1 /************************************************************** 2 * 3 * Licensed to the Apache Software Foundation (ASF) under one 4 * or more contributor license agreements. See the NOTICE file 5 * distributed with this work for additional information 6 * regarding copyright ownership. The ASF licenses this file 7 * to you under the Apache License, Version 2.0 (the 8 * "License"); you may not use this file except in compliance 9 * with the License. You may obtain a copy of the License at 10 * 11 * http://www.apache.org/licenses/LICENSE-2.0 12 * 13 * Unless required by applicable law or agreed to in writing, 14 * software distributed under the License is distributed on an 15 * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY 16 * KIND, either express or implied. See the License for the 17 * specific language governing permissions and limitations 18 * under the License. 19 * 20 *************************************************************/ 21 22 23 24 // MARKER(update_precomp.py): autogen include statement, do not remove 25 #include "precompiled_sal.hxx" 26 27 //------------------------------------------------------------------------ 28 // header file 29 //------------------------------------------------------------------------ 30 #include <osl_Security_Const.h> 31 32 using namespace osl; 33 using namespace rtl; 34 35 36 //------------------------------------------------------------------------ 37 // helper functions and classes 38 //------------------------------------------------------------------------ 39 40 /** print Boolean value. 41 */ 42 inline void printBool( sal_Bool bOk ) 43 { 44 //t_print("#printBool# " ); 45 ( sal_True == bOk ) ? t_print("TRUE!\n" ): t_print("FALSE!\n" ); 46 } 47 48 /** print a UNI_CODE String. 49 */ 50 inline void printUString( const ::rtl::OUString & str ) 51 { 52 rtl::OString aString; 53 54 //t_print("#printUString_u# " ); 55 aString = ::rtl::OUStringToOString( str, RTL_TEXTENCODING_ASCII_US ); 56 t_print("%s\n", aString.getStr( ) ); 57 } 58 59 60 //------------------------------------------------------------------------ 61 // test code start here 62 //------------------------------------------------------------------------ 63 64 namespace osl_Security 65 { 66 67 /** testing the method: 68 Security() 69 */ 70 class ctors : public CppUnit::TestFixture 71 { 72 public: 73 sal_Bool bRes, bRes1; 74 75 void ctors_001( ) 76 { 77 ::osl::Security aSec; 78 79 CPPUNIT_ASSERT_MESSAGE( "#test comment#: create a security its handle should not be NULL.", 80 aSec.getHandle( ) != NULL ); 81 } 82 83 CPPUNIT_TEST_SUITE( ctors ); 84 CPPUNIT_TEST( ctors_001 ); 85 CPPUNIT_TEST_SUITE_END( ); 86 }; // class ctors 87 88 89 /** testing the methods: 90 inline sal_Bool SAL_CALL logonUser(const ::rtl::OUString& strName, 91 const ::rtl::OUString& strPasswd); 92 inline sal_Bool SAL_CALL logonUser(const ::rtl::OUString & strName, 93 const ::rtl::OUString & strPasswd, 94 const ::rtl::OUString & strFileServer); 95 */ 96 class logonUser : public CppUnit::TestFixture 97 { 98 public: 99 sal_Bool bRes; 100 101 void logonUser_user_pwd( ) 102 { 103 ::osl::Security aSec; 104 bRes = aSec.logonUser( aLogonUser, aLogonPasswd ); 105 106 CPPUNIT_ASSERT_MESSAGE( "#test comment#: check logon user through forwarded user name, pwd, passed in (UNX), failed in (W32).", 107 ( sal_True == bRes ) ); 108 } 109 110 void logonUser_user_pwd_server( ) 111 { 112 ::osl::Security aSec; 113 bRes = aSec.logonUser( aLogonUser, aLogonPasswd, aFileServer ); 114 115 CPPUNIT_ASSERT_MESSAGE( "#test comment#: check logon user through forwarded user name, pwd and server name, failed in (UNX)(W32).", 116 ( sal_True == bRes ) ); 117 } 118 119 120 CPPUNIT_TEST_SUITE( logonUser ); 121 if ( !aStringForward.equals( aNullURL ) && aStringForward.indexOf( (sal_Unicode)' ' ) != -1 && ( aStringForward.indexOf( ( sal_Unicode ) ' ' ) == aStringForward.lastIndexOf( ( sal_Unicode ) ' ' ) ) ) 122 /// if user name and passwd are forwarded 123 { 124 CPPUNIT_TEST( logonUser_user_pwd ); 125 } 126 if ( !aStringForward.equals( aNullURL ) && aStringForward.indexOf( (sal_Unicode)' ' ) != -1 && ( aStringForward.indexOf( ( sal_Unicode ) ' ' ) != aStringForward.lastIndexOf( ( sal_Unicode ) ' ' ) ) ) 127 /// if user name and passwd and file server are forwarded 128 { 129 CPPUNIT_TEST( logonUser_user_pwd_server ); 130 } 131 CPPUNIT_TEST_SUITE_END( ); 132 }; // class logonUser 133 134 135 /** testing the method: 136 inline sal_Bool Security::getUserIdent( rtl::OUString& strIdent) const 137 */ 138 class getUserIdent : public CppUnit::TestFixture 139 { 140 public: 141 sal_Bool bRes, bRes1; 142 143 void getUserIdent_001( ) 144 { 145 ::osl::Security aSec; 146 ::rtl::OUString strID; 147 bRes = aSec.getUserIdent( strID ); 148 149 CPPUNIT_ASSERT_MESSAGE( "#test comment#: get UserID and compare it with names got at the beginning of the test.", 150 ( sal_True == strUserID.equals( strID ) ) && ( sal_True == bRes )); 151 } 152 153 CPPUNIT_TEST_SUITE( getUserIdent ); 154 CPPUNIT_TEST( getUserIdent_001 ); 155 CPPUNIT_TEST_SUITE_END( ); 156 }; // class getUserIdent 157 158 159 /** testing the method: 160 inline sal_Bool SAL_CALL getUserName( ::rtl::OUString& strName) const; 161 */ 162 class getUserName : public CppUnit::TestFixture 163 { 164 public: 165 sal_Bool bRes, bRes1; 166 167 void getUserName_001( ) 168 { 169 ::osl::Security aSec; 170 #ifdef WNT 171 ::rtl::OUString strName( strUserName ), strGetName; 172 #else 173 ::rtl::OUString strName( strUserName ), strGetName; 174 #endif 175 bRes = aSec.getUserName( strGetName ); 176 177 sal_Int32 nPos = -1; 178 if (strName.getLength() > 0) 179 { 180 nPos = strGetName.indexOf(strName); 181 } 182 CPPUNIT_ASSERT_MESSAGE( "#test comment#: get UserName and compare it with names got at the beginning of the test.", 183 ( nPos >= 0 ) && ( sal_True == bRes ) ); 184 } 185 186 CPPUNIT_TEST_SUITE( getUserName ); 187 CPPUNIT_TEST( getUserName_001 ); 188 CPPUNIT_TEST_SUITE_END( ); 189 }; // class getUserName 190 191 192 193 /** testing the method: 194 inline sal_Bool SAL_CALL getHomeDir( ::rtl::OUString& strDirectory) const; 195 */ 196 class getHomeDir : public CppUnit::TestFixture 197 { 198 public: 199 sal_Bool bRes, bRes1; 200 201 void getHomeDir_001( ) 202 { 203 ::osl::Security aSec; 204 ::rtl::OUString strHome; 205 bRes = aSec.getHomeDir( strHome ); 206 207 CPPUNIT_ASSERT_MESSAGE( "#test comment#: getHomeDir and compare it with the info we get at the beginning.", 208 ( sal_True == strHomeDirectory.equals( strHome ) ) && ( sal_True == bRes ) ); 209 } 210 211 CPPUNIT_TEST_SUITE( getHomeDir ); 212 CPPUNIT_TEST( getHomeDir_001 ); 213 CPPUNIT_TEST_SUITE_END( ); 214 }; // class getHomeDir 215 216 /** testing the method: 217 inline sal_Bool Security::getConfigDir( rtl::OUString& strDirectory ) const 218 */ 219 class getConfigDir : public CppUnit::TestFixture 220 { 221 public: 222 sal_Bool bRes, bRes1; 223 224 void getConfigDir_001( ) 225 { 226 ::osl::Security aSec; 227 ::rtl::OUString strConfig; 228 bRes = aSec.getConfigDir( strConfig ); 229 230 CPPUNIT_ASSERT_MESSAGE( "#test comment#: getHomeDir and compare it with the info we get at the beginning.", 231 ( sal_True == strConfigDirectory.equals( strConfig ) ) && ( sal_True == bRes ) ); 232 } 233 234 CPPUNIT_TEST_SUITE( getConfigDir ); 235 CPPUNIT_TEST( getConfigDir_001 ); 236 CPPUNIT_TEST_SUITE_END( ); 237 }; // class getConfigDir 238 239 /** testing the method: 240 inline sal_Bool SAL_CALL isAdministrator() const; 241 */ 242 class isAdministrator : public CppUnit::TestFixture 243 { 244 public: 245 sal_Bool bRes; 246 247 void isAdministrator_001( ) 248 { 249 ::osl::Security aSec; 250 bRes = aSec.isAdministrator( ); 251 252 CPPUNIT_ASSERT_MESSAGE( "#test comment#: check if the user is administrator at beginning, compare here.", 253 bRes == isAdmin ); 254 } 255 256 CPPUNIT_TEST_SUITE( isAdministrator ); 257 CPPUNIT_TEST( isAdministrator_001 ); 258 CPPUNIT_TEST_SUITE_END( ); 259 }; // class isAdministrator 260 261 /** testing the method: 262 inline oslSecurity getHandle() const; 263 */ 264 class getHandle : public CppUnit::TestFixture 265 { 266 public: 267 sal_Bool bRes; 268 269 void getHandle_001( ) 270 { 271 ::osl::Security aSec; 272 bRes = aSec.isAdministrator( ) == osl_isAdministrator( aSec.getHandle( ) ); 273 274 CPPUNIT_ASSERT_MESSAGE( "#test comment#: use getHandle function to call C API.", 275 bRes == sal_True ); 276 } 277 278 CPPUNIT_TEST_SUITE( getHandle ); 279 CPPUNIT_TEST( getHandle_001 ); 280 CPPUNIT_TEST_SUITE_END( ); 281 }; // class getHandle 282 283 284 class UserProfile : public CppUnit::TestFixture 285 { 286 public: 287 288 void loadUserProfile( ) 289 { 290 ::osl::Security aSec; 291 sal_Bool bValue = osl_loadUserProfile(aSec.getHandle()); 292 293 CPPUNIT_ASSERT_MESSAGE( "empty function.", bValue == sal_False ); 294 } 295 296 void unloadUserProfile( ) 297 { 298 ::osl::Security aSec; 299 osl_unloadUserProfile(aSec.getHandle()); 300 CPPUNIT_ASSERT_MESSAGE( "empty function.", sal_True ); 301 } 302 303 CPPUNIT_TEST_SUITE( UserProfile ); 304 CPPUNIT_TEST( loadUserProfile ); 305 CPPUNIT_TEST( unloadUserProfile ); 306 CPPUNIT_TEST_SUITE_END( ); 307 }; // class UserProfile 308 309 class loginUserOnFileServer : public CppUnit::TestFixture 310 { 311 public: 312 313 void loginUserOnFileServer_001( ) 314 { 315 rtl::OUString suUserName; 316 rtl::OUString suPassword; 317 rtl::OUString suFileServer; 318 ::osl::Security aSec; 319 oslSecurity pSec = aSec.getHandle(); 320 321 