2020-11-03 22:53:12 +00:00
|
|
|
/* $OpenBSD: match.c,v 1.43 2020/11/03 22:53:12 djm Exp $ */
|
1999-10-27 03:42:43 +00:00
|
|
|
/*
|
1999-11-24 13:26:21 +00:00
|
|
|
* Author: Tatu Ylonen <ylo@cs.hut.fi>
|
|
|
|
* Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
|
|
|
|
* All rights reserved
|
|
|
|
* Simple pattern matching, with '*' and '?' as wildcards.
|
2000-04-16 01:18:38 +00:00
|
|
|
*
|
2000-09-16 02:29:08 +00:00
|
|
|
* As far as I am concerned, the code I have written for this software
|
|
|
|
* can be used freely for any purpose. Any derived versions of this
|
|
|
|
* software must be clearly marked as such, and if the derived work is
|
|
|
|
* incompatible with the protocol description in the RFC file, it must be
|
|
|
|
* called by a name other than "ssh" or "Secure Shell".
|
1999-11-24 13:26:21 +00:00
|
|
|
*/
|
2001-03-11 01:49:19 +00:00
|
|
|
/*
|
|
|
|
* Copyright (c) 2000 Markus Friedl. All rights reserved.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
|
|
|
|
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
|
|
|
|
* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
|
|
|
|
* IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
|
|
|
|
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
|
|
|
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
|
|
|
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
|
|
|
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
|
|
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
|
|
|
* THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
*/
|
1999-10-27 03:42:43 +00:00
|
|
|
|
|
|
|
#include "includes.h"
|
2006-03-15 00:53:45 +00:00
|
|
|
|
2006-08-05 02:39:39 +00:00
|
|
|
#include <sys/types.h>
|
|
|
|
|
2006-03-15 00:53:45 +00:00
|
|
|
#include <ctype.h>
|
2013-06-01 21:31:17 +00:00
|
|
|
#include <stdlib.h>
|
2006-07-24 04:13:33 +00:00
|
|
|
#include <string.h>
|
2019-11-13 04:47:52 +00:00
|
|
|
#include <stdarg.h>
|
2017-03-10 04:24:55 +00:00
|
|
|
#include <stdio.h>
|
1999-10-27 03:42:43 +00:00
|
|
|
|
2001-03-11 01:49:19 +00:00
|
|
|
#include "xmalloc.h"
|
2006-08-05 02:39:39 +00:00
|
|
|
#include "match.h"
|
2017-03-10 04:24:55 +00:00
|
|
|
#include "misc.h"
|
1999-10-27 03:42:43 +00:00
|
|
|
|
1999-11-25 00:54:57 +00:00
|
|
|
/*
|
|
|
|
* Returns true if the given string matches the pattern (which may contain ?
|
|
|
|
* and * as wildcards), and zero if it does not match.
|
|
|
|
*/
|
2000-04-16 01:18:38 +00:00
|
|
|
int
|
1999-11-24 13:26:21 +00:00
|
|
|
match_pattern(const char *s, const char *pattern)
|
|
|
|
{
|
|
|
|
for (;;) {
|
|
|
|
/* If at end of pattern, accept if also at end of string. */
|
|
|
|
if (!*pattern)
|
|
|
|
return !*s;
|
1999-10-27 03:42:43 +00:00
|
|
|
|
1999-11-24 13:26:21 +00:00
|
|
|
if (*pattern == '*') {
|
2020-11-03 22:53:12 +00:00
|
|
|
/* Skip this and any consecutive asterisks. */
|
|
|
|
while (*pattern == '*')
|
|
|
|
pattern++;
|
1999-10-27 03:42:43 +00:00
|
|
|
|
1999-11-24 13:26:21 +00:00
|
|
|
/* If at end of pattern, accept immediately. */
|
|
|
|
if (!*pattern)
|
|
|
|
return 1;
|
1999-10-27 03:42:43 +00:00
|
|
|
|
1999-11-24 13:26:21 +00:00
|
|
|
/* If next character in pattern is known, optimize. */
|
|
|
|
if (*pattern != '?' && *pattern != '*') {
|
1999-11-25 00:54:57 +00:00
|
|
|
/*
|
|
|
|
* Look instances of the next character in
|
|
|
|
* pattern, and try to match starting from
|
|
|
|
* those.
