getsocketpeer.c 2.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136
  1. /** BEGIN COPYRIGHT BLOCK
  2. * Copyright (C) 2007 Red Hat, Inc.
  3. * All rights reserved.
  4. *
  5. * License: GPL (version 3 or any later version).
  6. * See LICENSE for details.
  7. * END COPYRIGHT BLOCK **/
  8. #ifdef HAVE_CONFIG_H
  9. # include <config.h>
  10. #endif
  11. #if defined(ENABLE_LDAPI)
  12. #if defined(HAVE_GETPEERUCRED)
  13. #include <ucred.h>
  14. #endif
  15. #include <sys/types.h>
  16. #include <unistd.h>
  17. #include <sys/socket.h>
  18. /* nspr secrets - we need to do an end run around nspr
  19. in order to do things it does not support
  20. */
  21. #include <private/pprio.h>
  22. int slapd_get_socket_peer(PRFileDesc *nspr_fd, uid_t *uid, gid_t *gid)
  23. {
  24. int ret = -1;
  25. int fd = PR_FileDesc2NativeHandle(nspr_fd); /* naughty private func */
  26. #if defined(SO_PEERCRED) /* linux */
  27. struct ucred creds;
  28. socklen_t len = sizeof(creds);
  29. if(0 == getsockopt(fd, SOL_SOCKET, SO_PEERCRED, (void*)&creds, &len ))
  30. {
  31. if(sizeof(creds) == len)
  32. {
  33. if(uid)
  34. *uid = creds.uid;
  35. if(gid)
  36. *gid = creds.gid;
  37. ret = 0;
  38. }
  39. }
  40. #elif defined(HAVE_GETPEERUCRED) /* solaris10 */
  41. ucred_t *creds = 0;
  42. if(0 == getpeerucred(fd, &creds))
  43. {
  44. if(uid)
  45. {
  46. *uid = ucred_getruid(creds);
  47. if(-1 != uid)
  48. ret = 0;
  49. }
  50. if(gid)
  51. {
  52. *gid = ucred_getrgid(creds);
  53. if(-1 == *gid)
  54. ret = -1;
  55. else
  56. ret = 0;
  57. }
  58. ucred_free(creds);
  59. }
  60. #elif defined(HAVE_GETPEEREID) /* osx / some BSDs */
  61. if(0 == getpeereid(fd, &uid, &gid))
  62. ret = 0;
  63. #else /* hpux / Solaris9 / some BSDs - file descriptor cooperative auth */
  64. #include <string.h>
  65. #include <sys/types.h>
  66. #include <sys/stat.h>
  67. #include <errno.h>
  68. struct msghdr msg;
  69. struct iovec iov;
  70. char dummy[8];
  71. int pass_sd[2];
  72. int rc = 0;
  73. unsigned int retrycnt = 0xffffffff; /* safety net */
  74. int myerrno = 0;
  75. memset((void *)&msg, 0, sizeof(msg));
  76. iov.iov_base = dummy;
  77. iov.iov_len = sizeof(dummy);
  78. msg.msg_iov = &iov;
  79. msg.msg_iovlen = 1;
  80. msg.msg_accrights = (caddr_t)&pass_sd;
  81. msg.msg_accrightslen = sizeof(pass_sd); /* Initialize it with 8 bytes.
  82. If recvmsg is successful,
  83. 4 is supposed to be returned. */
  84. /*
  85. Since PR_SockOpt_Nonblocking is set to the socket,
  86. recvmsg returns immediately if no data is waiting to be received.
  87. If recvmsg returns an error and EGAIN (== EWOULDBLOCK) is set to errno,
  88. we should retry some time.
  89. */
  90. while ((rc = recvmsg(fd, &msg, MSG_PEEK)) < 0 && (EAGAIN == (myerrno = errno)) && retrycnt-- >= 0)
  91. ;
  92. if (rc >= 0 && msg.msg_accrightslen == sizeof(int))
  93. {
  94. struct stat st;
  95. ret = fstat(pass_sd[0], &st);
  96. if(0 == ret && S_ISFIFO(st.st_mode) &&
  97. 0 == (st.st_mode & (S_IRWXG|S_IRWXO)))
  98. {
  99. if(uid)
  100. *uid = st.st_uid;
  101. if(gid)
  102. *gid = st.st_gid;
  103. } else {
  104. ret = -1;
  105. }
  106. }
  107. #endif
  108. return ret;
  109. }
  110. #endif /* ENABLE_LDAPI */