003 File Manager
Current Path:
/usr/src/lib/libutil
usr
/
src
/
lib
/
libutil
/
📁
..
📄
Makefile
(3.09 KB)
📄
Makefile.depend
(274 B)
📄
_secure_path.3
(2.52 KB)
📄
_secure_path.c
(2.33 KB)
📄
auth.c
(1.66 KB)
📄
expand_number.3
(2.61 KB)
📄
expand_number.c
(2.45 KB)
📄
flopen.3
(3.35 KB)
📄
flopen.c
(3.69 KB)
📄
fparseln.3
(4.53 KB)
📄
fparseln.c
(5.27 KB)
📄
getlocalbase.3
(3.82 KB)
📄
getlocalbase.c
(2.62 KB)
📄
gr_util.c
(14.2 KB)
📄
hexdump.3
(3.01 KB)
📄
hexdump.c
(2.98 KB)
📄
humanize_number.3
(5.65 KB)
📄
humanize_number.c
(5.35 KB)
📄
kinfo_getallproc.3
(2.47 KB)
📄
kinfo_getallproc.c
(2.67 KB)
📄
kinfo_getfile.3
(2.59 KB)
📄
kinfo_getfile.c
(1.46 KB)
📄
kinfo_getproc.3
(2.44 KB)
📄
kinfo_getproc.c
(2.13 KB)
📄
kinfo_getvmmap.3
(2.85 KB)
📄
kinfo_getvmmap.c
(1.47 KB)
📄
kinfo_getvmobject.3
(2.46 KB)
📄
kinfo_getvmobject.c
(2.58 KB)
📄
kld.3
(2.69 KB)
📄
kld.c
(2.5 KB)
📄
libutil.h
(8.04 KB)
📄
login.conf.5
(16.41 KB)
📄
login_auth.3
(2.3 KB)
📄
login_auth.c
(3.01 KB)
📄
login_cap.3
(16.04 KB)
📄
login_cap.c
(19.22 KB)
📄
login_cap.h
(6.25 KB)
📄
login_class.3
(6.83 KB)
📄
login_class.c
(14 KB)
📄
login_crypt.c
(1.92 KB)
📄
login_ok.3
(4.27 KB)
📄
login_ok.c
(5.76 KB)
📄
login_times.3
(5.28 KB)
📄
login_times.c
(3.72 KB)
📄
login_tty.3
(2.25 KB)
📄
login_tty.c
(2.03 KB)
📄
pidfile.3
(6.75 KB)
📄
pidfile.c
(7.22 KB)
📄
property.3
(2.91 KB)
📄
property.c
(5.85 KB)
📄
pty.3
(4.17 KB)
📄
pty.c
(2.99 KB)
📄
pw_util.3
(6.88 KB)
📄
pw_util.c
(15.18 KB)
📄
quotafile.3
(7.32 KB)
📄
quotafile.c
(14.98 KB)
📄
realhostname.3
(2.97 KB)
📄
realhostname.c
(5.59 KB)
📄
realhostname_sa.3
(4.56 KB)
📄
stub.c
(1.73 KB)
📁
tests
📄
trimdomain.3
(2.72 KB)
📄
trimdomain.c
(3.39 KB)
📄
uucplock.3
(4.94 KB)
📄
uucplock.c
(5.5 KB)
Editing: _secure_path.c
/*- * Based on code copyright (c) 1995,1997 by * Berkeley Software Design, Inc. * All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, is permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright * notice immediately at the beginning of the file, without modification, * this list of conditions, and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * 3. This work was done expressly for inclusion into FreeBSD. Other use * is permitted provided this notation is included. * 4. Absolutely no warranty of function or purpose is made by the authors. * 5. Modifications may be freely made to this file providing the above * conditions are met. */ #include <sys/cdefs.h> __FBSDID("$FreeBSD$"); #include <sys/types.h> #include <sys/stat.h> #include <errno.h> #include <libutil.h> #include <stddef.h> #include <syslog.h> /* * Check for common security problems on a given path * It must be: * 1. A regular file, and exists * 2. Owned and writable only by root (or given owner) * 3. Group ownership is given group or is non-group writable * * Returns: -2 if file does not exist, * -1 if security test failure * 0 otherwise */ int _secure_path(const char *path, uid_t uid, gid_t gid) { int r = -1; struct stat sb; const char *msg = NULL; if (lstat(path, &sb) < 0) { if (errno == ENOENT) /* special case */ r = -2; /* if it is just missing, skip the log entry */ else msg = "%s: cannot stat %s: %m"; } else if (!S_ISREG(sb.st_mode)) msg = "%s: %s is not a regular file"; else if (sb.st_mode & S_IWOTH) msg = "%s: %s is world writable"; else if ((int)uid != -1 && sb.st_uid != uid && sb.st_uid != 0) { if (uid == 0) msg = "%s: %s is not owned by root"; else msg = "%s: %s is not owned by uid %d"; } else if ((int)gid != -1 && sb.st_gid != gid && (sb.st_mode & S_IWGRP)) msg = "%s: %s is group writeable by non-authorised groups"; else r = 0; if (msg != NULL) syslog(LOG_ERR, msg, "_secure_path", path, uid); return r; }
Upload File
Create Folder