Commit 7efbb60b authored by Stephen Smalley's avatar Stephen Smalley Committed by Paul Moore

selinux: update my email address

Update my email address since epoch.ncsc.mil no longer exists.
MAINTAINERS and CREDITS are already correct.
Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
Signed-off-by: default avatarPaul Moore <paul@paul-moore.com>
parent 5703ffaa
/* /*
* Implementation of the kernel access vector cache (AVC). * Implementation of the kernel access vector cache (AVC).
* *
* Authors: Stephen Smalley, <sds@epoch.ncsc.mil> * Authors: Stephen Smalley, <sds@tycho.nsa.gov>
* James Morris <jmorris@redhat.com> * James Morris <jmorris@redhat.com>
* *
* Update: KaiGai, Kohei <kaigai@ak.jp.nec.com> * Update: KaiGai, Kohei <kaigai@ak.jp.nec.com>
......
...@@ -3,7 +3,7 @@ ...@@ -3,7 +3,7 @@
* *
* This file contains the SELinux hook function implementations. * This file contains the SELinux hook function implementations.
* *
* Authors: Stephen Smalley, <sds@epoch.ncsc.mil> * Authors: Stephen Smalley, <sds@tycho.nsa.gov>
* Chris Vance, <cvance@nai.com> * Chris Vance, <cvance@nai.com>
* Wayne Salamon, <wsalamon@nai.com> * Wayne Salamon, <wsalamon@nai.com>
* James Morris <jmorris@redhat.com> * James Morris <jmorris@redhat.com>
......
/* /*
* Access vector cache interface for object managers. * Access vector cache interface for object managers.
* *
* Author : Stephen Smalley, <sds@epoch.ncsc.mil> * Author : Stephen Smalley, <sds@tycho.nsa.gov>
*/ */
#ifndef _SELINUX_AVC_H_ #ifndef _SELINUX_AVC_H_
#define _SELINUX_AVC_H_ #define _SELINUX_AVC_H_
......
/* /*
* Access vector cache interface for the security server. * Access vector cache interface for the security server.
* *
* Author : Stephen Smalley, <sds@epoch.ncsc.mil> * Author : Stephen Smalley, <sds@tycho.nsa.gov>
*/ */
#ifndef _SELINUX_AVC_SS_H_ #ifndef _SELINUX_AVC_SS_H_
#define _SELINUX_AVC_SS_H_ #define _SELINUX_AVC_SS_H_
......
...@@ -3,7 +3,7 @@ ...@@ -3,7 +3,7 @@
* *
* This file contains the SELinux security data structures for kernel objects. * This file contains the SELinux security data structures for kernel objects.
* *
* Author(s): Stephen Smalley, <sds@epoch.ncsc.mil> * Author(s): Stephen Smalley, <sds@tycho.nsa.gov>
* Chris Vance, <cvance@nai.com> * Chris Vance, <cvance@nai.com>
* Wayne Salamon, <wsalamon@nai.com> * Wayne Salamon, <wsalamon@nai.com>
* James Morris <jmorris@redhat.com> * James Morris <jmorris@redhat.com>
......
/* /*
* Security server interface. * Security server interface.
* *
* Author : Stephen Smalley, <sds@epoch.ncsc.mil> * Author : Stephen Smalley, <sds@tycho.nsa.gov>
* *
*/ */
......
/* /*
* Implementation of the access vector table type. * Implementation of the access vector table type.
* *
* Author : Stephen Smalley, <sds@epoch.ncsc.mil> * Author : Stephen Smalley, <sds@tycho.nsa.gov>
*/ */
/* Updated: Frank Mayer <mayerf@tresys.com> and Karl MacMillan <kmacmillan@tresys.com> /* Updated: Frank Mayer <mayerf@tresys.com> and Karl MacMillan <kmacmillan@tresys.com>
......
...@@ -5,7 +5,7 @@ ...@@ -5,7 +5,7 @@
* table is used to represent the type enforcement * table is used to represent the type enforcement
* tables. * tables.
