1 /************************************************************** 2 * 3 * Licensed to the Apache Software Foundation (ASF) under one 4 * or more contributor license agreements. See the NOTICE file 5 * distributed with this work for additional information 6 * regarding copyright ownership. The ASF licenses this file 7 * to you under the Apache License, Version 2.0 (the 8 * "License"); you may not use this file except in compliance 9 * with the License. You may obtain a copy of the License at 10 * 11 * http://www.apache.org/licenses/LICENSE-2.0 12 * 13 * Unless required by applicable law or agreed to in writing, 14 * software distributed under the License is distributed on an 15 * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY 16 * KIND, either express or implied. See the License for the 17 * specific language governing permissions and limitations 18 * under the License. 19 * 20 *************************************************************/ 21 22 23 24 25 #include "system.h" 26 27 #include <osl/security.h> 28 #include <osl/diagnose.h> 29 #include <osl/module.h> 30 31 #include "osl/thread.h" 32 #include "osl/file.h" 33 34 #ifdef SOLARIS 35 #include <crypt.h> 36 #endif 37 38 #include "secimpl.h" 39 40 #ifndef PAM_BINARY_MSG 41 #define PAM_BINARY_MSG 6 42 #endif 43 44 extern oslModule SAL_CALL osl_psz_loadModule(const sal_Char *pszModuleName, sal_Int32 nRtldMode); 45 extern void* SAL_CALL osl_psz_getSymbol(oslModule hModule, const sal_Char* pszSymbolName); 46 extern oslSecurityError SAL_CALL 47 osl_psz_loginUser(const sal_Char* pszUserName, const sal_Char* pszPasswd, 48 oslSecurity* pSecurity); 49 sal_Bool SAL_CALL osl_psz_getUserIdent(oslSecurity Security, sal_Char *pszIdent, sal_uInt32 nMax); 50 sal_Bool SAL_CALL osl_psz_getUserName(oslSecurity Security, sal_Char* pszName, sal_uInt32 nMax); 51 sal_Bool SAL_CALL osl_psz_getHomeDir(oslSecurity Security, sal_Char* pszDirectory, sal_uInt32 nMax); 52 sal_Bool SAL_CALL osl_psz_getConfigDir(oslSecurity Security, sal_Char* pszDirectory, sal_uInt32 nMax); 53 54 55 56 oslSecurity SAL_CALL osl_getCurrentSecurity() 57 { 58 59 oslSecurityImpl *pSecImpl = (oslSecurityImpl*) malloc(sizeof(oslSecurityImpl)); 60 struct passwd *pPasswd = getpwuid(getuid()); 61 62 if (pPasswd) 63 { 64 memcpy(&pSecImpl->m_pPasswd, pPasswd, sizeof(pSecImpl->m_pPasswd)); 65 pSecImpl->m_isValid = sal_True; 66 } 67 else 68 { 69 /* Some UNIX-OS don't implement getpwuid, e.g. NC OS (special NetBSD) 1.2.1 */ 70 /* so we have to catch this in this else branch */ 71 pSecImpl->m_pPasswd.pw_name = getenv("USER"); 72 pSecImpl->m_pPasswd.pw_dir = getenv("HOME"); 73 if (pSecImpl->m_pPasswd.pw_name && pSecImpl->m_pPasswd.pw_dir) 74 pSecImpl->m_isValid = sal_True; 75 else 76 { 77 pSecImpl->m_pPasswd.pw_name = "unknown"; 78 pSecImpl->m_pPasswd.pw_dir = "/tmp"; 79 pSecImpl->m_isValid = sal_False; 80 } 81 pSecImpl->m_pPasswd.pw_passwd = NULL; 82 pSecImpl->m_pPasswd.pw_uid = getuid(); 83 pSecImpl->m_pPasswd.pw_gid = getgid(); 84 