2 * perm.c - check user permission for at(1)
3 * Copyright (C) 1994 Thomas Koenig
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. The name of the author(s) may not be used to endorse or promote
11 * products derived from this software without specific prior written
14 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR(S) ``AS IS'' AND ANY EXPRESS OR
15 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
16 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
17 * IN NO EVENT SHALL THE AUTHOR(S) BE LIABLE FOR ANY DIRECT, INDIRECT,
18 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
19 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
20 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
21 * THEORY OF LIABILITY, WETHER IN CONTRACT, STRICT LIABILITY, OR TORT
22 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
23 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
26 #include <sys/cdefs.h>
27 __FBSDID("$FreeBSD$");
31 #include <sys/types.h>
51 /* Structures and unions */
53 /* Function declarations */
55 static int check_for_user(FILE *fp,const char *name);
59 static int check_for_user(FILE *fp,const char *name)
66 if ((buffer = malloc(len+2)) == NULL)
67 errx(EXIT_FAILURE, "virtual memory exhausted");
69 while(fgets(buffer, len+2, fp) != NULL)
71 if ((strncmp(name, buffer, len) == 0) &&
72 (buffer[len] == '\n'))
82 /* Global functions */
83 int check_permission(void)
86 uid_t uid = geteuid();
87 struct passwd *pentry;
92 if ((pentry = getpwuid(uid)) == NULL)
93 err(EXIT_FAILURE, "cannot access user database");
97 fp=fopen(PERM_PATH "at.allow","r");
103 return check_for_user(fp, pentry->pw_name);
105 else if (errno == ENOENT)
110 fp=fopen(PERM_PATH "at.deny", "r");
116 return !check_for_user(fp, pentry->pw_name);
118 else if (errno != ENOENT)