]> git.ipfire.org Git - thirdparty/cups.git/blame - cups/usersys.c
Sandboxed applications were not able to get the default printer (Issue #5676)
[thirdparty/cups.git] / cups / usersys.c
CommitLineData
ef416fc2 1/*
83bc2aac
MS
2 * User, system, and password routines for CUPS.
3 *
3c2cb822 4 * Copyright 2007-2019 by Apple Inc.
83bc2aac
MS
5 * Copyright 1997-2006 by Easy Software Products.
6 *
3c2cb822
MS
7 * Licensed under Apache License v2.0. See the file "LICENSE" for more
8 * information.
ef416fc2 9 */
10
11/*
12 * Include necessary headers...
13 */
14
71e16022 15#include "cups-private.h"
fb863569 16#include "debug-internal.h"
ef416fc2 17#include <stdlib.h>
e00b005a 18#include <sys/stat.h>
19dc16f7 19#ifdef _WIN32
ef416fc2 20# include <windows.h>
5a6b583a
MS
21#else
22# include <pwd.h>
dcb445bc 23# include <termios.h>
db8b865d 24# include <sys/utsname.h>
19dc16f7 25#endif /* _WIN32 */
588c2205
MS
26#ifdef __APPLE__
27# include <sys/sysctl.h>
28#endif /* __APPLE__ */
ef416fc2 29
30
dcb445bc
MS
31/*
32 * Local constants...
33 */
34
08d56b1f 35#ifdef __APPLE__
3c2cb822 36# if TARGET_OS_OSX
588c2205
MS
37# define kCUPSPrintingPrefs CFSTR("org.cups.PrintingPrefs")
38# define kPREFIX ""
3c2cb822
MS
39# else
40# define kCUPSPrintingPrefs CFSTR(".GlobalPreferences")
41# define kPREFIX "AirPrint"
42# endif /* TARGET_OS_OSX */
ec8beb89
MS
43# define kDigestOptionsKey CFSTR(kPREFIX "DigestOptions")
44# define kUserKey CFSTR(kPREFIX "User")
59cd12c6 45# define kUserAgentTokensKey CFSTR(kPREFIX "UserAgentTokens")
588c2205
MS
46# define kAllowAnyRootKey CFSTR(kPREFIX "AllowAnyRoot")
47# define kAllowExpiredCertsKey CFSTR(kPREFIX "AllowExpiredCerts")
48# define kEncryptionKey CFSTR(kPREFIX "Encryption")
49# define kGSSServiceNameKey CFSTR(kPREFIX "GSSServiceName")
50# define kSSLOptionsKey CFSTR(kPREFIX "SSLOptions")
51# define kTrustOnFirstUseKey CFSTR(kPREFIX "TrustOnFirstUse")
52# define kValidateCertsKey CFSTR(kPREFIX "ValidateCerts")
53/* Deprecated */
54# define kAllowRC4 CFSTR(kPREFIX "AllowRC4")
55# define kAllowSSL3 CFSTR(kPREFIX "AllowSSL3")
56# define kAllowDH CFSTR(kPREFIX "AllowDH")
08d56b1f
MS
57#endif /* __APPLE__ */
58
dcb445bc
MS
59#define _CUPS_PASSCHAR '*' /* Character that is echoed for password */
60
61
3abb875b
MS
62/*
63 * Local types...
64 */
65
66typedef struct _cups_client_conf_s /**** client.conf config data ****/
67{
ec8beb89 68 _cups_digestoptions_t digestoptions; /* DigestOptions values */
59cd12c6 69 _cups_uatokens_t uatokens; /* UserAgentTokens values */
3abb875b 70#ifdef HAVE_SSL
8f1fbdec
MS
71 int ssl_options, /* SSLOptions values */
72 ssl_min_version,/* Minimum SSL/TLS version */
73 ssl_max_version;/* Maximum SSL/TLS version */
3abb875b 74#endif /* HAVE_SSL */
08d56b1f
MS
75 int trust_first, /* Trust on first use? */
76 any_root, /* Allow any (e.g., self-signed) root */
3abb875b
MS
77 expired_certs, /* Allow expired certs */
78 validate_certs; /* Validate certificates */
79 http_encryption_t encryption; /* Encryption setting */
80 char user[65], /* User name */
81 server_name[256];
82 /* Server hostname */
83#ifdef HAVE_GSSAPI
84 char gss_service_name[32];
85 /* Kerberos service name */
86#endif /* HAVE_GSSAPI */
87} _cups_client_conf_t;
88
89
b423cd4c 90/*
91 * Local functions...
92 */
93
08d56b1f
MS
94#ifdef __APPLE__
95static int cups_apple_get_boolean(CFStringRef key, int *value);
96static int cups_apple_get_string(CFStringRef key, char *value, size_t valsize);
97#endif /* __APPLE__ */
98static int cups_boolean_value(const char *value);
3abb875b
MS
99static void cups_finalize_client_conf(_cups_client_conf_t *cc);
100static void cups_init_client_conf(_cups_client_conf_t *cc);
101static void cups_read_client_conf(cups_file_t *fp, _cups_client_conf_t *cc);
4b9daaf4 102static void cups_set_default_ipp_port(_cups_globals_t *cg);
ec8beb89 103static void cups_set_digestoptions(_cups_client_conf_t *cc, const char *value);
3abb875b 104static void cups_set_encryption(_cups_client_conf_t *cc, const char *value);
07ed0e9a 105#ifdef HAVE_GSSAPI
3abb875b 106static void cups_set_gss_service_name(_cups_client_conf_t *cc, const char *value);
07ed0e9a 107#endif /* HAVE_GSSAPI */
3abb875b
MS
108static void cups_set_server_name(_cups_client_conf_t *cc, const char *value);
109#ifdef HAVE_SSL
110static void cups_set_ssl_options(_cups_client_conf_t *cc, const char *value);
111#endif /* HAVE_SSL */
59cd12c6 112static void cups_set_uatokens(_cups_client_conf_t *cc, const char *value);
3abb875b 113static void cups_set_user(_cups_client_conf_t *cc, const char *value);
b423cd4c 114
115
ef416fc2 116/*
5a6b583a 117 * 'cupsEncryption()' - Get the current encryption settings.
ef416fc2 118 *
119 * The default encryption setting comes from the CUPS_ENCRYPTION
568fa3fa 120 * environment variable, then the ~/.cups/client.conf file, and finally the
ef416fc2 121 * /etc/cups/client.conf file. If not set, the default is
cb7f98ee 122 * @code HTTP_ENCRYPTION_IF_REQUESTED@.
5a6b583a
MS
123 *
124 * Note: The current encryption setting is tracked separately for each thread
125 * in a program. Multi-threaded programs that override the setting via the
126 * @link cupsSetEncryption@ function need to do so in each thread for the same
127 * setting to be used.
ef416fc2 128 */
129
130http_encryption_t /* O - Encryption settings */
131cupsEncryption(void)
132{
ef416fc2 133 _cups_globals_t *cg = _cupsGlobals(); /* Pointer to library globals */
134
135
ef416fc2 136 if (cg->encryption == (http_encryption_t)-1)
e07d4801 137 _cupsSetDefaults();
ef416fc2 138
139 return (cg->encryption);
140}
141
142
143/*
144 * 'cupsGetPassword()' - Get a password from the user.
145 *
5a738aea 146 * Uses the current password callback function. Returns @code NULL@ if the
ecdc0628 147 * user does not provide a password.
5a6b583a
MS
148 *
149 * Note: The current password callback function is tracked separately for each
150 * thread in a program. Multi-threaded programs that override the setting via
151 * the @link cupsSetPasswordCB@ or @link cupsSetPasswordCB2@ functions need to
152 * do so in each thread for the same function to be used.
53af7f21
MS
153 *
154 * @exclude all@
ef416fc2 155 */
156
157const char * /* O - Password */
158cupsGetPassword(const char *prompt) /* I - Prompt string */
159{
f11a948a
MS
160 _cups_globals_t *cg = _cupsGlobals(); /* Pointer to library globals */
161
162
163 return ((cg->password_cb)(prompt, NULL, NULL, NULL, cg->password_data));
164}
165
166
167/*
98d88c8d 168 * 'cupsGetPassword2()' - Get a password from the user using the current
5a6b583a 169 * password callback.
f11a948a
MS
170 *
171 * Uses the current password callback function. Returns @code NULL@ if the
172 * user does not provide a password.
173 *
5a6b583a
MS
174 * Note: The current password callback function is tracked separately for each
175 * thread in a program. Multi-threaded programs that override the setting via
98d88c8d
MS
176 * the @link cupsSetPasswordCB2@ function need to do so in each thread for the
177 * same function to be used.
5a6b583a 178 *
8072030b 179 * @since CUPS 1.4/macOS 10.6@
f11a948a
MS
180 */
181
182const char * /* O - Password */
183cupsGetPassword2(const char *prompt, /* I - Prompt string */
184 http_t *http, /* I - Connection to server or @code CUPS_HTTP_DEFAULT@ */
185 const char *method, /* I - Request method ("GET", "POST", "PUT") */
186 const char *resource) /* I - Resource path */
187{
188 _cups_globals_t *cg = _cupsGlobals(); /* Pointer to library globals */
189
190
191 if (!http)
192 http = _cupsConnect();
193
194 return ((cg->password_cb)(prompt, http, method, resource, cg->password_data));
ef416fc2 195}
196
197
ef416fc2 198/*
5a6b583a
MS
199 * 'cupsServer()' - Return the hostname/address of the current server.
200 *
201 * The default server comes from the CUPS_SERVER environment variable, then the
202 * ~/.cups/client.conf file, and finally the /etc/cups/client.conf file. If not
203 * set, the default is the local system - either "localhost" or a domain socket
204 * path.
ef416fc2 205 *
5a6b583a
MS
206 * The returned value can be a fully-qualified hostname, a numeric IPv4 or IPv6
207 * address, or a domain socket pathname.
208 *
209 * Note: The current server is tracked separately for each thread in a program.
210 * Multi-threaded programs that override the server via the
211 * @link cupsSetServer@ function need to do so in each thread for the same
212 * server to be used.
ef416fc2 213 */
214
215const char * /* O - Server name */
216cupsServer(void)
217{
ef416fc2 218 _cups_globals_t *cg = _cupsGlobals(); /* Pointer to library globals */
219
220
ef416fc2 221 if (!cg->server[0])
e07d4801 222 _cupsSetDefaults();
ef416fc2 223
e07d4801
MS
224 return (cg->server);
225}
ef416fc2 226
d09495fa 227
7cf5915e
MS
228/*
229 * 'cupsSetClientCertCB()' - Set the client certificate callback.
230 *
231 * Pass @code NULL@ to restore the default callback.
232 *
233 * Note: The current certificate callback is tracked separately for each thread
234 * in a program. Multi-threaded programs that override the callback need to do
235 * so in each thread for the same callback to be used.
236 *
8072030b 237 * @since CUPS 1.5/macOS 10.7@
7cf5915e
MS
238 */
239
240void
241cupsSetClientCertCB(
242 cups_client_cert_cb_t cb, /* I - Callback function */
243 void *user_data) /* I - User data pointer */
244{
245 _cups_globals_t *cg = _cupsGlobals(); /* Pointer to library globals */
246
247
248 cg->client_cert_cb = cb;
249 cg->client_cert_data = user_data;
250}
251
252
253/*
254 * 'cupsSetCredentials()' - Set the default credentials to be used for SSL/TLS
255 * connections.
256 *
257 * Note: The default credentials are tracked separately for each thread in a
258 * program. Multi-threaded programs that override the setting need to do so in
259 * each thread for the same setting to be used.
260 *
8072030b 261 * @since CUPS 1.5/macOS 10.7@
7cf5915e
MS
262 */
263
264int /* O - Status of call (0 = success) */
265cupsSetCredentials(
266 cups_array_t *credentials) /* I - Array of credentials */
267{
268 _cups_globals_t *cg = _cupsGlobals(); /* Pointer to library globals */
269
270
271 if (cupsArrayCount(credentials) < 1)
272 return (-1);
273
7d5824d6 274#ifdef HAVE_SSL
7cf5915e 275 _httpFreeCredentials(cg->tls_credentials);
85dda01c 276 cg->tls_credentials = _httpCreateCredentials(credentials);
7d5824d6 277#endif /* HAVE_SSL */
7cf5915e
MS
278
279 return (cg->tls_credentials ? 0 : -1);
280}
281
282
e07d4801
MS
283/*
284 * 'cupsSetEncryption()' - Set the encryption preference.
5a6b583a
MS
285 *
286 * The default encryption setting comes from the CUPS_ENCRYPTION
287 * environment variable, then the ~/.cups/client.conf file, and finally the
288 * /etc/cups/client.conf file. If not set, the default is
cb7f98ee 289 * @code HTTP_ENCRYPTION_IF_REQUESTED@.
5a6b583a
MS
290 *
291 * Note: The current encryption setting is tracked separately for each thread
292 * in a program. Multi-threaded programs that override the setting need to do
293 * so in each thread for the same setting to be used.
e07d4801 294 */
ef416fc2 295
e07d4801
MS
296void
297cupsSetEncryption(http_encryption_t e) /* I - New encryption preference */
298{
299 _cups_globals_t *cg = _cupsGlobals(); /* Pointer to library globals */
ef416fc2 300
ef416fc2 301
e07d4801 302 cg->encryption = e;
ef416fc2 303
e07d4801
MS
304 if (cg->http)
305 httpEncryption(cg->http, e);
ef416fc2 306}
307
308
309/*
310 * 'cupsSetPasswordCB()' - Set the password callback for CUPS.
311 *
5a6b583a
MS
312 * Pass @code NULL@ to restore the default (console) password callback, which
313 * reads the password from the console. Programs should call either this
314 * function or @link cupsSetPasswordCB2@, as only one callback can be registered
315 * by a program per thread.
316 *
317 * Note: The current password callback is tracked separately for each thread
318 * in a program. Multi-threaded programs that override the callback need to do
319 * so in each thread for the same callback to be used.
53af7f21
MS
320 *
321 * @exclude all@
ef416fc2 322 */
323
324void
325cupsSetPasswordCB(cups_password_cb_t cb)/* I - Callback function */
326{
327 _cups_globals_t *cg = _cupsGlobals(); /* Pointer to library globals */
328
329
f11a948a
MS
330 if (cb == (cups_password_cb_t)0)
331 cg->password_cb = (cups_password_cb2_t)_cupsGetPassword;
332 else
333 cg->password_cb = (cups_password_cb2_t)cb;
334
335 cg->password_data = NULL;
336}
337
338
339/*
340 * 'cupsSetPasswordCB2()' - Set the advanced password callback for CUPS.
341 *
5a6b583a
MS
342 * Pass @code NULL@ to restore the default (console) password callback, which
343 * reads the password from the console. Programs should call either this
344 * function or @link cupsSetPasswordCB2@, as only one callback can be registered
345 * by a program per thread.
346 *
347 * Note: The current password callback is tracked separately for each thread
348 * in a program. Multi-threaded programs that override the callback need to do
349 * so in each thread for the same callback to be used.
f11a948a 350 *
8072030b 351 * @since CUPS 1.4/macOS 10.6@
f11a948a
MS
352 */
353
354void
355cupsSetPasswordCB2(
356 cups_password_cb2_t cb, /* I - Callback function */
357 void *user_data) /* I - User data pointer */
358{
359 _cups_globals_t *cg = _cupsGlobals(); /* Pointer to library globals */
360
361
362 if (cb == (cups_password_cb2_t)0)
363 cg->password_cb = (cups_password_cb2_t)_cupsGetPassword;
ef416fc2 364 else
365 cg->password_cb = cb;
f11a948a
MS
366
367 cg->password_data = user_data;
ef416fc2 368}
369
370
371/*
5a6b583a 372 * 'cupsSetServer()' - Set the default server name and port.
ef416fc2 373 *
374 * The "server" string can be a fully-qualified hostname, a numeric
5a6b583a
MS
375 * IPv4 or IPv6 address, or a domain socket pathname. Hostnames and numeric IP
376 * addresses can be optionally followed by a colon and port number to override
377 * the default port 631, e.g. "hostname:8631". Pass @code NULL@ to restore the
378 * default server name and port.
379 *
380 * Note: The current server is tracked separately for each thread in a program.
381 * Multi-threaded programs that override the server need to do so in each
382 * thread for the same server to be used.
ef416fc2 383 */
384
385void
386cupsSetServer(const char *server) /* I - Server name */
387{
0cb67df3
MS
388 char *options, /* Options */
389 *port; /* Pointer to port */
ef416fc2 390 _cups_globals_t *cg = _cupsGlobals(); /* Pointer to library globals */
391
392
393 if (server)
394 {
395 strlcpy(cg->server, server, sizeof(cg->server));
396
0cb67df3
MS
397 if (cg->server[0] != '/' && (options = strrchr(cg->server, '/')) != NULL)
398 {
399 *options++ = '\0';
400
401 if (!strcmp(options, "version=1.0"))
402 cg->server_version = 10;
403 else if (!strcmp(options, "version=1.1"))
404 cg->server_version = 11;
405 else if (!strcmp(options, "version=2.0"))
406 cg->server_version = 20;
407 else if (!strcmp(options, "version=2.1"))
408 cg->server_version = 21;
409 else if (!strcmp(options, "version=2.2"))
410 cg->server_version = 22;
411 }
567f49cb
MS
412 else
413 cg->server_version = 20;
0cb67df3 414
ef416fc2 415 if (cg->server[0] != '/' && (port = strrchr(cg->server, ':')) != NULL &&
416 !strchr(port, ']') && isdigit(port[1] & 255))
417 {
418 *port++ = '\0';
419
e07d4801 420 cg->ipp_port = atoi(port);
ef416fc2 421 }
422
4b9daaf4
MS
423 if (!cg->ipp_port)
424 cups_set_default_ipp_port(cg);
425
ef416fc2 426 if (cg->server[0] == '/')
5a9febac 427 strlcpy(cg->servername, "localhost", sizeof(cg->servername));
ef416fc2 428 else
429 strlcpy(cg->servername, cg->server, sizeof(cg->servername));
430 }
431 else
432 {
0cb67df3
MS
433 cg->server[0] = '\0';
434 cg->servername[0] = '\0';
435 cg->server_version = 20;
4b9daaf4 436 cg->ipp_port = 0;
ef416fc2 437 }
5a738aea
MS
438
439 if (cg->http)
440 {
441 httpClose(cg->http);
442 cg->http = NULL;
443 }
ef416fc2 444}
445
446
7cf5915e
MS
447/*
448 * 'cupsSetServerCertCB()' - Set the server certificate callback.
449 *
450 * Pass @code NULL@ to restore the default callback.
451 *
452 * Note: The current credentials callback is tracked separately for each thread
453 * in a program. Multi-threaded programs that override the callback need to do
454 * so in each thread for the same callback to be used.
455 *
8072030b 456 * @since CUPS 1.5/macOS 10.7@
7cf5915e
MS
457 */
458
459void
460cupsSetServerCertCB(
461 cups_server_cert_cb_t cb, /* I - Callback function */
462 void *user_data) /* I - User data pointer */
463{
464 _cups_globals_t *cg = _cupsGlobals(); /* Pointer to library globals */
465
466
467 cg->server_cert_cb = cb;
468 cg->server_cert_data = user_data;
469}
470
471
ef416fc2 472/*
473 * 'cupsSetUser()' - Set the default user name.
474 *
5a738aea 475 * Pass @code NULL@ to restore the default user name.
5a6b583a
MS
476 *
477 * Note: The current user name is tracked separately for each thread in a
478 * program. Multi-threaded programs that override the user name need to do so
479 * in each thread for the same user name to be used.
ef416fc2 480 */
481
482void
483cupsSetUser(const char *user) /* I - User name */
484{
485 _cups_globals_t *cg = _cupsGlobals(); /* Pointer to library globals */
486
487
488 if (user)
489 strlcpy(cg->user, user, sizeof(cg->user));
490 else
491 cg->user[0] = '\0';
492}
493
494
db8b865d
MS
495/*
496 * 'cupsSetUserAgent()' - Set the default HTTP User-Agent string.
497 *
498 * Setting the string to NULL forces the default value containing the CUPS
499 * version, IPP version, and operating system version and architecture.
500 *
8072030b 501 * @since CUPS 1.7/macOS 10.9@
db8b865d
MS
502 */
503
504void
505cupsSetUserAgent(const char *user_agent)/* I - User-Agent string or @code NULL@ */
506{
507 _cups_globals_t *cg = _cupsGlobals();
508 /* Thread globals */
19dc16f7 509#ifdef _WIN32
db8b865d 510 SYSTEM_INFO sysinfo; /* System information */
104c5283 511 OSVERSIONINFOA version; /* OS version info */
588c2205
MS
512 const char *machine; /* Hardware/machine name */
513#elif defined(__APPLE__)
514 struct utsname name; /* uname info */
515 char version[256]; /* macOS/iOS version */
516 size_t len; /* Length of value */
db8b865d
MS
517#else
518 struct utsname name; /* uname info */
19dc16f7 519#endif /* _WIN32 */
db8b865d
MS
520
521
522 if (user_agent)
523 {
524 strlcpy(cg->user_agent, user_agent, sizeof(cg->user_agent));
525 return;
526 }
527
59cd12c6
MS
528 if (cg->uatokens < _CUPS_UATOKENS_OS)
529 {
530 switch (cg->uatokens)
531 {
532 default :
533 case _CUPS_UATOKENS_NONE :
534 cg->user_agent[0] = '\0';
535 break;
536 case _CUPS_UATOKENS_PRODUCT_ONLY :
537 strlcpy(cg->user_agent, "CUPS IPP", sizeof(cg->user_agent));
538 break;
539 case _CUPS_UATOKENS_MAJOR :
540 snprintf(cg->user_agent, sizeof(cg->user_agent), "CUPS/%d IPP/2", CUPS_VERSION_MAJOR);
541 break;
542 case _CUPS_UATOKENS_MINOR :
543 snprintf(cg->user_agent, sizeof(cg->user_agent), "CUPS/%d.%d IPP/2.1", CUPS_VERSION_MAJOR, CUPS_VERSION_MINOR);
544 break;
545 case _CUPS_UATOKENS_MINIMAL :
546 strlcpy(cg->user_agent, CUPS_MINIMAL " IPP/2.1", sizeof(cg->user_agent));
547 break;
548 }
549 }
550
19dc16f7 551#ifdef _WIN32
588c2205
MS
552 /*
553 * Gather Windows version information for the User-Agent string...
