PR_IMPLEMENT(char*) PR_GetEnvSecure(const char *var) { #ifdef HAVE_SECURE_GETENV char *ev; if (!_pr_initialized) _PR_ImplicitInitialization(); _PR_LOCK_ENV(); ev = secure_getenv(var); _PR_UNLOCK_ENV(); return ev; #else #ifdef XP_UNIX /* ** Fall back to checking uids and gids. This won't detect any other ** privilege-granting mechanisms the platform may have. This also ** can't detect the case where the process already called ** setuid(geteuid()) and/or setgid(getegid()). */ if (getuid() != geteuid() || getgid() != getegid()) { return NULL; } #endif /* XP_UNIX */ return PR_GetEnv(var); #endif /* HAVE_SECURE_GETENV */ }
PR_IMPLEMENT(char*) PR_GetEnv(const char *var) { char *ev; if (!_pr_initialized) _PR_ImplicitInitialization(); _PR_LOCK_ENV(); ev = _PR_MD_GET_ENV(var); _PR_UNLOCK_ENV(); return ev; }
PR_IMPLEMENT(PRStatus) PR_SetEnv(const char *string) { PRIntn result; if (!_pr_initialized) _PR_ImplicitInitialization(); if ( !strchr(string, '=')) return(PR_FAILURE); _PR_LOCK_ENV(); result = _PR_MD_PUT_ENV(string); _PR_UNLOCK_ENV(); return (result)? PR_FAILURE : PR_SUCCESS; }
PR_IMPLEMENT(char **) PR_DuplicateEnvironment(void) { char **the_environ, **result, **end, **src, **dst; _PR_LOCK_ENV(); #ifdef DARWIN the_environ = *(_NSGetEnviron()); #else the_environ = environ; #endif for (end = the_environ; *end != NULL; end++) /* empty loop body */; result = (char **)PR_Malloc(sizeof(char *) * (end - the_environ + 1)); if (result != NULL) { for (src = the_environ, dst = result; src != end; src++, dst++) { size_t len; len = strlen(*src) + 1; *dst = PR_Malloc(len); if (*dst == NULL) { /* Allocation failed. Must clean up the half-copied env. */ char **to_delete; for (to_delete = result; to_delete != dst; to_delete++) { PR_Free(*to_delete); } PR_Free(result); result = NULL; goto out; } memcpy(*dst, *src, len); } *dst = NULL; } out: _PR_UNLOCK_ENV(); return result; }