pSecImpl->m_pPasswd.pw_gecos = "unknown"; 85 pSecImpl->m_pPasswd.pw_shell = "unknown"; 86 } 87 88 89 return ((oslSecurity)pSecImpl); 90 } 91 92 93 oslSecurityError SAL_CALL osl_loginUser( 94 rtl_uString *ustrUserName, 95 rtl_uString *ustrPassword, 96 oslSecurity *pSecurity 97 ) 98 { 99 oslSecurityError ret; 100 101 *pSecurity = osl_getCurrentSecurity(); 102 ret = osl_Security_E_None; 103 104 return ret; 105 } 106 107 108 109 oslSecurityError SAL_CALL osl_loginUserOnFileServer( 110 rtl_uString *strUserName, 111 rtl_uString *strPasswd, 112 rtl_uString *strFileServer, 113 oslSecurity *pSecurity 114 ) 115 { 116 oslSecurityError erg; 117 return erg = osl_Security_E_UserUnknown; 118 } 119 120 121 oslSecurityError SAL_CALL osl_psz_loginUserOnFileServer( const sal_Char* pszUserName, 122 const sal_Char* pszPasswd, 123 const sal_Char* pszFileServer, 124 oslSecurity* pSecurity ) 125 { 126 oslSecurityError erg; 127 return erg = osl_Security_E_UserUnknown; 128 } 129 130 sal_Bool SAL_CALL osl_getUserIdent(oslSecurity Security, rtl_uString **ustrIdent) 131 { 132 sal_Bool bRet=sal_False; 133 sal_Char pszIdent[1024]; 134 135 pszIdent[0] = '\0'; 136 137 bRet = osl_psz_getUserIdent(Security,pszIdent,sizeof(pszIdent)); 138 139 rtl_string2UString( ustrIdent, pszIdent, rtl_str_getLength( pszIdent ), osl_getThreadTextEncoding(), OUSTRING_TO_OSTRING_CVTFLAGS ); 140 OSL_ASSERT(*ustrIdent != NULL); 141 142 return bRet; 143 } 144 145 146 sal_Bool SAL_CALL osl_psz_getUserIdent(oslSecurity Security, sal_Char *pszIdent, sal_uInt32 nMax) 147 { 148 sal_Char buffer[32]; 149 sal_Int32 nChr; 150 151 oslSecurityImpl *pSecImpl = (oslSecurityImpl *)Security; 152 153 if (pSecImpl == NULL) 154 return sal_False; 155 156 nChr = snprintf(buffer, sizeof(buffer), "%u", pSecImpl->m_pPasswd.pw_uid); 157 if ( nChr < 0 || nChr >= sizeof(buffer) || nChr >= nMax ) 158 return sal_False; /* leave *pszIdent unmodified in case of failure */ 159 160 memcpy(pszIdent, buffer, nChr+1); 161 return sal_True; 162 } 163 164 sal_Bool SAL_CALL osl_getUserName(oslSecurity Security, rtl_uString **ustrName) 165 { 166 sal_Bool bRet=sal_False; 167 sal_Char pszName[1024]; 168 169 pszName[0] = '\0'; 170 171 bRet = osl_psz_getUserName(Security,pszName,sizeof(pszName)); 172 173 rtl_string2UString( ustrName, pszName, rtl_str_getLength( pszName ), osl_getThreadTextEncoding(), OUSTRING_TO_OSTRING_CVTFLAGS ); 174 OSL_ASSERT(*ustrName != NULL); 175 176 return bRet; 177 } 178 179 180 181 sal_Bool SAL_CALL osl_psz_getUserName(oslSecurity Security, sal_Char* pszName, sal_uInt32 nMax) 182 { 183 oslSecurityImpl *pSecImpl = (oslSecurityImpl *)Security; 184 185 if ((pSecImpl == NULL) || (! pSecImpl->m_isValid)) 186 return sal_False; 187 188 strncpy(pszName, pSecImpl->m_pPasswd.pw_name, nMax); 189 190 return sal_True; 191 } 192 193 sal_Bool SAL_CALL osl_getHomeDir(oslSecurity Security, rtl_uString **pustrDirectory) 194 { 195 sal_Bool bRet=sal_False; 196 sal_Char pszDirectory[PATH_MAX]; 197 198 pszDirectory[0] = '\0'; 