|
|
|
|
*/
|
1999-11-24 13:26:21 +00:00
|
|
|
for (; *s; s++)
|
|
|
|
if (*s == *pattern &&
|
|
|
|
match_pattern(s + 1, pattern + 1))
|
|
|
|
return 1;
|
|
|
|
/* Failed. */
|
|
|
|
return 0;
|
|
|
|
}
|
1999-11-25 00:54:57 +00:00
|
|
|
/*
|
|
|
|
* Move ahead one character at a time and try to
|
|
|
|
* match at each position.
|
|
|
|
*/
|
1999-11-24 13:26:21 +00:00
|
|
|
for (; *s; s++)
|
|
|
|
if (match_pattern(s, pattern))
|
|
|
|
return 1;
|
|
|
|
/* Failed. */
|
|
|
|
return 0;
|
|
|
|
}
|
1999-11-25 00:54:57 +00:00
|
|
|
/*
|
|
|
|
* There must be at least one more character in the string.
|
|
|
|
* If we are at the end, fail.
|
|
|
|
*/
|
1999-11-24 13:26:21 +00:00
|
|
|
if (!*s)
|
|
|
|
return 0;
|
1999-10-27 03:42:43 +00:00
|
|
|
|
1999-11-25 00:54:57 +00:00
|
|
|
/* Check if the next character of the string is acceptable. */
|
1999-11-24 13:26:21 +00:00
|
|
|
if (*pattern != '?' && *pattern != *s)
|
|
|
|
return 0;
|
1999-10-27 03:42:43 +00:00
|
|
|
|
1999-11-25 00:54:57 +00:00
|
|
|
/* Move to the next character, both in string and in pattern. */
|
1999-11-24 13:26:21 +00:00
|
|
|
s++;
|
|
|
|
pattern++;
|
|
|
|
}
|
|
|
|
/* NOTREACHED */
|
1999-10-27 03:42:43 +00:00
|
|
|
}
|
2000-03-26 03:04:51 +00:00
|
|
|
|
|
|
|
/*
|
2001-12-06 18:06:05 +00:00
|
|
|
* Tries to match the string against the
|
2000-03-26 03:04:51 +00:00
|
|
|
* comma-separated sequence of subpatterns (each possibly preceded by ! to
|
2000-06-07 09:55:44 +00:00
|
|
|
* indicate negation). Returns -1 if negation matches, 1 if there is
|
|
|
|
* a positive match, 0 if there is no match at all.
|
2000-03-26 03:04:51 +00:00
|
|
|
*/
|
|
|
|
int
|
2015-05-04 06:10:48 +00:00
|
|
|
match_pattern_list(const char *string, const char *pattern, int dolower)
|
2000-03-26 03:04:51 +00:00
|
|
|
{
|
|
|
|
char sub[1024];
|
|
|
|
int negated;
|
|
|
|
int got_positive;
|
2015-05-04 06:10:48 +00:00
|
|
|
u_int i, subi, len = strlen(pattern);
|
2000-03-26 03:04:51 +00:00
|
|
|
|
|
|
|
got_positive = 0;
|
|
|
|
for (i = 0; i < len;) {
|
|
|
|
/* Check if the subpattern is negated. */
|
|
|
|
if (pattern[i] == '!') {
|
|
|
|
negated = 1;
|
|
|
|
i++;
|
|
|
|
} else
|
|
|
|
negated = 0;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Extract the subpattern up to a comma or end. Convert the
|
|
|
|
* subpattern to lowercase.
|
|
|
|
*/
|
|
|
|
for (subi = 0;
|
2001-12-21 03:45:46 +00:00
|
|
|
i < len && subi < sizeof(sub) - 1 && pattern[i] != ',';
|
|
|
|
subi++, i++)
|
2013-11-21 02:57:15 +00:00
|
|
|
sub[subi] = dolower && isupper((u_char)pattern[i]) ?