oslSecurityError erg = osl_loginUserOnFileServer(suUserName.pData, suPassword.pData, suFileServer.pData, &pSec); 322 323 CPPUNIT_ASSERT_MESSAGE( "empty function.", erg == osl_Security_E_UserUnknown ); 324 } 325 326 CPPUNIT_TEST_SUITE( loginUserOnFileServer ); 327 CPPUNIT_TEST( loginUserOnFileServer_001 ); 328 CPPUNIT_TEST_SUITE_END( ); 329 }; // class loginUserOnFileServer 330 331 // ----------------------------------------------------------------------------- 332 CPPUNIT_TEST_SUITE_NAMED_REGISTRATION(osl_Security::ctors, "osl_Security"); 333 CPPUNIT_TEST_SUITE_NAMED_REGISTRATION(osl_Security::logonUser, "osl_Security"); 334 CPPUNIT_TEST_SUITE_NAMED_REGISTRATION(osl_Security::getUserIdent, "osl_Security"); 335 CPPUNIT_TEST_SUITE_NAMED_REGISTRATION(osl_Security::getUserName, "osl_Security"); 336 CPPUNIT_TEST_SUITE_NAMED_REGISTRATION(osl_Security::getHomeDir, "osl_Security"); 337 CPPUNIT_TEST_SUITE_NAMED_REGISTRATION(osl_Security::getConfigDir, "osl_Security"); 338 CPPUNIT_TEST_SUITE_NAMED_REGISTRATION(osl_Security::isAdministrator, "osl_Security"); 339 CPPUNIT_TEST_SUITE_NAMED_REGISTRATION(osl_Security::getHandle, "osl_Security"); 340 341 CPPUNIT_TEST_SUITE_NAMED_REGISTRATION(osl_Security::UserProfile, "osl_Security"); 342 CPPUNIT_TEST_SUITE_NAMED_REGISTRATION(osl_Security::loginUserOnFileServer, "osl_Security"); 343 344 // ----------------------------------------------------------------------------- 345 346 } // namespace osl_Security 347 348 349 // ----------------------------------------------------------------------------- 350 351 // this macro creates an empty function, which will called by the RegisterAllFunctions() 352 // to let the user the possibility to also register some functions by hand. 353 354 /** to do some initialized work, we replace the NOADDITIONAL macro with the initialize work which 355 get current user name, . 356 */ 357 358 void RegisterAdditionalFunctions(FktRegFuncPtr) 359 { 360 /// start message 361 t_print("#Initializing ...\n" ); 362 t_print("#\n#logonUser function need root/Administrator account to test.\n" ); 363 t_print("#You can test by login with root/Administrator, and excute:\n" ); 364 t_print("#testshl2 -forward \"username password\" ../../../wntmsci9/bin/Security.dll\n" ); 365 t_print("# where username and password are forwarded account info.\n" ); 366 t_print("#if no text forwarded, this function will be skipped.\n" ); 367 368 /// get system information 369 #if ( defined UNX ) || ( defined OS2 ) 370 /// some initialization work for UNIX OS 371 372 373 struct passwd* pw; 374 CPPUNIT_ASSERT_MESSAGE( "getpwuid: no password entry\n",( pw = getpwuid( getuid() ) ) != NULL ); 375 376 /// get user ID; 377 strUserID = ::rtl::OUString::valueOf( ( sal_Int32 )getuid( ) ); 378 379 /// get user Name; 380 strUserName = ::rtl::OUString::createFromAscii( pw->pw_name ); 381 382 /// get home directory; 383 CPPUNIT_ASSERT_MESSAGE( "#Convert from system path to URL failed.", 384 ::osl::File::E_None == ::osl::File::getFileURLFromSystemPath( ::rtl::OUString::createFromAscii( pw->pw_dir ), strHomeDirectory ) ); 385 386 /// get config directory; 387 strConfigDirectory = strHomeDirectory.copy(0); 388 389 /// is administrator; 390 if( !getuid( ) ) 391 isAdmin = sal_True; 392 393 #endif 394 #if defined ( WNT ) 395 /// some initialization work for Windows OS 396 397 398 /// Get the user name, computer name, user home directory. 