randy 97/01/19 22:30:41
Modified: src mod_auth_msql.c Log: MAX_STRING_LENGTH -> MAX_STRING_LEN Revision Changes Path 1.19 +21 -21 apache/src/mod_auth_msql.c Index: mod_auth_msql.c =================================================================== RCS file: /export/home/cvs/apache/src/mod_auth_msql.c,v retrieving revision 1.18 retrieving revision 1.19 diff -C3 -r1.18 -r1.19 *** mod_auth_msql.c 1997/01/20 04:28:11 1.18 --- mod_auth_msql.c 1997/01/20 06:30:39 1.19 *************** *** 280,286 **** * management tool. Added EncryptedPassword on/off functionality. * msqlClose() statements added upon error. Support for persistent * connections with the mSQL database (riscy). Escaping of ' and \. ! * Replaced some MAX_STRING_LENGTH claims. * 1.0 removed some error check as they where already done elsehwere * NumFields -> NumRows (Thanks Vitek). More stack memory. * 1.1 no logging of empty password strings. --- 280,286 ---- * management tool. Added EncryptedPassword on/off functionality. * msqlClose() statements added upon error. Support for persistent * connections with the mSQL database (riscy). Escaping of ' and \. ! * Replaced some MAX_STRING_LEN claims. * 1.0 removed some error check as they where already done elsehwere * NumFields -> NumRows (Thanks Vitek). More stack memory. * 1.1 no logging of empty password strings. *************** *** 560,566 **** /* does this fit ? */ if (j >= (MAX_FIELD_LEN-1)) { ! ap_snprintf(msql_errstr, MAX_STRING_LENGTH, "Could not escape '%s', longer than %d",in,MAX_FIELD_LEN); return NULL; }; --- 560,566 ---- /* does this fit ? */ if (j >= (MAX_FIELD_LEN-1)) { ! ap_snprintf(msql_errstr, MAX_STRING_LEN, "Could not escape '%s', longer than %d",in,MAX_FIELD_LEN); return NULL; }; *************** *** 602,608 **** /* (re) open if nessecary */ if (sock==-1) if ((sock=msqlConnect(host)) == -1) { ! ap_snprintf (msql_errstr, MAX_STRING_LENGTH, "mSQL: Could not connect to Msql DB %s (%s)", (sec->auth_msql_host ? sec->auth_msql_host : "\'unset, assuming localhost!\'"), msqlErrMsg); --- 602,608 ---- /* (re) open if nessecary */ if (sock==-1) if ((sock=msqlConnect(host)) == -1) { ! ap_snprintf (msql_errstr, MAX_STRING_LEN, "mSQL: Could not connect to Msql DB %s (%s)", (sec->auth_msql_host ? sec->auth_msql_host : "\'unset, assuming localhost!\'"), msqlErrMsg); *************** *** 613,619 **** * and is quite cheap anyway */ if (msqlSelectDB(sock,sec->auth_msql_database) == -1 ) { ! ap_snprintf (msql_errstr, MAX_STRING_LENGTH, "mSQL: Could not select Msql Table \'%s\' on host \'%s\'(%s)", (sec->auth_msql_database ? sec->auth_msql_database : "\'unset!\'"), (sec->auth_msql_host ? sec->auth_msql_host : "\'unset, assuming localhost!\'"), --- 613,619 ---- * and is quite cheap anyway */ if (msqlSelectDB(sock,sec->auth_msql_database) == -1 ) { ! ap_snprintf (msql_errstr, MAX_STRING_LEN, "mSQL: Could not select Msql Table \'%s\' on host \'%s\'(%s)", (sec->auth_msql_database ? sec->auth_msql_database : "\'unset!\'"), (sec->auth_msql_host ? sec->auth_msql_host : "\'unset, assuming localhost!\'"), *************** *** 624,630 **** } if (msqlQuery(sock,query) == -1 ) { ! ap_snprintf (msql_errstr, MAX_STRING_LENGTH, "mSQL: Could not Query database '%s' on host '%s' (%s) with query [%s]", (sec->auth_msql_database ? sec->auth_msql_database : "\'unset!\'"), (sec->auth_msql_host ? sec->auth_msql_host : "\'unset, assuming localhost!\'"), --- 624,630 ---- } if (msqlQuery(sock,query) == -1 ) { ! ap_snprintf (msql_errstr, MAX_STRING_LEN, "mSQL: Could not Query database '%s' on host '%s' (%s) with query [%s]", (sec->auth_msql_database ? sec->auth_msql_database : "\'unset!\'"), (sec->auth_msql_host ? sec->auth_msql_host : "\'unset, assuming localhost!\'"), *************** *** 636,642 **** } if (!(results=msqlStoreResult())) { ! ap_snprintf (msql_errstr, MAX_STRING_LENGTH, "mSQL: Could not get the results from mSQL database \'%s\' on \'%s\' (%s) with query [%s]", (sec->auth_msql_database ? sec->auth_msql_database : "\'unset!\'"), (sec->auth_msql_host ? sec->auth_msql_host : "\'unset, assuming localhost!\'"), --- 636,642 ---- } if (!(results=msqlStoreResult())) { ! ap_snprintf (msql_errstr, MAX_STRING_LEN, "mSQL: Could not get the results from mSQL database \'%s\' on \'%s\' (%s) with query [%s]", (sec->auth_msql_database ? sec->auth_msql_database : "\'unset!\'"), (sec->auth_msql_host ? sec->auth_msql_host : "\'unset, assuming localhost!\'"), *************** *** 653,659 **** /* complain if there are to many * matches. */ ! ap_snprintf (msql_errstr, MAX_STRING_LENGTH, "mSQL: More than %d matches (%d) whith query [%s]", once,hit,( query ? query : "\'unset!\'") ); } else --- 653,659 ---- /* complain if there are to many * matches. */ ! ap_snprintf (msql_errstr, MAX_STRING_LEN, "mSQL: More than %d matches (%d) whith query [%s]", once,hit,( query ? query : "\'unset!\'") ); } else *************** *** 663,669 **** if ( (currow=msqlFetchRow(results)) != NULL) { /* copy the first matching field value */ if (!(result=palloc(r->pool,strlen(currow[0])+1))) { ! ap_snprintf (msql_errstr, MAX_STRING_LENGTH, "mSQL: Could not get memory for mSQL %s (%s) with [%s]", (sec->auth_msql_database ? sec->auth_msql_database : "\'unset!\'"), msqlErrMsg, --- 663,669 ---- if ( (currow=msqlFetchRow(results)) != NULL) { /* copy the first matching field value */ if (!(result=palloc(r->pool,strlen(currow[0])+1))) { ! ap_snprintf (msql_errstr, MAX_STRING_LEN, "mSQL: Could not get memory for mSQL %s (%s) with [%s]", (sec->auth_msql_database ? sec->auth_msql_database : "\'unset!\'"), msqlErrMsg, *************** *** 701,707 **** (!sec->auth_msql_pwd_field) || (!sec->auth_msql_uname_field) ) { ! ap_snprintf(msql_errstr, MAX_STRING_LENGTH, "mSQL: Missing parameters for password lookup: %s%s%s", (sec->auth_msql_pwd_table ? "" : "Password table "), (sec->auth_msql_pwd_field ? "" : "Password field name "), --- 701,707 ---- (!sec->auth_msql_pwd_field) || (!sec->auth_msql_uname_field) ) { ! ap_snprintf(msql_errstr, MAX_STRING_LEN, "mSQL: Missing parameters for password lookup: %s%s%s", (sec->auth_msql_pwd_table ? "" : "Password table "), (sec->auth_msql_pwd_field ? "" : "Password field name "), *************** *** 711,717 **** }; if (!