f78a2bcce8
Patch contributed by Herbert Duerr: #i118662# remove berkeleyDB from module xmlhelp (author=orwitt) http://svn.apache.org/viewvc?view=revision&revision=1213188 #i119141# remove ISCII converter for now http://svn.apache.org/viewvc?view=revision&revision=1306246 make exceptions for cppunittester verbose http://svn.apache.org/viewvc?view=revision&revision=1174831 Patches contributed by Pedro Giffuni: Avoid some uses of non portable #!/bin/bash in shell scripts. http://svn.apache.org/viewvc?view=revision&revision=1235297 Patch contributed by Oliver-Rainer Wittmann 88652: applied patch, remove unicows deps http://svn.apache.org/viewvc?view=revision&revision=1177585 drop OS/2 code, remove in-line assembler ARM atomics, and obsolete armarch header.
478 lines
13 KiB
C
478 lines
13 KiB
C
/* -*- Mode: C++; tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 4 -*- */
|
|
/*
|
|
* This file is part of the LibreOffice project.
|
|
*
|
|
* This Source Code Form is subject to the terms of the Mozilla Public
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/.
|
|
*
|
|
* This file incorporates work covered by the following license notice:
|
|
*
|
|
* Licensed to the Apache Software Foundation (ASF) under one or more
|
|
* contributor license agreements. See the NOTICE file distributed
|
|
* with this work for additional information regarding copyright
|
|
* ownership. The ASF licenses this file to you under the Apache
|
|
* License, Version 2.0 (the "License"); you may not use this file
|
|
* except in compliance with the License. You may obtain a copy of
|
|
* the License at http://www.apache.org/licenses/LICENSE-2.0 .
|
|
*/
|
|
|
|
#include <stddef.h>
|
|
|
|
/* Solaris 8 has no C99 stdint.h, and Solaris generally seems not to miss it for
|
|
SIZE_MAX: */
|
|
#if !defined __SUNPRO_C
|
|
#include <stdint.h>
|
|
#endif
|
|
|
|
#include "system.h"
|
|
|
|
#include <osl/security.h>
|
|
#include <osl/diagnose.h>
|
|
#include <rtl/bootstrap.h>
|
|
|
|
#include "osl/thread.h"
|
|
#include "osl/file.h"
|
|
|
|
#if defined LINUX || defined SOLARIS
|
|
#include <crypt.h>
|
|
#endif
|
|
|
|
#include "secimpl.h"
|
|
|
|
#ifdef ANDROID
|
|
#define getpwuid_r(uid, pwd, buf, buflen, result) (*(result) = getpwuid(uid), (*(result) ? (memcpy (buf, *(result), sizeof (struct passwd)), 0) : errno))
|
|
#endif
|
|
|
|
|
|
static oslSecurityError SAL_CALL
|
|
osl_psz_loginUser(const sal_Char* pszUserName, const sal_Char* pszPasswd,
|
|
oslSecurity* pSecurity);
|
|
sal_Bool SAL_CALL osl_psz_getUserIdent(oslSecurity Security, sal_Char *pszIdent, sal_uInt32 nMax);
|
|
static sal_Bool SAL_CALL osl_psz_getUserName(oslSecurity Security, sal_Char* pszName, sal_uInt32 nMax);
|
|
static sal_Bool SAL_CALL osl_psz_getHomeDir(oslSecurity Security, sal_Char* pszDirectory, sal_uInt32 nMax);
|
|
