xref: /aoo4110/main/sal/osl/os2/security.c (revision b1cdbd2c)
1 /**************************************************************
2  *
3  * Licensed to the Apache Software Foundation (ASF) under one
4  * or more contributor license agreements.  See the NOTICE file
5  * distributed with this work for additional information
6  * regarding copyright ownership.  The ASF licenses this file
7  * to you under the Apache License, Version 2.0 (the
8  * "License"); you may not use this file except in compliance
9  * with the License.  You may obtain a copy of the License at
10  *
11  *   http://www.apache.org/licenses/LICENSE-2.0
12  *
13  * Unless required by applicable law or agreed to in writing,
14  * software distributed under the License is distributed on an
15  * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
16  * KIND, either express or implied.  See the License for the
17  * specific language governing permissions and limitations
18  * under the License.
19  *
20  *************************************************************/
21 
22 
23 
24 
25 #include "system.h"
26 
27 #include <osl/security.h>
28 #include <osl/diagnose.h>
29 #include <osl/module.h>
30 
31 #include "osl/thread.h"
32 #include "osl/file.h"
33 
34 #ifdef SOLARIS
35 #include <crypt.h>
36 #endif
37 
38 #include "secimpl.h"
39 
40 #ifndef PAM_BINARY_MSG
41 #define PAM_BINARY_MSG 6
42 #endif
43 
44 extern oslModule SAL_CALL osl_psz_loadModule(const sal_Char *pszModuleName, sal_Int32 nRtldMode);
45 extern void* SAL_CALL osl_psz_getSymbol(oslModule hModule, const sal_Char* pszSymbolName);
46 extern oslSecurityError SAL_CALL
47 osl_psz_loginUser(const sal_Char* pszUserName, const sal_Char* pszPasswd,
48                   oslSecurity* pSecurity);
49 sal_Bool SAL_CALL osl_psz_getUserIdent(oslSecurity Security, sal_Char *pszIdent, sal_uInt32 nMax);
50 sal_Bool SAL_CALL osl_psz_getUserName(oslSecurity Security, sal_Char* pszName, sal_uInt32  nMax);
51 sal_Bool SAL_CALL osl_psz_getHomeDir(oslSecurity Security, sal_Char* pszDirectory, sal_uInt32 nMax);
52 sal_Bool SAL_CALL osl_psz_getConfigDir(oslSecurity Security, sal_Char* pszDirectory, sal_uInt32 nMax);
53 
54 
55 
osl_getCurrentSecurity()56 oslSecurity SAL_CALL osl_getCurrentSecurity()
57 {
58 
59 	oslSecurityImpl *pSecImpl = (oslSecurityImpl*) malloc(sizeof(oslSecurityImpl));
60 	struct passwd	*pPasswd  = getpwuid(getuid());
61 
62 	if (pPasswd)
63 	{
64 		memcpy(&pSecImpl->m_pPasswd, pPasswd, sizeof(pSecImpl->m_pPasswd));
65 		pSecImpl->m_isValid = sal_True;
66 	}
67 	else
68 	{
69 		/* Some UNIX-OS don't implement getpwuid, e.g. NC OS (special NetBSD) 1.2.1 */
70 		/* so we have to catch this in this else branch */
71 		pSecImpl->m_pPasswd.pw_name		= getenv("USER");
72 		pSecImpl->m_pPasswd.pw_dir		= getenv("HOME");
73 		if (pSecImpl->m_pPasswd.pw_name && pSecImpl->m_pPasswd.pw_dir)
74 			pSecImpl->m_isValid				= sal_True;
75 		else
76 		{
77 			pSecImpl->m_pPasswd.pw_name		= "unknown";
78 			pSecImpl->m_pPasswd.pw_dir		= "/tmp";
79 			pSecImpl->m_isValid				= sal_False;
80 		}
81 		pSecImpl->m_pPasswd.pw_passwd	= NULL;
82 		pSecImpl->m_pPasswd.pw_uid		= getuid();
83 		pSecImpl->m_pPasswd.pw_gid		= getgid();
84 		pSecImpl->m_pPasswd.pw_gecos	= "unknown";
85 		pSecImpl->m_pPasswd.pw_shell	= "unknown";
86 	}
87 
88 
89 	return ((oslSecurity)pSecImpl);
90 }
91 
92 
osl_loginUser(rtl_uString * ustrUserName,rtl_uString * ustrPassword,oslSecurity * pSecurity)93 oslSecurityError SAL_CALL osl_loginUser(
94     rtl_uString *ustrUserName,
95 	rtl_uString *ustrPassword,
96 	oslSecurity *pSecurity
97 	)
98 {
99 	oslSecurityError ret;
100 