|
|
|
|
tolower((u_char)pattern[i]) : pattern[i];
|
2000-03-26 03:04:51 +00:00
|
|
|
/* If subpattern too long, return failure (no match). */
|
|
|
|
if (subi >= sizeof(sub) - 1)
|
|
|
|
return 0;
|
|
|
|
|
2017-03-10 03:52:48 +00:00
|
|
|
/* If the subpattern was terminated by a comma, then skip it. */
|
2000-03-26 03:04:51 +00:00
|
|
|
if (i < len && pattern[i] == ',')
|
|
|
|
i++;
|
|
|
|
|
|
|
|
/* Null-terminate the subpattern. */
|
|
|
|
sub[subi] = '\0';
|
|
|
|
|
2001-12-06 18:06:05 +00:00
|
|
|
/* Try to match the subpattern against the string. */
|
|
|
|
if (match_pattern(string, sub)) {
|
2000-03-26 03:04:51 +00:00
|
|
|
if (negated)
|
2000-06-07 09:55:44 +00:00
|
|
|
return -1; /* Negative */
|
2000-03-26 03:04:51 +00:00
|
|
|
else
|
2000-06-07 09:55:44 +00:00
|
|
|
got_positive = 1; /* Positive */
|
2016-09-21 16:55:42 +00:00
|
|
|
}
|
2000-03-26 03:04:51 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Return success if got a positive match. If there was a negative
|
2000-06-07 09:55:44 +00:00
|
|
|
* match, we have already returned -1 and never get here.
|
2000-03-26 03:04:51 +00:00
|
|
|
*/
|
|
|
|
return got_positive;
|
|
|
|
}
|
2001-03-11 01:49:19 +00:00
|
|
|
|
2019-03-06 22:14:23 +00:00
|
|
|
/* Match a list representing users or groups. */
|
|
|
|
int
|
|
|
|
match_usergroup_pattern_list(const char *string, const char *pattern)
|
|
|
|
{
|
2019-03-11 22:19:19 +00:00
|
|
|
#ifdef HAVE_CYGWIN
|
|
|
|
/* Windows usernames may be Unicode and are not case sensitive */
|
|
|
|
return cygwin_ug_match_pattern_list(string, pattern);
|
2019-03-06 22:14:23 +00:00
|
|
|
#else
|
2019-11-12 23:41:41 +00:00
|
|
|
/* Case sensitive match */
|
2019-03-11 22:19:19 +00:00
|
|
|
return match_pattern_list(string, pattern, 0);
|
2019-03-06 22:14:23 +00:00
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
2001-12-06 18:06:05 +00:00
|
|
|
/*
|
|
|
|
* Tries to match the host name (which must be in all lowercase) against the
|
|
|
|
* comma-separated sequence of subpatterns (each possibly preceded by ! to
|
|
|
|
* indicate negation). Returns -1 if negation matches, 1 if there is
|
|
|
|
* a positive match, 0 if there is no match at all.
|
|
|
|
*/
|
|
|
|
int
|
2015-05-04 06:10:48 +00:00
|
|
|
match_hostname(const char *host, const char *pattern)
|
2001-12-06 18:06:05 +00:00
|
|
|
{
|
2017-03-10 04:24:55 +00:00
|
|
|
char *hostcopy = xstrdup(host);
|
|
|
|
int r;
|
|
|
|
|
|
|
|
lowercase(hostcopy);
|
|
|
|
r = match_pattern_list(hostcopy, pattern, 1);
|
|
|
|
free(hostcopy);
|
|
|
|
return r;
|
2001-12-06 18:06:05 +00:00
|
|
|
}
|
|
|
|
|
2001-06-25 05:17:53 +00:00
|
|
|
/*
|
|
|
|
* returns 0 if we get a negative match for the hostname or the ip
|
2008-06-10 23:34:46 +00:00
|
|
|
* or if we get no match at all. returns -1 on error, or 1 on
|
|
|
|
* successful match.