* *
* Author : Stephen Smalley, <sds@epoch.ncsc.mil> * Author : Stephen Smalley, <sds@tycho.nsa.gov>
*/ */
/* Updated: Frank Mayer <mayerf@tresys.com> and Karl MacMillan <kmacmillan@tresys.com> /* Updated: Frank Mayer <mayerf@tresys.com> and Karl MacMillan <kmacmillan@tresys.com>
......
...@@ -10,7 +10,7 @@ ...@@ -10,7 +10,7 @@
* process from labeling an object with a different user * process from labeling an object with a different user
* identity. * identity.
* *
* Author : Stephen Smalley, <sds@epoch.ncsc.mil> * Author : Stephen Smalley, <sds@tycho.nsa.gov>
*/ */
#ifndef _SS_CONSTRAINT_H_ #ifndef _SS_CONSTRAINT_H_
#define _SS_CONSTRAINT_H_ #define _SS_CONSTRAINT_H_
......
...@@ -10,7 +10,7 @@ ...@@ -10,7 +10,7 @@
* security server and can be changed without affecting * security server and can be changed without affecting
* clients of the security server. * clients of the security server.
* *
* Author : Stephen Smalley, <sds@epoch.ncsc.mil> * Author : Stephen Smalley, <sds@tycho.nsa.gov>
*/ */
#ifndef _SS_CONTEXT_H_ #ifndef _SS_CONTEXT_H_
#define _SS_CONTEXT_H_ #define _SS_CONTEXT_H_
......
/* /*
* Implementation of the extensible bitmap type. * Implementation of the extensible bitmap type.
* *
* Author : Stephen Smalley, <sds@epoch.ncsc.mil> * Author : Stephen Smalley, <sds@tycho.nsa.gov>
*/ */
/* /*
* Updated: Hewlett-Packard <paul@paul-moore.com> * Updated: Hewlett-Packard <paul@paul-moore.com>
......
...@@ -9,7 +9,7 @@ ...@@ -9,7 +9,7 @@
* an explicitly specified starting bit position within * an explicitly specified starting bit position within
* the total bitmap. * the total bitmap.
* *
* Author : Stephen Smalley, <sds@epoch.ncsc.mil> * Author : Stephen Smalley, <sds@tycho.nsa.gov>
*/ */
#ifndef _SS_EBITMAP_H_ #ifndef _SS_EBITMAP_H_
#define _SS_EBITMAP_H_ #define _SS_EBITMAP_H_
......
/* /*
* Implementation of the hash table type. * Implementation of the hash table type.
* *
* Author : Stephen Smalley, <sds@epoch.ncsc.mil> * Author : Stephen Smalley, <sds@tycho.nsa.gov>
*/ */
#include <linux/kernel.h> #include <linux/kernel.h>
#include <linux/slab.h> #include <linux/slab.h>
......
...@@ -5,7 +5,7 @@ ...@@ -5,7 +5,7 @@
* functions for hash computation and key comparison are * functions for hash computation and key comparison are
* provided by the creator of the table. * provided by the creator of the table.
* *
* Author : Stephen Smalley, <sds@epoch.ncsc.mil> * Author : Stephen Smalley, <sds@tycho.nsa.gov>
*/ */
#ifndef _SS_HASHTAB_H_ #ifndef _SS_HASHTAB_H_
#define _SS_HASHTAB_H_ #define _SS_HASHTAB_H_
......
/* /*
* Implementation of the multi-level security (MLS) policy. * Implementation of the multi-level security (MLS) policy.
* *
* Author : Stephen Smalley, <sds@epoch.ncsc.mil> * Author : Stephen Smalley, <sds@tycho.nsa.gov>
*/ */
/* /*
* Updated: Trusted Computer Solutions, Inc. <dgoeddel@trustedcs.com> * Updated: Trusted Computer Solutions, Inc. <dgoeddel@trustedcs.com>
......
/* /*
* Multi-level security (MLS) policy operations. * Multi-level security (MLS) policy operations.
* *
* Author : Stephen Smalley, <sds@epoch.ncsc.mil> * Author : Stephen Smalley, <sds@tycho.nsa.gov>
*/ */
/* /*
* Updated: Trusted Computer Solutions, Inc. <dgoeddel@trustedcs.com> * Updated: Trusted Computer Solutions, Inc. <dgoeddel@trustedcs.com>
......
