25 #include "dbus-credentials.h" 26 #include "dbus-internals.h" 54 BusPDPLinuxID* credential_parsecid;
57 char *linux_security_label;
59 dbus_int32_t adt_audit_data_size;
87 creds->credential_parsecid =
NULL;
89 creds->windows_sid =
NULL;
90 creds->linux_security_label =
NULL;
91 creds->adt_audit_data =
NULL;
92 creds->adt_audit_data_size = 0;
128 credentials->refcount += 1;
141 credentials->refcount -= 1;
142 if (credentials->refcount == 0)
145 dbus_free (credentials->linux_security_label);
148 if (credentials->credential_parsecid)
dbus_free(credentials->credential_parsecid);
149 credentials->credential_parsecid=
NULL;
168 _dbus_verbose(
"***** Add PID to credentials (%p)! %ld\n",credentials,pid);
170 credentials->pid = pid;
185 credentials->unix_uid = uid;
199 const char *windows_sid)
208 credentials->windows_sid = copy;
231 dbus_free (credentials->linux_security_label);
232 credentials->linux_security_label = copy;
256 credentials->adt_audit_data = copy;
257 credentials->adt_audit_data_size = size;
271 DBusCredentialType type)
275 case DBUS_CREDENTIAL_UNIX_PROCESS_ID:
277 case DBUS_CREDENTIAL_UNIX_USER_ID:
279 case DBUS_CREDENTIAL_WINDOWS_SID:
280 return credentials->windows_sid !=
NULL;
281 case DBUS_CREDENTIAL_LINUX_SECURITY_LABEL:
282 return credentials->linux_security_label !=
NULL;
283 case DBUS_CREDENTIAL_ADT_AUDIT_DATA_ID:
284 return credentials->adt_audit_data !=
NULL;
286 case DBUS_CREDENTIAL_UNIX_PARSEC:
287 return credentials->credential_parsecid !=
NULL;
305 return credentials->pid;
318 return credentials->unix_uid;
331 return credentials->windows_sid;
344 return credentials->linux_security_label;
357 return credentials->adt_audit_data;
370 return credentials->adt_audit_data_size;
387 possible_subset->pid == credentials->pid) &&
389 (possible_subset->credential_parsecid ==
NULL ||
390 (credentials->credential_parsecid && possible_subset->credential_parsecid &&
391 credentials->credential_parsecid->sz_pdplinux_context==possible_subset->credential_parsecid->sz_pdplinux_context &&
392 (0==memcmp(possible_subset->credential_parsecid,credentials->credential_parsecid,
393 sizeof(*(credentials->credential_parsecid))+credentials->credential_parsecid->sz_pdplinux_context))) ) &&
396 possible_subset->unix_uid == credentials->unix_uid) &&
397 (possible_subset->windows_sid ==
NULL ||
398 (credentials->windows_sid && strcmp (possible_subset->windows_sid,
399 credentials->windows_sid) == 0)) &&
400 (possible_subset->linux_security_label ==
NULL ||
401 (credentials->linux_security_label !=
NULL &&
402 strcmp (possible_subset->linux_security_label,
403 credentials->linux_security_label) == 0)) &&
404 (possible_subset->adt_audit_data ==
NULL ||
405 (credentials->adt_audit_data && memcmp (possible_subset->adt_audit_data,
406 credentials->adt_audit_data,
407 credentials->adt_audit_data_size) == 0));
422 (credentials->credential_parsecid==
NULL) &&
425 credentials->windows_sid ==
NULL &&
426 credentials->linux_security_label ==
NULL &&
427 credentials->adt_audit_data ==
NULL;
441 credentials->windows_sid ==
NULL;
458 DBUS_CREDENTIAL_UNIX_PROCESS_ID,
459 other_credentials) &&
461 DBUS_CREDENTIAL_UNIX_USER_ID,
462 other_credentials) &&
464 DBUS_CREDENTIAL_ADT_AUDIT_DATA_ID,
465 other_credentials) &&
467 DBUS_CREDENTIAL_LINUX_SECURITY_LABEL,
468 other_credentials) &&
470 DBUS_CREDENTIAL_WINDOWS_SID,
474 DBUS_CREDENTIAL_UNIX_PARSEC,
496 DBusCredentialType which,
499 if (which == DBUS_CREDENTIAL_UNIX_PROCESS_ID &&
505 else if (which == DBUS_CREDENTIAL_UNIX_USER_ID &&
511 else if (which == DBUS_CREDENTIAL_WINDOWS_SID &&
512 other_credentials->windows_sid !=
NULL)
517 else if (which == DBUS_CREDENTIAL_LINUX_SECURITY_LABEL &&
518 other_credentials->linux_security_label !=
NULL)
521 other_credentials->linux_security_label))
524 else if (which == DBUS_CREDENTIAL_ADT_AUDIT_DATA_ID &&
525 other_credentials->adt_audit_data !=
NULL)
531 else if (which == DBUS_CREDENTIAL_UNIX_PARSEC){
533 _dbus_verbose(
"***** Asked to add credential DBUS_CREDENTIAL_UNIX_PARSEC (%d))\n", which);
535 if (other_credentials->credential_parsecid !=
NULL) {
536 if (!_dbus_credentials_pdplinux_add_unix_parsec (credentials, other_credentials->credential_parsecid)){
537 _dbus_verbose(
"Return FAILED (can't set credentials to this one from other_credentials)\n");
541 _dbus_verbose(
"Return OK (credentials successful copied to this one from other_credentials)\n");
545 _dbus_verbose(
"Return OK (but other_cred not set pid=%ld, uid=%lu). So do not add, pdp_credential=%p\n",
546 other_credentials->pid,
547 other_credentials->unix_uid,
548 credentials->credential_parsecid);
566 if (credentials->credential_parsecid)
dbus_free(credentials->credential_parsecid);
567 credentials->credential_parsecid=
NULL;
572 credentials->windows_sid =
NULL;
573 dbus_free (credentials->linux_security_label);
574 credentials->linux_security_label =
NULL;
576 credentials->adt_audit_data =
NULL;
577 credentials->adt_audit_data_size = 0;
622 return credentials->unix_uid == other_credentials->unix_uid &&
623 ((!(credentials->windows_sid || other_credentials->windows_sid)) ||
624 (credentials->windows_sid && other_credentials->windows_sid &&
625 strcmp (credentials->windows_sid, other_credentials->windows_sid) == 0));
657 if (credentials->windows_sid !=
NULL)
666 if (credentials->linux_security_label !=
NULL)
670 credentials->linux_security_label))
675 if (credentials->credential_parsecid !=
NULL)
677 char* pdplinux_context_string=
NULL;
679 if (_dbus_pdplinux_context_to_name(credentials->credential_parsecid,&pdplinux_context_string)){
683 pdplinux_context_string)){
689 if (pdplinux_context_string)
dbus_free(pdplinux_context_string);
705 _dbus_credentials_pdplinux_get_unix_parsec (
DBusCredentials *credentials, BusPDPLinuxID** pparsecid)
707 *pparsecid=credentials->credential_parsecid;
712 _dbus_credentials_pdplinux_add_unix_parsec (
DBusCredentials *credentials,
713 BusPDPLinuxID* parsecid)
715 if (!parsecid)
return FALSE;
716 if (!credentials)
return FALSE;
718 if (credentials->credential_parsecid)
dbus_free(credentials->credential_parsecid);
719 credentials->credential_parsecid=
NULL;
722 sizeof(*(parsecid))+parsecid->sz_pdplinux_context);
724 if (credentials->credential_parsecid){
725 memcpy(credentials->credential_parsecid,parsecid,
726 sizeof(*(parsecid))+parsecid->sz_pdplinux_context);
729 _dbus_verbose(
"No memory!\n");
dbus_uid_t _dbus_credentials_get_unix_uid(DBusCredentials *credentials)
Gets the UNIX user ID in the credentials, or DBUS_UID_UNSET if the credentials object doesn't contain...
#define NULL
A null pointer, defined appropriately for C or C++.
dbus_bool_t _dbus_credentials_include(DBusCredentials *credentials, DBusCredentialType type)
Checks whether the given credential is present.
DBusCredentials * _dbus_credentials_copy(DBusCredentials *credentials)
Copy a credentials object.
void dbus_free(void *memory)
Frees a block of memory previously allocated by dbus_malloc() or dbus_malloc0().
dbus_int32_t _dbus_credentials_get_adt_audit_data_size(DBusCredentials *credentials)
Gets the ADT audit data size in the credentials, or 0 if the credentials object doesn't contain ADT a...
dbus_bool_t _dbus_credentials_add_credential(DBusCredentials *credentials, DBusCredentialType which, DBusCredentials *other_credentials)
Merge the given credential found in the second object into the first object, overwriting the first ob...