static sal_Bool SAL_CALL osl_psz_getConfigDir(oslSecurity Security, sal_Char* pszDirectory, sal_uInt32 nMax);
|
|
|
|
static sal_Bool sysconf_SC_GETPW_R_SIZE_MAX(size_t * value) {
|
|
#if defined _SC_GETPW_R_SIZE_MAX
|
|
long m;
|
|
errno = 0;
|
|
m = sysconf(_SC_GETPW_R_SIZE_MAX);
|
|
if (m == -1) {
|
|
/* _SC_GETPW_R_SIZE_MAX has no limit; some platforms like certain
|
|
FreeBSD versions support sysconf(_SC_GETPW_R_SIZE_MAX) in a broken
|
|
way and always set EINVAL, so be resilient here: */
|
|
return sal_False;
|
|
} else {
|
|
OSL_ASSERT(m >= 0 && (unsigned long) m < SIZE_MAX);
|
|
*value = (size_t) m;
|
|
return sal_True;
|
|
}
|
|
#else
|
|
/* some platforms like Mac OS X 1.3 do not define _SC_GETPW_R_SIZE_MAX: */
|
|
return sal_False;
|
|
#endif
|
|
}
|
|
|
|
static oslSecurityImpl * growSecurityImpl(
|
|
oslSecurityImpl * impl, size_t * bufSize)
|
|
{
|
|
size_t n = 0;
|
|
oslSecurityImpl * p = NULL;
|
|
if (impl == NULL) {
|
|
if (!sysconf_SC_GETPW_R_SIZE_MAX(&n)) {
|
|
/* choose something sensible (the callers of growSecurityImpl will
|
|
detect it if the allocated buffer is too small: */
|
|
n = 1024;
|
|
}
|
|
} else if (*bufSize <= SIZE_MAX / 2) {
|
|
n = 2 * *bufSize;
|
|
}
|
|
if (n != 0) {
|
|
if (n <= SIZE_MAX - offsetof(oslSecurityImpl, m_buffer)) {
|
|
*bufSize = n;
|
|
n += offsetof(oslSecurityImpl, m_buffer);
|
|
} else {
|
|
*bufSize = SIZE_MAX - offsetof(oslSecurityImpl, m_buffer);
|
|
n = SIZE_MAX;
|
|
}
|
|
p = realloc(impl, n);
|
|
memset (p, 0, n);
|
|
}
|
|
if (p == NULL) {
|
|
free(impl);
|
|
}
|
|
return p;
|
|
}
|
|
|
|
static void deleteSecurityImpl(oslSecurityImpl * impl) {
|
|
free(impl);
|
|
}
|
|
|
|
oslSecurity SAL_CALL osl_getCurrentSecurity()
|
|
{
|
|
size_t n = 0;
|
|
oslSecurityImpl * p = NULL;
|
|
for (;;) {
|
|
struct passwd * found;
|
|
p = growSecurityImpl(p, &n);
|
|
if (p == NULL) {
|
|
return NULL;
|
|
}
|
|
switch (getpwuid_r(getuid(), &p->m_pPasswd, p->m_buffer, n, &found)) {
|
|
case ERANGE:
|
|
break;
|
|
case 0:
|
|
if (found != NULL) {
|
|
return p;
|
|
}
|
|
/* fall through */
|
|
default:
|
|
deleteSecurityImpl(p);
|
|
return NULL;
|
|
}
|
|
}
|
|
}
|
|
|
|
oslSecurityError SAL_CALL osl_loginUser(
|
|
rtl_uString *ustrUserName,
|
|
rtl_uString *ustrPassword,
|
|
oslSecurity *pSecurity
|
|
)
|
|
{
|
|
oslSecurityError Error;
|
|
rtl_String* strUserName=0;
|
|
rtl_String* strPassword=0;
|
|
sal_Char* pszUserName=0;
|
|
sal_Char* pszPassword=0;
|
|
|
|
if ( ustrUserName != 0 )
|
|
{
|
|
rtl_uString2String( &strUserName,
|
|
rtl_uString_getStr(ustrUserName),
|
|
rtl_uString_getLength(ustrUserName),
|
|
RTL_TEXTENCODING_UTF8,
|
|
OUSTRING_TO_OSTRING_CVTFLAGS );
|
|
pszUserName = rtl_string_getStr(strUserName);
|
|
}
|
|
|
|
|
|
if ( ustrPassword != 0 )
|
|
{
|
|
rtl_uString2String( &strPassword,
|
|
rtl_uString_getStr(ustrPassword),
|
