#define ID 10
#define MACH 11
-static char tokval[100];
+#define MAX_TOKVAL_SIZE 1024
struct toktab {
char *tokstr;
/*
* prototypes
*/
-static int token(void);
+static int token(char *);
void
if (errno != ENOENT)
perror (credentials_file);
} else {
- while ((t = token())) {
+ char tokval[MAX_TOKVAL_SIZE];
+ tokval[0] = '\0';
+
+ while ((t = token(tokval))) {
switch(t) {
case DEFAULT:
usedefault = 1;
case MACH:
if (!usedefault) {
- if (token() != ID)
+ if (token(tokval) != ID)
continue;
/*
* Allow match either for user's host name.
continue;
}
match:
- while ((t = token()) && t != MACH && t != DEFAULT) {
+ while ((t = token(tokval)) && t != MACH && t != DEFAULT) {
switch(t) {
case LOGIN:
- if (token() && *aname == 0) {
+ if (token(tokval) && *aname == 0) {
*aname = mh_xmalloc((size_t) strlen(tokval) + 1);
strcpy(*aname, tokval);
}
adios(NULL, "Remove password or correct file "
"permissions.");
}
- if (token() && *apass == 0) {
+ if (token(tokval) && *apass == 0) {
*apass = mh_xmalloc((size_t) strlen(tokval) + 1);
strcpy(*apass, tokval);
}
}
printf("Name (%s:%s): ", host, myname);
- fgets(tmp, sizeof(tmp) - 1, stdin);
+ if (fgets(tmp, sizeof(tmp) - 1, stdin) == NULL) {
+ advise ("tmp", "fgets");
+ }
tmp[strlen(tmp) - 1] = '\0';
- if (*tmp != '\0') {
+ if (*tmp != '\0' || myname == NULL) {
myname = tmp;
}
snprintf(prompt, sizeof(prompt), "Password (%s:%s): ", host, *aname);
mypass = nmh_getpass(prompt);
-
+
if (*mypass == '\0') {
mypass = *aname;
}
}
static int
-token(void)
+token(char *tokval)
{
char *cp;
int c;
if (c == '\\')
c = getc(cfile);
*cp++ = c;
+ if (cp - tokval > MAX_TOKVAL_SIZE-1) {
+ adios(NULL, "credential tokens restricted to length %d",
+ MAX_TOKVAL_SIZE - 1);
+ }
}
} else {
*cp++ = c;
if (c == '\\')
c = getc(cfile);
*cp++ = c;
+ if (cp - tokval > MAX_TOKVAL_SIZE-1) {
+ adios(NULL, "credential tokens restricted to length %d",
+ MAX_TOKVAL_SIZE - 1);
+ }
}
}
*cp = 0;