summaryrefslogtreecommitdiffstats
path: root/contrib/openbsm/libbsm/bsm_user.c
diff options
context:
space:
mode:
authorrwatson <rwatson@FreeBSD.org>2008-11-12 23:48:20 +0000
committerrwatson <rwatson@FreeBSD.org>2008-11-12 23:48:20 +0000
commit2bd138f9edd4a43ef97291f03523af35e1ae18f8 (patch)
treee103f4f6bb4ebb161c9702d64560b216d1990d94 /contrib/openbsm/libbsm/bsm_user.c
parent280c17909566cfd4eff091c2747edb9d747f7343 (diff)
downloadFreeBSD-src-2bd138f9edd4a43ef97291f03523af35e1ae18f8.zip
FreeBSD-src-2bd138f9edd4a43ef97291f03523af35e1ae18f8.tar.gz
Flatten OpenBSM vendor tree in preparation for new OpenBSM vendor
import.
Diffstat (limited to 'contrib/openbsm/libbsm/bsm_user.c')
-rw-r--r--contrib/openbsm/libbsm/bsm_user.c268
1 files changed, 0 insertions, 268 deletions
diff --git a/contrib/openbsm/libbsm/bsm_user.c b/contrib/openbsm/libbsm/bsm_user.c
deleted file mode 100644
index c00d139..0000000
--- a/contrib/openbsm/libbsm/bsm_user.c
+++ /dev/null
@@ -1,268 +0,0 @@
-/*
- * Copyright (c) 2004 Apple Computer, Inc.
- * Copyright (c) 2006 Robert N. M. Watson
- * All rights reserved.
- *
- * Redistribution and use in source and binary forms, with or without
- * modification, are permitted provided that the following conditions
- * are met:
- * 1. Redistributions of source code must retain the above copyright
- * notice, this list of conditions and the following disclaimer.
- * 2. Redistributions in binary form must reproduce the above copyright
- * notice, this list of conditions and the following disclaimer in the
- * documentation and/or other materials provided with the distribution.
- * 3. Neither the name of Apple Computer, Inc. ("Apple") nor the names of
- * its contributors may be used to endorse or promote products derived
- * from this software without specific prior written permission.
- *
- * THIS SOFTWARE IS PROVIDED BY APPLE AND ITS CONTRIBUTORS "AS IS" AND
- * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
- * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
- * ARE DISCLAIMED. IN NO EVENT SHALL APPLE OR ITS CONTRIBUTORS BE LIABLE FOR
- * ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
- * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
- * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
- * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
- * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
- * IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
- * POSSIBILITY OF SUCH DAMAGE.
- *
- * $P4: //depot/projects/trustedbsd/openbsm/libbsm/bsm_user.c#15 $
- */
-
-#include <bsm/libbsm.h>
-
-#include <string.h>
-#include <pthread.h>
-#include <stdio.h>
-#include <stdlib.h>
-
-/*
- * Parse the contents of the audit_user file into au_user_ent structures.
- */
-
-static FILE *fp = NULL;
-static char linestr[AU_LINE_MAX];
-static const char *user_delim = ":";
-
-static pthread_mutex_t mutex = PTHREAD_MUTEX_INITIALIZER;
-
-/*
- * Parse one line from the audit_user file into the au_user_ent structure.
