linux-pam/libpam/pam_misc.c
2000-06-20 22:10:38 +00:00

306 lines
7.0 KiB
C

/* pam_misc.c -- This is random stuff */
/*
* $Id$
*/
#include <stdarg.h>
#include <stdlib.h>
#include <stdio.h>
#include <string.h>
#include <syslog.h>
#include <ctype.h>
#include "pam_private.h"
/* caseless string comparison: POSIX does not define this.. */
int _pam_strCMP(const char *s, const char *t)
{
int cf;
do {
cf = tolower(*s) - tolower(*t);
++t;
} while (!cf && *s++);
return cf;
}
char *_pam_StrTok(char *from, const char *format, char **next)
/*
* this function is a variant of the standard strtok, it differs in that
* it takes an additional argument and doesn't nul terminate tokens until
* they are actually reached.
*/
{
char table[256], *end;
int i;
if (from == NULL && (from = *next) == NULL)
return from;
/* initialize table */
for (i=1; i<256; table[i++] = '\0');
for (i=0; format[i] ; table[(int)format[i++]] = 'y');
/* look for first non-blank char */
while (*from && table[(int)*from]) {
++from;
}
if (*from == '[') {
/*
* special case, "[...]" is considered to be a single
* object. Note, however, if one of the format[] chars is
* '[' this single string will not be read correctly.
*/
for (end=++from; *end && *end != ']'; ++end) {
if (*end == '\\' && end[1] == ']')
++end;
}
/* note, this string is stripped of its edges: "..." is what
remains */
} else if (*from) {
/* simply look for next blank char */
for (end=from; *end && !table[(int)*end]; ++end);
} else {
return (*next = NULL); /* no tokens left */
}
/* now terminate what we have */
if (*end)
*end++ = '\0';
/* indicate what it left */
if (*end) {
*next = end;
} else {
*next = NULL; /* have found last token */
}
/* return what we have */
return from;
}
/*
* Safe duplication of character strings. "Paranoid"; don't leave
* evidence of old token around for later stack analysis.
*/
char *_pam_strdup(const char *x)
{
register char *new=NULL;
if (x != NULL) {
register int i;
for (i=0; x[i]; ++i); /* length of string */
if ((new = malloc(++i)) == NULL) {
i = 0;
_pam_system_log(LOG_CRIT, "_pam_strdup: failed to get memory");
} else {
while (i-- > 0) {
new[i] = x[i];
}
}
x = NULL;
}
return new; /* return the duplicate or NULL on error */
}
/* Generate argv, argc from s */
/* caller must free(argv) */
int _pam_mkargv(char *s, char ***argv, int *argc)
{
int l;
int argvlen = 0;
char *sbuf, *sbuf_start;
char **our_argv = NULL;
char **argvbuf;
char *argvbufp;
#ifdef DEBUG
int count=0;
#endif
D(("_pam_mkargv called: %s",s));
*argc = 0;
l = strlen(s);
if (l) {
if ((sbuf = sbuf_start = _pam_strdup(s)) == NULL) {
_pam_system_log(LOG_CRIT,
"pam_mkargv: null returned by _pam_strdup");
D(("arg NULL"));
} else {
/* Overkill on the malloc, but not large */
argvlen = (l + 1) * ((sizeof(char)) + sizeof(char *));
if ((our_argv = argvbuf = malloc(argvlen)) == NULL) {
_pam_system_log(LOG_CRIT,
"pam_mkargv: null returned by malloc");
} else {
char *tmp=NULL;
argvbufp = (char *) argvbuf + (l * sizeof(char *));
D(("[%s]",sbuf));
while ((sbuf = _pam_StrTok(sbuf, " \n\t", &tmp))) {
D(("arg #%d",++count));
D(("->[%s]",sbuf));
strcpy(argvbufp, sbuf);
D(("copied token"));
*argvbuf = argvbufp;
argvbufp += strlen(argvbufp) + 1;
D(("stepped in argvbufp"));
(*argc)++;
argvbuf++;
sbuf = NULL;
D(("loop again?"));
}
_pam_drop(sbuf_start);
}
}
}
*argv = our_argv;
D(("_pam_mkargv returned"));
return(argvlen);
}
/*
* this function is used to protect the modules from accidental or
* semi-mallicious harm that an application may do to confuse the API.
*/
void _pam_sanitize(pam_handle_t *pamh)
{
/*
* this is for security. We reset the auth-tokens here.
*/
pam_set_item(pamh,PAM_AUTHTOK,NULL);
pam_set_item(pamh,PAM_OLDAUTHTOK,NULL);
}
/*
* This function scans the array and replaces the _PAM_ACTION_UNDEF
* entries with the default action.
*/
void _pam_set_default_control(int *control_array, int default_action)
{
int i;
for (i=0; i<_PAM_RETURN_VALUES; ++i) {
if (control_array[i] == _PAM_ACTION_UNDEF) {
control_array[i] = default_action;
}
}
}
/*
* This function is used to parse a control string. This string is a
* series of tokens of the following form:
*
* "[ ]*return_code[ ]*=[ ]*action/[ ]".
*/
#include "pam_tokens.h"
void _pam_parse_control(int *control_array, char *tok)
{
const char *error;
int ret;
while (*tok) {
int act, len;
/* skip leading space */
while (isspace((int)*tok) && *++tok);
if (!*tok)
break;
/* identify return code */
for (ret=0; ret<=_PAM_RETURN_VALUES; ++ret) {
len = strlen(_pam_token_returns[ret]);
if (!strncmp(_pam_token_returns[ret], tok, len)) {
break;
}
}
if (ret > _PAM_RETURN_VALUES || !*(tok += len)) {
error = "expecting return value";
goto parse_error;
}
/* observe '=' */
while (isspace((int)*tok) && *++tok);
if (!*tok || *tok++ != '=') {
error = "expecting '='";
goto parse_error;
}
/* skip leading space */
while (isspace((int)*tok) && *++tok);
if (!*tok) {
error = "expecting action";
goto parse_error;
}
/* observe action type */
for (act=0; act < (-(_PAM_ACTION_UNDEF)); ++act) {
len = strlen(_pam_token_actions[act]);
if (!strncmp(_pam_token_actions[act], tok, len)) {
act *= -1;
tok += len;
break;
}
}
if (act > 0) {
/*
* Either we have a number or we have hit an error. In
* principle, there is nothing to stop us accepting
* negative offsets. (Although we would have to think of
* another way of encoding the tokens.) However, I really
* think this would be both hard to administer and easily
* cause looping problems. So, for now, we will just
* allow forward jumps. (AGM 1998/1/7)
*/
if (!isdigit((int)*tok)) {
error = "expecting jump number";
goto parse_error;
}
/* parse a number */
act = 0;
do {
act *= 10;
act += *tok - '0'; /* XXX - this assumes ascii behavior */
} while (*++tok && isdigit((int)*tok));
if (! act) {
/* we do not allow 0 jumps. There is a token ('ignore')
for that */
error = "expecting non-zero";
goto parse_error;
}
}
/* set control_array element */
if (ret != _PAM_RETURN_VALUES) {
control_array[ret] = act;
} else {
/* set the default to 'act' */
_pam_set_default_control(control_array, act);
}
}
/* that was a success */
return;
parse_error:
/* treat everything as bad */
_pam_system_log(LOG_ERR, "pam_parse: %s; [...%s]", error, tok);
for (ret=0; ret<_PAM_RETURN_VALUES; control_array[ret++]=_PAM_ACTION_BAD);
}