153a5a1b3Sopenharmony_ci/*** 253a5a1b3Sopenharmony_ci This file is part of PulseAudio. 353a5a1b3Sopenharmony_ci 453a5a1b3Sopenharmony_ci Copyright 2004-2006 Lennart Poettering 553a5a1b3Sopenharmony_ci Copyright 2006 Pierre Ossman <ossman@cendio.se> for Cendio AB 653a5a1b3Sopenharmony_ci 753a5a1b3Sopenharmony_ci PulseAudio is free software; you can redistribute it and/or modify 853a5a1b3Sopenharmony_ci it under the terms of the GNU Lesser General Public License as 953a5a1b3Sopenharmony_ci published by the Free Software Foundation; either version 2.1 of the 1053a5a1b3Sopenharmony_ci License, or (at your option) any later version. 1153a5a1b3Sopenharmony_ci 1253a5a1b3Sopenharmony_ci PulseAudio is distributed in the hope that it will be useful, but 1353a5a1b3Sopenharmony_ci WITHOUT ANY WARRANTY; without even the implied warranty of 1453a5a1b3Sopenharmony_ci MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU 1553a5a1b3Sopenharmony_ci Lesser General Public License for more details. 1653a5a1b3Sopenharmony_ci 1753a5a1b3Sopenharmony_ci You should have received a copy of the GNU Lesser General Public 1853a5a1b3Sopenharmony_ci License along with PulseAudio; if not, see <http://www.gnu.org/licenses/>. 1953a5a1b3Sopenharmony_ci***/ 2053a5a1b3Sopenharmony_ci 2153a5a1b3Sopenharmony_ci#ifdef HAVE_CONFIG_H 2253a5a1b3Sopenharmony_ci#include <config.h> 2353a5a1b3Sopenharmony_ci#endif 2453a5a1b3Sopenharmony_ci 2553a5a1b3Sopenharmony_ci#include <unistd.h> 2653a5a1b3Sopenharmony_ci#include <fcntl.h> 2753a5a1b3Sopenharmony_ci#include <string.h> 2853a5a1b3Sopenharmony_ci#include <errno.h> 2953a5a1b3Sopenharmony_ci#include <stdio.h> 3053a5a1b3Sopenharmony_ci#include <stdlib.h> 3153a5a1b3Sopenharmony_ci#include <sys/stat.h> 3253a5a1b3Sopenharmony_ci 3353a5a1b3Sopenharmony_ci#include <pulse/util.h> 3453a5a1b3Sopenharmony_ci#include <pulse/xmalloc.h> 3553a5a1b3Sopenharmony_ci#include <pulsecore/core-error.h> 3653a5a1b3Sopenharmony_ci#include <pulsecore/core-util.h> 3753a5a1b3Sopenharmony_ci#include <pulsecore/log.h> 3853a5a1b3Sopenharmony_ci#include <pulsecore/random.h> 3953a5a1b3Sopenharmony_ci#include <pulsecore/macro.h> 4053a5a1b3Sopenharmony_ci 4153a5a1b3Sopenharmony_ci#include "authkey.h" 4253a5a1b3Sopenharmony_ci 4353a5a1b3Sopenharmony_ci/* Generate a new authentication key, store it in file fd and return it in *data */ 4453a5a1b3Sopenharmony_cistatic int generate(int fd, void *ret_data, size_t length) { 4553a5a1b3Sopenharmony_ci ssize_t r; 4653a5a1b3Sopenharmony_ci 4753a5a1b3Sopenharmony_ci pa_assert(fd >= 0); 4853a5a1b3Sopenharmony_ci pa_assert(ret_data); 4953a5a1b3Sopenharmony_ci pa_assert(length > 0); 5053a5a1b3Sopenharmony_ci 5153a5a1b3Sopenharmony_ci pa_random(ret_data, length); 5253a5a1b3Sopenharmony_ci 5353a5a1b3Sopenharmony_ci lseek(fd, (off_t) 0, SEEK_SET); 5453a5a1b3Sopenharmony_ci if (ftruncate(fd, (off_t) 0) < 0) { 5553a5a1b3Sopenharmony_ci pa_log("Failed to truncate cookie file: %s", pa_cstrerror(errno)); 5653a5a1b3Sopenharmony_ci return -1; 5753a5a1b3Sopenharmony_ci } 5853a5a1b3Sopenharmony_ci 5953a5a1b3Sopenharmony_ci if ((r = pa_loop_write(fd, ret_data, length, NULL)) < 0 || (size_t) r != length) { 6053a5a1b3Sopenharmony_ci pa_log("Failed to write cookie file: %s", pa_cstrerror(errno)); 6153a5a1b3Sopenharmony_ci return -1; 6253a5a1b3Sopenharmony_ci } 6353a5a1b3Sopenharmony_ci 6453a5a1b3Sopenharmony_ci return 0; 