554 */
555
db8b865d 556 version.dwOSVersionInfoSize = sizeof(OSVERSIONINFO);
86206ccf 557 GetVersionExA(&version);
db8b865d
MS
558 GetNativeSystemInfo(&sysinfo);
559
588c2205
MS
560 switch (sysinfo.wProcessorArchitecture)
561 {
562 case PROCESSOR_ARCHITECTURE_AMD64 :
563 machine = "amd64";
564 break;
565
566 case PROCESSOR_ARCHITECTURE_ARM :
567 machine = "arm";
568 break;
569
570 case PROCESSOR_ARCHITECTURE_IA64 :
571 machine = "ia64";
572 break;
573
574 case PROCESSOR_ARCHITECTURE_INTEL :
575 machine = "intel";
576 break;
577
578 default :
579 machine = "unknown";
580 break;
581 }
582
59cd12c6
MS
583 if (cg->uatokens == _CUPS_UATOKENS_OS)
584 snprintf(cg->user_agent, sizeof(cg->user_agent), CUPS_MINIMAL " (Windows %d.%d) IPP/2.0", version.dwMajorVersion, version.dwMinorVersion);
585 else
586 snprintf(cg->user_agent, sizeof(cg->user_agent), CUPS_MINIMAL " (Windows %d.%d; %s) IPP/2.0", version.dwMajorVersion, version.dwMinorVersion, machine);
588c2205
MS
587
588#elif defined(__APPLE__)
589 /*
590 * Gather macOS/iOS version information for the User-Agent string...
591 */
592
593 uname(&name);
594
595 len = sizeof(version) - 1;
596 if (!sysctlbyname("kern.osproductversion", version, &len, NULL, 0))
597 version[len] = '\0';
598 else
599 strlcpy(version, "unknown", sizeof(version));
600
3c2cb822 601# if TARGET_OS_OSX
59cd12c6
MS
602 if (cg->uatokens == _CUPS_UATOKENS_OS)
603 snprintf(cg->user_agent, sizeof(cg->user_agent), CUPS_MINIMAL " (macOS %s) IPP/2.0", version);
604 else
605 snprintf(cg->user_agent, sizeof(cg->user_agent), CUPS_MINIMAL " (macOS %s; %s) IPP/2.0", version, name.machine);
606
3c2cb822 607# else
59cd12c6
MS
608 if (cg->uatokens == _CUPS_UATOKENS_OS)
609 snprintf(cg->user_agent, sizeof(cg->user_agent), CUPS_MINIMAL " (iOS %s) IPP/2.0", version);
610 else
611 snprintf(cg->user_agent, sizeof(cg->user_agent), CUPS_MINIMAL " (iOS %s; %s) IPP/2.0", version, name.machine);
3c2cb822 612# endif /* TARGET_OS_OSX */
db8b865d
MS
613
614#else
588c2205
MS
615 /*
616 * Gather generic UNIX version information for the User-Agent string...
617 */
618
db8b865d
MS
619 uname(&name);
620
59cd12c6
MS
621 if (cg->uatokens == _CUPS_UATOKENS_OS)
622 snprintf(cg->user_agent, sizeof(cg->user_agent), CUPS_MINIMAL " (%s %s) IPP/2.0", name.sysname, name.release);
623 else
624 snprintf(cg->user_agent, sizeof(cg->user_agent), CUPS_MINIMAL " (%s %s; %s) IPP/2.0", name.sysname, name.release, name.machine);
19dc16f7 625#endif /* _WIN32 */
db8b865d
MS
626}
627
628
ef416fc2 629/*
630 * 'cupsUser()' - Return the current user's name.
5a6b583a
MS
631 *
632 * Note: The current user name is tracked separately for each thread in a
633 * program. Multi-threaded programs that override the user name with the
634 * @link cupsSetUser@ function need to do so in each thread for the same user
635 * name to be used.
ef416fc2 636 */
637
638const char * /* O - User name */
639cupsUser(void)
640{
641 _cups_globals_t *cg = _cupsGlobals(); /* Pointer to library globals */
642
643
644 if (!cg->user[0])
3e7fe0ca 645 _cupsSetDefaults();
ef416fc2 646
647 return (cg->user);
648}
649
650
db8b865d
MS
651/*
652 * 'cupsUserAgent()' - Return the default HTTP User-Agent string.
653 *
8072030b 654 * @since CUPS 1.7/macOS 10.9@
db8b865d
MS
655 */
656
657const char * /* O - User-Agent string */
658cupsUserAgent(void)
659{
660 _cups_globals_t *cg = _cupsGlobals(); /* Thread globals */
661
662
663 if (!cg->user_agent[0])
664 cupsSetUserAgent(NULL);
665
666 return (cg->user_agent);
667}
668
669
ef416fc2 670/*
671 * '_cupsGetPassword()' - Get a password from the user.
672 */
673
dcb445bc 674const char * /* O - Password or @code NULL@ if none */
ef416fc2 675_cupsGetPassword(const char *prompt) /* I - Prompt string */
676{
19dc16f7 677#ifdef _WIN32
dcb445bc
MS
678 HANDLE tty; /* Console handle */
679 DWORD mode; /* Console mode */
680 char passch, /* Current key press */
681 *passptr, /* Pointer into password string */
682 *passend; /* End of password string */
12f89d24 683 DWORD passbytes; /* Bytes read */
dcb445bc
MS
684 _cups_globals_t *cg = _cupsGlobals();
685 /* Thread globals */
686
687
5a6b583a 688 /*
dcb445bc 689 * Disable input echo and set raw input...
5a6b583a
MS
690 */
691
dcb445bc
MS
692 if ((tty = GetStdHandle(STD_INPUT_HANDLE)) == INVALID_HANDLE_VALUE)
693 return (NULL);
694
695 if (!GetConsoleMode(tty, &mode))
696 return (NULL);
697
698 if (!SetConsoleMode(tty, 0))
699 return (NULL);
700
701 /*
702 * Display the prompt...
703 */
704
705 printf("%s ", prompt);
706 fflush(stdout);
707
708 /*
709 * Read the password string from /dev/tty until we get interrupted or get a
710 * carriage return or newline...
711 */
712
713 passptr = cg->password;
714 passend = cg->password + sizeof(cg->password) - 1;
715
12f89d24 716 while (ReadFile(tty, &passch, 1, &passbytes, NULL))
dcb445bc
MS
717 {
718 if (passch == 0x0A || passch == 0x0D)
719 {
720 /*
721 * Enter/return...
722 */
723
724 break;
725 }
726 else if (passch == 0x08 || passch == 0x7F)
727 {
728 /*
729 * Backspace/delete (erase character)...
730 */
731
732 if (passptr > cg->password)
733 {
734 passptr --;
735 fputs("\010 \010", stdout);
736 }
737 else
738 putchar(0x07);
739 }
740 else if (passch == 0x15)
741 {
742 /*
743 * CTRL+U (erase line)
744 */
745
746 if (passptr > cg->password)
747 {
748 while (passptr > cg->password)
749 {
750 passptr --;
751 fputs("\010 \010", stdout);
752 }
753 }
754 else
755 putchar(0x07);
756 }
757 else if (passch == 0x03)
758 {
759 /*
760 * CTRL+C...
761 */
762
763 passptr = cg->password;
764 break;
765 }
766 else if ((passch & 255) < 0x20 || passptr >= passend)
767 putchar(0x07);
768 else
769 {
770 *passptr++ = passch;
771 putchar(_CUPS_PASSCHAR);
772 }
773
774 fflush(stdout);
775 }
776
777 putchar('\n');
778 fflush(stdout);
779
780 /*
781 * Cleanup...
782 */
783
784 SetConsoleMode(tty, mode);
785
786 /*
787 * Return the proper value...
788 */
789
790 if (passbytes == 1 && passptr > cg->password)
791 {
792 *passptr = '\0';
793 return (cg->password);
794 }
795 else
796 {
797 memset(cg->password, 0, sizeof(cg->password));
798 return (NULL);
799 }
5a6b583a
MS
800
801#else
dcb445bc
MS
802 int tty; /* /dev/tty - never read from stdin */
803 struct termios original, /* Original input mode */
804 noecho; /* No echo input mode */
805 char passch, /* Current key press */
806 *passptr, /* Pointer into password string */
807 *passend; /* End of password string */
808 ssize_t passbytes; /* Bytes read */
809 _cups_globals_t *cg = _cupsGlobals();
810 /* Thread globals */
811
812
5a6b583a 813 /*
dcb445bc 814 * Disable input echo and set raw input...
5a6b583a
MS
815 */
816
dcb445bc
MS
817 if ((tty = open("/dev/tty", O_RDONLY)) < 0)
818 return (NULL);
819
820 if (tcgetattr(tty, &original))
821 {
822 close(tty);
823 return (NULL);
824 }
825
826 noecho = original;
7e86f2f6 827 noecho.c_lflag &= (tcflag_t)~(ICANON | ECHO | ECHOE | ISIG);
a8db9df8
MS
828 noecho.c_cc[VMIN] = 1;
829 noecho.c_cc[VTIME] = 0;
7cf5915e 830
dcb445bc
MS
831 if (tcsetattr(tty, TCSAFLUSH, &noecho))
832 {
833 close(tty);
7cf5915e 834 return (NULL);
dcb445bc
MS
835 }
836
837 /*
838 * Display the prompt...
839 */
840
841 printf("%s ", prompt);
842 fflush(stdout);
843
844 /*
845 * Read the password string from /dev/tty until we get interrupted or get a
846 * carriage return or newline...
847 */
848
849 passptr = cg->password;
850 passend = cg->password + sizeof(cg->password) - 1;
851
852 while ((passbytes = read(tty, &passch, 1)) == 1)
853 {
8dd318e5
MS
854 if (passch == noecho.c_cc[VEOL] ||
855# ifdef VEOL2
856 passch == noecho.c_cc[VEOL2] ||
857# endif /* VEOL2 */
dcb445bc
MS
858 passch == 0x0A || passch == 0x0D)
859 {
860 /*
861 * Enter/return...
862 */
863
864 break;
865 }
866 else if (passch == noecho.c_cc[VERASE] ||
867 passch == 0x08 || passch == 0x7F)
868 {
869 /*
870 * Backspace/delete (erase character)...
871 */
872
873 if (passptr > cg->password)
874 {
875 passptr --;
876 fputs("\010 \010", stdout);
877 }
878 else
879 putchar(0x07);
880 }
881 else if (passch == noecho.c_cc[VKILL])
882 {
883 /*
884 * CTRL+U (erase line)
885 */
886
887 if (passptr > cg->password)
888 {
889 while (passptr > cg->password)
890 {
891 passptr --;
892 fputs("\010 \010", stdout);
893 }
894 }
895 else
896 putchar(0x07);
897 }
898 else if (passch == noecho.c_cc[VINTR] || passch == noecho.c_cc[VQUIT] ||
899 passch == noecho.c_cc[VEOF])
900 {
901 /*
902 * CTRL+C, CTRL+D, or CTRL+Z...
903 */
904
905 passptr = cg->password;
906 break;
907 }
908 else if ((passch & 255) < 0x20 || passptr >= passend)
909 putchar(0x07);
910 else
911 {
912 *passptr++ = passch;
913 putchar(_CUPS_PASSCHAR);
914 }
915
916 fflush(stdout);
917 }
918
919 putchar('\n');
920 fflush(stdout);
921
922 /*
923 * Cleanup...
924 */
925
926 tcsetattr(tty, TCSAFLUSH, &original);
927 close(tty);
928
929 /*
930 * Return the proper value...
931 */
932
933 if (passbytes == 1 && passptr > cg->password)
934 {
935 *passptr = '\0';
936 return (cg->password);
937 }
7cf5915e 938 else
dcb445bc
MS
939 {
940 memset(cg->password, 0, sizeof(cg->password));
941 return (NULL);
942 }
19dc16f7 943#endif /* _WIN32 */
5a6b583a 944}
ef416fc2 945
946
eac3a0a0
MS
947#ifdef HAVE_GSSAPI
948/*
949 * '_cupsGSSServiceName()' - Get the GSS (Kerberos) service name.
950 */
951
952const char *
953_cupsGSSServiceName(void)
954{
955 _cups_globals_t *cg = _cupsGlobals(); /* Thread globals */
956
957
958 if (!cg->gss_service_name[0])
959 _cupsSetDefaults();
960
961 return (cg->gss_service_name);
962}
963#endif /* HAVE_GSSAPI */
964
965
ef416fc2 966/*
e07d4801 967 * '_cupsSetDefaults()' - Set the default server, port, and encryption.
b423cd4c 968 */
969
e07d4801
MS
970void
971_cupsSetDefaults(void)
b423cd4c 972{
973 cups_file_t *fp; /* File */
b423cd4c 974 char filename[1024]; /* Filename */
3abb875b 975 _cups_client_conf_t cc; /* client.conf values */
b423cd4c 976 _cups_globals_t *cg = _cupsGlobals(); /* Pointer to library globals */
977
978
e07d4801
MS
979 DEBUG_puts("_cupsSetDefaults()");
980
981 /*
3abb875b
MS
982 * Load initial client.conf values...
983 */
984
985 cups_init_client_conf(&cc);
986
987 /*
988 * Read the /etc/cups/client.conf and ~/.cups/client.conf files, if
989 * present.
990 */
991
992 snprintf(filename, sizeof(filename), "%s/client.conf", cg->cups_serverroot);
993 if ((fp = cupsFileOpen(filename, "r")) != NULL)
994 {
995 cups_read_client_conf(fp, &cc);
996 cupsFileClose(fp);
997 }
998
e2eb28cf 999 if (cg->home)
3abb875b
MS
1000 {
1001 /*
1002 * Look for ~/.cups/client.conf...
1003 */
1004
e2eb28cf 1005 snprintf(filename, sizeof(filename), "%s/.cups/client.conf", cg->home);
3abb875b
MS
1006 if ((fp = cupsFileOpen(filename, "r")) != NULL)
1007 {
1008 cups_read_client_conf(fp, &cc);
1009 cupsFileClose(fp);
1010 }
1011 }
1012
1013 /*
1014 * Finalize things so every client.conf value is set...
e07d4801
MS
1015 */
1016
3abb875b
MS
1017 cups_finalize_client_conf(&cc);
1018
59cd12c6
MS
1019 cg->uatokens = cc.uatokens;
1020
3abb875b
MS
1021 if (cg->encryption == (http_encryption_t)-1)
1022 cg->encryption = cc.encryption;
1023
1024 if (!cg->server[0] || !cg->ipp_port)
1025 cupsSetServer(cc.server_name);
1026
1027 if (!cg->ipp_port)
4b9daaf4 1028 cups_set_default_ipp_port(cg);
3abb875b
MS
1029
1030 if (!cg->user[0])
1031 strlcpy(cg->user, cc.user, sizeof(cg->user));
1032
1033#ifdef HAVE_GSSAPI
1034 if (!cg->gss_service_name[0])
1035 strlcpy(cg->gss_service_name, cc.gss_service_name, sizeof(cg->gss_service_name));
1036#endif /* HAVE_GSSAPI */
1037
08d56b1f
MS
1038 if (cg->trust_first < 0)
1039 cg->trust_first = cc.trust_first;
1040
3abb875b
MS
1041 if (cg->any_root < 0)
1042 cg->any_root = cc.any_root;
1043
1044 if (cg->expired_certs < 0)
1045 cg->expired_certs = cc.expired_certs;
1046
1047 if (cg->validate_certs < 0)
1048 cg->validate_certs = cc.validate_certs;
1049
1050#ifdef HAVE_SSL
8f1fbdec 1051 _httpTLSSetOptions(cc.ssl_options | _HTTP_TLS_SET_DEFAULT, cc.ssl_min_version, cc.ssl_max_version);
3abb875b
MS
1052#endif /* HAVE_SSL */
1053}
1054
1055
08d56b1f
MS
1056#ifdef __APPLE__
1057/*
1058 * 'cups_apple_get_boolean()' - Get a boolean setting from the CUPS preferences.
1059 */
1060
1061static int /* O - 1 if set, 0 otherwise */
1062cups_apple_get_boolean(
1063 CFStringRef key, /* I - Key (name) */
1064 int *value) /* O - Boolean value */
1065{
1066 Boolean bval, /* Preference value */
1067 bval_set; /* Value is set? */
1068
1069
1070 bval = CFPreferencesGetAppBooleanValue(key, kCUPSPrintingPrefs, &bval_set);
1071
1072 if (bval_set)
1073 *value = (int)bval;
1074
1075 return ((int)bval_set);
1076}
1077
1078
1079/*
1080 * 'cups_apple_get_string()' - Get a string setting from the CUPS preferences.
1081 */
1082
1083static int /* O - 1 if set, 0 otherwise */
1084cups_apple_get_string(
1085 CFStringRef key, /* I - Key (name) */
1086 char *value, /* O - String value */
1087 size_t valsize) /* I - Size of value buffer */
1088{
1089 CFStringRef sval; /* String value */
1090
1091
1092 if ((sval = CFPreferencesCopyAppValue(key, kCUPSPrintingPrefs)) != NULL)
1093 {
1094 Boolean result = CFStringGetCString(sval, value, (CFIndex)valsize, kCFStringEncodingUTF8);
1095
1096 CFRelease(sval);
1097
1098 if (result)
1099 return (1);
1100 }
1101
1102 return (0);
1103}
1104#endif /* __APPLE__ */
1105
1106
3abb875b
MS
1107/*
1108 * 'cups_boolean_value()' - Convert a string to a boolean value.
1109 */
1110
1111static int /* O - Boolean value */
1112cups_boolean_value(const char *value) /* I - String value */
1113{
1114 return (!_cups_strcasecmp(value, "yes") || !_cups_strcasecmp(value, "on") || !_cups_strcasecmp(value, "true"));
1115}
1116
1117
1118/*
1119 * 'cups_finalize_client_conf()' - Finalize client.conf values.
1120 */
1121
1122static void
1123cups_finalize_client_conf(
1124 _cups_client_conf_t *cc) /* I - client.conf values */
1125{
1126 const char *value; /* Environment variable */
1127
1128
08d56b1f
MS
1129 if ((value = getenv("CUPS_TRUSTFIRST")) != NULL)
1130 cc->trust_first = cups_boolean_value(value);
1131
3abb875b
MS
1132 if ((value = getenv("CUPS_ANYROOT")) != NULL)
1133 cc->any_root = cups_boolean_value(value);
1134
1135 if ((value = getenv("CUPS_ENCRYPTION")) != NULL)
1136 cups_set_encryption(cc, value);
1137
1138 if ((value = getenv("CUPS_EXPIREDCERTS")) != NULL)
1139 cc->expired_certs = cups_boolean_value(value);
1140
07ed0e9a 1141#ifdef HAVE_GSSAPI
3abb875b
MS
1142 if ((value = getenv("CUPS_GSSSERVICENAME")) != NULL)
1143 cups_set_gss_service_name(cc, value);
07ed0e9a 1144#endif /* HAVE_GSSAPI */
3abb875b
MS
1145
1146 if ((value = getenv("CUPS_SERVER")) != NULL)
1147 cups_set_server_name(cc, value);
1148
1149 if ((value = getenv("CUPS_USER")) != NULL)
1150 cups_set_user(cc, value);
1151
1152 if ((value = getenv("CUPS_VALIDATECERTS")) != NULL)
1153 cc->validate_certs = cups_boolean_value(value);
e07d4801
MS
1154
1155 /*
3abb875b 1156 * Then apply defaults for those values that haven't been set...
e07d4801
MS
1157 */
1158
08d56b1f
MS
1159 if (cc->trust_first < 0)
1160 cc->trust_first = 1;
1161
3abb875b
MS
1162 if (cc->any_root < 0)
1163 cc->any_root = 1;
1164
1165 if (cc->encryption == (http_encryption_t)-1)
1166 cc->encryption = HTTP_ENCRYPTION_IF_REQUESTED;
1167
1168 if (cc->expired_certs < 0)
08d56b1f 1169 cc->expired_certs = 0;
3abb875b
MS
1170
1171#ifdef HAVE_GSSAPI
1172 if (!cc->gss_service_name[0])
1173 cups_set_gss_service_name(cc, CUPS_DEFAULT_GSSSERVICENAME);
1174#endif /* HAVE_GSSAPI */
1175
1176 if (!cc->server_name[0])
e07d4801 1177 {
63aefcd5 1178 /*
3abb875b
MS
1179 * If we are compiled with domain socket support, only use the
1180 * domain socket if it exists and has the right permissions...
63aefcd5
MS
1181 */
1182
9e24f768
MS
1183#if defined(__APPLE__) && !TARGET_OS_OSX
1184 cups_set_server_name(cc, "/private/var/run/printd");
1185
1186#else
1187# ifdef CUPS_DEFAULT_DOMAINSOCKET
89b7fd55 1188 if (!access(CUPS_DEFAULT_DOMAINSOCKET, R_OK))
3abb875b
MS
1189 cups_set_server_name(cc, CUPS_DEFAULT_DOMAINSOCKET);
1190 else
9e24f768
MS
1191# endif /* CUPS_DEFAULT_DOMAINSOCKET */
1192 cups_set_server_name(cc, "localhost");
1193#endif /* __APPLE__ && !TARGET_OS_OSX */
3abb875b 1194 }
63aefcd5 1195
3abb875b
MS
1196 if (!cc->user[0])
1197 {
19dc16f7 1198#ifdef _WIN32
63aefcd5 1199 /*
3abb875b 1200 * Get the current user name from the OS...
63aefcd5
MS
1201 */
1202
3abb875b 1203 DWORD size; /* Size of string */
63aefcd5 1204
3abb875b 1205 size = sizeof(cc->user);
86206ccf 1206 if (!GetUserNameA(cc->user, &size))
3abb875b 1207#else
63aefcd5 1208 /*
3abb875b 1209 * Try the USER environment variable as the default username...
63aefcd5
MS
1210 */
1211
3abb875b
MS
1212 const char *envuser = getenv("USER");
1213 /* Default username */
1214 struct passwd *pw = NULL; /* Account information */
1215
1216 if (envuser)
d09495fa 1217 {
10d09e33 1218 /*
3abb875b
MS
1219 * Validate USER matches the current UID, otherwise don't allow it to
1220 * override things... This makes sure that printing after doing su
1221 * or sudo records the correct username.
10d09e33 1222 */
e07d4801 1223
3abb875b
MS
1224 if ((pw = getpwnam(envuser)) != NULL && pw->pw_uid != getuid())
1225 pw = NULL;
1226 }
1227
1228 if (!pw)
1229 pw = getpwuid(getuid());
e07d4801 1230
3abb875b
MS
1231 if (pw)
1232 strlcpy(cc->user, pw->pw_name, sizeof(cc->user));
1233 else
19dc16f7 1234#endif /* _WIN32 */
3abb875b 1235 {
e07d4801 1236 /*
3abb875b 1237 * Use the default "unknown" user name...
e07d4801
MS
1238 */
1239
3abb875b 1240 strlcpy(cc->user, "unknown", sizeof(cc->user));
63aefcd5 1241 }
e07d4801 1242 }
3abb875b
MS
1243
1244 if (cc->validate_certs < 0)
1245 cc->validate_certs = 0;
1246}
1247
1248
1249/*
1250 * 'cups_init_client_conf()' - Initialize client.conf values.
1251 */
1252
1253static void
1254cups_init_client_conf(
1255 _cups_client_conf_t *cc) /* I - client.conf values */
1256{
1257 /*
1258 * Clear all values to "not set"...
