⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 htdbm.c

📁 Apache HTTP Server 是一个功能强大的灵活的与HTTP/1.1相兼容的web服务器.这里给出的是Apache HTTP服务器的源码。
💻 C
📖 第 1 页 / 共 2 页
字号:
    char salt[9];    switch (htdbm->alg) {        case ALG_APSHA:            /* XXX cpw >= 28 + strlen(sha1) chars - fixed len SHA */            apr_sha1_base64(htdbm->userpass,strlen(htdbm->userpass),cpw);        break;        case ALG_APMD5:             (void) srand((int) time((time_t *) NULL));            to64(&salt[0], rand(), 8);            salt[8] = '\0';            apr_md5_encode((const char *)htdbm->userpass, (const char *)salt,                            cpw, sizeof(cpw));        break;        case ALG_PLAIN:            /* XXX this len limitation is not in sync with any HTTPd len. */            apr_cpystrn(cpw,htdbm->userpass,sizeof(cpw));        break;#if APR_HAVE_CRYPT_H        case ALG_CRYPT:            (void) srand((int) time((time_t *) NULL));            to64(&salt[0], rand(), 8);            salt[8] = '\0';            apr_cpystrn(cpw, (char *)crypt(htdbm->userpass, salt), sizeof(cpw) - 1);            fprintf(stderr, "CRYPT is now deprecated, use MD5 instead!\n");#endif        default:        break;    }    htdbm->userpass = apr_pstrdup(htdbm->pool, cpw);    return APR_SUCCESS;}static apr_status_t htdbm_valid_username(htdbm_t *htdbm){    if (!htdbm->username || (strlen(htdbm->username) > 64) || (strlen(htdbm->username) < 1)) {        fprintf(stderr, "Invalid username length\n");        return APR_EINVAL;    }    if (strchr(htdbm->username, ':')) {        fprintf(stderr, "Username contains invalid characters\n");        return APR_EINVAL;    }    return APR_SUCCESS;}static void htdbm_usage(void){#if APR_HAVE_CRYPT_H#define CRYPT_OPTION "d"#else#define CRYPT_OPTION ""#endif    fprintf(stderr, "htdbm -- program for manipulating DBM password databases.\n\n");    fprintf(stderr, "Usage: htdbm    [-cm"CRYPT_OPTION"pstvx] [-TDBTYPE] database username\n");    fprintf(stderr, "                -b[cm"CRYPT_OPTION"ptsv] [-TDBTYPE] database username password\n");    fprintf(stderr, "                -n[m"CRYPT_OPTION"pst]   username\n");    fprintf(stderr, "                -nb[m"CRYPT_OPTION"pst]  username password\n");    fprintf(stderr, "                -v[m"CRYPT_OPTION"ps]    [-TDBTYPE] database username\n");    fprintf(stderr, "                -vb[m"CRYPT_OPTION"ps]   [-TDBTYPE] database username password\n");    fprintf(stderr, "                -x[m"CRYPT_OPTION"ps]    [-TDBTYPE] database username\n");    fprintf(stderr, "                -l                       [-TDBTYPE] database\n");    fprintf(stderr, "Options:\n");    fprintf(stderr, "   -b   Use the password from the command line rather "                    "than prompting for it.\n");    fprintf(stderr, "   -c   Create a new database.\n");    fprintf(stderr, "   -n   Don't update database; display results on stdout.\n");    fprintf(stderr, "   -m   Force MD5 encryption of the password (default).\n");#if APR_HAVE_CRYPT_H    fprintf(stderr, "   -d   Force CRYPT encryption of the password (now deprecated).\n");#endif    fprintf(stderr, "   -p   Do not encrypt the password (plaintext).\n");    fprintf(stderr, "   -s   Force SHA encryption of the password.\n");    fprintf(stderr, "   -T   DBM Type (SDBM|GDBM|DB|default).\n");    fprintf(stderr, "   -l   Display usernames from database on stdout.\n");    fprintf(stderr, "   -t   The last param is username comment.\n");    fprintf(stderr, "   -v   Verify the username/password.\n");    fprintf(stderr, "   -x   Remove the username record from database.\n");    exit(ERR_SYNTAX);}int main(int argc, const char * const argv[]){    apr_pool_t *pool;    apr_status_t rv;    apr_size_t l;    char pwi[MAX_STRING_LEN];    char pwc[MAX_STRING_LEN];    char errbuf[MAX_STRING_LEN];    const char *arg;    int  need_file = 1;    int  need_user = 1;    int  need_pwd  = 1;    int  need_cmnt = 0;    int  pwd_supplied = 0;    int  changed;    int  cmd = HTDBM_MAKE;    int  i;    int args_left = 2;    apr_app_initialize(&argc, &argv, NULL);    atexit(terminate);    if ((rv = htdbm_init(&pool, &h)) != APR_SUCCESS) {        fprintf(stderr, "Unable to initialize htdbm terminating!\n");        apr_strerror(rv, errbuf, sizeof(errbuf));        exit(1);    }    /*     * Preliminary check to make sure they provided at least     * three arguments, we'll do better argument checking as      * we parse the command line.     */    if (argc < 3)       htdbm_usage();    /*     * Go through the argument list and pick out any options.  They     * have to precede any other arguments.     */    for (i = 1; i < argc; i++) {        arg = argv[i];        if (*arg != '-')            break;                while (*++arg != '\0') {            switch (*arg) {            case 'b':                pwd_supplied = 1;                need_pwd = 0;                args_left++;                break;            case 'c':                h->create = 1;                break;            case 'n':                need_file = 0;                cmd = HTDBM_NOFILE;                    args_left--;                break;            case 'l':                need_pwd = 0;                need_user = 0;                cmd = HTDBM_LIST;                h->rdonly = 1;                args_left--;                break;            case 't':                need_cmnt = 1;                args_left++;                break;            case 'T':                h->type = apr_pstrdup(h->pool, ++arg);                while (*arg != '\0')                    ++arg;                --arg; /* so incrementing this in the loop with find a null */                break;            case 'v':                h->rdonly = 1;                cmd = HTDBM_VERIFY;                break;            case 'x':                need_pwd = 0;                cmd = HTDBM_DELETE;                break;            case 'm':                h->alg = ALG_APMD5;                break;            case 'p':                h->alg = ALG_PLAIN;                break;            case 's':                h->alg = ALG_APSHA;                break;#if APR_HAVE_CRYPT_H            case 'd':                h->alg = ALG_CRYPT;                break;#endif            default:                htdbm_usage();                break;            }        }    }    /*     * Make sure we still have exactly the right number of arguments left     * (the filename, the username, and possibly the password if -b was     * specified).     */    if ((argc - i) != args_left)        htdbm_usage();    if (!need_file)        i--;    else {        h->filename = apr_pstrdup(h->pool, argv[i]);            if ((rv = htdbm_open(h)) != APR_SUCCESS) {            fprintf(stderr, "Error opening database %s\n", argv[i]);            apr_strerror(rv, errbuf, sizeof(errbuf));            fprintf(stderr,"%s\n",errbuf);            exit(ERR_FILEPERM);        }    }    if (need_user) {        h->username = apr_pstrdup(pool, argv[i+1]);        if (htdbm_valid_username(h) != APR_SUCCESS)            exit(ERR_BADUSER);    }    if (pwd_supplied)        h->userpass = apr_pstrdup(pool, argv[i+2]);    if (need_pwd) {        l = sizeof(pwc);        if (apr_password_get("Enter password        : ", pwi, &l) != APR_SUCCESS) {            fprintf(stderr, "Password too long\n");            exit(ERR_OVERFLOW);        }        l = sizeof(pwc);        if (apr_password_get("Re-type password      : ", pwc, &l) != APR_SUCCESS) {            fprintf(stderr, "Password too long\n");            exit(ERR_OVERFLOW);        }        if (strcmp(pwi, pwc) != 0) {            fprintf(stderr, "Password verification error\n");            exit(ERR_PWMISMATCH);        }                    h->userpass = apr_pstrdup(pool,  pwi);    }    if (need_cmnt && pwd_supplied)        h->comment = apr_pstrdup(pool, argv[i+3]);    else if (need_cmnt)        h->comment = apr_pstrdup(pool, argv[i+2]);    switch (cmd) {        case HTDBM_VERIFY:            if ((rv = htdbm_verify(h)) != APR_SUCCESS) {                if(rv == APR_ENOENT) {                    fprintf(stderr, "The user '%s' could not be found in database\n", h->username);                    exit(ERR_BADUSER);                }                else {                    fprintf(stderr, "Password mismatch for user '%s'\n", h->username);                    exit(ERR_PWMISMATCH);                }            }            else                fprintf(stderr, "Password validated for user '%s'\n", h->username);            break;        case HTDBM_DELETE:            if (htdbm_del(h) != APR_SUCCESS) {                fprintf(stderr, "Cannot find user '%s' in database\n", h->username);                exit(ERR_BADUSER);            }            h->username = NULL;            changed = 1;            break;        case HTDBM_LIST:            htdbm_list(h);            break;        default:            htdbm_make(h);            break;    }        if (need_file && !h->rdonly) {        if ((rv = htdbm_save(h, &changed)) != APR_SUCCESS) {            apr_strerror(rv, errbuf, sizeof(errbuf));            exit(ERR_FILEPERM);        }        fprintf(stdout, "Database %s %s.\n", h->filename,                 h->create ? "created" : (changed ? "modified" : "updated"));    }    if (cmd == HTDBM_NOFILE) {        if (!need_cmnt) {            fprintf(stderr, "%s:%s\n", h->username, h->userpass);        }        else {            fprintf(stderr, "%s:%s:%s\n", h->username, h->userpass,                    h->comment);        }    }    htdbm_terminate(h);        return 0; /* Suppress compiler warning. */}

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -