summaryrefslogtreecommitdiff
path: root/release/src/router/busybox/libbb/die_if_bad_username.c
diff options
context:
space:
mode:
Diffstat (limited to 'release/src/router/busybox/libbb/die_if_bad_username.c')
-rw-r--r--release/src/router/busybox/libbb/die_if_bad_username.c36
1 files changed, 36 insertions, 0 deletions
diff --git a/release/src/router/busybox/libbb/die_if_bad_username.c b/release/src/router/busybox/libbb/die_if_bad_username.c
new file mode 100644
index 00000000..c1641d37
--- /dev/null
+++ b/release/src/router/busybox/libbb/die_if_bad_username.c
@@ -0,0 +1,36 @@
+/* vi: set sw=4 ts=4: */
+/*
+ * Check user and group names for illegal characters
+ *
+ * Copyright (C) 2008 Tito Ragusa <farmatito@tiscali.it>
+ *
+ * Licensed under GPLv2 or later, see file LICENSE in this tarball for details.
+ */
+
+#include "libbb.h"
+
+/* To avoid problems, the username should consist only of
+ * letters, digits, underscores, periods, at signs and dashes,
+ * and not start with a dash (as defined by IEEE Std 1003.1-2001).
+ * For compatibility with Samba machine accounts $ is also supported
+ * at the end of the username.
+ */
+
+void FAST_FUNC die_if_bad_username(const char *name)
+{
+ goto skip; /* 1st char being dash isn't valid */
+ do {
+ if (*name == '-')
+ continue;
+ skip:
+ if (isalnum(*name)
+ || *name == '_'
+ || *name == '.'
+ || *name == '@'
+ || (*name == '$' && !*(name + 1))
+ ) {
+ continue;
+ }
+ bb_error_msg_and_die("illegal character '%c'", *name);
+ } while (*++name);
+}