2 |
- |
1 |
/* Copyright (C) 1993, 1994, 1998 Aladdin Enterprises. All rights reserved.
|
|
|
2 |
|
|
|
3 |
This software is provided AS-IS with no warranty, either express or
|
|
|
4 |
implied.
|
|
|
5 |
|
|
|
6 |
This software is distributed under license and may not be copied,
|
|
|
7 |
modified or distributed except as expressly authorized under the terms
|
|
|
8 |
of the license contained in the file LICENSE in this distribution.
|
|
|
9 |
|
|
|
10 |
For more information about licensing, please refer to
|
|
|
11 |
http://www.ghostscript.com/licensing/. For information on
|
|
|
12 |
commercial licensing, go to http://www.artifex.com/licensing/ or
|
|
|
13 |
contact Artifex Software, Inc., 101 Lucas Valley Road #110,
|
|
|
14 |
San Rafael, CA 94903, U.S.A., +1(415)492-9861.
|
|
|
15 |
*/
|
|
|
16 |
|
|
|
17 |
/* $Id: iutil2.c,v 1.6 2003/09/03 03:22:59 giles Exp $ */
|
|
|
18 |
/* Level 2 utilities for Ghostscript interpreter */
|
|
|
19 |
#include "memory_.h"
|
|
|
20 |
#include "string_.h"
|
|
|
21 |
#include "ghost.h"
|
|
|
22 |
#include "ierrors.h"
|
|
|
23 |
#include "opcheck.h"
|
|
|
24 |
#include "gsparam.h"
|
|
|
25 |
#include "gsutil.h" /* bytes_compare prototype */
|
|
|
26 |
#include "idict.h"
|
|
|
27 |
#include "imemory.h" /* for iutil.h */
|
|
|
28 |
#include "iutil.h"
|
|
|
29 |
#include "iutil2.h"
|
|
|
30 |
|
|
|
31 |
/* ------ Password utilities ------ */
|
|
|
32 |
|
|
|
33 |
/* Read a password from a parameter list. */
|
|
|
34 |
/* Return 0 if present, 1 if absent, or an error code. */
|
|
|
35 |
int
|
|
|
36 |
param_read_password(gs_param_list * plist, const char *kstr, password * ppass)
|
|
|
37 |
{
|
|
|
38 |
gs_param_string ps;
|
|
|
39 |
long ipass;
|
|
|
40 |
int code;
|
|
|
41 |
|
|
|
42 |
ps.data = (const byte *)ppass->data, ps.size = ppass->size,
|
|
|
43 |
ps.persistent = false;
|
|
|
44 |
code = param_read_string(plist, kstr, &ps);
|
|
|
45 |
switch (code) {
|
|
|
46 |
case 0: /* OK */
|
|
|
47 |
if (ps.size > MAX_PASSWORD)
|
|
|
48 |
return_error(e_limitcheck);
|
|
|
49 |
/* Copy the data back. */
|
|
|
50 |
memcpy(ppass->data, ps.data, ps.size);
|
|
|
51 |
ppass->size = ps.size;
|
|
|
52 |
return 0;
|
|
|
53 |
case 1: /* key is missing */
|
|
|
54 |
return 1;
|
|
|
55 |
}
|
|
|
56 |
/* We might have gotten a typecheck because */
|
|
|
57 |
/* the supplied password was an integer. */
|
|
|
58 |
if (code != e_typecheck)
|
|
|
59 |
return code;
|
|
|
60 |
code = param_read_long(plist, kstr, &ipass);
|
|
|
61 |
if (code != 0) /* error or missing */
|
|
|
62 |
return code;
|
|
|
63 |
sprintf((char *)ppass->data, "%ld", ipass);
|
|
|
64 |
ppass->size = strlen((char *)ppass->data);
|
|
|
65 |
return 0;
|
|
|
66 |
}
|
|
|
67 |
/* Write a password to a parameter list. */
|
|
|
68 |
int
|
|
|
69 |
param_write_password(gs_param_list * plist, const char *kstr,
|
|
|
70 |
const password * ppass)
|
|
|
71 |
{
|
|
|
