Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in
Toggle navigation
P
Postgres FD Implementation
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Analytics
Analytics
CI / CD
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
Abuhujair Javed
Postgres FD Implementation
Commits
f35252de
Commit
f35252de
authored
Feb 20, 2001
by
Tom Lane
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Fix pg_passwd's failure to cope with usernames > 8 chars.
parent
a24b04de
Changes
2
Show whitespace changes
Inline
Side-by-side
Showing
2 changed files
with
52 additions
and
50 deletions
+52
-50
doc/src/sgml/ref/pg_passwd.sgml
doc/src/sgml/ref/pg_passwd.sgml
+10
-8
src/bin/pg_passwd/pg_passwd.c
src/bin/pg_passwd/pg_passwd.c
+42
-42
No files found.
doc/src/sgml/ref/pg_passwd.sgml
View file @
f35252de
<!--
<!--
$Header: /cvsroot/pgsql/doc/src/sgml/ref/Attic/pg_passwd.sgml,v 1.
5 2000/12/25 23:15:26 petere
Exp $
$Header: /cvsroot/pgsql/doc/src/sgml/ref/Attic/pg_passwd.sgml,v 1.
6 2001/02/20 01:16:49 tgl
Exp $
Postgres documentation
Postgres documentation
-->
-->
...
@@ -31,7 +31,7 @@ Postgres documentation
...
@@ -31,7 +31,7 @@ Postgres documentation
<para>
<para>
<application>pg_passwd</application> is a tool to manipulate a flat
<application>pg_passwd</application> is a tool to manipulate a flat
text password file for the purpose of using that file to control
text password file for the purpose of using that file to control
the
client authentication of the
client authentication of the
<productname>PostgreSQL</productname> server. More information
<productname>PostgreSQL</productname> server. More information
about setting up this authentication mechanism can be found in the
about setting up this authentication mechanism can be found in the
<citetitle>Administrator's Guide</citetitle>.
<citetitle>Administrator's Guide</citetitle>.
...
@@ -51,7 +51,7 @@ Postgres documentation
...
@@ -51,7 +51,7 @@ Postgres documentation
<para>
<para>
Supply the name of the password file as argument to the <application>pg_passwd</application>
Supply the name of the password file as argument to the <application>pg_passwd</application>
command. To be of use for client authentication the file needs to
command. To be of use for client authentication the file needs to
be locat
ion
in the server's data directory, and the base name of
be locat
ed
in the server's data directory, and the base name of
the file needs to be specified in the
the file needs to be specified in the
<filename>pg_hba.conf</filename> access control file.
<filename>pg_hba.conf</filename> access control file.
...
@@ -65,7 +65,9 @@ Postgres documentation
...
@@ -65,7 +65,9 @@ Postgres documentation
where the <literal>Password:</literal> and <literal>Re-enter
where the <literal>Password:</literal> and <literal>Re-enter
password:</literal> prompts require the same password input which
password:</literal> prompts require the same password input which
is not displayed on the terminal.
is not displayed on the terminal. Note that the password is limited
to eight useful characters by restrictions of the standard crypt(3)
library routine.
</para>
</para>
<para>
<para>
...
@@ -78,12 +80,12 @@ Postgres documentation
...
@@ -78,12 +80,12 @@ Postgres documentation
<filename>pg_hba.conf</filename>:
<filename>pg_hba.conf</filename>:
<programlisting>
<programlisting>
host
unv
133.65.96.250 255.255.255.255 password passwords
host
mydb
133.65.96.250 255.255.255.255 password passwords
</programlisting>
</programlisting>
which would allow access
from host 133.65.96.250 using the
which would allow access
to database mydb from host 133.65.96.250 using
passwords listed in the <filename>passwords</filename> file (and
the
passwords listed in the <filename>passwords</filename> file (and
only to the users listed in th
e
file).
only to the users listed in th
at
file).
</para>
</para>
<note>
<note>
...
...
src/bin/pg_passwd/pg_passwd.c
View file @
f35252de
...
@@ -19,14 +19,23 @@ extern char *crypt(const char *, const char *);
...
@@ -19,14 +19,23 @@ extern char *crypt(const char *, const char *);
#endif
#endif
#define PG_PASSWD_LEN 13
/* not including null */
/*
* We assume that the output of crypt(3) is always 13 characters,
* and that at most 8 characters can usefully be sent to it.
*
* Postgres usernames are assumed to be less than NAMEDATALEN chars long.
*/
#define CLEAR_PASSWD_LEN 8
/* not including null */
#define CRYPTED_PASSWD_LEN 13
/* not including null */
const
char
*
progname
;
const
char
*
progname
;
static
void
usage
(
void
);
static
void
usage
(
void
);
static
void
read_pwd_file
(
char
*
filename
);
static
void
read_pwd_file
(
char
*
filename
);
static
void
write_pwd_file
(
char
*
filename
,
char
*
bkname
);
static
void
write_pwd_file
(
char
*
filename
,
char
*
bkname
);
static
void
encrypt_pwd
(
char
key
[
9
],
char
salt
[
3
],
char
passwd
[
PG_PASSWD_LEN
+
1
]);
static
void
encrypt_pwd
(
char
key
[
CLEAR_PASSWD_LEN
+
1
],
char
salt
[
3
],
char
passwd
[
CRYPTED_PASSWD_LEN
+
1
]);
static
void
prompt_for_username
(
char
*
username
);
static
void
prompt_for_username
(
char
*
username
);
static
void
prompt_for_password
(
char
*
prompt
,
char
*
password
);
static
void
prompt_for_password
(
char
*
prompt
,
char
*
password
);
...