|
2001-06-25 05:17:53 +00:00
|
|
|
*/
|
|
|
|
int
|
|
|
|
match_host_and_ip(const char *host, const char *ipaddr,
|
|
|
|
const char *patterns)
|
|
|
|
{
|
|
|
|
int mhost, mip;
|
|
|
|
|
2008-06-10 23:34:46 +00:00
|
|
|
if ((mip = addr_match_list(ipaddr, patterns)) == -2)
|
2016-11-06 05:46:37 +00:00
|
|
|
return -1; /* error in ipaddr match */
|
|
|
|
else if (host == NULL || ipaddr == NULL || mip == -1)
|
|
|
|
return 0; /* negative ip address match, or testing pattern */
|
2008-06-10 23:34:46 +00:00
|
|
|
|
2001-06-25 05:17:53 +00:00
|
|
|
/* negative hostname match */
|
2015-05-04 06:10:48 +00:00
|
|
|
if ((mhost = match_hostname(host, patterns)) == -1)
|
2001-06-25 05:17:53 +00:00
|
|
|
return 0;
|
|
|
|
/* no match at all */
|
|
|
|
if (mhost == 0 && mip == 0)
|
|
|
|
return 0;
|
|
|
|
return 1;
|
|
|
|
}
|
2001-03-11 01:49:19 +00:00
|
|
|
|
2001-07-04 04:56:44 +00:00
|
|
|
/*
|
2016-11-06 05:46:37 +00:00
|
|
|
* Match user, user@host_or_ip, user@host_or_ip_list against pattern.
|
|
|
|
* If user, host and ipaddr are all NULL then validate pattern/
|
|
|
|
* Returns -1 on invalid pattern, 0 on no match, 1 on match.
|
2001-07-04 04:56:44 +00:00
|
|
|
*/
|
|
|
|
int
|
2002-03-05 01:42:42 +00:00
|
|
|
match_user(const char *user, const char *host, const char *ipaddr,
|
2001-07-04 04:56:44 +00:00
|
|
|
const char *pattern)
|
|
|
|
{
|
|
|
|
char *p, *pat;
|
|
|
|
int ret;
|
|
|
|
|
2016-11-06 05:46:37 +00:00
|
|
|
/* test mode */
|
|
|
|
if (user == NULL && host == NULL && ipaddr == NULL) {
|
|
|
|
if ((p = strchr(pattern, '@')) != NULL &&
|
|
|
|
match_host_and_ip(NULL, NULL, p + 1) < 0)
|
|
|
|
return -1;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2019-10-04 04:13:39 +00:00
|
|
|
if ((p = strchr(pattern, '@')) == NULL)
|
2001-07-04 04:56:44 +00:00
|
|
|
return match_pattern(user, pattern);
|
|
|
|
|
|
|
|
pat = xstrdup(pattern);
|
|
|
|
p = strchr(pat, '@');
|
|
|
|
*p++ = '\0';
|
|
|
|
|
|
|
|
if ((ret = match_pattern(user, pat)) == 1)
|
2002-03-05 01:42:42 +00:00
|
|
|
ret = match_host_and_ip(host, ipaddr, p);
|
2013-06-01 21:31:17 +00:00
|
|
|
free(pat);
|
2001-07-04 04:56:44 +00:00
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2001-06-25 05:17:53 +00:00
|
|
|
/*
|
|
|
|
* Returns first item from client-list that is also supported by server-list,
|
2013-06-01 21:31:17 +00:00
|
|
|
* caller must free the returned string.
|
2001-06-25 05:17:53 +00:00
|
|
|
*/
|
2002-02-13 02:55:30 +00:00
|
|
|
#define MAX_PROP 40
|
2001-03-11 01:49:19 +00:00
|
|
|
#define SEP ","
|
|
|
|
char *
|
|
|
|
match_list(const char *client, const char *server, u_int *next)
|
|
|
|
{
|
|
|
|
char *sproposals[MAX_PROP];
|
|
|
|
char *c, *s, *p, *ret, *cp, *sp;
|
|
|
|
int i, j, nproposals;
|
|
|
|
|
|
|
|
c = cp = xstrdup(client);
|
|
|
|
s = sp = xstrdup(server);
|
|
|
|
|
|
|
|
for ((p = strsep(&sp, SEP)), i=0; p && *p != '\0';
|
2001-12-21 03:45:46 +00:00
|
|
|
(p = strsep(&sp, SEP)), i++) {
|
2001-03-11 01:49:19 +00:00
|
|
|
if (i < MAX_PROP)
|
|
|
|
sproposals[i] = p;
|
|
|
|
else
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
nproposals = i;
|
|
|
|
|
|
|
|
for ((p = strsep(&cp, SEP)), i=0; p && *p != '\0';
|
2001-12-21 03:45:46 +00:00
|
|
|
(p = strsep(&cp, SEP)), i++) {
|
2001-03-11 01:49:19 +00:00
|
|
|
for (j = 0; j < nproposals; j++) {
|
|
|
|
if (strcmp(p, sproposals[j]) == 0) {
|
|
|
|
ret = xstrdup(p);
|
|
|
|
if (next != NULL)
|
|
|
|
*next = (cp == NULL) ?