101 	*pSecurity = osl_getCurrentSecurity();
102 	ret = osl_Security_E_None;
103 
104     return ret;
105 }
106 
107 
108 
osl_loginUserOnFileServer(rtl_uString * strUserName,rtl_uString * strPasswd,rtl_uString * strFileServer,oslSecurity * pSecurity)109 oslSecurityError SAL_CALL osl_loginUserOnFileServer(
110     rtl_uString *strUserName,
111 	rtl_uString *strPasswd,
112 	rtl_uString *strFileServer,
113 	oslSecurity *pSecurity
114 	)
115 {
116 	oslSecurityError erg;
117 	return erg = osl_Security_E_UserUnknown;
118 }
119 
120 
osl_psz_loginUserOnFileServer(const sal_Char * pszUserName,const sal_Char * pszPasswd,const sal_Char * pszFileServer,oslSecurity * pSecurity)121 oslSecurityError SAL_CALL osl_psz_loginUserOnFileServer( const sal_Char*  pszUserName,
122                                                      const sal_Char*  pszPasswd,
123                                                      const sal_Char*  pszFileServer,
124                                                      oslSecurity*     pSecurity )
125 {
126 	oslSecurityError erg;
127 	return erg = osl_Security_E_UserUnknown;
128 }
129 
osl_getUserIdent(oslSecurity Security,rtl_uString ** ustrIdent)130 sal_Bool SAL_CALL osl_getUserIdent(oslSecurity Security, rtl_uString **ustrIdent)
131 {
132     sal_Bool bRet=sal_False;
133     sal_Char pszIdent[1024];
134 
135     pszIdent[0] = '\0';
136 
137     bRet = osl_psz_getUserIdent(Security,pszIdent,sizeof(pszIdent));
138 
139     rtl_string2UString( ustrIdent, pszIdent, rtl_str_getLength( pszIdent ), osl_getThreadTextEncoding(), OUSTRING_TO_OSTRING_CVTFLAGS );
140     OSL_ASSERT(*ustrIdent != NULL);
141 
142     return bRet;
143 }
144 
145 
osl_psz_getUserIdent(oslSecurity Security,sal_Char * pszIdent,sal_uInt32 nMax)146 sal_Bool SAL_CALL osl_psz_getUserIdent(oslSecurity Security, sal_Char *pszIdent, sal_uInt32 nMax)
147 {
148 	sal_Char  buffer[32];
149     sal_Int32 nChr;
150 
151 	oslSecurityImpl *pSecImpl = (oslSecurityImpl *)Security;
152 
153     if (pSecImpl == NULL)
154 	    return sal_False;
155 
156 	nChr = snprintf(buffer, sizeof(buffer), "%u", pSecImpl->m_pPasswd.pw_uid);
157     if ( nChr < 0 || nChr >= sizeof(buffer) || nChr >= nMax )
158         return sal_False; /* leave *pszIdent unmodified in case of failure */
159 
160 	memcpy(pszIdent, buffer, nChr+1);
161     return sal_True;
162 }
163 
osl_getUserName(oslSecurity Security,rtl_uString ** ustrName)164 sal_Bool SAL_CALL osl_getUserName(oslSecurity Security, rtl_uString **ustrName)
165 {
166     sal_Bool bRet=sal_False;
167     sal_Char pszName[1024];
168 
169     pszName[0] = '\0';
170 
171     bRet = osl_psz_getUserName(Security,pszName,sizeof(pszName));
172 
173     rtl_string2UString( ustrName, pszName, rtl_str_getLength( pszName ), osl_getThreadTextEncoding(), OUSTRING_TO_OSTRING_CVTFLAGS );
174     OSL_ASSERT(*ustrName != NULL);
175 
176     return bRet;
177 }
178 
179 
180 
osl_psz_getUserName(oslSecurity Security,sal_Char * pszName,sal_uInt32 nMax)181 sal_Bool SAL_CALL osl_psz_getUserName(oslSecurity Security, sal_Char* pszName, sal_uInt32  nMax)
182 {
183 	oslSecurityImpl *pSecImpl = (oslSecurityImpl *)Security;
184 
185     if ((pSecImpl == NULL) || (! pSecImpl->m_isValid))
186 	    return sal_False;
187 
188 	strncpy(pszName, pSecImpl->m_pPasswd.pw_name, nMax);
189 
190     return sal_True;
191 }
192 
osl_getHomeDir(oslSecurity Security,rtl_uString ** pustrDirectory)193 sal_Bool SAL_CALL osl_getHomeDir(oslSecurity Security, rtl_uString **pustrDirectory)
194 {
195     sal_Bool bRet=sal_False;
196     sal_Char pszDirectory[PATH_MAX];
197 
198     pszDirectory[0] = '\0';
