mirror of
https://gitee.com/openharmony/developtools_hdc
synced 2024-11-23 23:20:43 +00:00
sudo代码主干分支回退
Signed-off-by: chenbo <chenbo18@huawei.com>
This commit is contained in:
parent
68f5fd51a3
commit
742bb2dc27
11
bundle.json
11
bundle.json
@ -12,9 +12,6 @@
|
||||
"component": {
|
||||
"name": "hdc",
|
||||
"subsystem": "developtools",
|
||||
"features": [
|
||||
"hdc_feature_support_sudo"
|
||||
],
|
||||
"adapted_system_type": [
|
||||
"standard"
|
||||
],
|
||||
@ -37,10 +34,7 @@
|
||||
"selinux",
|
||||
"openssl",
|
||||
"libusb",
|
||||
"libuv",
|
||||
"os_account",
|
||||
"user_auth_framework",
|
||||
"pin_auth"
|
||||
"libuv"
|
||||
],
|
||||
"third_party": []
|
||||
},
|
||||
@ -50,8 +44,7 @@
|
||||
"//developtools/hdc/hdcd_user_permit:hdcd_user_permit",
|
||||
"//developtools/hdc:hdc_register",
|
||||
"//developtools/hdc:hdcd_updater",
|
||||
"//developtools/hdc:hdc_updater",
|
||||
"//developtools/hdc/sudo:sudo"
|
||||
"//developtools/hdc:hdc_updater"
|
||||
],
|
||||
"inner_kits": [
|
||||
{
|
||||
|
1
hdc.gni
1
hdc.gni
@ -23,7 +23,6 @@ declare_args() {
|
||||
js_jdwp_connect = true
|
||||
hdc_version_check = false
|
||||
support_hdcd_user_permit = false
|
||||
hdc_feature_support_sudo = false
|
||||
|
||||
if (defined(global_parts_info)) {
|
||||
if (defined(global_parts_info.ability_ability_base)) {
|
||||
|
@ -78,10 +78,7 @@
|
||||
"ohos.permission.PUBLISH_SYSTEM_COMMON_EVENT",
|
||||
"ohos.permission.CLEAN_APPLICATION_DATA",
|
||||
"ohos.permission.START_SYSTEM_DIALOG",
|
||||
"ohos.permission.GET_RUNNING_INFO",
|
||||
"ohos.permission.MANAGE_USER_IDM",
|
||||
"ohos.permission.ACCESS_PIN_AUTH",
|
||||
"ohos.permission.ACCESS_USER_AUTH_INTERNAL"
|
||||
"ohos.permission.GET_RUNNING_INFO"
|
||||
],
|
||||
"permission_acls" : [
|
||||
"ohos.permission.CHANGE_ABILITY_ENABLED_STATE",
|
||||
@ -96,10 +93,7 @@
|
||||
"ohos.permission.PUBLISH_SYSTEM_COMMON_EVENT",
|
||||
"ohos.permission.CLEAN_APPLICATION_DATA",
|
||||
"ohos.permission.START_SYSTEM_DIALOG",
|
||||
"ohos.permission.GET_RUNNING_INFO",
|
||||
"ohos.permission.MANAGE_USER_IDM",
|
||||
"ohos.permission.ACCESS_PIN_AUTH",
|
||||
"ohos.permission.ACCESS_USER_AUTH_INTERNAL"
|
||||
"ohos.permission.GET_RUNNING_INFO"
|
||||
],
|
||||
"sandbox" : 0,
|
||||
"start-mode" : "condition",
|
||||
|
@ -1,51 +0,0 @@
|
||||
# Copyright (C) 2024 Huawei Device Co., Ltd.
|
||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||
# you may not use this file except in compliance with the License.
|
||||
# You may obtain a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
# See the License for the specific language governing permissions and
|
||||
# limitations under the License.
|
||||
|
||||
import("//build/ohos.gni")
|
||||
import("//developtools/hdc/hdc.gni")
|
||||
|
||||
ohos_executable("exec_sudo") {
|
||||
if (hdc_feature_support_sudo) {
|
||||
sources = [
|
||||
"src/main.cpp",
|
||||
"src/sudo_iam.cpp",
|
||||
]
|
||||
deps = []
|
||||
|
||||
external_deps = [
|
||||
"c_utils:utils",
|
||||
"ipc:ipc_single",
|
||||
"os_account:account_iam_innerkits",
|
||||
"os_account:os_account_innerkits",
|
||||
"pin_auth:pinauth_framework",
|
||||
"user_auth_framework:userauth_client",
|
||||
]
|
||||
|
||||
defines = [ "HAS_PIN_AUTH_PART" ]
|
||||
|
||||
if (build_selinux) {
|
||||
external_deps += [ "selinux:libselinux" ]
|
||||
defines += [ "SURPPORT_SELINUX" ]
|
||||
}
|
||||
|
||||
subsystem_name = "developtools"
|
||||
output_name = "sudo"
|
||||
part_name = "hdc"
|
||||
}
|
||||
}
|
||||
|
||||
group("sudo") {
|
||||
if (hdc_feature_support_sudo) {
|
||||
deps = [ ":exec_sudo" ]
|
||||
}
|
||||
}
|
@ -1,388 +0,0 @@
|
||||
/*
|
||||
* Copyright (C) 2024 Huawei Device Co., Ltd.
|
||||
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||
* you may not use this file except in compliance with the License.
|
||||
* You may obtain a copy of the License at
|
||||
*
|
||||
* http://www.apache.org/licenses/LICENSE-2.0
|
||||
*
|
||||
* Unless required by applicable law or agreed to in writing, software
|
||||
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
* See the License for the specific language governing permissions and
|
||||
* limitations under the License.
|
||||
*/
|
||||
|
||||
#include <termios.h>
|
||||
#include <cstring>
|
||||
#include <unistd.h>
|
||||
#include <climits>
|
||||
#include <sys/types.h>
|
||||
#include <sys/wait.h>
|
||||
#include <sys/stat.h>
|
||||
#include <securec.h>
|
||||
|
||||
#if defined(SURPPORT_SELINUX)
|
||||
#include "selinux/selinux.h"
|
||||
#endif
|
||||
#include "account_iam_client.h"
|
||||
#include "os_account_manager.h"
|
||||
#include "sudo_iam.h"
|
||||
|
||||
#define PWD_BUF_LEN 128
|
||||
#define DEFAULT_PATH "/system/bin"
|
||||
#define DEFAULT_BASH "/system/bin/sh"
|
||||
|
||||
using namespace OHOS::UserIam;
|
||||
using namespace OHOS::AccountSA;
|
||||
|
||||
static FILE *g_ttyFp = nullptr;
|
||||
|
||||
static const char *OUT_OF_MEM = "[E0001] out of memory\n";
|
||||
static const char *COMMAND_NOT_FOUND = "[E0002] command not found\n";
|
||||
static const char *USER_VERIFY_FAILED = "[E0003] Sorry, try again. If screen lock password not set, set it first.\n";
|
||||
|
||||
static void WriteStdErr(const char *str)
|
||||
{
|
||||
(void)fwrite(str, 1, strlen(str), stderr);
|
||||
fflush(stderr);
|
||||
}
|
||||
|
||||
static void WriteTty(const char *str)
|
||||
{
|
||||
if (g_ttyFp != nullptr) {
|
||||
(void)fwrite(str, 1, strlen(str), g_ttyFp);
|
||||
fflush(g_ttyFp);
|
||||
} else {
|
||||
g_ttyFp = fopen("/dev/tty", "w");
|
||||
if (g_ttyFp != nullptr) {
|
||||
(void)fwrite(str, 1, strlen(str), g_ttyFp);
|
||||
fflush(g_ttyFp);
|
||||
return;
|
||||
}
|
||||
WriteStdErr("open /dev/tty for write failed\n");
|
||||
}
|
||||
}
|
||||
|
||||
static void CloseTty(void)
|
||||
{
|
||||
if (g_ttyFp != nullptr) {
|
||||
fclose(g_ttyFp);
|
||||
}
|
||||
g_ttyFp = nullptr;
|
||||
}
|
||||
|
||||
static char *StrDup(const char *str)
|
||||
{
|
||||
int ret;
|
||||
char *result = new(std::nothrow)char[strlen(str) + 1];
|
||||
if (result == nullptr) {
|
||||
WriteStdErr(OUT_OF_MEM);
|
||||
exit(1);
|
||||
}
|
||||
ret = strcpy_s(result, strlen(str) + 1, str);
|
||||
if (ret != 0) {
|
||||
WriteStdErr(OUT_OF_MEM);
|
||||
exit(1);
|
||||
}
|
||||
return result;
|
||||
}
|
||||
|
||||
static void FreeArgvNew(char **argvNew)
|
||||
{
|
||||
char **p = nullptr;
|
||||
for (p = argvNew; *p != nullptr; p++) {
|
||||
delete [] *p;
|
||||
}
|
||||
delete [] argvNew;
|
||||
}
|
||||
|
||||
/*
|
||||
* Find cmd from PATH
|
||||
*/
|
||||
static bool GetCmdInPath(char *cmd, int cmdBufLen, char *envp[])
|
||||
{
|
||||
struct stat st;
|
||||
char *path = nullptr;
|
||||
char *pathBak = nullptr;
|
||||
char **ep = nullptr;
|
||||
char *cp = nullptr;
|
||||
char pathBuf[PATH_MAX + 1] = {0};
|
||||
bool findSuccess = false;
|
||||
int ret;
|
||||
|
||||
if (strchr(cmd, '/') != nullptr) {
|
||||
return true;
|
||||
}
|
||||
|
||||
for (ep = envp; *ep != nullptr; ep++) {
|
||||
if (strcmp(*ep, "PATH=") == 0) {
|
||||
path = *ep + strlen("PATH=");
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
path = StrDup((path != nullptr && *path != '\0') ? path : DEFAULT_PATH);
|
||||
pathBak = path;
|
||||
do {
|
||||
if ((cp = strchr(path, ':')) != nullptr) {
|
||||
*cp = '\0';
|
||||
}
|
||||
ret = sprintf_s(pathBuf, sizeof(pathBuf), "%s/%s", *path ? path : ".", cmd);
|
||||
if (ret > 0 && stat(pathBuf, &st) == 0 && S_ISREG(st.st_mode)) {
|
||||
findSuccess = true;
|
||||
break;
|
||||
}
|
||||
path = cp + 1;
|
||||
} while (cp != nullptr);
|
||||
|
||||
free(pathBak);
|
||||
if (!findSuccess) {
|
||||
WriteTty(COMMAND_NOT_FOUND);
|
||||
return false;
|
||||
}
|
||||
return (sprintf_s(cmd, cmdBufLen, "%s", pathBuf) < 0) ? false : true;
|
||||
}
|
||||
|
||||
static char **ParseCmd(int argc, char* argv[], char* env[], char *cmd, int cmdLen)
|
||||
{
|
||||
int startCopyArgvIndex = 1;
|
||||
int argvNewIndex = 0;
|
||||
char **argvTmp = nullptr;
|
||||
bool isShc = false;
|
||||
int ret;
|
||||
|
||||
/*
|
||||
* Here, we construct the command and its argv
|
||||
* sudo sh -c xxx yyy -----> sh -c xxx yyy
|
||||
* sudo xxx yyy -----> xxx yyy
|
||||
*/
|
||||
if (argc <= 0) {
|
||||
return nullptr;
|
||||
}
|
||||
argvTmp = new(std::nothrow) char* [argc];
|
||||
if (argvTmp == nullptr) {
|
||||
WriteStdErr(OUT_OF_MEM);
|
||||
return nullptr;
|
||||
}
|
||||
(void)memset_s(argvTmp, sizeof(char*) * argc, 0, sizeof(char*) * argc);
|
||||
/*
|
||||
* sudo sh -c xxxx
|
||||
*/
|
||||
if (argc >= 3) { //3:argc of main
|
||||
if (strcmp(argv[1], "sh") == 0 && strcmp(argv[2], "-c") == 0) { //2:argv 2 of main
|
||||
// argvNew[0] is "/system/bin/sh"
|
||||
argvTmp[argvNewIndex++] = StrDup(DEFAULT_BASH);
|
||||
// argvNew[1] is "-c"
|
||||
argvTmp[argvNewIndex++] = StrDup("-c");
|
||||
ret = sprintf_s(cmd, cmdLen, "%s", DEFAULT_BASH);
|
||||
if (ret < 0) {
|
||||
FreeArgvNew(argvTmp);
|
||||
return nullptr;
|
||||
}
|
||||
startCopyArgvIndex = 3; //3:start copy index of argv
|
||||
isShc = true;
|
||||
}
|
||||
}
|
||||
|
||||
/*
|
||||
* if not "sudo sh -c xxxx", just as "sudo xxxx"
|
||||
*/
|
||||
if (!isShc) {
|
||||
ret = sprintf_s(cmd, cmdLen, "%s", argv[1]);
|
||||
if (ret < 0 || !GetCmdInPath(cmd, cmdLen, env)) {
|
||||
FreeArgvNew(argvTmp);
|
||||
return nullptr;
|
||||
}
|
||||
argvTmp[argvNewIndex++] = StrDup(cmd);
|
||||
startCopyArgvIndex = 2; //2:start copy index of argv
|
||||
}
|
||||
|
||||
for (int i = startCopyArgvIndex; i < argc; i++) {
|
||||
argvTmp[argvNewIndex++] = StrDup(argv[i]);
|
||||
}
|
||||
argvTmp[argvNewIndex] = nullptr;
|
||||
|
||||
return argvTmp;
|
||||
}
|
||||
|
||||
static void GetUserPwd(char *pwdBuf, int bufLen)
|
||||
{
|
||||
const char *prompts = "[sudo] password for current user:";
|
||||
const char *newline = "\n";
|
||||
struct termios oldTerm;
|
||||
struct termios newTerm;
|
||||
|
||||
WriteTty(prompts);
|
||||
|
||||
tcgetattr(STDIN_FILENO, &oldTerm);
|
||||
newTerm = oldTerm;
|
||||
newTerm.c_lflag &= ~(ECHO);
|
||||
tcsetattr(STDIN_FILENO, TCSANOW, &newTerm);
|
||||
(void)fgets(pwdBuf, bufLen, stdin);
|
||||
if (pwdBuf[strlen(pwdBuf) - 1] == '\n') {
|
||||
pwdBuf[strlen(pwdBuf) - 1] = '\0';
|
||||
}
|
||||
tcsetattr(STDIN_FILENO, TCSANOW, &oldTerm);
|
||||
|
||||
WriteTty(newline);
|
||||
}
|
||||
|
||||
static bool SetUidGid(void)
|
||||
{
|
||||
if (setuid(0) != 0) {
|
||||
return false;
|
||||
}
|
||||
if (setegid(0) != 0) {
|
||||
return false;
|
||||
}
|
||||
if (setgid(0) != 0) {
|
||||
return false;
|
||||
}
|
||||
return true;
|
||||
}
|
||||
|
||||
static void WaitForAuth(void)
|
||||
{
|
||||
std::unique_lock<std::mutex> lock(g_mutexForAuth);
|
||||
g_condVarForAuth.wait(lock, [] { return g_authFinish; });
|
||||
}
|
||||
|
||||
static bool VerifyAccount(int32_t userId)
|
||||
{
|
||||
OHOS::ErrCode err;
|
||||
std::vector<uint8_t> challenge;
|
||||
AuthOptions authOptions;
|
||||
bool verifyResult = false;
|
||||
|
||||
AccountIAMClient &sudoIAMClient = AccountIAMClient::GetInstance();
|
||||
err = sudoIAMClient.OpenSession(userId, challenge);
|
||||
if (err != 0) {
|
||||
WriteStdErr("open session failed\n");
|
||||
return false;
|
||||
}
|
||||
|
||||
std::shared_ptr<IDMCallback> callback = std::make_shared<SudoIDMCallback>();
|
||||
authOptions.accountId = userId;
|
||||
sudoIAMClient.AuthUser(authOptions, challenge, AuthType::PIN, AuthTrustLevel::ATL1, callback);
|
||||
std::shared_ptr<SudoIDMCallback> sudoCallback = std::static_pointer_cast<SudoIDMCallback>(callback);
|
||||
WaitForAuth();
|
||||
verifyResult = sudoCallback->GetVerifyResult();
|
||||
|
||||
sudoIAMClient.CloseSession(userId);
|
||||
return verifyResult;
|
||||
}
|
||||
|
||||
static bool UserAccountVerify(char *pwd, int pwdLen)
|
||||
{
|
||||
int32_t userId = -1;
|
||||
std::shared_ptr<PinAuth::IInputer> inputer = nullptr;
|
||||
OHOS::ErrCode err;
|
||||
int verifyResult = 0;
|
||||
pid_t pid;
|
||||
int fds[2];
|
||||
|
||||
if (pipe(fds) != 0) {
|
||||
WriteStdErr("exec pipe failed\n");
|
||||
return false;
|
||||
}
|
||||
pid = fork();
|
||||
if (pid == -1) {
|
||||
WriteStdErr("exec fork failed\n");
|
||||
return false;
|
||||
}
|
||||
if (pid == 0) {
|
||||
close(fds[0]);
|
||||
err = OsAccountManager::GetForegroundOsAccountLocalId(userId);
|
||||
if (err != 0) {
|
||||
WriteStdErr("get os account local id failed\n");
|
||||
exit(1);
|
||||
}
|
||||
inputer = std::make_shared<PinAuth::SudoIInputer>();
|
||||
std::shared_ptr<PinAuth::SudoIInputer> sudoInputer = std::static_pointer_cast<PinAuth::SudoIInputer>(inputer);
|
||||
sudoInputer->SetPasswd(pwd, pwdLen);
|
||||
err = AccountIAMClient::GetInstance().RegisterPINInputer(inputer);
|
||||
if (err != 0) {
|
||||
WriteStdErr("register pin inputer failed\n");
|
||||
exit(1);
|
||||
}
|
||||
if (VerifyAccount(userId)) {
|
||||
verifyResult = 1;
|
||||
}
|
||||
AccountIAMClient::GetInstance().UnregisterPINInputer();
|
||||
write(fds[1], &verifyResult, sizeof(verifyResult));
|
||||
close(fds[1]);
|
||||
exit(0);
|
||||
} else {
|
||||
close(fds[1]);
|
||||
waitpid(pid, nullptr, 0);
|
||||
read(fds[0], &verifyResult, sizeof(verifyResult));
|
||||
close(fds[0]);
|
||||
return (verifyResult == 1);
|
||||
}
|
||||
}
|
||||
|
||||
static bool VerifyUserPin(void)
|
||||
{
|
||||
char passwd[PWD_BUF_LEN] = {0};
|
||||
bool pwdVerifyResult = false;
|
||||
|
||||
if (getuid() == 0) {
|
||||
return true;
|
||||
}
|
||||
|
||||
GetUserPwd(passwd, PWD_BUF_LEN);
|
||||
pwdVerifyResult = UserAccountVerify(passwd, strnlen(passwd, PWD_BUF_LEN));
|
||||
memset_s(passwd, sizeof(passwd), 0, sizeof(passwd));
|
||||
if (!pwdVerifyResult) {
|
||||
WriteTty(USER_VERIFY_FAILED);
|
||||
}
|
||||
return pwdVerifyResult;
|
||||
}
|
||||
|
||||
int main(int argc, char* argv[], char* env[])
|
||||
{
|
||||
char execCmd[PATH_MAX + 1] = {0};
|
||||
char **argvNew = nullptr;
|
||||
const char *help = "sudo - execute command as root\n\n"
|
||||
"usage: sudo command ...\n"
|
||||
"usage: sudo sh -c command ...\n";
|
||||
if (argc < 2) { //2:argc check number
|
||||
WriteStdErr(help);
|
||||
return 1;
|
||||
}
|
||||
|
||||
/*
|
||||
* Get and verify user pwd
|
||||
*/
|
||||
if (!VerifyUserPin()) {
|
||||
return 1;
|
||||
}
|
||||
|
||||
/*
|
||||
* Make exec cmd and the args
|
||||
*/
|
||||
argvNew = ParseCmd(argc, argv, env, execCmd, PATH_MAX + 1);
|
||||
if (argvNew == nullptr) {
|
||||
return 1;
|
||||
}
|
||||
CloseTty();
|
||||
|
||||
/*
|
||||
* set uid, gid, egid
|
||||
*/
|
||||
if (!SetUidGid()) {
|
||||
FreeArgvNew(argvNew);
|
||||
WriteStdErr("setuid failed\n");
|
||||
return 1;
|
||||
}
|
||||
|
||||
#if defined(SURPPORT_SELINUX)
|
||||
setcon("u:r:privilege_app:s0");
|
||||
#endif
|
||||
|
||||
execvp(execCmd, argvNew);
|
||||
|
||||
WriteStdErr("execvp failed\n");
|
||||
return 1;
|
||||
}
|
@ -1,79 +0,0 @@
|
||||
/*
|
||||
* Copyright (C) 2024 Huawei Device Co., Ltd.
|
||||
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||
* you may not use this file except in compliance with the License.
|
||||
* You may obtain a copy of the License at
|
||||
*
|
||||
* http://www.apache.org/licenses/LICENSE-2.0
|
||||
*
|
||||
* Unless required by applicable law or agreed to in writing, software
|
||||
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
* See the License for the specific language governing permissions and
|
||||
* limitations under the License.
|
||||
*/
|
||||
|
||||
#include "sudo_iam.h"
|
||||
#include "account_iam_client.h"
|
||||
#include "account_iam_info.h"
|
||||
#include "account_iam_client_callback.h"
|
||||
#include "i_inputer.h"
|
||||
|
||||
std::condition_variable g_condVarForAuth;
|
||||
bool g_authFinish;
|
||||
std::mutex g_mutexForAuth;
|
||||
|
||||
namespace OHOS {
|
||||
namespace UserIam {
|
||||
namespace PinAuth {
|
||||
|
||||
void SudoIInputer::OnGetData(int32_t authSubType, std::vector<uint8_t> challenge,
|
||||
std::shared_ptr<IInputerData> inputerData)
|
||||
{
|
||||
inputerData->OnSetData(authSubType, passwd_);
|
||||
}
|
||||
|
||||
void SudoIInputer::SetPasswd(char *pwd, int len)
|
||||
{
|
||||
passwd_.resize(len);
|
||||
for (int i = 0; i < len; i++) {
|
||||
passwd_[i] = *pwd++;
|
||||
}
|
||||
}
|
||||
|
||||
SudoIInputer::~SudoIInputer()
|
||||
{
|
||||
for (int i = 0; i < (int)passwd_.size(); i++) {
|
||||
passwd_[i] = 0;
|
||||
}
|
||||
}
|
||||
|
||||
} //PinAuth
|
||||
} //UserIam
|
||||
|
||||
namespace AccountSA {
|
||||
|
||||
void SudoIDMCallback::OnAcquireInfo(int32_t module, uint32_t acquireInfo, const Attributes &extraInfo)
|
||||
{
|
||||
return;
|
||||
}
|
||||
|
||||
void SudoIDMCallback::OnResult(int32_t result, const Attributes &extraInfo)
|
||||
{
|
||||
verifyResult_ = false;
|
||||
if (result == 0) {
|
||||
verifyResult_ = true;
|
||||
}
|
||||
|
||||
std::unique_lock<std::mutex> lock { g_mutexForAuth };
|
||||
g_authFinish = true;
|
||||
g_condVarForAuth.notify_all();
|
||||
}
|
||||
|
||||
bool SudoIDMCallback::GetVerifyResult(void)
|
||||
{
|
||||
return verifyResult_;
|
||||
}
|
||||
|
||||
} // AccountSA
|
||||
} //OHOS
|
@ -1,59 +0,0 @@
|
||||
/*
|
||||
* Copyright (C) 2024 Huawei Device Co., Ltd.
|
||||
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||
* you may not use this file except in compliance with the License.
|
||||
* You may obtain a copy of the License at
|
||||
*
|
||||
* http://www.apache.org/licenses/LICENSE-2.0
|
||||
*
|
||||
* Unless required by applicable law or agreed to in writing, software
|
||||
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
* See the License for the specific language governing permissions and
|
||||
* limitations under the License.
|
||||
*/
|
||||
|
||||
#ifndef SUDO_IAM_H
|
||||
#define SUDO_IAM_H
|
||||
#include <condition_variable>
|
||||
#include <mutex>
|
||||
#include "account_iam_client.h"
|
||||
#include "account_iam_info.h"
|
||||
#include "account_iam_client_callback.h"
|
||||
#include "i_inputer.h"
|
||||
|
||||
extern std::condition_variable g_condVarForAuth;
|
||||
extern bool g_authFinish;
|
||||
extern std::mutex g_mutexForAuth;
|
||||
|
||||
namespace OHOS {
|
||||
namespace UserIam {
|
||||
namespace PinAuth {
|
||||
|
||||
class SudoIInputer : public IInputer {
|
||||
public:
|
||||
virtual ~SudoIInputer();
|
||||
void OnGetData(int32_t authSubType, std::vector<uint8_t> challenge,
|
||||
std::shared_ptr<IInputerData> inputerData) override;
|
||||
void SetPasswd(char *pwd, int len);
|
||||
private:
|
||||
std::vector<uint8_t> passwd_;
|
||||
};
|
||||
|
||||
} //PinAuth
|
||||
} //UserIam
|
||||
|
||||
namespace AccountSA {
|
||||
|
||||
class SudoIDMCallback : public IDMCallback {
|
||||
public:
|
||||
virtual ~SudoIDMCallback() = default;
|
||||
void OnAcquireInfo(int32_t module, uint32_t acquireInfo, const Attributes &extraInfo) override;
|
||||
void OnResult(int32_t result, const Attributes &extraInfo) override;
|
||||
bool GetVerifyResult(void);
|
||||
private:
|
||||
bool verifyResult_;
|
||||
};
|
||||
} // AccountSA
|
||||
} //OHOS
|
||||
#endif //SUDO_IAM_H
|
Loading…
Reference in New Issue
Block a user