Skip to content
GitLab
Explore
Sign in
Register
Primary navigation
Search or go to…
Project
P
postgres-lambda-diff
Manage
Activity
Members
Labels
Plan
Issues
Issue boards
Milestones
Wiki
Code
Merge requests
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Snippets
Build
Pipelines
Jobs
Pipeline schedules
Artifacts
Deploy
Releases
Container Registry
Model registry
Operate
Environments
Monitor
Incidents
Analyze
Value stream analytics
Contributor analytics
CI/CD analytics
Repository analytics
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
Jakob Huber
postgres-lambda-diff
Commits
f35252de
Commit
f35252de
authored
24 years ago
by
Tom Lane
Browse files
Options
Downloads
Patches
Plain Diff
Fix pg_passwd's failure to cope with usernames > 8 chars.
parent
a24b04de
No related branches found
No related tags found
No related merge requests found
Changes
2
Hide whitespace changes
Inline
Side-by-side
Showing
2 changed files
doc/src/sgml/ref/pg_passwd.sgml
+10
-8
10 additions, 8 deletions
doc/src/sgml/ref/pg_passwd.sgml
src/bin/pg_passwd/pg_passwd.c
+42
-42
42 additions, 42 deletions
src/bin/pg_passwd/pg_passwd.c
with
52 additions
and
50 deletions
doc/src/sgml/ref/pg_passwd.sgml
+
10
−
8
View file @
f35252de
<!--
<!--
$Header: /cvsroot/pgsql/doc/src/sgml/ref/Attic/pg_passwd.sgml,v 1.
5
200
0/12/25 23:15:26 petere
Exp $
$Header: /cvsroot/pgsql/doc/src/sgml/ref/Attic/pg_passwd.sgml,v 1.
6
200
1/02/20 01:16:49 tgl
Exp $
Postgres documentation
Postgres documentation
-->
-->
...
@@ -31,7 +31,7 @@ Postgres documentation
...
@@ -31,7 +31,7 @@ Postgres documentation
<para>
<para>
<application>pg_passwd</application> is a tool to manipulate a flat
<application>pg_passwd</application> is a tool to manipulate a flat
text password file for the purpose of using that file to control
text password file for the purpose of using that file to control
the
client authentication of the
client authentication of the
<productname>PostgreSQL</productname> server. More information
<productname>PostgreSQL</productname> server. More information
about setting up this authentication mechanism can be found in the
about setting up this authentication mechanism can be found in the
<citetitle>Administrator's Guide</citetitle>.
<citetitle>Administrator's Guide</citetitle>.
...
@@ -51,7 +51,7 @@ Postgres documentation
...
@@ -51,7 +51,7 @@ Postgres documentation
<para>
<para>
Supply the name of the password file as argument to the <application>pg_passwd</application>
Supply the name of the password file as argument to the <application>pg_passwd</application>
command. To be of use for client authentication the file needs to
command. To be of use for client authentication the file needs to
be locat
ion
in the server's data directory, and the base name of
be locat
ed
in the server's data directory, and the base name of
the file needs to be specified in the
the file needs to be specified in the
<filename>pg_hba.conf</filename> access control file.
<filename>pg_hba.conf</filename> access control file.
...
@@ -65,7 +65,9 @@ Postgres documentation
...
@@ -65,7 +65,9 @@ Postgres documentation
where the <literal>Password:</literal> and <literal>Re-enter
where the <literal>Password:</literal> and <literal>Re-enter
password:</literal> prompts require the same password input which
password:</literal> prompts require the same password input which
is not displayed on the terminal.
is not displayed on the terminal. Note that the password is limited
to eight useful characters by restrictions of the standard crypt(3)
library routine.
</para>
</para>
<para>
<para>
...
@@ -78,12 +80,12 @@ Postgres documentation
...
