Solaris Trusted Extensions Developer's Guide

Appendix A Programmer's Reference

This appendix explains where to find information about developing, testing, and releasing label-aware applications to an environment that uses the Solaris Trusted Extensions software.

This appendix covers the following topics:

Header File Locations

Most Trusted Extensions header files are located in the /usr/include/tsol directory and in the /usr/include/sys/tsol directory. The locations of other header files are shown in the following table.

Header File and Its Location 

Category of Interface 

/usr/openwin/include/X11/extensions/Xtsol.h

X Window System 

/usr/include/libtsnet.h

Trusted network library 

/usr/include/bsm/libbsm.h

Audit library 

Abbreviations Used in Interface Names and Data Structure Names

Many of the Trusted Extensions interface names and data structure names use the following short abbreviations. Knowing the abbreviations of these names will help you recognize the purpose of an interface or structure.

Table A–1 Name Abbreviations Used by Trusted Extensions APIs

Abbreviation 

Name 

attr

Attribute 

b

Binary 

clear

Clearance 

ent

Entry 

f

File 

fs

File system 

h

Hexadecimal 

l

Level, label, or symbolic link 

prop

Properties 

r

Re-entrant 

res

Resource 

s

String 

sec

Security 

sl

Sensitivity label 

tp

Trusted Path 

tsol

Trusted Extensions 

xtsol

Trusted X11 Server 

Developing, Testing, and Debugging an Application

You must develop, test, and debug an application on an isolated development system to prevent software bugs and incomplete code from compromising the security policy on the main system.

Follow these guidelines:

Releasing an Application

You submit a fully tested and debugged application to the system administrator for application integration. The application can be submitted as a software package. If the application uses privileges, the system administrator must evaluate the application source code and the security information that you supply. This evaluation verifies that your use of privileges does not compromise system security.


Caution – Caution –

Notify the system administrator of new auditing events, audit classes, or X Window System properties that your application uses. The system administrator must place these items into the correct files. For more information, see Chapter 6, Trusted X Window System.


Creating a Software Package

To create a software package, see the Application Packaging Developer’s Guide. To debug package installation issues, see Chapter 14, Troubleshooting Software Problems (Overview), in System Administration Guide: Advanced Administration.