|
rtl_uString_getLength(ustrPassword),
|
|
RTL_TEXTENCODING_UTF8,
|
|
OUSTRING_TO_OSTRING_CVTFLAGS );
|
|
pszPassword = rtl_string_getStr(strPassword);
|
|
}
|
|
|
|
|
|
Error=osl_psz_loginUser(pszUserName,pszPassword,pSecurity);
|
|
|
|
if ( strUserName != 0 )
|
|
{
|
|
rtl_string_release(strUserName);
|
|
}
|
|
|
|
if ( strPassword)
|
|
{
|
|
rtl_string_release(strPassword);
|
|
}
|
|
|
|
|
|
return Error;
|
|
}
|
|
|
|
|
|
static oslSecurityError SAL_CALL
|
|
osl_psz_loginUser(const sal_Char* pszUserName, const sal_Char* pszPasswd,
|
|
oslSecurity* pSecurity)
|
|
{
|
|
(void)pszUserName;
|
|
(void)pszPasswd;
|
|
(void)pSecurity;
|
|
|
|
return osl_Security_E_None;
|
|
}
|
|
|
|
oslSecurityError SAL_CALL osl_loginUserOnFileServer(
|
|
rtl_uString *strUserName,
|
|
rtl_uString *strPasswd,
|
|
rtl_uString *strFileServer,
|
|
oslSecurity *pSecurity
|
|
)
|
|
{
|
|
(void) strUserName; /* unused */
|
|
(void) strPasswd; /* unused */
|
|
(void) strFileServer; /* unused */
|
|
(void) pSecurity; /* unused */
|
|
return osl_Security_E_UserUnknown;
|
|
}
|
|
|
|
|
|
sal_Bool SAL_CALL osl_getUserIdent(oslSecurity Security, rtl_uString **ustrIdent)
|
|
{
|
|
sal_Bool bRet=sal_False;
|
|
sal_Char pszIdent[1024];
|
|
|
|
pszIdent[0] = '\0';
|
|
|
|
bRet = osl_psz_getUserIdent(Security,pszIdent,sizeof(pszIdent));
|
|
|
|
rtl_string2UString( ustrIdent, pszIdent, rtl_str_getLength( pszIdent ), osl_getThreadTextEncoding(), OUSTRING_TO_OSTRING_CVTFLAGS );
|
|
OSL_ASSERT(*ustrIdent != NULL);
|
|
|
|
return bRet;
|
|
}
|
|
|
|
|
|
sal_Bool SAL_CALL osl_psz_getUserIdent(oslSecurity Security, sal_Char *pszIdent, sal_uInt32 nMax)
|
|
{
|
|
sal_Char buffer[32];
|
|
sal_Int32 nChr;
|
|
|
|
oslSecurityImpl *pSecImpl = (oslSecurityImpl *)Security;
|
|
|
|
if (pSecImpl == NULL)
|
|
return sal_False;
|
|
|
|
nChr = snprintf(buffer, sizeof(buffer), "%u", pSecImpl->m_pPasswd.pw_uid);
|
|
if ( nChr < 0 || SAL_INT_CAST(sal_uInt32, nChr) >= sizeof(buffer)
|
|
|| SAL_INT_CAST(sal_uInt32, nChr) >= nMax )
|
|
return sal_False; /* leave *pszIdent unmodified in case of failure */
|
|
|
|
memcpy(pszIdent, buffer, nChr+1);
|
|
return sal_True;
|
|
}
|
|
|
|
sal_Bool SAL_CALL osl_getUserName(oslSecurity Security, rtl_uString **ustrName)
|
|
{
|
|
sal_Bool bRet=sal_False;
|
|
sal_Char pszName[1024];
|
|
|
|
pszName[0] = '\0';
|
|
|
|
bRet = osl_psz_getUserName(Security,pszName,sizeof(pszName));
|
|
|
|
rtl_string2UString( ustrName, pszName, rtl_str_getLength( pszName ), osl_getThreadTextEncoding(), OUSTRING_TO_OSTRING_CVTFLAGS );
|
|
OSL_ASSERT(*ustrName != NULL);
|
|
|
|
return bRet;
|
|
}
|
|
|
|
|
|
|
|
static sal_Bool SAL_CALL osl_psz_getUserName(oslSecurity Security, sal_Char* pszName, sal_uInt32 nMax)
|
|
{
|
|
oslSecurityImpl *pSecImpl = (oslSecurityImpl *)Security;
|
|
|
|
if (pSecImpl == NULL || pSecImpl->m_pPasswd.pw_name == NULL)