@@ -78,12 +80,12 @@ Postgres documentation
<filename>pg_hba.conf</filename>:
<filename>pg_hba.conf</filename>:
<programlisting>
<programlisting>
host
unv
133.65.96.250 255.255.255.255 password passwords
host
mydb
133.65.96.250 255.255.255.255 password passwords
</programlisting>
</programlisting>
which would allow access from host 133.65.96.250 using
the
which would allow access
to database mydb
from host 133.65.96.250 using
passwords listed in the <filename>passwords</filename> file (and
the
passwords listed in the <filename>passwords</filename> file (and
only to the users listed in th
e
file).
only to the users listed in th
at
file).
</para>
</para>
<note>
<note>
...
...
This diff is collapsed.
Click to expand it.
src/bin/pg_passwd/pg_passwd.c
+
42
−
42
View file @
f35252de
...
@@ -19,14 +19,23 @@ extern char *crypt(const char *, const char *);
...
@@ -19,14 +19,23 @@ extern char *crypt(const char *, const char *);
#endif
#endif
#define PG_PASSWD_LEN 13
/* not including null */
/*
* We assume that the output of crypt(3) is always 13 characters,
* and that at most 8 characters can usefully be sent to it.
*
* Postgres usernames are assumed to be less than NAMEDATALEN chars long.
*/
#define CLEAR_PASSWD_LEN 8
/* not including null */
#define CRYPTED_PASSWD_LEN 13
/* not including null */
const
char
*
progname
;
const
char
*
progname
;
static
void
usage
(
void
);
static
void
usage
(
void
);
static
void
read_pwd_file
(
char
*
filename
);
static
void
read_pwd_file
(
char
*
filename
);
static
void
write_pwd_file
(
char
*
filename
,
char
*
bkname
);
static
void
write_pwd_file
(
char
*
filename
,
char
*
bkname
);
static
void
encrypt_pwd
(
char
key
[
9
],
char
salt
[
3
],
char
passwd
[
PG_PASSWD_LEN
+
1
]);
static
void
encrypt_pwd
(
char
key
[
CLEAR_PASSWD_LEN
+
1
],
char
salt
[
3
],
char
passwd
[
CRYPTED_PASSWD_LEN
+
1
]);
static
void
prompt_for_username
(
char
*
username
);
static
void
prompt_for_username
(
char
*
username
);
static
void
prompt_for_password
(
char
*
prompt
,
char
*
password
);
static
void
prompt_for_password
(
char
*
prompt
,
char
*
password
);
...
@@ -94,7 +103,9 @@ try_again:
...
@@ -94,7 +103,9 @@ try_again:
}
}
/* read all the entries */
/* read all the entries */
for
(
npwds
=
0
;
npwds
<
MAXPWDS
&&
fgets
(
line
,
512
,
fp
)
!=
NULL
;
++
npwds
)
for
(
npwds
=
0
;
npwds
<
MAXPWDS
&&
fgets
(
line
,
sizeof
(
line
),
fp
)
!=
NULL
;
++
npwds
)
{
{
int
l
;
int
l
;
char
*
p
,
char
*
p
,
...
@@ -123,13 +134,13 @@ try_again:
...
@@ -123,13 +134,13 @@ try_again:
}
}
pwds
[
npwds
].
uname
=
strdup
(
p
);
pwds
[
npwds
].
uname
=
strdup
(
p
);
/* check duplicate */
/* check
for
duplicate
user name
*/
for
(
i
=
0
;
i
<
npwds
;
++
i
)
for
(
i
=
0
;
i
<
npwds
;
++
i
)
{
{
if
(
strcmp
(
pwds
[
i
].
uname
,
pwds
[
npwds
].
uname
)
==
0
)
if
(
strcmp
(
pwds
[
i
].
uname
,
pwds
[
npwds
].
uname
)
==
0
)
{
{
fprintf
(
stderr
,
"Duplicate
d
entry
:
%
s
\n
"
,
fprintf
(
stderr
,
"Duplicate
username %s in
entry %
d
\n
"
,
pwds
[
npwds
].
uname
);
pwds
[
npwds
].
uname
,
npwds
+
1
);
exit
(
1
);
exit
(
1
);
}
}
}
}
...
@@ -143,7 +154,7 @@ try_again:
...
@@ -143,7 +154,7 @@ try_again:
if
(
q
!=
NULL
)
if
(
q
!=
NULL
)
*
(
q
++
)
=
'\0'
;
*
(
q
++
)
=
'\0'
;
if
(
strlen
(
p
)
!=
PG
_PASSWD_LEN
&&
strcmp
(
p
,
"+"
)
!=
0
)
if
(
strlen
(
p
)
!=
CRYPTED
_PASSWD_LEN
&&
strcmp
(
p
,
"+"
)
!=
0
)
{
{
fprintf
(
stderr
,
"%s:%d: warning: invalid password length
\n
"
,
fprintf
(
stderr
,
"%s:%d: warning: invalid password length
\n
"
,
filename
,
npwds
+
1
);
filename
,
npwds
+
1
);
...
@@ -209,11 +220,13 @@ link_again:
...
@@ -209,11 +220,13 @@ link_again:
}
}
static
void
static
void
encrypt_pwd
(
char
key
[
9
],
char
salt
[
3
],
char
passwd
[
PG_PASSWD_LEN
+
1
])
encrypt_pwd
(
char
key
[
CLEAR_PASSWD_LEN
+
1
],
char
salt
[
3
],
char
passwd
[
CRYPTED_PASSWD_LEN
+
1
])
{
{
int
n
;
int
n
;
/*
get encrypted password
*/
/*
select a salt, if not already given
*/
if
(
salt
[
0
]
==
'\0'
)
if
(
salt
[
0
]
==
'\0'
)
{
{
srand
(
time
(
NULL
));
srand
(
time
(
NULL
));
...
@@ -229,32 +242,16 @@ encrypt_pwd(char key[9], char salt[3], char passwd[PG_PASSWD_LEN + 1])
...
@@ -229,32 +242,16 @@ encrypt_pwd(char key[9], char salt[3], char passwd[PG_PASSWD_LEN + 1])
salt
[
1
]
=
n
;
salt
[
1
]
=
n
;
salt
[
2
]
=
'\0'
;
salt
[
2
]
=
'\0'
;
}
}
/* get encrypted password */
strcpy
(
passwd
,
crypt
(
key
,
salt
));
strcpy
(
passwd
,
crypt
(
key
,
salt
));
#ifdef PG_PASSWD_DEBUG
/* show it */
/* show it */
fprintf
(
stderr
,
"key = %s, salt = %s, password = %s
\n
"
,
/*
key
,
salt
,
passwd
);
* fprintf(stderr, "key = %s, salt = %s, password = %s\n", key, salt,
* passwd);
*/
}
#ifdef NOT_USED
static
int
check_pwd
(
char
key
[
9
],
char
passwd
[
PG_PASSWD_LEN
+
1
])
{
char
shouldbe
[
PG_PASSWD_LEN
+
1
];
char
salt
[
3
];
salt
[
0
]
=
passwd
[
0
];
salt
[
1
]
=
passwd
[
1
];
salt
[
2
]
=
'\0'
;
encrypt_pwd
(
key
,
salt
,
shouldbe
);
return
strncmp
(
shouldbe
,
passwd
,
PG_PASSWD_LEN
)
==
0
?
1
:
0
;
}
#endif
#endif
}
static
void
static
void
prompt_for_username
(
char
*
username
)
prompt_for_username
(
char
*
username
)
...
@@ -263,7 +260,7 @@ prompt_for_username(char *username)
...
@@ -263,7 +260,7 @@ prompt_for_username(char *username)
printf
(
"Username: "
);
printf
(
"Username: "
);
fflush
(
stdout
);
fflush
(
stdout
);
if
(
fgets
(
username
,
9
,
stdin
)
==
NULL
)
if
(
fgets
(
username
,
NAMEDATALEN
,
stdin
)
==
NULL
)
username
[
0
]
=
'\0'
;
username
[
0
]
=
'\0'
;
length
=
strlen
(
username
);
length
=
strlen
(
username
);
...