1259 */
1260
1261 memset(cc, 0, sizeof(_cups_client_conf_t));
1262
59cd12c6
MS
1263 cc->uatokens = _CUPS_UATOKENS_MINIMAL;
1264
3c2cb822 1265#if defined(__APPLE__) && !TARGET_OS_OSX
588c2205 1266 cups_set_user(cc, "mobile");
3c2cb822 1267#endif /* __APPLE__ && !TARGET_OS_OSX */
588c2205 1268
60da78ba 1269#ifdef HAVE_SSL
c88f441f
MS
1270 cc->ssl_min_version = _HTTP_TLS_1_0;
1271 cc->ssl_max_version = _HTTP_TLS_MAX;
60da78ba 1272#endif /* HAVE_SSL */
c88f441f
MS
1273 cc->encryption = (http_encryption_t)-1;
1274 cc->trust_first = -1;
1275 cc->any_root = -1;
1276 cc->expired_certs = -1;
1277 cc->validate_certs = -1;
08d56b1f
MS
1278
1279 /*
1280 * Load settings from the org.cups.PrintingPrefs plist (which trump
1281 * everything...)
1282 */
1283
59cd12c6 1284#if defined(__APPLE__)
08d56b1f 1285 char sval[1024]; /* String value */
59cd12c6 1286# ifdef HAVE_SSL
08d56b1f
MS
1287 int bval; /* Boolean value */
1288
1289 if (cups_apple_get_boolean(kAllowAnyRootKey, &bval))
1290 cc->any_root = bval;
1291
1292 if (cups_apple_get_boolean(kAllowExpiredCertsKey, &bval))
1293 cc->expired_certs = bval;
1294
1295 if (cups_apple_get_string(kEncryptionKey, sval, sizeof(sval)))
1296 cups_set_encryption(cc, sval);
1297
1298 if (cups_apple_get_string(kSSLOptionsKey, sval, sizeof(sval)))
588c2205 1299 {
08d56b1f 1300 cups_set_ssl_options(cc, sval);
588c2205
MS
1301 }
1302 else
1303 {
1304 sval[0] = '\0';
1305
1306 if (cups_apple_get_boolean(kAllowRC4, &bval) && bval)
1307 strlcat(sval, " AllowRC4", sizeof(sval));
1308 if (cups_apple_get_boolean(kAllowSSL3, &bval) && bval)
1309 strlcat(sval, " AllowSSL3", sizeof(sval));
1310 if (cups_apple_get_boolean(kAllowDH, &bval) && bval)
1311 strlcat(sval, " AllowDH", sizeof(sval));
1312
1313 if (sval[0])
1314 cups_set_ssl_options(cc, sval);
1315 }
08d56b1f
MS
1316
1317 if (cups_apple_get_boolean(kTrustOnFirstUseKey, &bval))
1318 cc->trust_first = bval;
1319
1320 if (cups_apple_get_boolean(kValidateCertsKey, &bval))
1321 cc->validate_certs = bval;
59cd12c6
MS
1322# endif /* HAVE_SSL */
1323
ec8beb89
MS
1324 if (cups_apple_get_string(kDigestOptionsKey, sval, sizeof(sval)))
1325 cups_set_digestoptions(cc, sval);
1326
1327 if (cups_apple_get_string(kUserKey, sval, sizeof(sval)))
1328 strlcpy(cc->user, sval, sizeof(cc->user));
1329
59cd12c6 1330 if (cups_apple_get_string(kUserAgentTokensKey, sval, sizeof(sval)))
59cd12c6 1331 cups_set_uatokens(cc, sval);
59cd12c6 1332#endif /* __APPLE__ */
e07d4801
MS
1333}
1334
1335
1336/*
1337 * 'cups_read_client_conf()' - Read a client.conf file.
1338 */
1339
1340static void
1341cups_read_client_conf(
3abb875b
MS
1342 cups_file_t *fp, /* I - File to read */
1343 _cups_client_conf_t *cc) /* I - client.conf values */
e07d4801
MS
1344{
1345 int linenum; /* Current line number */
1346 char line[1024], /* Line from file */
3abb875b 1347 *value; /* Pointer into line */
e07d4801
MS
1348
1349
1350 /*
1351 * Read from the file...
1352 */
1353
1354 linenum = 0;
1355 while (cupsFileGetConf(fp, line, sizeof(line), &value, &linenum))
1356 {
ec8beb89
MS
1357 if (!_cups_strcasecmp(line, "DigestOptions") && value)
1358 cups_set_digestoptions(cc, value);
1359 else if (!_cups_strcasecmp(line, "Encryption") && value)
3abb875b 1360 cups_set_encryption(cc, value);
85dda01c
MS
1361#ifndef __APPLE__
1362 /*
8072030b 1363 * The ServerName directive is not supported on macOS due to app
3abb875b 1364 * sandboxing restrictions, i.e. not all apps request network access.
85dda01c 1365 */
3abb875b
MS
1366 else if (!_cups_strcasecmp(line, "ServerName") && value)
1367 cups_set_server_name(cc, value);
85dda01c 1368#endif /* !__APPLE__ */
3abb875b
MS
1369 else if (!_cups_strcasecmp(line, "User") && value)
1370 cups_set_user(cc, value);
59cd12c6
MS
1371 else if (!_cups_strcasecmp(line, "UserAgentTokens") && value)
1372 cups_set_uatokens(cc, value);
08d56b1f
MS
1373 else if (!_cups_strcasecmp(line, "TrustOnFirstUse") && value)
1374 cc->trust_first = cups_boolean_value(value);
3abb875b
MS
1375 else if (!_cups_strcasecmp(line, "AllowAnyRoot") && value)
1376 cc->any_root = cups_boolean_value(value);
1377 else if (!_cups_strcasecmp(line, "AllowExpiredCerts") &&
7cf5915e 1378 value)
3abb875b
MS
1379 cc->expired_certs = cups_boolean_value(value);
1380 else if (!_cups_strcasecmp(line, "ValidateCerts") && value)
1381 cc->validate_certs = cups_boolean_value(value);
07ed0e9a 1382#ifdef HAVE_GSSAPI
3abb875b
MS
1383 else if (!_cups_strcasecmp(line, "GSSServiceName") && value)
1384 cups_set_gss_service_name(cc, value);
07ed0e9a 1385#endif /* HAVE_GSSAPI */
22ebb7d0 1386#ifdef HAVE_SSL
3abb875b
MS
1387 else if (!_cups_strcasecmp(line, "SSLOptions") && value)
1388 cups_set_ssl_options(cc, value);
1389#endif /* HAVE_SSL */
1390 }
1391}
63aefcd5 1392
63aefcd5 1393
4b9daaf4
MS
1394/*
1395 * 'cups_set_default_ipp_port()' - Set the default IPP port value.
1396 */
1397
1398static void
1399cups_set_default_ipp_port(
1400 _cups_globals_t *cg) /* I - Global data */
1401{
1402 const char *ipp_port; /* IPP_PORT environment variable */
1403
1404
1405 if ((ipp_port = getenv("IPP_PORT")) != NULL)
1406 {
1407 if ((cg->ipp_port = atoi(ipp_port)) <= 0)
1408 cg->ipp_port = CUPS_DEFAULT_IPP_PORT;
1409 }
1410 else
1411 cg->ipp_port = CUPS_DEFAULT_IPP_PORT;
1412}
1413
ec8beb89
MS
1414
1415/*
1416 * 'cups_set_digestoptions()' - Set the DigestOptions value.
1417 */
1418
1419static void
1420cups_set_digestoptions(
1421 _cups_client_conf_t *cc, /* I - client.conf values */
1422 const char *value) /* I - Value */
1423{
1424 if (!_cups_strcasecmp(value, "DenyMD5"))
1425 cc->digestoptions = _CUPS_DIGESTOPTIONS_DENYMD5;
1426 else if (!_cups_strcasecmp(value, "None"))
1427 cc->digestoptions = _CUPS_DIGESTOPTIONS_NONE;
1428}
1429
1430
3abb875b
MS
1431/*
1432 * 'cups_set_encryption()' - Set the Encryption value.
1433 */
63aefcd5 1434
3abb875b
MS
1435static void
1436cups_set_encryption(
1437 _cups_client_conf_t *cc, /* I - client.conf values */
1438 const char *value) /* I - Value */
1439{
1440 if (!_cups_strcasecmp(value, "never"))
1441 cc->encryption = HTTP_ENCRYPTION_NEVER;
1442 else if (!_cups_strcasecmp(value, "always"))
1443 cc->encryption = HTTP_ENCRYPTION_ALWAYS;
1444 else if (!_cups_strcasecmp(value, "required"))
1445 cc->encryption = HTTP_ENCRYPTION_REQUIRED;
1446 else
1447 cc->encryption = HTTP_ENCRYPTION_IF_REQUESTED;
1448}
e07d4801 1449
e07d4801 1450
3abb875b
MS
1451/*
1452 * 'cups_set_gss_service_name()' - Set the GSSServiceName value.
1453 */
b423cd4c 1454
3abb875b
MS
1455#ifdef HAVE_GSSAPI
1456static void
1457cups_set_gss_service_name(
1458 _cups_client_conf_t *cc, /* I - client.conf values */
1459 const char *value) /* I - Value */
1460{
1461 strlcpy(cc->gss_service_name, value, sizeof(cc->gss_service_name));
1462}
1463#endif /* HAVE_GSSAPI */
7cf5915e 1464
10d09e33 1465
3abb875b
MS
1466/*
1467 * 'cups_set_server_name()' - Set the ServerName value.
1468 */
10d09e33 1469
3abb875b
MS
1470static void
1471cups_set_server_name(
1472 _cups_client_conf_t *cc, /* I - client.conf values */
1473 const char *value) /* I - Value */
1474{
1475 strlcpy(cc->server_name, value, sizeof(cc->server_name));
1476}
10d09e33 1477
10d09e33 1478
3abb875b
MS
1479/*
1480 * 'cups_set_ssl_options()' - Set the SSLOptions value.
1481 */
10d09e33 1482
3abb875b
MS
1483#ifdef HAVE_SSL
1484static void
1485cups_set_ssl_options(
1486 _cups_client_conf_t *cc, /* I - client.conf values */
1487 const char *value) /* I - Value */
1488{
1489 /*
ee6226a5 1490 * SSLOptions [AllowRC4] [AllowSSL3] [AllowDH] [DenyTLS1.0] [None]
3abb875b 1491 */
10d09e33 1492
8f1fbdec
MS
1493 int options = _HTTP_TLS_NONE, /* SSL/TLS options */
1494 min_version = _HTTP_TLS_1_0, /* Minimum SSL/TLS version */
1495 max_version = _HTTP_TLS_MAX; /* Maximum SSL/TLS version */
3abb875b
MS
1496 char temp[256], /* Copy of value */
1497 *start, /* Start of option */
1498 *end; /* End of option */
3e7fe0ca 1499
3e7fe0ca 1500
3abb875b 1501 strlcpy(temp, value, sizeof(temp));
3e7fe0ca 1502
3abb875b
MS
1503 for (start = temp; *start; start = end)
1504 {
a8db9df8 1505 /*
3abb875b
MS
1506 * Find end of keyword...
1507 */
3e7fe0ca 1508
3abb875b
MS
1509 end = start;
1510 while (*end && !_cups_isspace(*end))
1511 end ++;
93e3d3f5 1512
3abb875b
MS
1513 if (*end)
1514 *end++ = '\0';
93e3d3f5 1515
3abb875b
MS
1516 /*
1517 * Compare...
1518 */
3e7fe0ca 1519
3abb875b
MS
1520 if (!_cups_strcasecmp(start, "AllowRC4"))
1521 options |= _HTTP_TLS_ALLOW_RC4;
1522 else if (!_cups_strcasecmp(start, "AllowSSL3"))
8f1fbdec 1523 min_version = _HTTP_TLS_SSL3;
ee6226a5
MS
1524 else if (!_cups_strcasecmp(start, "AllowDH"))
1525 options |= _HTTP_TLS_ALLOW_DH;
f2e87147
MS
1526 else if (!_cups_strcasecmp(start, "DenyCBC"))
1527 options |= _HTTP_TLS_DENY_CBC;
ee6226a5 1528 else if (!_cups_strcasecmp(start, "DenyTLS1.0"))
8f1fbdec
MS
1529 min_version = _HTTP_TLS_1_1;
1530 else if (!_cups_strcasecmp(start, "MaxTLS1.0"))
1531 max_version = _HTTP_TLS_1_0;
1532 else if (!_cups_strcasecmp(start, "MaxTLS1.1"))
1533 max_version = _HTTP_TLS_1_1;
1534 else if (!_cups_strcasecmp(start, "MaxTLS1.2"))
1535 max_version = _HTTP_TLS_1_2;
1536 else if (!_cups_strcasecmp(start, "MaxTLS1.3"))
1537 max_version = _HTTP_TLS_1_3;
1538 else if (!_cups_strcasecmp(start, "MinTLS1.0"))
1539 min_version = _HTTP_TLS_1_0;
1540 else if (!_cups_strcasecmp(start, "MinTLS1.1"))
1541 min_version = _HTTP_TLS_1_1;
1542 else if (!_cups_strcasecmp(start, "MinTLS1.2"))
1543 min_version = _HTTP_TLS_1_2;
1544 else if (!_cups_strcasecmp(start, "MinTLS1.3"))
1545 min_version = _HTTP_TLS_1_3;
3abb875b 1546 else if (!_cups_strcasecmp(start, "None"))
ee6226a5 1547 options = _HTTP_TLS_NONE;
3e7fe0ca
MS
1548 }
1549
8f1fbdec
MS
1550 cc->ssl_options = options;
1551 cc->ssl_max_version = max_version;
1552 cc->ssl_min_version = min_version;
b37d45d9 1553
8f1fbdec 1554 DEBUG_printf(("4cups_set_ssl_options(cc=%p, value=\"%s\") options=%x, min_version=%d, max_version=%d", (void *)cc, value, options, min_version, max_version));
3abb875b
MS
1555}
1556#endif /* HAVE_SSL */
07ed0e9a 1557
7cf5915e 1558
59cd12c6
MS
1559/*
1560 * 'cups_set_uatokens()' - Set the UserAgentTokens value.
1561 */
1562
1563static void
1564cups_set_uatokens(
1565 _cups_client_conf_t *cc, /* I - client.conf values */
1566 const char *value) /* I - Value */
1567{
1568 int i; /* Looping var */
1569 static const char * const uatokens[] =/* UserAgentTokens values */
1570 {
1571 "NONE",
1572 "PRODUCTONLY",
1573 "MAJOR",
1574 "MINOR",
1575 "MINIMAL",
1576 "OS",
1577 "FULL"
1578 };
1579
1580 for (i = 0; i < (int)(sizeof(uatokens) / sizeof(uatokens[0])); i ++)
1581 {
1582 if (!_cups_strcasecmp(value, uatokens[i]))
1583 {
1584 cc->uatokens = (_cups_uatokens_t)i;
1585 return;
1586 }
1587 }
1588}
1589
1590
3abb875b
MS
1591/*
1592 * 'cups_set_user()' - Set the User value.
1593 */
f51f3773 1594
3abb875b
MS
1595static void
1596cups_set_user(
1597 _cups_client_conf_t *cc, /* I - client.conf values */
1598 const char *value) /* I - Value */
1599{
1600 strlcpy(cc->user, value, sizeof(cc->user));
b423cd4c 1601}