mirror of
https://git.FreeBSD.org/src.git
synced 2024-12-22 11:17:19 +00:00
2aef693010
Rest of build to follow.
87 lines
2.3 KiB
C
87 lines
2.3 KiB
C
/*
|
|
* percent_x() takes a string and performs %<char> expansions. It aborts the
|
|
* program when the expansion would overflow the output buffer. The result
|
|
* of %<char> expansion may be passed on to a shell process. For this
|
|
* reason, characters with a special meaning to shells are replaced by
|
|
* underscores.
|
|
*
|
|
* Diagnostics are reported through syslog(3).
|
|
*
|
|
* Author: Wietse Venema, Eindhoven University of Technology, The Netherlands.
|
|
*/
|
|
|
|
#ifndef lint
|
|
static char sccsid[] = "@(#) percent_x.c 1.4 94/12/28 17:42:37";
|
|
#endif
|
|
|
|
/* System libraries. */
|
|
|
|
#include <stdio.h>
|
|
#include <syslog.h>
|
|
#include <string.h>
|
|
|
|
extern void exit();
|
|
|
|
/* Local stuff. */
|
|
|
|
#include "tcpd.h"
|
|
|
|
/* percent_x - do %<char> expansion, abort if result buffer is too small */
|
|
|
|
char *percent_x(result, result_len, string, request)
|
|
char *result;
|
|
int result_len;
|
|
char *string;
|
|
struct request_info *request;
|
|
{
|
|
char *bp = result;
|
|
char *end = result + result_len - 1; /* end of result buffer */
|
|
char *expansion;
|
|
int expansion_len;
|
|
static char ok_chars[] = "1234567890!@%-_=+:,./\
|
|
abcdefghijklmnopqrstuvwxyz\
|
|
ABCDEFGHIJKLMNOPQRSTUVWXYZ";
|
|
char *str = string;
|
|
char *cp;
|
|
int ch;
|
|
|
|
/*
|
|
* Warning: we may be called from a child process or after pattern
|
|
* matching, so we cannot use clean_exit() or tcpd_jump().
|
|
*/
|
|
|
|
while (*str) {
|
|
if (*str == '%' && (ch = str[1]) != 0) {
|
|
str += 2;
|
|
expansion =
|
|
ch == 'a' ? eval_hostaddr(request->client) :
|
|
ch == 'A' ? eval_hostaddr(request->server) :
|
|
ch == 'c' ? eval_client(request) :
|
|
ch == 'd' ? eval_daemon(request) :
|
|
ch == 'h' ? eval_hostinfo(request->client) :
|
|
ch == 'H' ? eval_hostinfo(request->server) :
|
|
ch == 'n' ? eval_hostname(request->client) :
|
|
ch == 'N' ? eval_hostname(request->server) :
|
|
ch == 'p' ? eval_pid(request) :
|
|
ch == 's' ? eval_server(request) :
|
|
ch == 'u' ? eval_user(request) :
|
|
ch == '%' ? "%" : (tcpd_warn("unrecognized %%%c", ch), "");
|
|
for (cp = expansion; *(cp += strspn(cp, ok_chars)); /* */ )
|
|
*cp = '_';
|
|
expansion_len = cp - expansion;
|
|
} else {
|
|
expansion = str++;
|
|
expansion_len = 1;
|
|
}
|
|
if (bp + expansion_len >= end) {
|
|
tcpd_warn("percent_x: expansion too long: %.30s...", result);
|
|
sleep(5);
|
|
exit(0);
|
|
}
|
|
memcpy(bp, expansion, expansion_len);
|
|
bp += expansion_len;
|
|
}
|
|
*bp = 0;
|
|
return (result);
|
|
}
|