399 LPTSTR lpszSystemInfo; // pointer to system information string 400 DWORD cchBuff = BUFSIZE; // size of computer or user name 401 TCHAR tchBuffer[BUFSIZE]; // buffer for string 402 403 lpszSystemInfo = tchBuffer; 404 cchBuff = BUFSIZE; 405 if( GetUserNameA(lpszSystemInfo, &cchBuff) ) 406 strUserName = ::rtl::OUString::createFromAscii( lpszSystemInfo ); 407 408 if( GetComputerName(lpszSystemInfo, &cchBuff) ) 409 strComputerName = ::rtl::OUString::createFromAscii( lpszSystemInfo ); 410 411 /// Get user home directory. 412 HKEY hRegKey; 413 sal_Char PathA[_MAX_PATH]; 414 ::rtl::OUString strHome; 415 if (RegOpenKey(HKEY_CURRENT_USER, "Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\Shell Folders", &hRegKey) == ERROR_SUCCESS) 416 { 417 LONG lRet, lSize = sizeof(PathA); 418 DWORD Type; 419 420 lRet = RegQueryValueEx(hRegKey, "AppData", NULL, &Type, ( unsigned char * )PathA, ( unsigned long * )&lSize); 421 if ( ( lRet == ERROR_SUCCESS ) && ( Type == REG_SZ ) && ( _access( PathA, 0 ) == 0 ) ) 422 { 423 CPPUNIT_ASSERT_MESSAGE( "#Convert from system path to URL failed.", 424 ::osl::File::E_None == ::osl::File::getFileURLFromSystemPath( ::rtl::OUString::createFromAscii( PathA ), strConfigDirectory ) ); 425 } 426 427 lRet = RegQueryValueEx(hRegKey, "Personal", NULL, &Type, ( unsigned char * )PathA, ( unsigned long * )&lSize); 428 if ( ( lRet == ERROR_SUCCESS ) && ( Type == REG_SZ ) && ( _access( PathA, 0 ) == 0 ) ) 429 { 430 CPPUNIT_ASSERT_MESSAGE( "#Convert from system path to URL failed.", 431 ::osl::File::E_None == ::osl::File::getFileURLFromSystemPath( ::rtl::OUString::createFromAscii( PathA ), strHomeDirectory ) ); 432 } 433 434 RegCloseKey(hRegKey); 435 } 436 437 438 /// Get user Security ID: 439 440 // Create buffers that may be large enough. If a buffer is too small, the count parameter will be set to the size needed. 441 const DWORD INITIAL_SIZE = 32; 442 DWORD cbSid = 0; 443 DWORD dwSidBufferSize = INITIAL_SIZE; 444 DWORD cchDomainName = 0; 445 DWORD dwDomainBufferSize = INITIAL_SIZE; 446 WCHAR * wszDomainName = NULL; 447 SID_NAME_USE eSidType; 448 DWORD dwErrorCode = 0; 449 450 LPCWSTR wszAccName = ( LPWSTR ) strUserName.getStr( ); 451 452 // Create buffers for the SID and the domain name. 453 PSID pSid = (PSID) new WIN_BYTE[dwSidBufferSize]; 454 CPPUNIT_ASSERT_MESSAGE("# creating SID buffer failed.\n", pSid!= NULL ); 455 memset( pSid, 0, dwSidBufferSize); 456 457 wszDomainName = new WCHAR[dwDomainBufferSize]; 458 CPPUNIT_ASSERT_MESSAGE("# creating Domain name buffer failed.\n", wszDomainName != NULL ); 459 memset(wszDomainName, 0, dwDomainBufferSize*sizeof(WCHAR)); 460 461 // Obtain the SID for the account name passed. 462 for ( ; ; ) 463 { 464 // Set the count variables to the buffer sizes and retrieve the SID. 465 cbSid = dwSidBufferSize; 466 cchDomainName = dwDomainBufferSize; 467 if (LookupAccountNameW( 468 NULL, // Computer name. NULL for the local computer 469 wszAccName, 470 pSid, // Pointer to the SID buffer. Use NULL to get the size needed, 471 &cbSid, // Size of the SID buffer needed. 