From cbfb8e703ed9c7e31848ebf959ac7a4cf27b4a64 Mon Sep 17 00:00:00 2001 From: Nick Mathewson Date: Fri, 28 Mar 2014 03:51:50 -0400 Subject: Add 'rename' to the sandboxed syscalls (If we don't restrict rename, there's not much point in restricting open, since an attacker could always use rename to make us open whatever they want.) --- src/common/compat.h | 1 + 1 file changed, 1 insertion(+) (limited to 'src/common/compat.h') diff --git a/src/common/compat.h b/src/common/compat.h index bb88818d82..9a381fb97f 100644 --- a/src/common/compat.h +++ b/src/common/compat.h @@ -410,6 +410,7 @@ struct tm *tor_gmtime_r(const time_t *timep, struct tm *result); /* ===== File compatibility */ int tor_open_cloexec(const char *path, int flags, unsigned mode); FILE *tor_fopen_cloexec(const char *path, const char *mode); +int tor_rename(const char *path_old, const char *path_new); int replace_file(const char *from, const char *to); int touch_file(const char *fname); -- cgit v1.2.3-54-g00ecf