|
|
return sal_False;
|
|
|
|
strncpy(pszName, pSecImpl->m_pPasswd.pw_name, nMax);
|
|
|
|
return sal_True;
|
|
}
|
|
|
|
sal_Bool SAL_CALL osl_getHomeDir(oslSecurity Security, rtl_uString **pustrDirectory)
|
|
{
|
|
sal_Bool bRet=sal_False;
|
|
sal_Char pszDirectory[PATH_MAX];
|
|
|
|
pszDirectory[0] = '\0';
|
|
|
|
bRet = osl_psz_getHomeDir(Security,pszDirectory,sizeof(pszDirectory));
|
|
|
|
if ( bRet == sal_True )
|
|
{
|
|
rtl_string2UString( pustrDirectory, pszDirectory, rtl_str_getLength( pszDirectory ), osl_getThreadTextEncoding(), OUSTRING_TO_OSTRING_CVTFLAGS );
|
|
OSL_ASSERT(*pustrDirectory != NULL);
|
|
osl_getFileURLFromSystemPath( *pustrDirectory, pustrDirectory );
|
|
}
|
|
|
|
return bRet;
|
|
}
|
|
|
|
static sal_Bool SAL_CALL osl_psz_getHomeDir(oslSecurity Security, sal_Char* pszDirectory, sal_uInt32 nMax)
|
|
{
|
|
oslSecurityImpl *pSecImpl = (oslSecurityImpl *)Security;
|
|
|
|
if (pSecImpl == NULL)
|
|
return sal_False;
|
|
|
|
#ifdef ANDROID
|
|
{
|
|
sal_Bool bRet = sal_False;
|
|
rtl_uString *pName = 0, *pValue = 0;
|
|
|
|
rtl_uString_newFromAscii(&pName, "HOME");
|
|
|
|
if (rtl_bootstrap_get(pName, &pValue, NULL))
|
|
{
|
|
rtl_String *pStrValue = 0;
|
|
if (pValue && pValue->length > 0)
|
|
{
|
|
rtl_uString2String(&pStrValue, pValue->buffer,
|
|
pValue->length, RTL_TEXTENCODING_UTF8,
|
|
OUSTRING_TO_OSTRING_CVTFLAGS);
|
|
if (pStrValue && pStrValue->length > 0)
|
|
{
|
|
sal_Int32 nCopy = (sal_Int32)(nMax-1) < pStrValue->length ? (sal_Int32)(nMax-1) : pStrValue->length ;
|
|
strncpy (pszDirectory, pStrValue->buffer, nCopy);
|
|
pszDirectory[nCopy] = '\0';
|
|
bRet = (size_t)pStrValue->length < nMax;
|
|
}
|
|
rtl_string_release(pStrValue);
|
|
}
|
|
rtl_uString_release(pName);
|
|
}
|
|
if (bRet)
|
|
return bRet;
|
|
}
|
|
#endif
|
|
|
|
/* if current user, check also environment for HOME */
|
|
if (getuid() == pSecImpl->m_pPasswd.pw_uid)
|
|
{
|
|
sal_Char *pStr = NULL;
|
|
#ifdef SOLARIS
|
|
char buffer[8192];
|
|
|
|
struct passwd pwd;
|
|
struct passwd *ppwd;
|
|
|
|
#ifdef _POSIX_PTHREAD_SEMANTICS
|
|
if ( 0 != getpwuid_r(getuid(), &pwd, buffer, sizeof(buffer), &ppwd ) )
|
|
ppwd = NULL;
|
|
#else
|
|
ppwd = getpwuid_r(getuid(), &pwd, buffer, sizeof(buffer) );
|
|
#endif
|
|
|
|
if ( ppwd )
|
|
pStr = ppwd->pw_dir;
|
|
#else
|
|
pStr = getenv("HOME");
|
|
#endif
|
|
|
|
if (pStr != NULL && strlen(pStr) > 0 && access(pStr, 0) == 0)
|
|
strncpy(pszDirectory, pStr, nMax);
|
|
else if (pSecImpl->m_pPasswd.pw_dir != NULL)
|
|
strncpy(pszDirectory, pSecImpl->m_pPasswd.pw_dir, nMax);
|
|
else
|
|
return sal_False;
|
|
}
|
|
else if (pSecImpl->m_pPasswd.pw_dir != NULL)
|
|
strncpy(pszDirectory, pSecImpl->m_pPasswd.pw_dir, nMax);
|
|
else
|
|
return sal_False;
|
|
|
|
return sal_True;
|
|
}
|
|
|
|
