003 File Manager
Current Path:
/usr/src/lib/libutil
usr
/
src
/
lib
/
libutil
/
📁
..
📄
Makefile
(3.09 KB)
📄
Makefile.depend
(274 B)
📄
_secure_path.3
(2.52 KB)
📄
_secure_path.c
(2.33 KB)
📄
auth.c
(1.66 KB)
📄
expand_number.3
(2.61 KB)
📄
expand_number.c
(2.45 KB)
📄
flopen.3
(3.35 KB)
📄
flopen.c
(3.69 KB)
📄
fparseln.3
(4.53 KB)
📄
fparseln.c
(5.27 KB)
📄
getlocalbase.3
(3.82 KB)
📄
getlocalbase.c
(2.62 KB)
📄
gr_util.c
(14.2 KB)
📄
hexdump.3
(3.01 KB)
📄
hexdump.c
(2.98 KB)
📄
humanize_number.3
(5.65 KB)
📄
humanize_number.c
(5.35 KB)
📄
kinfo_getallproc.3
(2.47 KB)
📄
kinfo_getallproc.c
(2.67 KB)
📄
kinfo_getfile.3
(2.59 KB)
📄
kinfo_getfile.c
(1.46 KB)
📄
kinfo_getproc.3
(2.44 KB)
📄
kinfo_getproc.c
(2.13 KB)
📄
kinfo_getvmmap.3
(2.85 KB)
📄
kinfo_getvmmap.c
(1.47 KB)
📄
kinfo_getvmobject.3
(2.46 KB)
📄
kinfo_getvmobject.c
(2.58 KB)
📄
kld.3
(2.69 KB)
📄
kld.c
(2.5 KB)
📄
libutil.h
(8.04 KB)
📄
login.conf.5
(16.41 KB)
📄
login_auth.3
(2.3 KB)
📄
login_auth.c
(3.01 KB)
📄
login_cap.3
(16.04 KB)
📄
login_cap.c
(19.22 KB)
📄
login_cap.h
(6.25 KB)
📄
login_class.3
(6.83 KB)
📄
login_class.c
(14 KB)
📄
login_crypt.c
(1.92 KB)
📄
login_ok.3
(4.27 KB)
📄
login_ok.c
(5.76 KB)
📄
login_times.3
(5.28 KB)
📄
login_times.c
(3.72 KB)
📄
login_tty.3
(2.25 KB)
📄
login_tty.c
(2.03 KB)
📄
pidfile.3
(6.75 KB)
📄
pidfile.c
(7.22 KB)
📄
property.3
(2.91 KB)
📄
property.c
(5.85 KB)
📄
pty.3
(4.17 KB)
📄
pty.c
(2.99 KB)
📄
pw_util.3
(6.88 KB)
📄
pw_util.c
(15.18 KB)
📄
quotafile.3
(7.32 KB)
📄
quotafile.c
(14.98 KB)
📄
realhostname.3
(2.97 KB)
📄
realhostname.c
(5.59 KB)
📄
realhostname_sa.3
(4.56 KB)
📄
stub.c
(1.73 KB)
📁
tests
📄
trimdomain.3
(2.72 KB)
📄
trimdomain.c
(3.39 KB)
📄
uucplock.3
(4.94 KB)
📄
uucplock.c
(5.5 KB)
Editing: login_ok.c
/*- * Copyright (c) 1996 by * David Nugent <davidn@blaze.net.au> * All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, is permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright * notice immediately at the beginning of the file, without modification, * this list of conditions, and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * 3. This work was done expressly for inclusion into FreeBSD. Other use * is permitted provided this notation is included. * 4. Absolutely no warranty of function or purpose is made by the authors. * 5. Modifications may be freely made to this file providing the above * conditions are met. * * Support allow/deny lists in login class capabilities */ #include <sys/cdefs.h> __FBSDID("$FreeBSD$"); #include <sys/types.h> #include <sys/time.h> #include <sys/resource.h> #include <sys/param.h> #include <errno.h> #include <fnmatch.h> #include <login_cap.h> #include <stdlib.h> #include <string.h> #include <ttyent.h> #include <unistd.h> /* -- support functions -- */ /* * login_strinlist() * This function is intentionally public - reused by TAS. * Returns TRUE (non-zero) if a string matches a pattern * in a given array of patterns. 'flags' is passed directly * to fnmatch(3). */ int login_strinlist(const char **list, char const *str, int flags) { int rc = 0; if (str != NULL && *str != '\0') { int i = 0; while (rc == 0 && list[i] != NULL) rc = fnmatch(list[i++], str, flags) == 0; } return rc; } /* * login_str2inlist() * Locate either or two strings in a given list */ int login_str2inlist(const char **ttlst, const char *str1, const char *str2, int flags) { int rc = 0; if (login_strinlist(ttlst, str1, flags)) rc = 1; else if (login_strinlist(ttlst, str2, flags)) rc = 1; return rc; } /* * login_timelist() * This function is intentionally public - reused by TAS. * Returns an allocated list of time periods given an array * of time periods in ascii form. */ login_time_t * login_timelist(login_cap_t *lc, char const *cap, int *ltno, login_time_t **ltptr) { int j = 0; struct login_time *lt = NULL; const char **tl; if ((tl = login_getcaplist(lc, cap, NULL)) != NULL) { while (tl[j++] != NULL) ; if (*ltno >= j) lt = *ltptr; else if ((lt = realloc(*ltptr, j * sizeof(struct login_time))) != NULL) { *ltno = j; *ltptr = lt; } if (lt != NULL) { int i = 0; for (--j; i < j; i++) lt[i] = parse_lt(tl[i]); lt[i].lt_dow = LTM_NONE; } } return lt; } /* * login_ttyok() * This function is a variation of auth_ttyok(), but it checks two * arbitrary capability lists not necessarily related to access. * This hook is provided for the accounted/exclude accounting lists. */ int login_ttyok(login_cap_t *lc, const char *tty, const char *allowcap, const char *denycap) { int rc = 1; if (lc != NULL && tty != NULL && *tty != '\0') { struct ttyent *te; char *grp; const char **ttl; te = getttynam(tty); /* Need group name */ grp = te ? te->ty_group : NULL; ttl = login_getcaplist(lc, allowcap, NULL); if (ttl != NULL && !login_str2inlist(ttl, tty, grp, 0)) rc = 0; /* tty or ttygroup not in allow list */ else { ttl = login_getcaplist(lc, denycap, NULL); if (ttl != NULL && login_str2inlist(ttl, tty, grp, 0)) rc = 0; /* tty or ttygroup in deny list */ } } return rc; } /* * auth_ttyok() * Determine whether or not login on a tty is accessible for * a login class */ int auth_ttyok(login_cap_t *lc, const char * tty) { return login_ttyok(lc, tty, "ttys.allow", "ttys.deny"); } /* * login_hostok() * This function is a variation of auth_hostok(), but it checks two * arbitrary capability lists not necessarily related to access. * This hook is provided for the accounted/exclude accounting lists. */ int login_hostok(login_cap_t *lc, const char *host, const char *ip, const char *allowcap, const char *denycap) { int rc = 1; /* Default is ok */ if (lc != NULL && ((host != NULL && *host != '\0') || (ip != NULL && *ip != '\0'))) { const char **hl; hl = login_getcaplist(lc, allowcap, NULL); if (hl != NULL && !login_str2inlist(hl, host, ip, FNM_CASEFOLD)) rc = 0; /* host or IP not in allow list */ else { hl = login_getcaplist(lc, denycap, NULL); if (hl != NULL && login_str2inlist(hl, host, ip, FNM_CASEFOLD)) rc = 0; /* host or IP in deny list */ } } return rc; } /* * auth_hostok() * Determine whether or not login from a host is ok */ int auth_hostok(login_cap_t *lc, const char *host, const char *ip) { return login_hostok(lc, host, ip, "host.allow", "host.deny"); } /* * auth_timeok() * Determine whether or not login is ok at a given time */ int auth_timeok(login_cap_t *lc, time_t t) { int rc = 1; /* Default is ok */ if (lc != NULL && t != (time_t)0 && t != (time_t)-1) { struct tm *tptr; static int ltimesno = 0; static struct login_time *ltimes = NULL; if ((tptr = localtime(&t)) != NULL) { struct login_time *lt; lt = login_timelist(lc, "times.allow", <imesno, <imes); if (lt != NULL && in_ltms(lt, tptr, NULL) == -1) rc = 0; /* not in allowed times list */ else { lt = login_timelist(lc, "times.deny", <imesno, <imes); if (lt != NULL && in_ltms(lt, tptr, NULL) != -1) rc = 0; /* in deny times list */ } if (ltimes) { free(ltimes); ltimes = NULL; ltimesno = 0; } } } return rc; }
Upload File
Create Folder