File: env_info.c

package info (click to toggle)
xsecurelock 1.9.0-3
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid
  • size: 1,164 kB
  • sloc: ansic: 4,522; sh: 1,645; makefile: 263
file content (56 lines) | stat: -rw-r--r-- 1,550 bytes parent folder | download | duplicates (3)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
#include "env_info.h"

#include <pwd.h>     // for getpwuid_r, passwd
#include <stdlib.h>  // for rand, free, mblen, size_t, exit
#include <string.h>
#include <unistd.h>  // for gethostname, getuid, read, sysconf

#include "logging.h"
#include "mlock_page.h"
#include "util.h"

int GetHostName(char* hostname_buf, size_t hostname_buflen) {
  if (gethostname(hostname_buf, hostname_buflen)) {
    LogErrno("gethostname");
    return 0;
  }
  hostname_buf[hostname_buflen - 1] = 0;
  return 1;
}

int GetUserName(char* username_buf, size_t username_buflen) {
  struct passwd* pwd = NULL;
  struct passwd pwd_storage;
  char* pwd_buf;
  long pwd_bufsize = sysconf(_SC_GETPW_R_SIZE_MAX);
  if (pwd_bufsize < 0) {
    pwd_bufsize = 1 << 20;
  }
  pwd_buf = malloc((size_t)pwd_bufsize);
  if (!pwd_buf) {
    LogErrno("malloc(pwd_bufsize)");
    return 0;
  }
  if (MLOCK_PAGE(pwd_buf, pwd_bufsize) < 0) {
    // We continue anyway, as very likely getpwuid_r won't retrieve a password
    // hash on modern systems.
    LogErrno("mlock");
  }
  getpwuid_r(getuid(), &pwd_storage, pwd_buf, (size_t)pwd_bufsize, &pwd);
  if (!pwd) {
    LogErrno("getpwuid_r");
    free(pwd_buf);
    return 0;
  }
  if (strlen(pwd->pw_name) >= username_buflen) {
    Log("Username too long: got %d, want < %d", (int)strlen(pwd->pw_name),
        (int)username_buflen);
    free(pwd_buf);
    return 0;
  }
  strncpy(username_buf, pwd->pw_name, username_buflen);
  username_buf[username_buflen - 1] = 0;
  explicit_bzero(pwd_buf, pwd_bufsize);
  free(pwd_buf);
  return 1;
}