6553a5a1b3Sopenharmony_ci} 6653a5a1b3Sopenharmony_ci 6753a5a1b3Sopenharmony_ci#ifndef O_BINARY 6853a5a1b3Sopenharmony_ci#define O_BINARY 0 6953a5a1b3Sopenharmony_ci#endif 7053a5a1b3Sopenharmony_ci 7153a5a1b3Sopenharmony_ci/* Load an authentication cookie from file fn and store it in data. If 7253a5a1b3Sopenharmony_ci * the cookie file doesn't exist, create it */ 7353a5a1b3Sopenharmony_cistatic int load(const char *fn, bool create, void *data, size_t length) { 7453a5a1b3Sopenharmony_ci int fd = -1; 7553a5a1b3Sopenharmony_ci int writable = 1; 7653a5a1b3Sopenharmony_ci int unlock = 0, ret = -1; 7753a5a1b3Sopenharmony_ci ssize_t r; 7853a5a1b3Sopenharmony_ci 7953a5a1b3Sopenharmony_ci pa_assert(fn); 8053a5a1b3Sopenharmony_ci pa_assert(data); 8153a5a1b3Sopenharmony_ci pa_assert(length > 0); 8253a5a1b3Sopenharmony_ci 8353a5a1b3Sopenharmony_ci if (create) 8453a5a1b3Sopenharmony_ci pa_make_secure_parent_dir(fn, pa_in_system_mode() ? 0755U : 0700U, -1, -1, false); 8553a5a1b3Sopenharmony_ci 8653a5a1b3Sopenharmony_ci if ((fd = pa_open_cloexec(fn, (create ? O_RDWR|O_CREAT : O_RDONLY)|O_BINARY, S_IRUSR|S_IWUSR)) < 0) { 8753a5a1b3Sopenharmony_ci 8853a5a1b3Sopenharmony_ci if (!create || errno != EACCES || (fd = open(fn, O_RDONLY|O_BINARY)) < 0) { 8953a5a1b3Sopenharmony_ci pa_log_warn("Failed to open cookie file '%s': %s", fn, pa_cstrerror(errno)); 9053a5a1b3Sopenharmony_ci goto finish; 9153a5a1b3Sopenharmony_ci } else 9253a5a1b3Sopenharmony_ci writable = 0; 9353a5a1b3Sopenharmony_ci } 9453a5a1b3Sopenharmony_ci 9553a5a1b3Sopenharmony_ci unlock = pa_lock_fd(fd, 1) >= 0; 9653a5a1b3Sopenharmony_ci 9753a5a1b3Sopenharmony_ci if ((r = pa_loop_read(fd, data, length, NULL)) < 0) { 9853a5a1b3Sopenharmony_ci pa_log("Failed to read cookie file '%s': %s", fn, pa_cstrerror(errno)); 9953a5a1b3Sopenharmony_ci goto finish; 10053a5a1b3Sopenharmony_ci } 10153a5a1b3Sopenharmony_ci 10253a5a1b3Sopenharmony_ci if ((size_t) r != length) { 10353a5a1b3Sopenharmony_ci pa_log_debug("Got %d bytes from cookie file '%s', expected %d", (int) r, fn, (int) length); 10453a5a1b3Sopenharmony_ci 10553a5a1b3Sopenharmony_ci if (!writable) { 10653a5a1b3Sopenharmony_ci pa_log_warn("Unable to write cookie to read-only file"); 10753a5a1b3Sopenharmony_ci goto finish; 10853a5a1b3Sopenharmony_ci } 10953a5a1b3Sopenharmony_ci 11053a5a1b3Sopenharmony_ci if (generate(fd, data, length) < 0) 11153a5a1b3Sopenharmony_ci goto finish; 11253a5a1b3Sopenharmony_ci } 11353a5a1b3Sopenharmony_ci 11453a5a1b3Sopenharmony_ci ret = 0; 11553a5a1b3Sopenharmony_ci 11653a5a1b3Sopenharmony_cifinish: 11753a5a1b3Sopenharmony_ci 11853a5a1b3Sopenharmony_ci if (fd >= 0) { 11953a5a1b3Sopenharmony_ci 12053a5a1b3Sopenharmony_ci if (unlock) 12153a5a1b3Sopenharmony_ci pa_lock_fd(fd, 0); 12253a5a1b3Sopenharmony_ci 12353a5a1b3Sopenharmony_ci if (pa_close(fd) < 0) { 12453a5a1b3Sopenharmony_ci pa_log_warn("Failed to close cookie file: %s", pa_cstrerror(errno)); 12553a5a1b3Sopenharmony_ci ret = -1; 12653a5a1b3Sopenharmony_ci } 12753a5a1b3Sopenharmony_ci } 12853a5a1b3Sopenharmony_ci 12953a5a1b3Sopenharmony_ci return ret; 13053a5a1b3Sopenharmony_ci} 13153a5a1b3Sopenharmony_ci 13253a5a1b3Sopenharmony_ci/* If the specified file path starts with / return it, otherwise 13353a5a1b3Sopenharmony_ci * return path prepended with the config home directory. */ 13453a5a1b3Sopenharmony_cistatic int normalize_path(const char *fn, char **_r) { 