common.c revision 8b37eff6e65298e652eb839df412286e3b4766f5
/*
* System Security Services Daemon. NSS client interface
*
* Copyright (C) Simo Sorce 2007
*
* Winbind derived code:
* Copyright (C) Tim Potter 2000
* Copyright (C) Andrew Tridgell 2000
* Copyright (C) Andrew Bartlett 2002
*
* it under the terms of the GNU Lesser General Public License as
* published by the Free Software Foundation; either version 2.1 of the
* License, or (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU Lesser General Public License for more details.
*
* You should have received a copy of the GNU Lesser General Public
* License along with this program; if not, write to the Free Software
* Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
*/
/* for struct ucred */
#define _GNU_SOURCE
#include <nss.h>
#include <security/pam_modules.h>
#include <errno.h>
#include <unistd.h>
#include <stdlib.h>
#include <stdint.h>
#include <string.h>
#include <fcntl.h>
#include <poll.h>
#include <libintl.h>
#include "config.h"
#include "sss_cli.h"
/* common functions */
static void sss_cli_close_socket(void)
{
if (sss_cli_sd != -1) {
sss_cli_sd = -1;
}
}
/* Requests:
*
* byte 0-3: 32bit unsigned with length (the complete packet length: 0 to X)
* byte 4-7: 32bit unsigned with command code
* byte 8-11: 32bit unsigned (reserved)
* byte 12-15: 32bit unsigned (reserved)
* byte 16-X: (optional) request structure associated to the command code used
*/
struct sss_cli_req_data *rd,
int *errnop)
{
header[2] = 0;
header[3] = 0;
datasent = 0;
int rdsent;
*errnop = 0;
do {
errno = 0;
/* If error is EINTR here, we'll try again
* If it's any other error, we'll catch it
* below.
*/
switch (res) {
case -1:
break;
case 0:
break;
case 1:
}
}
break;
default: /* more than one avail ?? */
break;
}
if (*errnop) {
return NSS_STATUS_UNAVAIL;
}
errno = 0;
if (datasent < SSS_NSS_HEADER_SIZE) {
} else {
}
/* If the write was interrupted, go back through
* the loop and try again
*/
continue;
}
/* Write failed */
return NSS_STATUS_UNAVAIL;
}
}
return NSS_STATUS_SUCCESS;
}
/* Replies:
*
* byte 0-3: 32bit unsigned with length (the complete packet length: 0 to X)
* byte 4-7: 32bit unsigned with command code
* byte 8-11: 32bit unsigned with the request status (server errno)
* byte 12-15: 32bit unsigned (reserved)
* byte 16-X: (optional) reply structure associated to the command code used
*/
int *errnop)
{
header[1] = 0;
header[2] = 0;
header[3] = 0;
datarecv = 0;
*len = 0;
*errnop = 0;
int bufrecv;
do {
errno = 0;
/* If error is EINTR here, we'll try again
* If it's any other error, we'll catch it
* below.
*/
switch (res) {
case -1:
break;
case 0:
break;
case 1:
}
}
break;
default: /* more than one avail ?? */
break;
}
if (*errnop) {
return NSS_STATUS_UNAVAIL;
}
errno = 0;
if (datarecv < SSS_NSS_HEADER_SIZE) {
} else {
}
/* If the read was interrupted, go back through
* the loop and try again
*/
continue;
}
/* Read failed. I think the only useful thing
* we can do here is just return -1 and fail
* since the transaction has failed half way
* through. */
return NSS_STATUS_UNAVAIL;
}
/* at this point recv buf is not yet
* allocated and the header has just
* been read, do checks and proceed */
if (header[2] != 0) {
/* server side error */
return NSS_STATUS_TRYAGAIN;
} else {
return NSS_STATUS_UNAVAIL;
}
}
/* wrong command id */
return NSS_STATUS_UNAVAIL;
}
if (header[0] > SSS_NSS_HEADER_SIZE) {
if (!*buf) {
return NSS_STATUS_UNAVAIL;
}
}
}
}
return NSS_STATUS_SUCCESS;
}
/* this function will check command codes match and returned length is ok */
/* repbuf and replen report only the data section not the header */
static enum nss_status sss_nss_make_request_nochecks(
enum sss_cli_command cmd,
struct sss_cli_req_data *rd,
int *errnop)
{
enum nss_status ret;
int len = 0;
/* send data */
if (ret != NSS_STATUS_SUCCESS) {
return ret;
}
/* data sent, now get reply */
if (ret != NSS_STATUS_SUCCESS) {
return ret;
}
/* we got through, now we have the custom data in buf if any,
* return it if requested */
if (replen) {
}
} else {
if (replen) {
*replen = 0;
}
}
return NSS_STATUS_SUCCESS;
}
/* GET_VERSION Reply:
* 0-3: 32bit unsigned version number
*/
static int sss_nss_check_version(const char *socket_name)
{
enum nss_status nret;
int errnop;
int res = NSS_STATUS_UNAVAIL;
struct sss_cli_req_data req;
} else {
return NSS_STATUS_UNAVAIL;
}
if (nret != NSS_STATUS_SUCCESS) {
return nret;
}
if (!repbuf) {
return res;
}
}
return res;
}
/* this 2 functions are adapted from samba3 winbinbd's wb_common.c */
/* Make sure socket handle isn't stdin (0), stdout(1) or stderr(2) by setting
* the limit to 3 */
#define RECURSION_LIMIT 3
{
int new_fd;
#ifdef F_DUPFD
return -1;
}
/* Paranoia */
if (new_fd < 3) {
return -1;
}
return new_fd;
#else
if (limit <= 0)
return -1;
if (new_fd == -1)
return -1;
/* use the program stack to hold our list of FDs to close */
return new_fd;
#endif
}
return fd;
}
/****************************************************************************
Set a fd into blocking/nonblocking mode. Uses POSIX O_NONBLOCK if available,
else
if SYSV use O_NDELAY
if BSD use FNDELAY
Set close on exec also.
****************************************************************************/
static int make_safe_fd(int fd)
{
if (new_fd == -1) {
return -1;
}
/* Socket should be nonblocking. */
#ifdef O_NONBLOCK
#define FLAG_TO_SET O_NONBLOCK
#else
#ifdef SYSV
#define FLAG_TO_SET O_NDELAY
#else /* BSD */
#define FLAG_TO_SET FNDELAY
#endif
#endif
return -1;
}
flags |= FLAG_TO_SET;
return -1;
}
/* Socket should be closed on exec() */
#ifdef FD_CLOEXEC
if (flags >= 0) {
flags |= FD_CLOEXEC;
}
if (result < 0) {
return -1;
}
#endif
return new_fd;
}
{
struct sockaddr_un nssaddr;
int inprogress = 1;
int wait_time, sleep_time;
int sd;
if (sd == -1) {
return -1;
}
/* set as non-blocking, close on exec, and make sure standard
* descriptors are not used */
if (sd == -1) {
return -1;
}
/* this piece is adapted from winbind client code */
wait_time = 0;
sleep_time = 0;
while(inprogress) {
int connect_errno = 0;
int ret;
wait_time += sleep_time;
sizeof(nssaddr));
if (ret == 0) {
return sd;
}
switch(errno) {
case EINPROGRESS:
if (ret > 0) {
errnosize = sizeof(connect_errno);
&connect_errno, &errnosize);
if (ret >= 0 && connect_errno == 0) {
return sd;
}
}
break;
case EAGAIN:
if (wait_time < SSS_CLI_SOCKET_TIMEOUT) {
}
break;
default:
inprogress = 0;
break;
}
if (wait_time >= SSS_CLI_SOCKET_TIMEOUT) {
inprogress = 0;
}
}
/* if we get here connect() failed or we timed out */
return -1;
}
{
int mysd;
}
/* check if the socket has been closed on the other side */
if (sss_cli_sd != -1) {
*errnop = 0;
do {
errno = 0;
/* If error is EINTR here, we'll try again
* If it's any other error, we'll catch it
* below.
*/
switch (res) {
case -1:
break;
case 0:
break;
case 1:
}
}
break;
default: /* more than one avail ?? */
break;
}
if (*errnop == 0) {
return SSS_STATUS_SUCCESS;
}
}
if (mysd == -1) {
return SSS_STATUS_UNAVAIL;
}
sss_cli_sd = mysd;
return SSS_STATUS_SUCCESS;
}
return SSS_STATUS_UNAVAIL;
}
/* this function will check command codes match and returned length is ok */
/* repbuf and replen report only the data section not the header */
struct sss_cli_req_data *rd,
int *errnop)
{
enum sss_status ret;
char *envval;
/* avoid looping in the nss daemon */
return NSS_STATUS_NOTFOUND;
}
if (ret != SSS_STATUS_SUCCESS) {
return NSS_STATUS_UNAVAIL;
}
}
{
#ifdef HAVE_UCRED
int ret;
struct ucred server_cred;
if (ret != 0) {
return errno;
}
if (server_cred_len != sizeof(struct ucred)) {
return ESSS_BAD_CRED_MSG;
}
return ESSS_SERVER_NOT_TRUSTED;
}
#endif
return 0;
}
struct sss_cli_req_data *rd,
int *errnop)
{
int ret;
char *envval;
/* avoid looping in the pam daemon */
return PAM_SERVICE_ERR;
}
/* only root shall use the privileged pipe */
if (ret != 0) return PAM_SERVICE_ERR;
return PAM_SERVICE_ERR;
}
} else {
if (ret != 0) return PAM_SERVICE_ERR;
return PAM_SERVICE_ERR;
}
}
if (ret != NSS_STATUS_SUCCESS) {
return PAM_SERVICE_ERR;
}
if (ret != 0) {
return PAM_SERVICE_ERR;
}
}
const char *ssscli_err2string(int err)
{
const char *m;
switch(err) {
case ESSS_BAD_PRIV_SOCKET:
return _("Privileged socket has wrong ownership or permissions.");
break;
case ESSS_BAD_PUB_SOCKET:
return _("Public socket has wrong ownership or permissions.");
break;
case ESSS_BAD_CRED_MSG:
return _("Unexpected format of the server credential message.");
break;
case ESSS_SERVER_NOT_TRUSTED:
return _("SSSD is not run by root.");
break;
default:
if (m == NULL) {
return _("An error occurred, but no description can be found.");
}
return m;
break;
}
return _("Unexpected error while looking for an error description");
}
/* Return strlen(str) or maxlen, whichever is shorter
* Returns EINVAL if str is NULL, EFBIG if str is longer than maxlen
* _len will return the result
*
* This function is useful for preventing buffer overflow attacks.
*/
{
if (!str) {
return EINVAL;
}
#if defined __USE_GNU
#else
*len = 0;
len++;
}
#endif
return EFBIG;
}
return 0;
}