xref: /freebsd-src/contrib/tcp_wrappers/percent_x.c (revision 14f102eacc8434a5a1f96466752578a4167140c9)
12aef6930SMark Murray  /*
22aef6930SMark Murray   * percent_x() takes a string and performs %<char> expansions. It aborts the
32aef6930SMark Murray   * program when the expansion would overflow the output buffer. The result
42aef6930SMark Murray   * of %<char> expansion may be passed on to a shell process. For this
52aef6930SMark Murray   * reason, characters with a special meaning to shells are replaced by
62aef6930SMark Murray   * underscores.
72aef6930SMark Murray   *
82aef6930SMark Murray   * Diagnostics are reported through syslog(3).
92aef6930SMark Murray   *
102aef6930SMark Murray   * Author: Wietse Venema, Eindhoven University of Technology, The Netherlands.
112aef6930SMark Murray   */
122aef6930SMark Murray 
132aef6930SMark Murray #ifndef lint
142aef6930SMark Murray static char sccsid[] = "@(#) percent_x.c 1.4 94/12/28 17:42:37";
152aef6930SMark Murray #endif
162aef6930SMark Murray 
172aef6930SMark Murray /* System libraries. */
182aef6930SMark Murray 
192aef6930SMark Murray #include <stdio.h>
202aef6930SMark Murray #include <syslog.h>
212aef6930SMark Murray #include <string.h>
2246bcf11dSSean Bruno #include <unistd.h>
232aef6930SMark Murray 
242aef6930SMark Murray extern void exit();
252aef6930SMark Murray 
262aef6930SMark Murray /* Local stuff. */
272aef6930SMark Murray 
282aef6930SMark Murray #include "tcpd.h"
292aef6930SMark Murray 
302aef6930SMark Murray /* percent_x - do %<char> expansion, abort if result buffer is too small */
312aef6930SMark Murray 
percent_x(char * result,int result_len,char * string,struct request_info * request)32*14f102eaSEd Maste char   *percent_x(char *result, int result_len, char *string,
33*14f102eaSEd Maste     struct request_info *request)
342aef6930SMark Murray {
352aef6930SMark Murray     char   *bp = result;
362aef6930SMark Murray     char   *end = result + result_len - 1;	/* end of result buffer */
372aef6930SMark Murray     char   *expansion;
382aef6930SMark Murray     int     expansion_len;
392aef6930SMark Murray     static char ok_chars[] = "1234567890!@%-_=+:,./\
402aef6930SMark Murray abcdefghijklmnopqrstuvwxyz\
412aef6930SMark Murray ABCDEFGHIJKLMNOPQRSTUVWXYZ";
422aef6930SMark Murray     char   *str = string;
432aef6930SMark Murray     char   *cp;
442aef6930SMark Murray     int     ch;
452aef6930SMark Murray 
462aef6930SMark Murray     /*
472aef6930SMark Murray      * Warning: we may be called from a child process or after pattern
482aef6930SMark Murray      * matching, so we cannot use clean_exit() or tcpd_jump().
492aef6930SMark Murray      */
502aef6930SMark Murray 
512aef6930SMark Murray     while (*str) {
522aef6930SMark Murray 	if (*str == '%' && (ch = str[1]) != 0) {
532aef6930SMark Murray 	    str += 2;
542aef6930SMark Murray 	    expansion =
552aef6930SMark Murray 		ch == 'a' ? eval_hostaddr(request->client) :
562aef6930SMark Murray 		ch == 'A' ? eval_hostaddr(request->server) :
572aef6930SMark Murray 		ch == 'c' ? eval_client(request) :
582aef6930SMark Murray 		ch == 'd' ? eval_daemon(request) :
592aef6930SMark Murray 		ch == 'h' ? eval_hostinfo(request->client) :
602aef6930SMark Murray 		ch == 'H' ? eval_hostinfo(request->server) :
612aef6930SMark Murray 		ch == 'n' ? eval_hostname(request->client) :
622aef6930SMark Murray 		ch == 'N' ? eval_hostname(request->server) :
632aef6930SMark Murray 		ch == 'p' ? eval_pid(request) :
642aef6930SMark Murray 		ch == 's' ? eval_server(request) :
652aef6930SMark Murray 		ch == 'u' ? eval_user(request) :
662aef6930SMark Murray 		ch == '%' ? "%" : (tcpd_warn("unrecognized %%%c", ch), "");
672aef6930SMark Murray 	    for (cp = expansion; *(cp += strspn(cp, ok_chars)); /* */ )
682aef6930SMark Murray 		*cp = '_';
692aef6930SMark Murray 	    expansion_len = cp - expansion;
702aef6930SMark Murray 	} else {
712aef6930SMark Murray 	    expansion = str++;
722aef6930SMark Murray 	    expansion_len = 1;
732aef6930SMark Murray 	}
742aef6930SMark Murray 	if (bp + expansion_len >= end) {
752aef6930SMark Murray 	    tcpd_warn("percent_x: expansion too long: %.30s...", result);
762aef6930SMark Murray 	    sleep(5);
772aef6930SMark Murray 	    exit(0);
782aef6930SMark Murray 	}
792aef6930SMark Murray 	memcpy(bp, expansion, expansion_len);
802aef6930SMark Murray 	bp += expansion_len;
812aef6930SMark Murray     }
822aef6930SMark Murray     *bp = 0;
832aef6930SMark Murray     return (result);
842aef6930SMark Murray }
85