@@ -94,7 +103,9 @@ try_again:
...
@@ -94,7 +103,9 @@ try_again:
}
}
/* read all the entries */
/* read all the entries */
for
(
npwds
=
0
;
npwds
<
MAXPWDS
&&
fgets
(
line
,
512
,
fp
)
!=
NULL
;
++
npwds
)
for
(
npwds
=
0
;
npwds
<
MAXPWDS
&&
fgets
(
line
,
sizeof
(
line
),
fp
)
!=
NULL
;
++
npwds
)
{
{
int
l
;
int
l
;
char
*
p
,
char
*
p
,
...
@@ -123,13 +134,13 @@ try_again:
...
@@ -123,13 +134,13 @@ try_again:
}
}
pwds
[
npwds
].
uname
=
strdup
(
p
);
pwds
[
npwds
].
uname
=
strdup
(
p
);
/* check
duplicat
e */
/* check
for duplicate user nam
e */
for
(
i
=
0
;
i
<
npwds
;
++
i
)
for
(
i
=
0
;
i
<
npwds
;
++
i
)
{
{
if
(
strcmp
(
pwds
[
i
].
uname
,
pwds
[
npwds
].
uname
)
==
0
)
if
(
strcmp
(
pwds
[
i
].
uname
,
pwds
[
npwds
].
uname
)
==
0
)
{
{
fprintf
(
stderr
,
"Duplicate
d entry: %s
\n
"
,
fprintf
(
stderr
,
"Duplicate
username %s in entry %d
\n
"
,
pwds
[
npwds
].
uname
);
pwds
[
npwds
].
uname
,
npwds
+
1
);
exit
(
1
);
exit
(
1
);
}
}
}
}
...
@@ -143,7 +154,7 @@ try_again:
...
@@ -143,7 +154,7 @@ try_again:
if
(
q
!=
NULL
)
if
(
q
!=
NULL
)
*
(
q
++
)
=
'\0'
;
*
(
q
++
)
=
'\0'
;
if
(
strlen
(
p
)
!=
PG_PASSWD_LEN
&&
strcmp
(
p
,
"+"
)
!=
0
)
if
(
strlen
(
p
)
!=
CRYPTED_PASSWD_LEN
&&
strcmp
(
p
,
"+"
)
!=
0
)
{
{
fprintf
(
stderr
,
"%s:%d: warning: invalid password length
\n
"
,
fprintf
(
stderr
,
"%s:%d: warning: invalid password length
\n
"
,
filename
,
npwds
+
1
);
filename
,
npwds
+
1
);
...
@@ -209,11 +220,13 @@ link_again:
...
@@ -209,11 +220,13 @@ link_again:
}
}
static
void
static
void
encrypt_pwd
(
char
key
[
9
],
char
salt
[
3
],
char
passwd
[
PG_PASSWD_LEN
+
1
])
encrypt_pwd
(
char
key
[
CLEAR_PASSWD_LEN
+
1
],
char
salt
[
3
],
char
passwd
[
CRYPTED_PASSWD_LEN
+
1
])
{
{
int
n
;
int
n
;
/*
get encrypted password
*/
/*
select a salt, if not already given
*/
if
(
salt
[
0
]
==
'\0'
)
if
(
salt
[
0
]
==
'\0'
)
{
{
srand
(
time
(
NULL
));
srand
(
time
(
NULL
));
...
@@ -229,32 +242,16 @@ encrypt_pwd(char key[9], char salt[3], char passwd[PG_PASSWD_LEN + 1])
...
@@ -229,32 +242,16 @@ encrypt_pwd(char key[9], char salt[3], char passwd[PG_PASSWD_LEN + 1])
salt
[
1
]
=
n
;
salt
[
1
]
=
n
;
salt
[
2
]
=
'\0'
;
salt
[
2
]
=
'\0'
;
}
}
/* get encrypted password */
strcpy
(
passwd
,
crypt
(
key
,
salt
));
strcpy
(
passwd
,
crypt
(
key
,
salt
));
#ifdef PG_PASSWD_DEBUG
/* show it */
/* show it */
fprintf
(
stderr
,
"key = %s, salt = %s, password = %s
\n
"
,
/*
key
,
salt
,
passwd
);
* fprintf(stderr, "key = %s, salt = %s, password = %s\n", key, salt,
* passwd);
*/
}
#ifdef NOT_USED
static
int
check_pwd
(
char
key
[
9
],
char
passwd
[
PG_PASSWD_LEN
+
1
])
{
char
shouldbe
[
PG_PASSWD_LEN
+
1
];
char
salt
[
3
];
salt
[
0
]
=
passwd
[
0
];
salt
[
1
]
=
passwd
[
1
];
salt
[
2
]
=
'\0'
;
encrypt_pwd
(
key
,
salt
,
shouldbe
);
return
strncmp
(
shouldbe
,
passwd
,
PG_PASSWD_LEN
)
==
0
?