(msql_escape(esc_user, user, msql_errstr))) { ! ap_snprintf(msql_errstr, MAX_STRING_LENGTH, "mSQL: Could not cope/escape the '%s' user_id value; ",user); return NULL; }; --- 711,717 ---- }; if (!(msql_escape(esc_user, user, msql_errstr))) { ! ap_snprintf(msql_errstr, MAX_STRING_LEN, "mSQL: Could not cope/escape the '%s' user_id value; ",user); return NULL; }; *************** *** 738,744 **** (!sec->auth_msql_grp_field) || (!sec->auth_msql_uname_field) ) { ! ap_snprintf(msql_errstr, MAX_STRING_LENGTH, "mSQL: Missing parameters for group lookup: %s%s%s", (sec->auth_msql_grp_table ? "" : "Group table "), (sec->auth_msql_grp_field ? "" : "GroupID field name "), --- 738,744 ---- (!sec->auth_msql_grp_field) || (!sec->auth_msql_uname_field) ) { ! ap_snprintf(msql_errstr, MAX_STRING_LEN, "mSQL: Missing parameters for group lookup: %s%s%s", (sec->auth_msql_grp_table ? "" : "Group table "), (sec->auth_msql_grp_field ? "" : "GroupID field name "), *************** *** 748,760 **** }; if (!(msql_escape(esc_user, user,msql_errstr))) { ! ap_snprintf(msql_errstr, MAX_STRING_LENGTH, "mSQL: Could not cope/escape the '%s' user_id value",user); return NULL; }; if (!(msql_escape(esc_group, group,msql_errstr))) { ! ap_snprintf(msql_errstr, MAX_STRING_LENGTH, "mSQL: Could not cope/escape the '%s' group_id value",group); return NULL; --- 748,760 ---- }; if (!(msql_escape(esc_user, user,msql_errstr))) { ! ap_snprintf(msql_errstr, MAX_STRING_LEN, "mSQL: Could not cope/escape the '%s' user_id value",user); return NULL; }; if (!(msql_escape(esc_group, group,msql_errstr))) { ! ap_snprintf(msql_errstr, MAX_STRING_LEN, "mSQL: Could not cope/escape the '%s' group_id value",group); return NULL; *************** *** 806,812 **** if (sec->auth_msql_authoritative) { /* insist that the user is in the database */ ! ap_snprintf(msql_errstr, MAX_STRING_LENGTH, "mSQL: Password for user %s not found", c->user); note_basic_auth_failure (r); res = AUTH_REQUIRED; --- 806,812 ---- if (sec->auth_msql_authoritative) { /* insist that the user is in the database */ ! ap_snprintf(msql_errstr, MAX_STRING_LEN, "mSQL: Password for user %s not found", c->user); note_basic_auth_failure (r); res = AUTH_REQUIRED; *************** *** 826,832 **** if ((sec->auth_msql_nopasswd) && (!strlen(real_pw))) { /* ! ap_snprintf(msql_errstr, MAX_STRING_LENGTH, "mSQL: user %s: Empty/'any' password accepted",c->user); log_reason (msql_errstr, r->uri, r); */ --- 826,832 ---- if ((sec->auth_msql_nopasswd) && (!strlen(real_pw))) { /* ! ap_snprintf(msql_errstr, MAX_STRING_LEN, "mSQL: user %s: Empty/'any' password accepted",c->user); log_reason (msql_errstr, r->uri, r); */ *************** *** 837,843 **** * an arms length. */ if ((!strlen(real_pw)) || (!strlen(sent_pw))) { ! ap_snprintf(msql_errstr, MAX_STRING_LENGTH, "mSQL: user %s: Empty Password(s) Rejected",c->user); log_reason (msql_errstr, r->uri, r); note_basic_auth_failure (r); --- 837,843 ---- * an arms length. */ if ((!strlen(real_pw)) || (!strlen(sent_pw))) { ! ap_snprintf(msql_errstr, MAX_STRING_LEN, "mSQL: user %s: Empty Password(s) Rejected",c->user); log_reason (msql_errstr, r->uri, r); note_basic_auth_failure (r); *************** *** 856,862 **** }; if (strcmp(real_pw,sent_pw)) { ! ap_snprintf(msql_errstr, MAX_STRING_LENGTH, "mSQL user %s: password mismatch",c->user); log_reason (msql_errstr, r->uri, r); note_basic_auth_failure (r); --- 856,862 ---- }; if (strcmp(real_pw,sent_pw)) { ! ap_snprintf(msql_errstr, MAX_STRING_LEN, "mSQL user %s: password mismatch",c->user); log_reason (msql_errstr, r->uri, r); note_basic_auth_failure (r); *************** *** 891,897 **** if (!reqs_arr) { if (sec->auth_msql_authoritative) { ! ap_snprintf(msql_errstr, MAX_STRING_LENGTH, "user %s denied, no access rules specified (MSQL-Authoritative) ",user); log_reason (msql_errstr, r->uri, r); note_basic_auth_failure(r); return AUTH_REQUIRED; --- 891,897 ---- if (!reqs_arr) { if (sec->auth_msql_authoritative) { ! ap_snprintf(msql_errstr, MAX_STRING_LEN, "user %s denied, no access rules specified (MSQL-Authoritative) ",user); log_reason (msql_errstr, r->uri, r); note_basic_auth_failure(r); return AUTH_REQUIRED; *************** *** 916,922 **** }; } if ((sec->auth_msql_authoritative) && ( user_result != OK)) { ! ap_snprintf(msql_errstr, MAX_STRING_LENGTH, "User %s not found (MSQL-Auhtorative)",user); log_reason (msql_errstr, r->uri, r); note_basic_auth_failure(r); return AUTH_REQUIRED; --- 916,922 ---- }; } if ((sec->auth_msql_authoritative) && ( user_result != OK)) { ! ap_snprintf(msql_errstr, MAX_STRING_LEN, "User %s not found (MSQL-Auhtorative)",user); log_reason (msql_errstr, r->uri, r); note_basic_auth_failure(r); return AUTH_REQUIRED; *************** *** 944,950 **** }; if ( (sec->auth_msql_authoritative) && (group_result != OK) ) { ! ap_snprintf(msql_errstr, MAX_STRING_LENGTH, "user %s not in right groups (MSQL-Authoritative) ",user); log_reason (msql_errstr, r->uri, r); note_basic_auth_failure(r); return AUTH_REQUIRED; --- 944,950 ---- }; if ( (sec->auth_msql_authoritative) && (group_result != OK) ) { ! ap_snprintf(msql_errstr, MAX_STRING_LEN, "user %s not in right groups (MSQL-Authoritative) ",user); log_reason (msql_errstr, r->uri, r); note_basic_auth_failure(r); return AUTH_REQUIRED; *************** *** 961,967 **** * This really is not needed. */ if (((group_result == AUTH_REQUIRED) || (user_result == AUTH_REQUIRED)) && (sec->auth_msql_authoritative) ) { ! ap_snprintf(msql_errstr, MAX_STRING_LENGTH, "mSQL-Authoritative: Access denied on %s %s rule(s) ", (group_result == AUTH_REQUIRED) ? "USER" : "", (user_result == AUTH_REQUIRED) ? "GROUP" : "" ); --- 961,967 ---- * This really is not needed. */ if (((group_result == AUTH_REQUIRED) || (user_result == AUTH_REQUIRED)) && (sec->auth_msql_authoritative) ) { ! ap_snprintf(msql_errstr, MAX_STRING_LEN, "mSQL-Authoritative: Access denied on %s %s rule(s) ", (group_result == AUTH_REQUIRED) ? "USER" : "", (user_result == AUTH_REQUIRED) ? "GROUP" : "" );