#define dbus_new(type, count)
Safe macro for using dbus_malloc().
dbus_bool_t _dbus_credentials_are_superset(DBusCredentials *credentials, DBusCredentials *possible_subset)
Checks whether the first credentials object contains all the credentials found in the second credenti...
#define DBUS_PID_FORMAT
an appropriate printf format for dbus_pid_t
#define _dbus_assert(condition)
Aborts with an error message if the condition is false.
dbus_bool_t _dbus_credentials_add_linux_security_label(DBusCredentials *credentials, const char *label)
Add a Linux security label, as used by LSMs such as SELinux, Smack and AppArmor, to the credentials...
dbus_bool_t _dbus_credentials_add_windows_sid(DBusCredentials *credentials, const char *windows_sid)
Add a Windows user SID to the credentials.
#define DBUS_PID_UNSET
an invalid PID used to represent an uninitialized dbus_pid_t field
void _dbus_credentials_clear(DBusCredentials *credentials)
Clear all credentials in the object.
#define DBUS_UID_UNSET
an invalid UID used to represent an uninitialized dbus_uid_t field
dbus_bool_t _dbus_credentials_add_credentials(DBusCredentials *credentials, DBusCredentials *other_credentials)
Merge all credentials found in the second object into the first object, overwriting the first object ...
unsigned long dbus_pid_t
A process ID.
dbus_bool_t _dbus_credentials_are_anonymous(DBusCredentials *credentials)
Checks whether a credentials object contains a user identity.
dbus_uint32_t dbus_bool_t
A boolean, valid values are TRUE and FALSE.
DBusCredentials * _dbus_credentials_new_from_current_process(void)
Creates a new object with credentials (user ID and process ID) from the current process.
void * _dbus_memdup(const void *mem, size_t n_bytes)
Duplicates a block of memory.
dbus_bool_t _dbus_string_append_printf(DBusString *str, const char *format,...)
Appends a printf-style formatted string to the DBusString.
void _dbus_credentials_ref(DBusCredentials *credentials)
Increment refcount on credentials.
dbus_bool_t _dbus_credentials_add_adt_audit_data(DBusCredentials *credentials, void *audit_data, dbus_int32_t size)
Add ADT audit data to the credentials.
dbus_bool_t _dbus_credentials_add_from_current_process(DBusCredentials *credentials)
Adds the credentials of the current process to the passed-in credentials object.
#define TRUE
Expands to "1".
#define _dbus_assert_not_reached(explanation)
Aborts with an error message if called.
dbus_bool_t _dbus_credentials_add_pid(DBusCredentials *credentials, dbus_pid_t pid)
Add a UNIX process ID to the credentials.
#define DBUS_UID_FORMAT
an appropriate printf format for dbus_uid_t
DBusCredentials * _dbus_credentials_new(void)
Creates a new credentials object.
dbus_pid_t _dbus_credentials_get_pid(DBusCredentials *credentials)
Gets the UNIX process ID in the credentials, or DBUS_PID_UNSET if the credentials object doesn't cont...
void _dbus_credentials_unref(DBusCredentials *credentials)
Decrement refcount on credentials.
#define FALSE
Expands to "0".
const char * _dbus_credentials_get_linux_security_label(DBusCredentials *credentials)
Gets the Linux security label (as used by LSMs) from the credentials, or NULL if the credentials obje...
dbus_bool_t _dbus_credentials_same_user(DBusCredentials *credentials, DBusCredentials *other_credentials)
Check whether the user-identifying credentials in two credentials objects are identical.
void * dbus_malloc0(size_t bytes)
Allocates the given number of bytes, as with standard malloc(), but all bytes are initialized to zero...
dbus_bool_t _dbus_credentials_to_string_append(DBusCredentials *credentials, DBusString *string)
Convert the credentials in this object to a human-readable string format, and append to the given str...
const char * _dbus_credentials_get_windows_sid(DBusCredentials *credentials)
Gets the Windows user SID in the credentials, or NULL if the credentials object doesn't contain a Win...
char * _dbus_strdup(const char *str)
Duplicates a string.
dbus_bool_t _dbus_credentials_add_unix_uid(DBusCredentials *credentials, dbus_uid_t uid)
Add a UNIX user ID to the credentials.
unsigned long dbus_uid_t
A user ID.
dbus_bool_t _dbus_credentials_are_empty(DBusCredentials *credentials)
Checks whether a credentials object contains anything.
void * _dbus_credentials_get_adt_audit_data(DBusCredentials *credentials)
Gets the ADT audit data in the credentials, or NULL if the credentials object doesn't contain ADT aud...