1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
|
/* Add authentication to selected processes
Copyright (C) 1997, 1998 Free Software Foundation, Inc.
Written by Miles Bader <miles@gnu.ai.mit.edu>
This program is free software; you can redistribute it and/or
modify it under the terms of the GNU General Public License as
published by the Free Software Foundation; either version 2, or (at
your option) any later version.
This program is distributed in the hope that it will be useful, but
WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. */
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <unistd.h>
#include <argp.h>
#include <idvec.h>
#include <ugids.h>
#include <error.h>
#include <hurd.h>
#include <version.h>
#include "frobauth.h"
const char *argp_program_version = STANDARD_HURD_VERSION (addauth);
static struct argp_child child_argps[] = {{ &frobauth_ea_argp }, { 0 }};
static char doc[] =
"Add new user/group ids to the authentication of selected processes";
extern error_t
get_nonsugid_ids (struct idvec *uids, struct idvec *gids);
int
main (int argc, char *argv[])
{
int i;
error_t err;
auth_t auth;
char *ids_rep = 0;
process_t proc_server = getproc();
struct frobauth frobauth = FROBAUTH_INIT;
struct idvec have_uids = IDVEC_INIT, have_gids = IDVEC_INIT;
struct argp argp = { 0, 0, 0, doc, child_argps };
frobauth.require_ids = 1;
/* Parse our command line. This shouldn't ever return an error. */
argp_parse (&argp, argc, argv, 0, 0, &frobauth);
/* See what the invoking user is authorized to do. */
err = get_nonsugid_ids (&have_uids, &have_gids);
if (err)
error (52, err, "Cannot get invoking authentication");
/* Check passwords. */
err = ugids_verify_make_auth (&frobauth.ugids, &have_uids, &have_gids, 0, 0,
0, 0, &auth);
if (err == EACCES)
error (15, 0, "Invalid password");
else if (err)
error (16, err, "Authentication failure");
if (frobauth.verbose)
/* A string showing which ids we will add. */
ids_rep = ugids_rep (&frobauth.ugids, 1, 1, 0, 0, 0);
/* Add the new authentication to each process. */
for (i = 0; i < frobauth.num_pids; i++)
{
mach_port_t msgport;
pid_t pid = frobauth.pids[i];
error_t err = proc_getmsgport (proc_server, pid, &msgport);
if (err)
error (0, err, "%d: Cannot get message port", pid);
else
{
if (! frobauth.dry_run)
err = msg_add_auth (msgport, auth);
if (err)
error (0, err, "%d: Cannot add authentication", pid);
else if (frobauth.verbose)
printf ("%d: Added %s\n", pid, ids_rep);
mach_port_deallocate (mach_task_self (), msgport);
}
}
return 0;
}
|