The daemon as such does not require this capability.
#include <processing/jobs/start_action_job.h>
#include <threading/mutex.h>
-#ifndef CAP_NET_ADMIN
-#define CAP_NET_ADMIN 12
-#endif
-
#ifndef LOG_AUTHPRIV /* not defined on OpenSolaris */
#define LOG_AUTHPRIV LOG_AUTH
#endif
this = daemon_create(name);
- if (!lib->caps->keep(lib->caps, CAP_NET_ADMIN))
- {
- dbg(DBG_DMN, 1, "libcharon requires CAP_NET_ADMIN capability");
- return FALSE;
- }
-
/* for uncritical pseudo random numbers */
srandom(time(NULL) + getpid());
{
private_kernel_libipsec_plugin_t *this;
+ if (!lib->caps->keep(lib->caps, CAP_NET_ADMIN))
+ { /* required to create TUN devices */
+ DBG1(DBG_KNL, "kernel-libipsec plugin requires CAP_NET_ADMIN "
+ "capability");
+ return NULL;
+ }
+
INIT(this,
.public = {
.plugin = {
{
private_kernel_netlink_plugin_t *this;
+ if (!lib->caps->keep(lib->caps, CAP_NET_ADMIN))
+ { /* required to bind/use XFRM sockets / create routing tables */
+ DBG1(DBG_KNL, "kernel-netlink plugin requires CAP_NET_ADMIN "
+ "capability");
+ return NULL;
+ }
+
INIT(this,
.public = {
.plugin = {
{
private_kernel_pfkey_plugin_t *this;
+ if (!lib->caps->keep(lib->caps, CAP_NET_ADMIN))
+ { /* required to open PF_KEY sockets */
+ DBG1(DBG_KNL, "kernel-pfkey plugin requires CAP_NET_ADMIN capability");
+ return NULL;
+ }
+
INIT(this,
.public = {
.plugin = {
# include <linux/capability.h>
#endif
+#ifndef CAP_NET_ADMIN
+#define CAP_NET_ADMIN 12
+#endif
+
/**
* POSIX capability dropping abstraction layer.
*/