/* /*
* Type definitions for the multi-level security (MLS) policy. * Type definitions for the multi-level security (MLS) policy.
* *
* Author : Stephen Smalley, <sds@epoch.ncsc.mil> * Author : Stephen Smalley, <sds@tycho.nsa.gov>
*/ */
/* /*
* Updated: Trusted Computer Solutions, Inc. <dgoeddel@trustedcs.com> * Updated: Trusted Computer Solutions, Inc. <dgoeddel@trustedcs.com>
......
/* /*
* Implementation of the policy database. * Implementation of the policy database.
* *
* Author : Stephen Smalley, <sds@epoch.ncsc.mil> * Author : Stephen Smalley, <sds@tycho.nsa.gov>
*/ */
/* /*
......
...@@ -2,7 +2,7 @@ ...@@ -2,7 +2,7 @@
* A policy database (policydb) specifies the * A policy database (policydb) specifies the
* configuration data for the security policy. * configuration data for the security policy.
* *
* Author : Stephen Smalley, <sds@epoch.ncsc.mil> * Author : Stephen Smalley, <sds@tycho.nsa.gov>
*/ */
/* /*
......
/* /*
* Implementation of the security services. * Implementation of the security services.
* *
* Authors : Stephen Smalley, <sds@epoch.ncsc.mil> * Authors : Stephen Smalley, <sds@tycho.nsa.gov>
* James Morris <jmorris@redhat.com> * James Morris <jmorris@redhat.com>
* *
* Updated: Trusted Computer Solutions, Inc. <dgoeddel@trustedcs.com> * Updated: Trusted Computer Solutions, Inc. <dgoeddel@trustedcs.com>
......
/* /*
* Implementation of the security services. * Implementation of the security services.
* *
* Author : Stephen Smalley, <sds@epoch.ncsc.mil> * Author : Stephen Smalley, <sds@tycho.nsa.gov>
*/ */
#ifndef _SS_SERVICES_H_ #ifndef _SS_SERVICES_H_
#define _SS_SERVICES_H_ #define _SS_SERVICES_H_
......
/* /*
* Implementation of the SID table type. * Implementation of the SID table type.
* *
* Author : Stephen Smalley, <sds@epoch.ncsc.mil> * Author : Stephen Smalley, <sds@tycho.nsa.gov>
*/ */
#include <linux/kernel.h> #include <linux/kernel.h>
#include <linux/slab.h> #include <linux/slab.h>
......
...@@ -2,7 +2,7 @@ ...@@ -2,7 +2,7 @@
* A security identifier table (sidtab) is a hash table * A security identifier table (sidtab) is a hash table
* of security context structures indexed by SID value. * of security context structures indexed by SID value.
* *
* Author : Stephen Smalley, <sds@epoch.ncsc.mil> * Author : Stephen Smalley, <sds@tycho.nsa.gov>
*/ */
#ifndef _SS_SIDTAB_H_ #ifndef _SS_SIDTAB_H_
#define _SS_SIDTAB_H_ #define _SS_SIDTAB_H_
......
/* /*
* Implementation of the symbol table type. * Implementation of the symbol table type.
* *
* Author : Stephen Smalley, <sds@epoch.ncsc.mil> * Author : Stephen Smalley, <sds@tycho.nsa.gov>
*/ */
#include <linux/kernel.h> #include <linux/kernel.h>
#include <linux/string.h> #include <linux/string.h>
......
...@@ -4,7 +4,7 @@ ...@@ -4,7 +4,7 @@
* is arbitrary. The symbol table type is implemented * is arbitrary. The symbol table type is implemented
* using the hash table type (hashtab). * using the hash table type (hashtab).
* *
* Author : Stephen Smalley, <sds@epoch.ncsc.mil> * Author : Stephen Smalley, <sds@tycho.nsa.gov>
*/ */
#ifndef _SS_SYMTAB_H_ #ifndef _SS_SYMTAB_H_
#define _SS_SYMTAB_H_ #define _SS_SYMTAB_H_
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment