diff options
author | Jason Downs <downsj@cvs.openbsd.org> | 1996-08-19 10:13:38 +0000 |
---|---|---|
committer | Jason Downs <downsj@cvs.openbsd.org> | 1996-08-19 10:13:38 +0000 |
commit | 14856225739aa48b6c9cf4c17925362b2d95cea3 (patch) | |
tree | dfd38f1b654fb5bbdfc38887c1a829b658e71530 /gnu/usr.bin/perl/taint.c | |
parent | 77469082517e44fe6ca347d9e8dc7dffd1583637 (diff) |
Import of Perl 5.003 into the tree. Makefile.bsd-wrapper and
config.sh.OpenBSD are the only local changes.
Diffstat (limited to 'gnu/usr.bin/perl/taint.c')
-rw-r--r-- | gnu/usr.bin/perl/taint.c | 71 |
1 files changed, 71 insertions, 0 deletions
diff --git a/gnu/usr.bin/perl/taint.c b/gnu/usr.bin/perl/taint.c new file mode 100644 index 00000000000..6c64b39fc77 --- /dev/null +++ b/gnu/usr.bin/perl/taint.c @@ -0,0 +1,71 @@ +/* + * "...we will have peace, when you and all your works have perished--and + * the works of your dark master to whom you would deliver us. You are a + * liar, Saruman, and a corrupter of men's hearts." --Theoden + */ + +#include "EXTERN.h" +#include "perl.h" + +void +taint_not(s) +char *s; +{ + if (euid != uid) + croak("No %s allowed while running setuid", s); + if (egid != gid) + croak("No %s allowed while running setgid", s); +} + +void +taint_proper(f, s) +char *f; +char *s; +{ + if (tainting) { + DEBUG_u(fprintf(stderr,"%s %d %d %d\n",s,tainted,uid, euid)); + if (tainted) { + char *ug = 0; + if (euid != uid) + ug = " while running setuid"; + else if (egid != gid) + ug = " while running setgid"; + else if (tainting) + ug = " while running with -T switch"; + if (ug) { + if (!unsafe) + croak(f, s, ug); + else if (dowarn) + warn(f, s, ug); + } + } + } +} + +void +taint_env() +{ + SV** svp; + + if (tainting) { + MAGIC *mg = 0; + svp = hv_fetch(GvHVn(envgv),"PATH",4,FALSE); + if (!svp || *svp == &sv_undef || + ((mg = mg_find(*svp, 't')) && mg->mg_len & 1)) + { + tainted = TRUE; + if (mg && MgTAINTEDDIR(mg)) + taint_proper("Insecure directory in %s%s", "$ENV{PATH}"); + else + taint_proper("Insecure %s%s", "$ENV{PATH}"); + } + svp = hv_fetch(GvHVn(envgv),"IFS",3,FALSE); + if (svp && *svp != &sv_undef && + (mg = mg_find(*svp, 't')) && mg->mg_len & 1) + { + tainted = TRUE; + taint_proper("Insecure %s%s", "$ENV{IFS}"); + } + } +} + |