|
2005-06-17 02:59:34 +00:00
|
|
|
strlen(c) : (u_int)(cp - c);
|
2013-06-01 21:31:17 +00:00
|
|
|
free(c);
|
|
|
|
free(s);
|
2001-03-11 01:49:19 +00:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (next != NULL)
|
|
|
|
*next = strlen(c);
|
2013-06-01 21:31:17 +00:00
|
|
|
free(c);
|
|
|
|
free(s);
|
2001-03-11 01:49:19 +00:00
|
|
|
return NULL;
|
|
|
|
}
|
2017-02-03 23:01:19 +00:00
|
|
|
|
|
|
|
/*
|
2018-07-04 13:49:31 +00:00
|
|
|
* Filter proposal using pattern-list filter.
|
2020-07-05 23:59:45 +00:00
|
|
|
* "denylist" determines sense of filter:
|
2018-07-04 13:49:31 +00:00
|
|
|
* non-zero indicates that items matching filter should be excluded.
|
|
|
|
* zero indicates that only items matching filter should be included.
|
|
|
|
* returns NULL on allocation error, otherwise caller must free result.
|
2017-02-03 23:01:19 +00:00
|
|
|
*/
|
2018-07-04 13:49:31 +00:00
|
|
|
static char *
|
2020-07-05 23:59:45 +00:00
|
|
|
filter_list(const char *proposal, const char *filter, int denylist)
|
2017-02-03 23:01:19 +00:00
|
|
|
{
|
|
|
|
size_t len = strlen(proposal) + 1;
|
|
|
|
char *fix_prop = malloc(len);
|
|
|
|
char *orig_prop = strdup(proposal);
|
|
|
|
char *cp, *tmp;
|
2018-07-04 13:49:31 +00:00
|
|
|
int r;
|
2017-02-03 23:01:19 +00:00
|
|
|
|
2017-02-15 23:38:31 +00:00
|
|
|
if (fix_prop == NULL || orig_prop == NULL) {
|
|
|
|
free(orig_prop);
|
|
|
|
free(fix_prop);
|
2017-02-03 23:01:19 +00:00
|
|
|
return NULL;
|
2017-02-15 23:38:31 +00:00
|
|
|
}
|
2017-02-03 23:01:19 +00:00
|
|
|
|
|
|
|
tmp = orig_prop;
|
|
|
|
*fix_prop = '\0';
|
|
|
|
while ((cp = strsep(&tmp, ",")) != NULL) {
|
2018-07-04 13:49:31 +00:00
|
|
|
r = match_pattern_list(cp, filter, 0);
|
2020-07-05 23:59:45 +00:00
|
|
|
if ((denylist && r != 1) || (!denylist && r == 1)) {
|
2017-02-03 23:01:19 +00:00
|
|
|
if (*fix_prop != '\0')
|
|
|
|
strlcat(fix_prop, ",", len);
|
|
|
|
strlcat(fix_prop, cp, len);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
free(orig_prop);
|
|
|
|
return fix_prop;
|
|
|
|
}
|
|
|
|
|
2018-07-04 13:49:31 +00:00
|
|
|
/*
|
|
|
|
* Filters a comma-separated list of strings, excluding any entry matching
|
|
|
|
* the 'filter' pattern list. Caller must free returned string.
|
|
|
|
*/
|
|
|
|
char *
|
2020-07-05 23:59:45 +00:00
|
|
|
match_filter_denylist(const char *proposal, const char *filter)
|
2018-07-04 13:49:31 +00:00
|
|
|
{
|
|
|
|
return filter_list(proposal, filter, 1);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Filters a comma-separated list of strings, including only entries matching
|
|
|
|
* the 'filter' pattern list. Caller must free returned string.
|
|
|
|
*/
|
|
|
|
char *
|
2020-07-05 23:59:45 +00:00
|
|
|
match_filter_allowlist(const char *proposal, const char *filter)
|
2018-07-04 13:49:31 +00:00
|
|
|
{
|
|
|
|
return filter_list(proposal, filter, 0);
|
|
|
|
}
|