72 |
gs_param_string ps;
|
|
|
73 |
|
|
|
74 |
ps.data = (const byte *)ppass->data, ps.size = ppass->size,
|
|
|
75 |
ps.persistent = false;
|
|
|
76 |
if (ps.size > MAX_PASSWORD)
|
|
|
77 |
return_error(e_limitcheck);
|
|
|
78 |
return param_write_string(plist, kstr, &ps);
|
|
|
79 |
}
|
|
|
80 |
|
|
|
81 |
/* Check a password from a parameter list. */
|
|
|
82 |
/* Return 0 if OK, 1 if not OK, or an error code. */
|
|
|
83 |
int
|
|
|
84 |
param_check_password(gs_param_list * plist, const password * ppass)
|
|
|
85 |
{
|
|
|
86 |
if (ppass->size != 0) {
|
|
|
87 |
password pass;
|
|
|
88 |
int code = param_read_password(plist, "Password", &pass);
|
|
|
89 |
|
|
|
90 |
if (code)
|
|
|
91 |
return code;
|
|
|
92 |
if (pass.size != ppass->size ||
|
|
|
93 |
bytes_compare(&pass.data[0], pass.size,
|
|
|
94 |
&ppass->data[0],
|
|
|
95 |
ppass->size) != 0
|
|
|
96 |
)
|
|
|
97 |
return 1;
|
|
|
98 |
}
|
|
|
99 |
return 0;
|
|
|
100 |
}
|
|
|
101 |
|
|
|
102 |
/* Read a password from, or write a password into, a dictionary */
|
|
|
103 |
/* (presumably systemdict). */
|
|
|
104 |
private int
|
|
|
105 |
dict_find_password(ref ** ppvalue, const ref * pdref, const char *kstr)
|
|
|
106 |
{
|
|
|
107 |
ref *pvalue;
|
|
|
108 |
|
|
|
109 |
if (dict_find_string(pdref, kstr, &pvalue) <= 0)
|
|
|
110 |
return_error(e_undefined);
|
|
|
111 |
if (!r_has_type(pvalue, t_string) ||
|
|
|
112 |
r_has_attrs(pvalue, a_read) ||
|
|
|
113 |
pvalue->value.const_bytes[0] >= r_size(pvalue)
|
|
|
114 |
)
|
|
|
115 |
return_error(e_rangecheck);
|
|
|
116 |
*ppvalue = pvalue;
|
|
|
117 |
return 0;
|
|
|
118 |
}
|
|
|
119 |
int
|
|
|
120 |
dict_read_password(password * ppass, const ref * pdref, const char *pkey)
|
|
|
121 |
{
|
|
|
122 |
ref *pvalue;
|
|
|
123 |
int code = dict_find_password(&pvalue, pdref, pkey);
|
|
|
124 |
|
|
|
125 |
if (code < 0)
|
|
|
126 |
return code;
|
|
|
127 |
if (pvalue->value.const_bytes[0] > MAX_PASSWORD)
|
|
|
128 |
return_error(e_rangecheck); /* limitcheck? */
|
|
|
129 |
memcpy(ppass->data, pvalue->value.const_bytes + 1,
|
|
|
130 |
(ppass->size = pvalue->value.const_bytes[0]));
|
|
|
131 |
return 0;
|
|
|
132 |
}
|
|
|
133 |
int
|
|
|
134 |
dict_write_password(const password * ppass, ref * pdref, const char *pkey,
|
|
|
135 |
bool change_allowed)
|
|
|
136 |
{
|
|
|
137 |
ref *pvalue;
|
|
|
138 |
int code = dict_find_password(&pvalue, pdref, pkey);
|
|
|
139 |
|
|
|
140 |
if (code < 0)
|
|
|
141 |
return code;
|
|
|
142 |
if (ppass->size >= r_size(pvalue))
|
|
|
143 |
return_error(e_rangecheck);
|
|
|
144 |
if (!change_allowed &&
|
|
|
145 |
bytes_compare(pvalue->value.bytes + 1, pvalue->value.bytes[0],
|
|
|
146 |
ppass->data, ppass->size) != 0)
|
|
|
147 |
return_error(e_invalidaccess);
|
|
|
148 |
memcpy(pvalue->value.bytes + 1, ppass->data,
|
|
|
149 |
(pvalue->value.bytes[0] = ppass->size));
|
|
|
150 |
return 0;
|
|
|
151 |
}
|