1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
|
/* Copyright (C) 2001-2020 Artifex Software, Inc.
All Rights Reserved.
This software is provided AS-IS with no warranty, either express or
implied.
This software is distributed under license and may not be copied,
modified or distributed except as expressly authorized under the terms
of the license contained in the file LICENSE in this distribution.
Refer to licensing information at http://www.artifex.com or contact
Artifex Software, Inc., 1305 Grant Avenue - Suite 200, Novato,
CA 94945, U.S.A., +1(415)492-9861, for further information.
*/
/* Level 2 utilities for Ghostscript interpreter */
#include "memory_.h"
#include "string_.h"
#include "ghost.h"
#include "ierrors.h"
#include "opcheck.h"
#include "gsparam.h"
#include "gsutil.h" /* bytes_compare prototype */
#include "idict.h"
#include "imemory.h" /* for iutil.h */
#include "iutil.h"
#include "iutil2.h"
/* ------ Password utilities ------ */
/* Read a password from a parameter list. */
/* Return 0 if present, 1 if absent, or an error code. */
int
param_read_password(gs_param_list * plist, const char *kstr, password * ppass)
{
gs_param_string ps;
long ipass;
int code = param_read_string(plist, kstr, &ps);
switch (code) {
case 0: /* OK */
if (ps.size > MAX_PASSWORD)
return_error(gs_error_limitcheck);
/* Copy the data back. */
memcpy(ppass->data, ps.data, ps.size);
ppass->size = ps.size;
return 0;
case 1: /* key is missing */
return 1;
}
/* We might have gotten a typecheck because */
/* the supplied password was an integer. */
if (code != gs_error_typecheck)
return code;
code = param_read_long(plist, kstr, &ipass);
if (code != 0) /* error or missing */
return code;
gs_sprintf((char *)ppass->data, "%ld", ipass);
ppass->size = strlen((char *)ppass->data);
return 0;
}
/* Write a password to a parameter list. */
int
param_write_password(gs_param_list * plist, const char *kstr,
const password * ppass)
{
gs_param_string ps;
ps.data = (const byte *)ppass->data, ps.size = ppass->size,
ps.persistent = false;
if (ps.size > MAX_PASSWORD)
return_error(gs_error_limitcheck);
return param_write_string(plist, kstr, &ps);
}
/* Check a password from a parameter list. */
/* Return 0 if OK, 1 if not OK, or an error code. */
int
param_check_password(gs_param_list * plist, const password * ppass)
{
if (ppass->size != 0) {
password pass;
int code = param_read_password(plist, "Password", &pass);
if (code)
return code;
if (pass.size != ppass->size ||
bytes_compare(&pass.data[0], pass.size,
&ppass->data[0],
ppass->size) != 0
)
return 1;
}
return 0;
}
/* Read a password from, or write a password into, a dictionary */
/* (presumably systemdict). */
static int
dict_find_password(ref ** ppvalue, const ref * pdref, const char *kstr)
{
ref *pvalue;
if (dict_find_string(pdref, kstr, &pvalue) <= 0)
return_error(gs_error_undefined);
if (!r_has_type(pvalue, t_string) ||
r_has_attrs(pvalue, a_read) ||
pvalue->value.const_bytes[0] >= r_size(pvalue)
)
return_error(gs_error_rangecheck);
*ppvalue = pvalue;
return 0;
}
int
dict_read_password(password * ppass, const ref * pdref, const char *pkey)
{
ref *pvalue;
int code = dict_find_password(&pvalue, pdref, pkey);
if (code < 0)
return code;
if (pvalue->value.const_bytes[0] > MAX_PASSWORD)
return_error(gs_error_rangecheck); /* limitcheck? */
memcpy(ppass->data, pvalue->value.const_bytes + 1,
(ppass->size = pvalue->value.const_bytes[0]));
return 0;
}
int
dict_write_password(const password * ppass, ref * pdref, const char *pkey,
bool change_allowed)
{
ref *pvalue;
int code = dict_find_password(&pvalue, pdref, pkey);
if (code < 0)
return code;
if (ppass->size >= r_size(pvalue))
return_error(gs_error_rangecheck);
if (!change_allowed &&
bytes_compare(pvalue->value.bytes + 1, pvalue->value.bytes[0],
ppass->data, ppass->size) != 0)
return_error(gs_error_invalidaccess);
memcpy(pvalue->value.bytes + 1, ppass->data,
(pvalue->value.bytes[0] = ppass->size));
return 0;
}
|