472 wszDomainName, // wszDomainName, 473 &cchDomainName, 474 &eSidType 475 )) 476 { 477 if (IsValidSid( pSid) == FALSE) 478 wprintf(L"# The SID for %s is invalid.\n", wszAccName); 479 break; 480 } 481 dwErrorCode = GetLastError(); 482 483 // Check if one of the buffers was too small. 484 if (dwErrorCode == ERROR_INSUFFICIENT_BUFFER) 485 { 486 if (cbSid > dwSidBufferSize) 487 { 488 // Reallocate memory for the SID buffer. 489 wprintf(L"# The SID buffer was too small. It will be reallocated.\n"); 490 FreeSid( pSid); 491 pSid = (PSID) new WIN_BYTE[cbSid]; 492 CPPUNIT_ASSERT_MESSAGE("# re-creating SID buffer failed.\n", pSid!= NULL ); 493 memset( pSid, 0, cbSid); 494 dwSidBufferSize = cbSid; 495 } 496 if (cchDomainName > dwDomainBufferSize) 497 { 498 // Reallocate memory for the domain name buffer. 499 wprintf(L"# The domain name buffer was too small. It will be reallocated.\n"); 500 delete [] wszDomainName; 501 wszDomainName = new WCHAR[cchDomainName]; 502 CPPUNIT_ASSERT_MESSAGE("# re-creating domain name buffer failed.\n", wszDomainName!= NULL ); 503 memset(wszDomainName, 0, cchDomainName*sizeof(WCHAR)); 504 dwDomainBufferSize = cchDomainName; 505 } 506 } 507 else 508 { 509 wprintf(L"# LookupAccountNameW failed. GetLastError returned: %d\n", dwErrorCode); 510 break; 511 } 512 } 513 514 // now got SID successfully, only need to compare SID, so I copied the rest lines from source to convert SID to OUString. 515 PSID_IDENTIFIER_AUTHORITY psia; 516 DWORD dwSubAuthorities; 517 DWORD dwSidRev=SID_REVISION; 518 DWORD dwCounter; 519 DWORD dwSidSize; 520 sal_Char *Ident; 521 522 /* obtain SidIdentifierAuthority */ 523 psia=GetSidIdentifierAuthority(pSid); 524 525 /* obtain sidsubauthority count */ 526 dwSubAuthorities=*GetSidSubAuthorityCount(pSid)<=5?*GetSidSubAuthorityCount(pSid):5; 527 528 /* buffer length: S-SID_REVISION- + identifierauthority- + subauthorities- + NULL */ 529 Ident=(sal_Char * )malloc(88*sizeof(sal_Char)); 530 531 /* prepare S-SID_REVISION- */ 532 dwSidSize=wsprintf(Ident, TEXT("S-%lu-"), dwSidRev); 533 534 /* prepare SidIdentifierAuthority */ 535 if ((psia->Value[0] != 0) || (psia->Value[1] != 0)) 536 { 537 dwSidSize+=wsprintf(Ident + strlen(Ident), 538 TEXT("0x%02hx%02hx%02hx%02hx%02hx%02hx"), 539 (USHORT)psia->Value[0], 540 (USHORT)psia->Value[1], 541 (USHORT)psia->Value[2], 542 (USHORT)psia->Value[3], 543 (USHORT)psia->Value[4], 544 (USHORT)psia->Value[5]); 545 } 546 else 547 { 548 dwSidSize+=wsprintf(Ident + strlen(Ident), 549 TEXT("%lu"), 550 (ULONG)(psia->Value[5] ) + 551 (ULONG)(psia->Value[4] << 8) + 552 (ULONG)(psia->Value[3] << 16) + 553 (ULONG)(psia->Value[2] << 24) ); 554 } 555 556 /* loop through SidSubAuthorities */ 557 for (dwCounter=0; dwCounter < dwSubAuthorities; dwCounter++) 558 { 559 dwSidSize+=wsprintf(Ident + dwSidSize, TEXT("-%lu"), 560 *GetSidSubAuthority(pSid, dwCounter) ); 561 } 562 563 strUserID = ::rtl::OUString::createFromAscii( Ident ); 564 565 free(Ident); 566 delete pSid; 567 delete [] wszDomainName; 568 569 570 /// check if logged in user is administrator: 571 572 WIN_BOOL b; 573 SID_IDENTIFIER_AUTHORITY NtAuthority = SECURITY_NT_AUTHORITY; 574 PSID AdministratorsGroup; 575 b = AllocateAndInitializeSid( 576 &NtAuthority, 577 2, 578 SECURITY_BUILTIN_DOMAIN_RID, 579 DOMAIN_ALIAS_RID_ADMINS, 580 0, 0, 0, 0, 0, 0, 581 &AdministratorsGroup); 582 if(b) 583 { 584 if (!CheckTokenMembership( NULL, AdministratorsGroup, &b)) 585 { 586 b = FALSE; 587 } 588 FreeSid(AdministratorsGroup); 589 } 590 591 isAdmin = ( sal_Bool )b; 592 593 #endif 594 595 /// print the information. 596 t_print("#\n#Retrived system information is below:\n"); 597 598 t_print("Computer Name: "); 599 if ( strComputerName == aNullURL ) 600 t_print(" Not retrived\n" ); 601 else 602 printUString( strComputerName ); 603 604 t_print("Current User Name: "); 605 if ( strUserName == aNullURL ) 606 t_print(" Not retrived\n" ); 607 else 608 printUString( strUserName ); 609 610 t_print("Current User Home Directory:"); 611 if ( strHomeDirectory == aNullURL ) 612 t_print(" Not retrived\n" ); 613 else 614 printUString( strHomeDirectory ); 615 616 t_print("Current Config Directory: "); 617 if ( strConfigDirectory == aNullURL ) 618 t_print(" Not retrived\n" ); 619 else 620 printUString( strConfigDirectory ); 621 622 t_print("Current UserID: "); 623 if ( strUserID == aNullURL ) 624 t_print(" Not retrived\n" ); 625 else 626 printUString( strUserID ); 627 628 t_print("Current User is"); 629 if ( isAdmin == sal_False ) 630 t_print(" NOT Administrator.\n" ); 631 else 632 t_print(" Administrator.\n" ); 633 634 635 /// get and display forwarded text if available. 636 aStringForward = ::rtl::OUString::createFromAscii( getForwardString() ); 637 if ( !aStringForward.equals( aNullURL ) && aStringForward.indexOf( (sal_Unicode)' ' ) != -1 ) 638 { 639 sal_Int32 nFirstSpacePoint = aStringForward.indexOf( (sal_Unicode)' ' );; 640 sal_Int32 nLastSpacePoint = aStringForward.lastIndexOf( (sal_Unicode)' ' );; 641 if ( nFirstSpacePoint == nLastSpacePoint ) 642 /// only forwarded two parameters, username and password. 643 { 644 aLogonUser = aStringForward.copy( 0, nFirstSpacePoint ); 645 t_print("\n#Forwarded username: "); 646 printUString( aLogonUser); 647 648 aLogonPasswd = aStringForward.copy( nFirstSpacePoint +1, aStringForward.getLength( ) - 1 ); 649 t_print("#Forwarded password: "); 650 for ( int i = nFirstSpacePoint +1; i <= aStringForward.getLength( ) - 1; i++, t_print("*") ); 651 t_print("\n" ); 652 } 653 else 654 /// forwarded three parameters, username, password and fileserver. 655 { 656 aLogonUser = aStringForward.copy( 0, nFirstSpacePoint ); 657 t_print("#Forwarded username: "); 658 printUString( aLogonUser); 659 660 aLogonPasswd = aStringForward.copy( nFirstSpacePoint +1, nLastSpacePoint ); 661 t_print("#Forwarded password: "); 662 for ( int i = nFirstSpacePoint +1; i <= nLastSpacePoint; i++, t_print("*") ); 663 t_print("\n" ); 664 665 aFileServer = aStringForward.copy( nLastSpacePoint +1, aStringForward.getLength( ) - 1 ); 666 t_print("#Forwarded FileServer: "); 667 printUString( aFileServer ); 668 669 } 670 } 671 672 t_print("#\n#Initialization Done.\n" ); 673 674 } 675