summaryrefslogtreecommitdiffstats
path: root/kdmlib/kdmtsak.h
blob: 171bece0b55339c3d280c915dc740dd0db6da467 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
/*
   This file is part of the TDE project
   Copyright (C) 2011 Timothy Pearson <kb9vqf@pearsoncomputing.net>

   This library is free software; you can redistribute it and/or
   modify it under the terms of the GNU Library General Public
   License as published by the Free Software Foundation; either
   version 2 of the License, or (at your option) any later version.

   This library is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
   Library General Public License for more details.

   You should have received a copy of the GNU Library General Public License
   along with this library; see the file COPYING.LIB.  If not, write to
   the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor,
   Boston, MA 02110-1301, USA.
*/

#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <unistd.h>
#include <errno.h>
#include <fcntl.h>
#include <limits.h>
#include <dirent.h>
#include <sys/types.h>
#include <sys/stat.h>
#include <sys/select.h>
#include <sys/time.h>
#include <termios.h>
#include <signal.h>

#include <tqstring.h>

#include "config.h"

#define FIFO_FILE "/tmp/ksocket-global/tsak"

// #define DEBUG

inline int tde_sak_verify_calling_process()
{
	int mPipe_fd;
	char readbuf[128];
	int numread;
	bool authorized = false;

	pid_t parentproc = getppid();
#ifdef DEBUG
	printf("Parent pid is: %d\n\r", parentproc);
#endif

	char parentexecutable[8192];
	TQString procparent = TQString("/proc/%1/exe").arg(parentproc);
	int chars = readlink(procparent.ascii(), parentexecutable, sizeof(parentexecutable));
	parentexecutable[chars] = 0;
	parentexecutable[8191] = 0;
	procparent = parentexecutable;
#ifdef DEBUG
	printf("Parent executable name and full path is: %s\n\r", procparent.ascii());
#endif

	TQString tdeBinaryPath = TQString(KDE_BINDIR "/");
#ifdef DEBUG
	printf("The TDE binary path is: %s\n\r", tdeBinaryPath.ascii());
#endif

	if (!procparent.startsWith(tdeBinaryPath)) {
		printf("Unauthorized path detected in calling process\n\r");
		return 2;
	}
	else {
		procparent = procparent.mid(tdeBinaryPath.length());
#ifdef DEBUG
		printf("Parent executable name is: %s\n\r", procparent.ascii());
#endif
		if ((procparent == "kdesktop") || (procparent == "kdesktop_lock") || (procparent == "kdm")) {
			authorized = true;
		}
		else if (procparent == "kdeinit") {
			printf("kdeinit detected\n\r");
			// A bit more digging is needed to see if this is an authorized process or not
			// Get the kdeinit command
			char kdeinitcmdline[8192];
			FILE *fp = fopen(TQString("/proc/%1/cmdline").arg(parentproc).ascii(),"r");
			if (fp != NULL) {
				if (fgets (kdeinitcmdline, 8192, fp) != NULL)
				fclose (fp);
			}
			kdeinitcmdline[8191] = 0;
			TQString kdeinitCommand = kdeinitcmdline;

			// Also get the environment, specifically the path
			TQString kdeinitEnvironment;
			char kdeinitenviron[8192];
			fp = fopen(TQString("/proc/%1/environ").arg(parentproc).ascii(),"r");
			if (fp != NULL) {
				int c;
				int pos = 0;
				do {
					c = fgetc(fp);
					kdeinitenviron[pos] = c;
					pos++;
					if (c == 0) {
						TQString curEnvLine = kdeinitenviron;
						if (curEnvLine.startsWith("PATH=")) {
							kdeinitEnvironment = curEnvLine.mid(5);
						}
						pos = 0;
					}
				} while ((c != EOF) && (pos < 8192));
				fclose (fp);
			}
			kdeinitenviron[8191] = 0;

#ifdef DEBUG
			printf("Called executable name is: %s\n\r", kdeinitCommand.ascii());
			printf("Environment is: %s\n\r", kdeinitEnvironment.ascii());
#endif

			if ((kdeinitCommand == "kdesktop [kdeinit]") && (kdeinitEnvironment.startsWith(KDE_BINDIR))) {
				authorized = true;
			}
			else {
				return 4;
			}
		}
		else {
			printf("Unauthorized calling process detected\n\r");
			return 3;
		}

		if (authorized == true) {
			// OK, the calling process is authorized to retrieve SAK data
			// First, flush the buffer
			mPipe_fd = open(FIFO_FILE, O_RDWR | O_NONBLOCK);
			numread = 1;
			while (numread > 0) {
				numread = read(mPipe_fd, readbuf, 128);
			}
			// Now wait for SAK press
			mPipe_fd = open(FIFO_FILE, O_RDWR);
			if (mPipe_fd > -1) {
				numread = read(mPipe_fd, readbuf, 128);
				readbuf[numread] = 0;
				readbuf[127] = 0;
				close(mPipe_fd);
				if (strcmp(readbuf, "SAK\n\r") == 0) {
					return 0;
				}
				else {
					return 1;
				}
			}
			return 6;
		}
	}

	return 5;
}

#undef FIFO_FILE
#undef DEBUG