1
:
0
;
}
#endif
#endif
}
static
void
static
void
prompt_for_username
(
char
*
username
)
prompt_for_username
(
char
*
username
)
...
@@ -263,7 +260,7 @@ prompt_for_username(char *username)
...
@@ -263,7 +260,7 @@ prompt_for_username(char *username)
printf
(
"Username: "
);
printf
(
"Username: "
);
fflush
(
stdout
);
fflush
(
stdout
);
if
(
fgets
(
username
,
9
,
stdin
)
==
NULL
)
if
(
fgets
(
username
,
NAMEDATALEN
,
stdin
)
==
NULL
)
username
[
0
]
=
'\0'
;
username
[
0
]
=
'\0'
;
length
=
strlen
(
username
);
length
=
strlen
(
username
);
...
@@ -295,16 +292,19 @@ prompt_for_password(char *prompt, char *password)
...
@@ -295,16 +292,19 @@ prompt_for_password(char *prompt, char *password)
#endif
#endif
printf
(
prompt
);
fflush
(
stdout
);
#ifdef HAVE_TERMIOS_H
#ifdef HAVE_TERMIOS_H
tcgetattr
(
0
,
&
t
);
tcgetattr
(
0
,
&
t
);
t_orig
=
t
;
t_orig
=
t
;
t
.
c_lflag
&=
~
ECHO
;
t
.
c_lflag
&=
~
ECHO
;
tcsetattr
(
0
,
TCSADRAIN
,
&
t
);
tcsetattr
(
0
,
TCSADRAIN
,
&
t
);
#endif
#endif
if
(
fgets
(
password
,
9
,
stdin
)
==
NULL
)
printf
(
prompt
);
fflush
(
stdout
);
if
(
fgets
(
password
,
CLEAR_PASSWD_LEN
+
1
,
stdin
)
==
NULL
)
password
[
0
]
=
'\0'
;
password
[
0
]
=
'\0'
;
#ifdef HAVE_TERMIOS_H
#ifdef HAVE_TERMIOS_H
tcsetattr
(
0
,
TCSADRAIN
,
&
t_orig
);
tcsetattr
(
0
,
TCSADRAIN
,
&
t_orig
);
#endif
#endif
...
@@ -332,13 +332,13 @@ prompt_for_password(char *prompt, char *password)
...
@@ -332,13 +332,13 @@ prompt_for_password(char *prompt, char *password)
int
int
main
(
int
argc
,
char
*
argv
[])
main
(
int
argc
,
char
*
argv
[])
{
{
static
char
bkname
[
MAXPGPATH
];
char
*
filename
;
char
*
filename
;
char
username
[
9
];
char
bkname
[
MAXPGPATH
];
char
username
[
NAMEDATALEN
];
char
salt
[
3
];
char
salt
[
3
];
char
key
[
9
],
char
key
[
CLEAR_PASSWD_LEN
+
1
],
key2
[
9
];
key2
[
CLEAR_PASSWD_LEN
+
1
];
char
e_passwd
[
PG
_PASSWD_LEN
+
1
];
char
e_passwd
[
CRYPTED
_PASSWD_LEN
+
1
];
int
i
;
int
i
;
progname
=
argv
[
0
];
progname
=
argv
[
0
];
...
@@ -376,7 +376,7 @@ main(int argc, char *argv[])
...
@@ -376,7 +376,7 @@ main(int argc, char *argv[])
prompt_for_username
(
username
);
prompt_for_username
(
username
);
prompt_for_password
(
"New password: "
,
key
);
prompt_for_password
(
"New password: "
,
key
);
prompt_for_password
(
"Re-enter new password: "
,
key2
);
prompt_for_password
(
"Re-enter new password: "
,
key2
);
if
(
str
ncmp
(
key
,
key2
,
8
)
!=
0
)
if
(
str
cmp
(
key
,
key2
)
!=
0
)
{
{
fprintf
(
stderr
,
"Password mismatch
\n
"
);
fprintf
(
stderr
,
"Password mismatch
\n
"
);
exit
(
1
);
exit
(
1
);
...
@@ -397,7 +397,7 @@ main(int argc, char *argv[])
...
@@ -397,7 +397,7 @@ main(int argc, char *argv[])
{
/* did not exist */
{
/* did not exist */
if
(
npwds
==
MAXPWDS
)
if
(
npwds
==
MAXPWDS
)
{
{
fprintf
(
stderr
,
"Cannot handle so may entries
\n
"
);
fprintf
(
stderr
,
"Cannot handle so ma
n
y entries
\n
"
);
exit
(
1
);
exit
(
1
);
}
}
pwds
[
npwds
].
uname
=
strdup
(
username
);
pwds
[
npwds
].
uname
=
strdup
(
username
);
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment