]> git.saurik.com Git - apple/ipsec.git/blob - ipsec-tools/racoon/safefile.c
ipsec-34.tar.gz
[apple/ipsec.git] / ipsec-tools / racoon / safefile.c
1 /* $KAME: safefile.c,v 1.5 2001/03/05 19:54:06 thorpej Exp $ */
2
3 /*
4 * Copyright (C) 2000 WIDE Project.
5 * All rights reserved.
6 *
7 * Redistribution and use in source and binary forms, with or without
8 * modification, are permitted provided that the following conditions
9 * are met:
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in the
14 * documentation and/or other materials provided with the distribution.
15 * 3. Neither the name of the project nor the names of its contributors
16 * may be used to endorse or promote products derived from this software
17 * without specific prior written permission.
18 *
19 * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
20 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
21 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
22 * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
23 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
24 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
25 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
26 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
27 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
28 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
29 * SUCH DAMAGE.
30 */
31
32 #include "config.h"
33
34 #include <sys/types.h>
35 #include <sys/stat.h>
36 #include <sys/socket.h>
37 #include <netinet/in.h>
38 #include <unistd.h>
39
40 #include "plog.h"
41 #include "debug.h"
42 #include "misc.h"
43 #include "safefile.h"
44
45 int
46 safefile(path, secret)
47 const char *path;
48 int secret;
49 {
50 struct stat s;
51 uid_t me;
52
53 /* no setuid */
54 if (getuid() != geteuid()) {
55 plog(LLV_ERROR, LOCATION, NULL,
56 "setuid'ed execution not allowed\n");
57 return -1;
58 }
59
60 if (stat(path, &s) != 0)
61 return -1;
62
63 /* the file must be owned by the running uid */
64 me = getuid();
65 if (s.st_uid != me) {
66 plog(LLV_ERROR, LOCATION, NULL,
67 "%s has invalid owner uid\n", path);
68 return -1;
69 }
70
71 switch (s.st_mode & S_IFMT) {
72 case S_IFREG:
73 break;
74 default:
75 plog(LLV_ERROR, LOCATION, NULL,
76 "%s is an invalid file type 0x%x\n", path,
77 (s.st_mode & S_IFMT));
78 return -1;
79 }
80
81 /* secret file should not be read by others */
82 if (secret) {
83 if ((s.st_mode & S_IRWXG) != 0 || (s.st_mode & S_IRWXO) != 0) {
84 plog(LLV_ERROR, LOCATION, NULL,
85 "%s has weak file permission\n", path);
86 return -1;
87 }
88 }
89
90 return 0;
91 }