199 200 bRet = osl_psz_getHomeDir(Security,pszDirectory,sizeof(pszDirectory)); 201 202 if ( bRet == sal_True ) 203 { 204 rtl_string2UString( pustrDirectory, pszDirectory, rtl_str_getLength( pszDirectory ), osl_getThreadTextEncoding(), OUSTRING_TO_OSTRING_CVTFLAGS ); 205 OSL_ASSERT(*pustrDirectory != NULL); 206 osl_getFileURLFromSystemPath( *pustrDirectory, pustrDirectory ); 207 } 208 209 return bRet; 210 } 211 212 213 sal_Bool SAL_CALL osl_psz_getHomeDir(oslSecurity Security, sal_Char* pszDirectory, sal_uInt32 nMax) 214 { 215 oslSecurityImpl *pSecImpl = (oslSecurityImpl *)Security; 216 217 if (pSecImpl == NULL) 218 return sal_False; 219 220 /* if current user, check also environment for HOME */ 221 if (getuid() == pSecImpl->m_pPasswd.pw_uid) 222 { 223 sal_Char *pStr = NULL; 224 #ifdef SOLARIS 225 char buffer[8192]; 226 227 struct passwd pwd; 228 struct passwd *ppwd; 229 230 #ifdef _POSIX_PTHREAD_SEMANTICS 231 if ( 0 != getpwuid_r(getuid(), &pwd, buffer, sizeof(buffer), &ppwd ) ) 232 ppwd = NULL; 233 #else 234 ppwd = getpwuid_r(getuid(), &pwd, buffer, sizeof(buffer) ); 235 #endif 236 237 if ( ppwd ) 238 pStr = ppwd->pw_dir; 239 #else 240 pStr = getenv("HOME"); 241 #endif 242 243 if ((pStr != NULL) && (strlen(pStr) > 0) && 244 (access(pStr, 0) == 0)) 245 strncpy(pszDirectory, pStr, nMax); 246 else 247 if (pSecImpl->m_isValid) 248 strncpy(pszDirectory, pSecImpl->m_pPasswd.pw_dir, nMax); 249 else 250 return sal_False; 251 } 252 else 253 strncpy(pszDirectory, pSecImpl->m_pPasswd.pw_dir, nMax); 254 255 return sal_True; 256 } 257 258 sal_Bool SAL_CALL osl_getConfigDir(oslSecurity Security, rtl_uString **pustrDirectory) 259 { 260 sal_Bool bRet = sal_False; 261 sal_Char pszDirectory[PATH_MAX]; 262 263 pszDirectory[0] = '\0'; 264 265 bRet = osl_psz_getConfigDir(Security,pszDirectory,sizeof(pszDirectory)); 266 267 if ( bRet == sal_True ) 268 { 269 rtl_string2UString( pustrDirectory, pszDirectory, rtl_str_getLength( pszDirectory ), osl_getThreadTextEncoding(), OUSTRING_TO_OSTRING_CVTFLAGS ); 270 OSL_ASSERT(*pustrDirectory != NULL); 271 osl_getFileURLFromSystemPath( *pustrDirectory, pustrDirectory ); 272 } 273 274 return bRet; 275 } 276 277 278 sal_Bool SAL_CALL osl_psz_getConfigDir(oslSecurity Security, sal_Char* pszDirectory, sal_uInt32 nMax) 279 { 280 return (osl_psz_getHomeDir(Security, pszDirectory, nMax)); 281 } 282 283 sal_Bool SAL_CALL osl_isAdministrator(oslSecurity Security) 284 { 285 oslSecurityImpl *pSecImpl = (oslSecurityImpl *)Security; 286 287 if (pSecImpl == NULL) 288 return sal_False; 289 290 if (pSecImpl->m_pPasswd.pw_uid != 0) 291 return (sal_False); 292 293 return (sal_True); 294 } 295 296 void SAL_CALL osl_freeSecurityHandle(oslSecurity Security) 297 { 298 if (Security) 299 free ((oslSecurityImpl*)Security); 300 } 301 302 303 sal_Bool SAL_CALL osl_loadUserProfile(oslSecurity Security) 304 { 305 return sal_False; 306 } 307 308 void SAL_CALL osl_unloadUserProfile(oslSecurity Security) 309 { 310 return; 311 } 312 313 314