sal_Bool SAL_CALL osl_getConfigDir(oslSecurity Security, rtl_uString **pustrDirectory)
|
|
{
|
|
sal_Bool bRet = sal_False;
|
|
sal_Char pszDirectory[PATH_MAX];
|
|
|
|
pszDirectory[0] = '\0';
|
|
|
|
bRet = osl_psz_getConfigDir(Security,pszDirectory,sizeof(pszDirectory));
|
|
|
|
if ( bRet == sal_True )
|
|
{
|
|
rtl_string2UString( pustrDirectory, pszDirectory, rtl_str_getLength( pszDirectory ), osl_getThreadTextEncoding(), OUSTRING_TO_OSTRING_CVTFLAGS );
|
|
OSL_ASSERT(*pustrDirectory != NULL);
|
|
osl_getFileURLFromSystemPath( *pustrDirectory, pustrDirectory );
|
|
}
|
|
|
|
return bRet;
|
|
}
|
|
|
|
#ifndef MACOSX
|
|
|
|
#define DOT_CONFIG "/.config"
|
|
|
|
static sal_Bool SAL_CALL osl_psz_getConfigDir(oslSecurity Security, sal_Char* pszDirectory, sal_uInt32 nMax)
|
|
{
|
|
sal_Char *pStr = getenv("XDG_CONFIG_HOME");
|
|
|
|
if (pStr == NULL || strlen(pStr) == 0 || access(pStr, 0) != 0)
|
|
{
|
|
size_t n = 0;
|
|
// a default equal to $HOME/.config should be used.
|
|
if (!osl_psz_getHomeDir(Security, pszDirectory, nMax))
|
|
return sal_False;
|
|
n = strlen(pszDirectory);
|
|
if (n + sizeof(DOT_CONFIG) < nMax)
|
|
{
|
|
strncpy(pszDirectory+n, DOT_CONFIG, sizeof(DOT_CONFIG));
|
|
if (access(pszDirectory, 0) != 0)
|
|
{
|
|
// resort to HOME
|
|
pszDirectory[n] = '\0';
|
|
}
|
|
}
|
|
}
|
|
else
|
|
strncpy(pszDirectory, pStr, nMax);
|
|
|
|
return sal_True;
|
|
}
|
|
|
|
#undef DOT_CONFIG
|
|
|
|
#else
|
|
|
|
/*
|
|
* FIXME: rewrite to use more flexible
|
|
* NSSearchPathForDirectoriesInDomains(NSApplicationSupportDirectory, NSUserDomainMask, YES)
|
|
* as soon as we can bumb the baseline to Tiger (for NSApplicationSupportDirectory) and have
|
|
* support for Objective-C in the build environment
|
|
*/
|
|
|
|
#define MACOSX_CONFIG_DIR "/Library/Application Support"
|
|
static sal_Bool SAL_CALL osl_psz_getConfigDir(oslSecurity Security, sal_Char* pszDirectory, sal_uInt32 nMax)
|
|
{
|
|
if( osl_psz_getHomeDir(Security, pszDirectory, nMax - sizeof(MACOSX_CONFIG_DIR) + 1) )
|
|
{
|
|
strcat( pszDirectory, MACOSX_CONFIG_DIR );
|
|
return sal_True;
|
|
}
|
|
|
|
return sal_False;
|
|
}
|
|
|
|
#endif
|
|
|
|
sal_Bool SAL_CALL osl_isAdministrator(oslSecurity Security)
|
|
{
|
|
oslSecurityImpl *pSecImpl = (oslSecurityImpl *)Security;
|
|
|
|
if (pSecImpl == NULL)
|
|
return sal_False;
|
|
|
|
if (pSecImpl->m_pPasswd.pw_uid != 0)
|
|
return sal_False;
|
|
|
|
return sal_True;
|
|
}
|
|
|
|
void SAL_CALL osl_freeSecurityHandle(oslSecurity Security)
|
|
{
|
|
deleteSecurityImpl(Security);
|
|
}
|
|
|
|
|
|
sal_Bool SAL_CALL osl_loadUserProfile(oslSecurity Security)
|
|
{
|
|
(void) Security; /* unused */
|
|
return sal_False;
|
|
}
|
|
|
|
void SAL_CALL osl_unloadUserProfile(oslSecurity Security)
|
|
{
|
|
(void) Security; /* unused */
|
|
}
|
|
|
|
/* vim:set shiftwidth=4 softtabstop=4 expandtab: */
|