2013-01-28 12:51:32 +00:00
|
|
|
--- tcp_wrappers_7.6/hosts_access.5.patch6 2013-01-23 11:10:00.545081410 +0100
|
|
|
|
+++ tcp_wrappers_7.6/hosts_access.5 2013-01-23 11:10:00.549081436 +0100
|
2008-08-29 07:49:41 +00:00
|
|
|
@@ -96,6 +96,10 @@ or address pattern listed in the named f
|
2004-09-09 13:06:45 +00:00
|
|
|
zero or more lines with zero or more host name or address patterns
|
|
|
|
separated by whitespace. A file name pattern can be used anywhere
|
|
|
|
a host name or address pattern can be used.
|
|
|
|
+.IP \(bu
|
|
|
|
+Wildcards `*\' and `?\' can be used to match hostnames or IP addresses. This
|
|
|
|
+method of matching cannot be used in conjunction with `net/mask\' matching,
|
|
|
|
+hostname matching beginning with `.\' or IP address matching ending with `.\'.
|
|
|
|
.SH WILDCARDS
|
|
|
|
The access control language supports explicit wildcards:
|
|
|
|
.IP ALL
|
2013-01-28 12:51:32 +00:00
|
|
|
--- tcp_wrappers_7.6/hosts_access.c.patch6 2013-01-23 11:10:00.546081416 +0100
|
|
|
|
+++ tcp_wrappers_7.6/hosts_access.c 2013-01-23 11:12:28.519925230 +0100
|
|
|
|
@@ -376,6 +376,11 @@ char *string;
|
2004-09-09 13:06:45 +00:00
|
|
|
{
|
|
|
|
int n;
|
|
|
|
|
|
|
|
+#ifndef DISABLE_WILDCARD_MATCHING
|
|
|
|
+ if (strchr(tok, '*') || strchr(tok,'?')) { /* contains '*' or '?' */
|
|
|
|
+ return (match_pattern_ylo(string,tok));
|
|
|
|
+ } else
|
|
|
|
+#endif
|
|
|
|
if (tok[0] == '.') { /* suffix */
|
|
|
|
n = strlen(string) - strlen(tok);
|
|
|
|
return (n > 0 && STR_EQ(tok, string + n));
|
2013-01-28 12:51:32 +00:00
|
|
|
@@ -417,6 +422,74 @@ char *string;
|
2004-09-09 13:06:45 +00:00
|
|
|
return ((addr & mask) == net);
|
|
|
|
}
|
2013-01-28 12:51:32 +00:00
|
|
|
|
2004-09-09 13:06:45 +00:00
|
|
|
+#ifndef DISABLE_WILDCARD_MATCHING
|
|
|
|
+/* Note: this feature has been adapted in a pretty straightforward way
|
|
|
|
+ from Tatu Ylonen's last SSH version under free license by
|
|
|
|
+ Pekka Savola <pekkas@netcore.fi>.
|
|
|
|
+
|
|
|
|
+ Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
|
|
|
|
+*/
|
|
|
|
+
|
|
|
|
+/* Returns true if the given string matches the pattern (which may contain
|
|
|
|
+ ? and * as wildcards), and zero if it does not match. */
|
|
|
|
+
|
|
|
|
+int match_pattern_ylo(const char *s, const char *pattern)
|
|
|
|
+{
|
|
|
|
+ while (1)
|
|
|
|
+ {
|
|
|
|
+ /* If at end of pattern, accept if also at end of string. */
|
|
|
|
+ if (!*pattern)
|
|
|
|
+ return !*s;
|
|
|
|
+
|
|
|
|
+ /* Process '*'. */
|
|
|
|
+ if (*pattern == '*')
|
|
|
|
+ {
|
|
|
|
+ /* Skip the asterisk. */
|
|
|
|
+ pattern++;
|
|
|
|
+
|
|
|
|
+ /* If at end of pattern, accept immediately. */
|
|
|
|
+ if (!*pattern)
|
|
|
|
+ return 1;
|
|
|
|
+
|
|
|
|
+ /* If next character in pattern is known, optimize. */
|
|
|
|
+ if (*pattern != '?' && *pattern != '*')
|
|
|
|
+ {
|
|
|
|
+ /* Look instances of the next character in pattern, and try
|
|
|
|
+ to match starting from those. */
|
|
|
|
+ for (; *s; s++)
|
|
|
|
+ if (*s == *pattern &&
|
|
|
|
+ match_pattern_ylo(s + 1, pattern + 1))
|
|
|
|
+ return 1;
|
|
|
|
+ /* Failed. */
|
|
|
|
+ return 0;
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
+ /* Move ahead one character at a time and try to match at each
|
|
|
|
+ position. */
|
|
|
|
+ for (; *s; s++)
|
|
|
|
+ if (match_pattern_ylo(s, pattern))
|
|
|
|
+ return 1;
|
|
|
|
+ /* Failed. */
|
|
|
|
+ return 0;
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
+ /* There must be at least one more character in the string. If we are
|
|
|
|
+ at the end, fail. */
|
|
|
|
+ if (!*s)
|
|
|
|
+ return 0;
|
|
|
|
+
|
|
|
|
+ /* Check if the next character of the string is acceptable. */
|
|
|
|
+ if (*pattern != '?' && *pattern != *s)
|
|
|
|
+ return 0;
|
|
|
|
+
|
|
|
|
+ /* Move to the next character, both in string and in pattern. */
|
|
|
|
+ s++;
|
|
|
|
+ pattern++;
|
|
|
|
+ }
|
|
|
|
+ /*NOTREACHED*/
|
|
|
|
+}
|
|
|
|
+#endif /* DISABLE_WILDCARD_MATCHING */
|
2013-01-28 12:51:32 +00:00
|
|
|
+
|
|
|
|
#ifdef HAVE_IPV6
|
|
|
|
/*
|
|
|
|
* Function that zeros all but the first "maskbits" bits of the IPV6 address
|