amiga-apg/restrict.c

306 lines
8.7 KiB
C

/*
** Copyright (c) 1999, 2000, 2001, 2002, 2003
** Adel I. Mirzazhanov. All rights reserved
**
** Redistribution and use in source and binary forms, with or without
** modification, are permitted provided that the following conditions
** are met:
**
** 1.Redistributions of source code must retain the above copyright notice,
** this list of conditions and the following disclaimer.
** 2.Redistributions in binary form must reproduce the above copyright
** notice, this list of conditions and the following disclaimer in the
** documentation and/or other materials provided with the distribution.
** 3.The name of the author may not be used to endorse or promote products
** derived from this software without specific prior written permission.
**
** THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS
** OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
** WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
** ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY
** DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
** DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE
** GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
** INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
** WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
** NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
** SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*/
/*
** restrict.c
*/
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include "restrict.h"
extern struct sym smbl[94];
/*
** check_pass() - routine that checks if password exist in dictionary
** INPUT:
** char * - password to check.
** char * - dictionary filename.
** OUTPUT:
** int
** -1 - error
** 1 - password exist in dictionary
** 0 - password does not exist in dictionary
** NOTES:
** none.
*/
int
check_pass(char *pass, char *dict)
{
FILE *dct;
char *string;
char *tmp;
if( (string = (char *) calloc(1,MAX_DICT_STRING_SIZE)) == NULL)
return(-1);
#ifdef APG_DEBUG
fprintf (stdout, "DEBUG> check_pass: ck pass: %s\n", pass);
fflush (stdout);
#endif /* APG_DEBUG */
/*
** Open dict file an report of error
*/
if ( (dct = fopen(dict,"r")) == NULL)
return(-1);
while ((fgets(string, MAX_DICT_STRING_SIZE, dct) != NULL))
{
tmp = strtok (string," \t\n\0");
if( tmp != NULL)
string = tmp;
else
continue;
if(strlen(string) != strlen(pass)) continue;
else if (strncmp(string, pass, strlen(pass)) == 0)
{
free ( (void *)string);
fclose (dct);
#ifdef APG_DEBUG
fprintf (stdout, "DEBUG> check_pass: password found in dictionary: %s\n", pass);
fflush (stdout);
#endif /* APG_DEBUG */
return (1);
}
}
free ( (void *)string);
fclose (dct);
return (0);
}
/*
** bloom_check_pass() - routine that checks if password exist in dictionary
** using Bloom filter.
** INPUT:
** char * - password to check.
** char * - bloom-filter filename.
** OUTPUT:
** int
** -1 - error
** 1 - password exist in dictionary
** 0 - password does not exist in dictionary
** NOTES:
** none.
*/
int
bloom_check_pass (char *word, char *filter)
{
int ret = 0;
FILE *f_filter;
h_val filter_size = 0L;
f_mode flt_mode = 0x00;
if ( (f_filter = open_filter(filter,"r")) == NULL)
return(-1);
filter_size = get_filtersize(f_filter);
flt_mode = get_filtermode(f_filter);
ret = check_word (word, f_filter, filter_size, flt_mode);
close_filter(f_filter);
return(ret);
}
/*
** paranoid_bloom_check_pass() - routine that checks if password or any
** substring of the password exist in dictionary using Bloom filter.
** INPUT:
** char * - password to check.
** char * - bloom-filter filename.
** USHORT - minimum substring length
** OUTPUT:
** int
** -1 - error
** 1 - password exist in dictionary
** 0 - password does not exist in dictionary
** NOTES:
** none.
*/
int
paranoid_bloom_check_pass (char * password, char *filter, USHORT s_len)
{
char * substring;
int len = strlen(password); /* string length */
int c_substr_start_pos = 0; /* current start position */
int substr_len = 0; /* substring length (LEN-I >= substr_len >= 2) */
int k = 0; /* counter */
int c = 0; /* counter */
int ret = 0;
if (s_len < 2) s_len = 2;
if (s_len > len) return (bloom_check_pass(password, filter));
#ifdef APG_DEBUG
fprintf (stdout, "DEBUG> paranoid_bloom_check_pass: ck pass: %s\n", password);
fflush (stdout);
#endif /* APG_DEBUG */
if ((substring = (char *)calloc(1, (size_t)len))==NULL)
return (-1);
for (c_substr_start_pos = 0; c_substr_start_pos <= len-s_len; c_substr_start_pos++)
for (substr_len = s_len; substr_len <= len-c_substr_start_pos; substr_len++)
{
c = 0;
for (k = c_substr_start_pos; k <= c_substr_start_pos + substr_len-1; k++)
{
substring[c]=password[k];
c++;
}
#ifdef APG_DEBUG
fprintf (stdout, "DEBUG> paranoid_bloom_check_pass: ck substr: %s\n", substring);
fflush (stdout);
#endif /* APG_DEBUG */
if((ret = bloom_check_pass(substring, filter)) == 1)
{
#ifdef APG_DEBUG
fprintf (stdout, "DEBUG> paranoid_bloom_check_pass: substr found in filter: %s\n", substring);
fflush (stdout);
#endif /* APG_DEBUG */
return(1);
}
else if (ret == -1) return(-1);
(void)memset(substring,0,(size_t)len);
}
return(0);
}
#if defined(APG_USE_CRACKLIB)
/*
** cracklib_check_pass() - check password against cracklib.
** INPUT:
** char * - password to check.
** char * - cracklib dict.
** OUTPUT:
** int
** -1 - error
** 1 - password does not pass this check
** 0 - password does pass this check
** NOTES:
** none.
*/
int
cracklib_check_pass(char *pw, char *dictpath)
{
char * msg;
msg = FascistCheck(pw,dictpath);
if (msg == NULL) return (0);
else
{
#ifdef APG_DEBUG
fprintf(stdout,"cracklib_check_pass: password --> %s rejected (%s)\n", pw, msg);
fflush(stdout);
#endif
return (1);
}
}
#endif
/*
** filter_check_pass() - routine that checks password against filter string
**
** INPUT:
** char * - password to check.
** char * - bloom-filter filename.
** OUTPUT:
** int
** -1 - error
** 1 - password do not pass the filter
** 0 - password pass the filter
** NOTES:
** none.
*/
int
filter_check_pass(const char * word, unsigned int cond)
{
int i = 0;
int sl_ret = 0;
int cl_ret = 0;
int nb_ret = 0;
int ss_ret = 0;
#ifdef APG_DEBUG
fprintf (stdout, "DEBUG> filter_check_pass: ck pass: %s\n", word);
fflush (stdout);
#endif /* APG_DEBUG */
if ((cond & S_SS) > 0)
for (i=0; i < 94; i++)
if ((smbl[i].type & S_SS) > 0)
if ((strchr(word,smbl[i].ch)) != NULL)
ss_ret = 1;
i = 0;
if ((cond & S_SL) > 0)
for (i=0; i < 94; i++)
if ((smbl[i].type & S_SL) > 0)
if ((strchr(word,smbl[i].ch)) != NULL)
sl_ret = 1;
i = 0;
if ((cond & S_CL) > 0)
for (i=0; i < 94; i++)
if ((smbl[i].type & S_CL) > 0)
if ((strchr(word,smbl[i].ch)) != NULL)
cl_ret = 1;
i = 0;
if ((cond & S_NB) > 0)
for (i=0; i < 94; i++)
if ((smbl[i].type & S_NB) > 0)
if ((strchr(word,smbl[i].ch)) != NULL)
nb_ret = 1;
if (((cond & S_SS) > 0) &&(ss_ret != 1)) return (1);
if (((cond & S_SL) > 0) &&(sl_ret != 1)) return (1);
if (((cond & S_CL) > 0) &&(cl_ret != 1)) return (1);
if (((cond & S_NB) > 0) &&(nb_ret != 1)) return (1);
#ifdef APG_DEBUG
fprintf (stdout, "DEBUG> filter_check_pass: password %s pass the filter\n", word);
fflush (stdout);
#endif /* APG_DEBUG */
return(0);
}
/*
** set_exclude_list() - set up character list that should
** be excluded from password generation process
**
** INPUT:
** char * - string of characters.
** OUTPUT:
** int - return code
** 0 - OK
** -1 - char_string is too long (max 93)
** NOTES:
** none.
*/
int set_exclude_list(const char * char_string)
{
int i = 0;
if (strlen(char_string) > 93)
return(-1);
for(i=0; i < 94; i++)
if ((strchr(char_string, smbl[i].ch)) != NULL)
smbl[i].type = smbl[i].type | S_RS;
return(0);
}