199 
200     bRet = osl_psz_getHomeDir(Security,pszDirectory,sizeof(pszDirectory));
201 
202     if ( bRet == sal_True )
203     {
204         rtl_string2UString( pustrDirectory, pszDirectory, rtl_str_getLength( pszDirectory ), osl_getThreadTextEncoding(), OUSTRING_TO_OSTRING_CVTFLAGS );
205         OSL_ASSERT(*pustrDirectory != NULL);
206         osl_getFileURLFromSystemPath( *pustrDirectory, pustrDirectory );
207     }
208 
209     return bRet;
210 }
211 
212 
osl_psz_getHomeDir(oslSecurity Security,sal_Char * pszDirectory,sal_uInt32 nMax)213 sal_Bool SAL_CALL osl_psz_getHomeDir(oslSecurity Security, sal_Char* pszDirectory, sal_uInt32 nMax)
214 {
215 	oslSecurityImpl *pSecImpl = (oslSecurityImpl *)Security;
216 
217     if (pSecImpl == NULL)
218 	    return sal_False;
219 
220 	/* if current user, check also environment for HOME */
221 	if (getuid() == pSecImpl->m_pPasswd.pw_uid)
222 	{
223 		sal_Char *pStr = NULL;
224 #ifdef SOLARIS
225 		char	buffer[8192];
226 
227 		struct passwd pwd;
228 		struct passwd *ppwd;
229 
230 #ifdef _POSIX_PTHREAD_SEMANTICS
231 		if ( 0 != getpwuid_r(getuid(), &pwd, buffer, sizeof(buffer), &ppwd ) )
232 			ppwd = NULL;
233 #else
234 		ppwd = getpwuid_r(getuid(), &pwd, buffer, sizeof(buffer) );
235 #endif
236 
237 		if ( ppwd )
238 			pStr = ppwd->pw_dir;
239 #else
240 		pStr = getenv("HOME");
241 #endif
242 
243 		if ((pStr != NULL) && (strlen(pStr) > 0) &&
244 		    (access(pStr, 0) == 0))
245 			strncpy(pszDirectory, pStr, nMax);
246 		else
247     		if (pSecImpl->m_isValid)
248 				strncpy(pszDirectory, pSecImpl->m_pPasswd.pw_dir, nMax);
249 			else
250 				return sal_False;
251 	}
252 	else
253 		strncpy(pszDirectory, pSecImpl->m_pPasswd.pw_dir, nMax);
254 
255 	return sal_True;
256 }
257 
osl_getConfigDir(oslSecurity Security,rtl_uString ** pustrDirectory)258 sal_Bool SAL_CALL osl_getConfigDir(oslSecurity Security, rtl_uString **pustrDirectory)
259 {
260     sal_Bool bRet = sal_False;
261     sal_Char pszDirectory[PATH_MAX];
262 
263     pszDirectory[0] = '\0';
264 
265     bRet = osl_psz_getConfigDir(Security,pszDirectory,sizeof(pszDirectory));
266 
267     if ( bRet == sal_True )
268     {
269         rtl_string2UString( pustrDirectory, pszDirectory, rtl_str_getLength( pszDirectory ), osl_getThreadTextEncoding(), OUSTRING_TO_OSTRING_CVTFLAGS );
270         OSL_ASSERT(*pustrDirectory != NULL);
271         osl_getFileURLFromSystemPath( *pustrDirectory, pustrDirectory );
272     }
273 
274     return bRet;
275 }
276 
277 
osl_psz_getConfigDir(oslSecurity Security,sal_Char * pszDirectory,sal_uInt32 nMax)278 sal_Bool SAL_CALL osl_psz_getConfigDir(oslSecurity Security, sal_Char* pszDirectory, sal_uInt32 nMax)
279 {
280 	return (osl_psz_getHomeDir(Security, pszDirectory, nMax));
281 }
282 
osl_isAdministrator(oslSecurity Security)283 sal_Bool SAL_CALL osl_isAdministrator(oslSecurity Security)
284 {
285 	oslSecurityImpl *pSecImpl = (oslSecurityImpl *)Security;
286 
287     if (pSecImpl == NULL)
288 	    return sal_False;
289 
290     if (pSecImpl->m_pPasswd.pw_uid != 0)
291 		return (sal_False);
292 
293 	return (sal_True);
294 }
295 
osl_freeSecurityHandle(oslSecurity Security)296 void SAL_CALL osl_freeSecurityHandle(oslSecurity Security)
297 {
298 	if (Security)
299 		free ((oslSecurityImpl*)Security);
300 }
301 
302 
osl_loadUserProfile(oslSecurity Security)303 sal_Bool SAL_CALL osl_loadUserProfile(oslSecurity Security)
304 {
305     return sal_False;
306 }
307 
osl_unloadUserProfile(oslSecurity Security)308 void SAL_CALL osl_unloadUserProfile(oslSecurity Security)
309 {
310     return;
311 }
312 
313 
314