4 This file is part of PulseAudio.
6 PulseAudio is free software; you can redistribute it and/or modify
7 it under the terms of the GNU Lesser General Public License as
8 published by the Free Software Foundation; either version 2.1 of the
9 License, or (at your option) any later version.
11 PulseAudio is distributed in the hope that it will be useful, but
12 WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 Lesser General Public License for more details.
16 You should have received a copy of the GNU Lesser General Public
17 License along with PulseAudio; if not, write to the Free Software
18 Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307
38 #include <pulse/util.h>
39 #include <pulsecore/core-error.h>
40 #include <pulsecore/core-util.h>
41 #include <pulsecore/log.h>
42 #include <pulsecore/random.h>
46 /* Generate a new authorization key, store it in file fd and return it in *data */
47 static int generate(int fd
, void *ret_data
, size_t length
) {
49 assert(fd
>= 0 && ret_data
&& length
);
51 pa_random(ret_data
, length
);
53 lseek(fd
, 0, SEEK_SET
);
56 if ((r
= pa_loop_write(fd
, ret_data
, length
, NULL
)) < 0 || (size_t) r
!= length
) {
57 pa_log("failed to write cookie file: %s", pa_cstrerror(errno
));
68 /* Load an euthorization cookie from file fn and store it in data. If
69 * the cookie file doesn't exist, create it */
70 static int load(const char *fn
, void *data
, size_t length
) {
73 int unlock
= 0, ret
= -1;
75 assert(fn
&& data
&& length
);
77 if ((fd
= open(fn
, O_RDWR
|O_CREAT
|O_BINARY
, S_IRUSR
|S_IWUSR
)) < 0) {
78 if (errno
!= EACCES
|| (fd
= open(fn
, O_RDONLY
|O_BINARY
)) < 0) {
79 pa_log("failed to open cookie file '%s': %s", fn
, pa_cstrerror(errno
));
85 unlock
= pa_lock_fd(fd
, 1) >= 0;
87 if ((r
= pa_loop_read(fd
, data
, length
, NULL
)) < 0) {
88 pa_log("failed to read cookie file '%s': %s", fn
, pa_cstrerror(errno
));
92 if ((size_t) r
!= length
) {
93 pa_log_debug("got %d bytes from cookie file '%s', expected %d", (int)r
, fn
, (int)length
);
96 pa_log("unable to write cookie to read only file");
100 if (generate(fd
, data
, length
) < 0)
119 /* Load a cookie from a cookie file. If the file doesn't exist, create it. */
120 int pa_authkey_load(const char *path
, void *data
, size_t length
) {
123 assert(path
&& data
&& length
);
125 ret
= load(path
, data
, length
);
128 pa_log("Failed to load authorization key '%s': %s", path
,
129 (ret
== -1) ? pa_cstrerror(errno
) : "file corrupt");
134 /* If the specified file path starts with / return it, otherwise
135 * return path prepended with home directory */
136 static const char *normalize_path(const char *fn
, char *s
, size_t l
) {
137 assert(fn
&& s
&& l
> 0);
142 if (strlen(fn
) < 3 || !isalpha(fn
[0]) || fn
[1] != ':' || fn
[2] != '\\') {
144 char homedir
[PATH_MAX
];
145 if (!pa_get_home_dir(homedir
, sizeof(homedir
)))
149 snprintf(s
, l
, "%s/%s", homedir
, fn
);
151 snprintf(s
, l
, "%s\\%s", homedir
, fn
);
159 /* Load a cookie from a file in the home directory. If the specified
160 * path starts with /, use it as absolute path instead. */
161 int pa_authkey_load_auto(const char *fn
, void *data
, size_t length
) {
164 assert(fn
&& data
&& length
);
166 if (!(p
= normalize_path(fn
, path
, sizeof(path
))))
169 return pa_authkey_load(p
, data
, length
);
172 /* Store the specified cookie in the speicified cookie file */
173 int pa_authkey_save(const char *fn
, const void *data
, size_t length
) {
175 int unlock
= 0, ret
= -1;
179 assert(fn
&& data
&& length
);
181 if (!(p
= normalize_path(fn
, path
, sizeof(path
))))
184 if ((fd
= open(p
, O_RDWR
|O_CREAT
, S_IRUSR
|S_IWUSR
)) < 0) {
185 pa_log("failed to open cookie file '%s': %s", fn
, pa_cstrerror(errno
));
189 unlock
= pa_lock_fd(fd
, 1) >= 0;
191 if ((r
= pa_loop_write(fd
, data
, length
, NULL
)) < 0 || (size_t) r
!= length
) {
192 pa_log("failed to read cookie file '%s': %s", fn
, pa_cstrerror(errno
));