps> <command-path> [command-args...]\n\n"
"  This program is a wrapper that can be used to limit the Inheritable\n"
"  capabilities of a program to be executed.  Note, this wrapper is\n"
"  intended to assist in overcoming a lack of support for filesystem\n"
"  capability attributes and should be used to launch other files.\n"
"  This program should _NOT_ be made setuid-0.\n\n"
"[Copyright (c) 1998 Andrew G. Morgan <morgan@kernel.org>]\n");


progs/old/setpcaps.c
/*
 * Copyright (c) 1997-8 Andrew G. Morgan  <morgan@kernel.org>
 *
 * This sets the capabilities of a given process.
 */
"usage: setcap [-q] (-|<caps>) <pid> [ ... (-|<capsN>) <pid> ]\n\n"
"  This program can be used to set the process capabilities of running\n"
"  processes.  In order to work, it needs to be executing with CAP_SETPCAP\n"
"  raised, and the only capabilities that this program can bestow on others\n"
"  are a subset of its effective set.  This program is mostly intended as an\n"
"  example -- a safe use of CAP_SETPCAP has yet to be demonstrated!\n\n"
"[Copyright (c) 1997-8 Andrew G. Morgan  <morgan@kernel.org>]\n"


progs/old/sucap.c
"usage: sucap <user> <group> <command-path> [command-args...]\n\n"
"  This program is a wrapper that change UID but not privileges of a\n"
"  program to be executed.\n"
"  Note, this wrapper is intended to assist in overcoming a lack of support\n"
"  for filesystem capability attributes and should be used to launch other\n"
"  files. This program should _NOT_ be made setuid-0.\n\n"
"[Copyright (c) 1998 Finn Arne Gangstad <finnag@guardian.no>]\n");


template.c
/*
 * Copyright (c) 1997 <Author>  <@>
 *
 * <Content>
 */