- */
-static struct au_user_ent *
-userfromstr(char *str, struct au_user_ent *u)
-{
- char *username, *always, *never;
- char *last;
-
- username = strtok_r(str, user_delim, &last);
- always = strtok_r(NULL, user_delim, &last);
- never = strtok_r(NULL, user_delim, &last);
-
- if ((username == NULL) || (always == NULL) || (never == NULL))
- return (NULL);
-
- if (strlen(username) >= AU_USER_NAME_MAX)
- return (NULL);
-
- strcpy(u->au_name, username);
- if (getauditflagsbin(always, &(u->au_always)) == -1)
- return (NULL);
-
- if (getauditflagsbin(never, &(u->au_never)) == -1)
- return (NULL);
-
- return (u);
-}
-
-/*
- * Rewind to beginning of the file
- */
-static void
-setauuser_locked(void)
-{
-
- if (fp != NULL)
- fseek(fp, 0, SEEK_SET);
-}
-
-void
-setauuser(void)
-{
-
- pthread_mutex_lock(&mutex);
- setauuser_locked();
- pthread_mutex_unlock(&mutex);
-}
-
-/*
- * Close the file descriptor
- */
-void
-endauuser(void)
-{
-
- pthread_mutex_lock(&mutex);
- if (fp != NULL) {
- fclose(fp);
- fp = NULL;
- }
- pthread_mutex_unlock(&mutex);
-}
-
-/*
- * Enumerate the au_user_ent structures from the file
- */
-static struct au_user_ent *
-getauuserent_r_locked(struct au_user_ent *u)
-{
- char *nl;
-
- if ((fp == NULL) && ((fp = fopen(AUDIT_USER_FILE, "r")) == NULL))
- return (NULL);
-
- while (1) {
- if (fgets(linestr, AU_LINE_MAX, fp) == NULL)
- return (NULL);
-
- /* Remove new lines. */
- if ((nl = strrchr(linestr, '\n')) != NULL)
- *nl = '\0';
-
- /* Skip comments. */
- if (linestr[0] == '#')
- continue;
-
- /* Get the next structure. */
- if (userfromstr(linestr, u) == NULL)
- return (NULL);
- break;
- }
-
- return (u);
-}
-
-struct au_user_ent *
-getauuserent_r(struct au_user_ent *u)
-{
- struct au_user_ent *up;
-
- pthread_mutex_lock(&mutex);
- up = getauuserent_r_locked(u);
- pthread_mutex_unlock(&mutex);
- return (up);
-}
-
-struct au_user_ent *
-getauuserent(void)
-{
- static char user_ent_name[AU_USER_NAME_MAX];
- static struct au_user_ent u;
-
- bzero(&u, sizeof(u));
- bzero(user_ent_name, sizeof(user_ent_name));
- u.au_name = user_ent_name;
-
- return (getauuserent_r(&u));
-}
-
-/*
- * Find a au_user_ent structure matching the given user name.
- */
-struct au_user_ent *
-getauusernam_r(struct au_user_ent *u, const char *name)
-{
- struct au_user_ent *up;
-
- if (name == NULL)
- return (NULL);
-
- pthread_mutex_lock(&mutex);
-
- setauuser_locked();
- while ((up = getauuserent_r_locked(u)) != NULL) {
- if (strcmp(name, u->au_name) == 0) {
- pthread_mutex_unlock(&mutex);
- return (u);
- }
- }
-
- pthread_mutex_unlock(&mutex);
- return (NULL);
-
-}
-
-struct au_user_ent *
-getauusernam(const char *name)
-{
- static char user_ent_name[AU_USER_NAME_MAX];
- static struct au_user_ent u;
-
- bzero(&u, sizeof(u));
- bzero(user_ent_name, sizeof(user_ent_name));
- u.au_name = user_ent_name;
-
- return (getauusernam_r(&u, name));
-}
-
-/*
- * Read the default system wide audit classes from audit_control, combine with
- * the per-user audit class and update the binary preselection mask.
- */
-int
-au_user_mask(char *username, au_mask_t *mask_p)
-{
- char auditstring[MAX_AUDITSTRING_LEN + 1];
- char user_ent_name[AU_USER_NAME_MAX];
- struct au_user_ent u, *up;
-
- bzero(&u, sizeof(u));
- bzero(user_ent_name, sizeof(user_ent_name));
- u.au_name = user_ent_name;
-
- /* Get user mask. */
- if ((up = getauusernam_r(&u, username)) != NULL) {
- if (-1 == getfauditflags(&up->au_always, &up->au_never,
- mask_p))
- return (-1);
- return (0);
- }
-
- /* Read the default system mask. */
- if (getacflg(auditstring, MAX_AUDITSTRING_LEN) == 0) {
- if (-1 == getauditflagsbin(auditstring, mask_p))
- return (-1);
- return (0);
- }
-
- /* No masks defined. */
- return (-1);
-}
-
-/*
- * Generate the process audit state by combining the audit masks passed as
- * parameters with the system audit masks.
- */
-int
-getfauditflags(au_mask_t *usremask, au_mask_t *usrdmask, au_mask_t *lastmask)
-{
- char auditstring[MAX_AUDITSTRING_LEN + 1];
-
- if ((usremask == NULL) || (usrdmask == NULL) || (lastmask == NULL))
- return (-1);
-
- lastmask->am_success = 0;
- lastmask->am_failure = 0;
-
- /* Get the system mask. */
- if (getacflg(auditstring, MAX_AUDITSTRING_LEN) == 0) {
- if (getauditflagsbin(auditstring, lastmask) != 0)
- return (-1);
- }
-
- ADDMASK(lastmask, usremask);
- SUBMASK(lastmask, usrdmask);
-
- return (0);
-}
OpenPOWER on IntegriCloud