144743Smarkm /* 244743Smarkm * percent_x() takes a string and performs %<char> expansions. It aborts the 344743Smarkm * program when the expansion would overflow the output buffer. The result 444743Smarkm * of %<char> expansion may be passed on to a shell process. For this 544743Smarkm * reason, characters with a special meaning to shells are replaced by 644743Smarkm * underscores. 744743Smarkm * 844743Smarkm * Diagnostics are reported through syslog(3). 944743Smarkm * 1044743Smarkm * Author: Wietse Venema, Eindhoven University of Technology, The Netherlands. 1144743Smarkm */ 1244743Smarkm 1344743Smarkm#ifndef lint 1444743Smarkmstatic char sccsid[] = "@(#) percent_x.c 1.4 94/12/28 17:42:37"; 1544743Smarkm#endif 1644743Smarkm 1744743Smarkm/* System libraries. */ 1844743Smarkm 1944743Smarkm#include <stdio.h> 2044743Smarkm#include <syslog.h> 2144743Smarkm#include <string.h> 22257398Ssbruno#include <unistd.h> 2344743Smarkm 2444743Smarkmextern void exit(); 2544743Smarkm 2644743Smarkm/* Local stuff. */ 2744743Smarkm 2844743Smarkm#include "tcpd.h" 2944743Smarkm 3044743Smarkm/* percent_x - do %<char> expansion, abort if result buffer is too small */ 3144743Smarkm 3244743Smarkmchar *percent_x(result, result_len, string, request) 3344743Smarkmchar *result; 3444743Smarkmint result_len; 3544743Smarkmchar *string; 3644743Smarkmstruct request_info *request; 3744743Smarkm{ 3844743Smarkm char *bp = result; 3944743Smarkm char *end = result + result_len - 1; /* end of result buffer */ 4044743Smarkm char *expansion; 4144743Smarkm int expansion_len; 4244743Smarkm static char ok_chars[] = "1234567890!@%-_=+:,./\ 4344743Smarkmabcdefghijklmnopqrstuvwxyz\ 4444743SmarkmABCDEFGHIJKLMNOPQRSTUVWXYZ"; 4544743Smarkm char *str = string; 4644743Smarkm char *cp; 4744743Smarkm int ch; 4844743Smarkm 4944743Smarkm /* 5044743Smarkm * Warning: we may be called from a child process or after pattern 5144743Smarkm * matching, so we cannot use clean_exit() or tcpd_jump(). 5244743Smarkm */ 5344743Smarkm 5444743Smarkm while (*str) { 5544743Smarkm if (*str == '%' && (ch = str[1]) != 0) { 5644743Smarkm str += 2; 5744743Smarkm expansion = 5844743Smarkm ch == 'a' ? eval_hostaddr(request->client) : 5944743Smarkm ch == 'A' ? eval_hostaddr(request->server) : 6044743Smarkm ch == 'c' ? eval_client(request) : 6144743Smarkm ch == 'd' ? eval_daemon(request) : 6244743Smarkm ch == 'h' ? eval_hostinfo(request->client) : 6344743Smarkm ch == 'H' ? eval_hostinfo(request->server) : 6444743Smarkm ch == 'n' ? eval_hostname(request->client) : 6544743Smarkm ch == 'N' ? eval_hostname(request->server) : 6644743Smarkm ch == 'p' ? eval_pid(request) : 6744743Smarkm ch == 's' ? eval_server(request) : 6844743Smarkm ch == 'u' ? eval_user(request) : 6944743Smarkm ch == '%' ? "%" : (tcpd_warn("unrecognized %%%c", ch), ""); 7044743Smarkm for (cp = expansion; *(cp += strspn(cp, ok_chars)); /* */ ) 7144743Smarkm *cp = '_'; 7244743Smarkm expansion_len = cp - expansion; 7344743Smarkm } else { 7444743Smarkm expansion = str++; 7544743Smarkm expansion_len = 1; 7644743Smarkm } 7744743Smarkm if (bp + expansion_len >= end) { 7844743Smarkm tcpd_warn("percent_x: expansion too long: %.30s...", result); 7944743Smarkm sleep(5); 8044743Smarkm exit(0); 8144743Smarkm } 8244743Smarkm memcpy(bp, expansion, expansion_len); 8344743Smarkm bp += expansion_len; 8444743Smarkm } 8544743Smarkm *bp = 0; 8644743Smarkm return (result); 8744743Smarkm} 88