13553a5a1b3Sopenharmony_ci pa_assert(fn); 13653a5a1b3Sopenharmony_ci pa_assert(_r); 13753a5a1b3Sopenharmony_ci 13853a5a1b3Sopenharmony_ci if (!pa_is_path_absolute(fn)) 13953a5a1b3Sopenharmony_ci return pa_append_to_config_home_dir(fn, _r); 14053a5a1b3Sopenharmony_ci 14153a5a1b3Sopenharmony_ci *_r = pa_xstrdup(fn); 14253a5a1b3Sopenharmony_ci return 0; 14353a5a1b3Sopenharmony_ci} 14453a5a1b3Sopenharmony_ci 14553a5a1b3Sopenharmony_ciint pa_authkey_load(const char *fn, bool create, void *data, size_t length) { 14653a5a1b3Sopenharmony_ci char *p; 14753a5a1b3Sopenharmony_ci int ret; 14853a5a1b3Sopenharmony_ci 14953a5a1b3Sopenharmony_ci pa_assert(fn); 15053a5a1b3Sopenharmony_ci pa_assert(data); 15153a5a1b3Sopenharmony_ci pa_assert(length > 0); 15253a5a1b3Sopenharmony_ci 15353a5a1b3Sopenharmony_ci if ((ret = normalize_path(fn, &p)) < 0) 15453a5a1b3Sopenharmony_ci return ret; 15553a5a1b3Sopenharmony_ci 15653a5a1b3Sopenharmony_ci if ((ret = load(p, create, data, length)) < 0) 15753a5a1b3Sopenharmony_ci pa_log_warn("Failed to load authentication key '%s': %s", p, (ret < 0) ? pa_cstrerror(errno) : "File corrupt"); 15853a5a1b3Sopenharmony_ci 15953a5a1b3Sopenharmony_ci pa_xfree(p); 16053a5a1b3Sopenharmony_ci 16153a5a1b3Sopenharmony_ci return ret; 16253a5a1b3Sopenharmony_ci} 16353a5a1b3Sopenharmony_ci 16453a5a1b3Sopenharmony_ci/* Store the specified cookie in the specified cookie file */ 16553a5a1b3Sopenharmony_ciint pa_authkey_save(const char *fn, const void *data, size_t length) { 16653a5a1b3Sopenharmony_ci int fd = -1; 16753a5a1b3Sopenharmony_ci int unlock = 0, ret; 16853a5a1b3Sopenharmony_ci ssize_t r; 16953a5a1b3Sopenharmony_ci char *p; 17053a5a1b3Sopenharmony_ci 17153a5a1b3Sopenharmony_ci pa_assert(fn); 17253a5a1b3Sopenharmony_ci pa_assert(data); 17353a5a1b3Sopenharmony_ci pa_assert(length > 0); 17453a5a1b3Sopenharmony_ci 17553a5a1b3Sopenharmony_ci if ((ret = normalize_path(fn, &p)) < 0) 17653a5a1b3Sopenharmony_ci return ret; 17753a5a1b3Sopenharmony_ci 17853a5a1b3Sopenharmony_ci if ((fd = pa_open_cloexec(p, O_RDWR|O_CREAT, S_IRUSR|S_IWUSR)) < 0) { 17953a5a1b3Sopenharmony_ci pa_log_warn("Failed to open cookie file '%s': %s", fn, pa_cstrerror(errno)); 18053a5a1b3Sopenharmony_ci ret = -1; 18153a5a1b3Sopenharmony_ci goto finish; 18253a5a1b3Sopenharmony_ci } 18353a5a1b3Sopenharmony_ci 18453a5a1b3Sopenharmony_ci unlock = pa_lock_fd(fd, 1) >= 0; 18553a5a1b3Sopenharmony_ci 18653a5a1b3Sopenharmony_ci if ((r = pa_loop_write(fd, data, length, NULL)) < 0 || (size_t) r != length) { 18753a5a1b3Sopenharmony_ci pa_log("Failed to read cookie file '%s': %s", fn, pa_cstrerror(errno)); 18853a5a1b3Sopenharmony_ci ret = -1; 18953a5a1b3Sopenharmony_ci goto finish; 19053a5a1b3Sopenharmony_ci } 19153a5a1b3Sopenharmony_ci 19253a5a1b3Sopenharmony_cifinish: 19353a5a1b3Sopenharmony_ci 19453a5a1b3Sopenharmony_ci if (fd >= 0) { 19553a5a1b3Sopenharmony_ci 19653a5a1b3Sopenharmony_ci if (unlock) 19753a5a1b3Sopenharmony_ci pa_lock_fd(fd, 0); 19853a5a1b3Sopenharmony_ci 19953a5a1b3Sopenharmony_ci if (pa_close(fd) < 0) { 20053a5a1b3Sopenharmony_ci pa_log_warn("Failed to close cookie file: %s", pa_cstrerror(errno)); 20153a5a1b3Sopenharmony_ci ret = -1; 20253a5a1b3Sopenharmony_ci } 20353a5a1b3Sopenharmony_ci } 20453a5a1b3Sopenharmony_ci 20553a5a1b3Sopenharmony_ci pa_xfree(p); 20653a5a1b3Sopenharmony_ci 20753a5a1b3Sopenharmony_ci return ret; 20853a5a1b3Sopenharmony_ci} 209