@@ -295,16 +292,19 @@ prompt_for_password(char *prompt, char *password)
...
@@ -295,16 +292,19 @@ prompt_for_password(char *prompt, char *password)
#endif
#endif
printf
(
prompt
);
fflush
(
stdout
);
#ifdef HAVE_TERMIOS_H
#ifdef HAVE_TERMIOS_H
tcgetattr
(
0
,
&
t
);
tcgetattr
(
0
,
&
t
);
t_orig
=
t
;
t_orig
=
t
;
t
.
c_lflag
&=
~
ECHO
;
t
.
c_lflag
&=
~
ECHO
;
tcsetattr
(
0
,
TCSADRAIN
,
&
t
);
tcsetattr
(
0
,
TCSADRAIN
,
&
t
);
#endif
#endif
if
(
fgets
(
password
,
9
,
stdin
)
==
NULL
)
printf
(
prompt
);
fflush
(
stdout
);
if
(
fgets
(
password
,
CLEAR_PASSWD_LEN
+
1
,
stdin
)
==
NULL
)
password
[
0
]
=
'\0'
;
password
[
0
]
=
'\0'
;
#ifdef HAVE_TERMIOS_H
#ifdef HAVE_TERMIOS_H
tcsetattr
(
0
,
TCSADRAIN
,
&
t_orig
);
tcsetattr
(
0
,
TCSADRAIN
,
&
t_orig
);
#endif
#endif
...
@@ -332,13 +332,13 @@ prompt_for_password(char *prompt, char *password)
...
@@ -332,13 +332,13 @@ prompt_for_password(char *prompt, char *password)
int
int
main
(
int
argc
,
char
*
argv
[])
main
(
int
argc
,
char
*
argv
[])
{
{
static
char
bkname
[
MAXPGPATH
];
char
*
filename
;
char
*
filename
;
char
username
[
9
];
char
bkname
[
MAXPGPATH
];
char
username
[
NAMEDATALEN
];
char
salt
[
3
];
char
salt
[
3
];
char
key
[
9
],
char
key
[
CLEAR_PASSWD_LEN
+
1
],
key2
[
9
];
key2
[
CLEAR_PASSWD_LEN
+
1
];
char
e_passwd
[
PG
_PASSWD_LEN
+
1
];
char
e_passwd
[
CRYPTED
_PASSWD_LEN
+
1
];
int
i
;
int
i
;
progname
=
argv
[
0
];
progname
=
argv
[
0
];
...
@@ -376,7 +376,7 @@ main(int argc, char *argv[])
...
@@ -376,7 +376,7 @@ main(int argc, char *argv[])
prompt_for_username
(
username
);
prompt_for_username
(
username
);
prompt_for_password
(
"New password: "
,
key
);
prompt_for_password
(
"New password: "
,
key
);
prompt_for_password
(
"Re-enter new password: "
,
key2
);
prompt_for_password
(
"Re-enter new password: "
,
key2
);
if
(
str
n
cmp
(
key
,
key2
,
8
)
!=
0
)
if
(
strcmp
(
key
,
key2
)
!=
0
)
{
{
fprintf
(
stderr
,
"Password mismatch
\n
"
);
fprintf
(
stderr
,
"Password mismatch
\n
"
);
exit
(
1
);
exit
(
1
);
...
@@ -397,7 +397,7 @@ main(int argc, char *argv[])
...
@@ -397,7 +397,7 @@ main(int argc, char *argv[])
{
/* did not exist */
{
/* did not exist */
if
(
npwds
==
MAXPWDS
)
if
(
npwds
==
MAXPWDS
)
{
{
fprintf
(
stderr
,
"Cannot handle so may entries
\n
"
);
fprintf
(
stderr
,
"Cannot handle so ma
n
y entries
\n
"
);
exit
(
1
);
exit
(
1
);
}
}
pwds
[
npwds
].
uname
=
strdup
(
username
);
pwds
[
npwds
].
uname
=
strdup
(
username
);
...
...
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment