Blob Blame History Raw
/* SPDX-License-Identifier: GPL-2.0-or-later */
/*
 * Copyright (C) 2006 - 2012 Red Hat, Inc.
 */

#include "src/core/nm-default-daemon.h"

#include "nm-supplicant-settings-verify.h"

#include <stdio.h>
#include <stdlib.h>

struct Opt {
    const char *         key;
    const char *const *  str_allowed;
    const NMSupplOptType type;
    const guint32        int_low;  /* Inclusive */
    const guint32        int_high; /* Inclusive; max length for strings */
};

typedef gboolean (*validate_func)(const struct Opt *, const char *, const guint32);

#define OPT_INT(_key, _int_low, _int_high)                                                      \
    {                                                                                           \
        .key = _key, .type = NM_SUPPL_OPT_TYPE_INT, .int_high = _int_high, .int_low = _int_low, \
    }
#define OPT_BYTES(_key, _int_high)                                           \
    {                                                                        \
        .key = _key, .type = NM_SUPPL_OPT_TYPE_BYTES, .int_high = _int_high, \
    }
#define OPT_UTF8(_key, _int_high)                                           \
    {                                                                       \
        .key = _key, .type = NM_SUPPL_OPT_TYPE_UTF8, .int_high = _int_high, \
    }
#define OPT_KEYWORD(_key, _str_allowed)                                              \
    {                                                                                \
        .key = _key, .type = NM_SUPPL_OPT_TYPE_KEYWORD, .str_allowed = _str_allowed, \
    }

static const struct Opt opt_table[] = {
    OPT_BYTES("altsubject_match", 0),
    OPT_BYTES("altsubject_match2", 0),
    OPT_BYTES("anonymous_identity", 0),
    OPT_KEYWORD("auth_alg", NM_MAKE_STRV("OPEN", "SHARED", "LEAP", )),
    OPT_BYTES("bgscan", 0),
    OPT_KEYWORD("bssid", NULL),
    OPT_BYTES("ca_cert", 65536),
    OPT_BYTES("ca_cert2", 65536),
    OPT_BYTES("ca_path", 0),
    OPT_BYTES("ca_path2", 0),
    OPT_BYTES("client_cert", 65536),
    OPT_BYTES("client_cert2", 65536),
    OPT_BYTES("domain_match", 0),
    OPT_BYTES("domain_match2", 0),
    OPT_BYTES("domain_suffix_match", 0),
    OPT_BYTES("domain_suffix_match2", 0),
    OPT_KEYWORD("eap",
                NM_MAKE_STRV("LEAP", "MD5", "TLS", "PEAP", "TTLS", "SIM", "PSK", "FAST", "PWD", )),
    OPT_INT("eapol_flags", 0, 3),
    OPT_BYTES("eappsk", 0),
    OPT_INT("engine", 0, 1),
    OPT_BYTES("engine_id", 0),
    OPT_INT("fragment_size", 1, 2000),
    OPT_KEYWORD("freq_list", NULL),
    OPT_INT("frequency", 2412, 5825),
    OPT_KEYWORD("group", NM_MAKE_STRV("CCMP", "TKIP", "WEP104", "WEP40", "GCMP-256", )),
    OPT_BYTES("identity", 0),
    OPT_INT("ieee80211w", 0, 2),
    OPT_INT("ignore_broadcast_ssid", 0, 2),
    OPT_BYTES("key_id", 0),
    OPT_KEYWORD("key_mgmt",
                NM_MAKE_STRV("WPA-PSK",
                             "WPA-PSK-SHA256",
                             "FT-PSK",
                             "WPA-EAP",
                             "WPA-EAP-SHA256",
                             "FT-EAP",
                             "FT-EAP-SHA384",
                             "FILS-SHA256",
                             "FILS-SHA384",
                             "FT-FILS-SHA256",
                             "FT-FILS-SHA384",
                             "IEEE8021X",
                             "SAE",
                             "WPA-EAP-SUITE-B-192",
                             "FT-SAE",
                             "OWE",
                             "NONE", )),
    OPT_INT("macsec_integ_only", 0, 1),
    OPT_INT("macsec_policy", 0, 1),
    OPT_INT("macsec_port", 1, 65534),
    OPT_BYTES("mka_cak", 65536),
    OPT_BYTES("mka_ckn", 65536),
    OPT_BYTES("nai", 0),
    OPT_BYTES("pac_file", 0),
    OPT_KEYWORD("pairwise", NM_MAKE_STRV("CCMP", "TKIP", "GCMP-256", "NONE", )),
    OPT_UTF8("password", 0),
    OPT_BYTES("pcsc", 0),
    OPT_KEYWORD("phase1",
                NM_MAKE_STRV("peapver=0",
                             "peapver=1",
                             "peaplabel=1",
                             "peap_outer_success=0",
                             "include_tls_length=1",
                             "sim_min_num_chal=3",
                             "fast_provisioning=0",
                             "fast_provisioning=1",
                             "fast_provisioning=2",
                             "fast_provisioning=3",
                             "tls_disable_tlsv1_0=0",
                             "tls_disable_tlsv1_0=1",
                             "tls_disable_tlsv1_1=0",
                             "tls_disable_tlsv1_1=1",
                             "tls_disable_tlsv1_2=0",
                             "tls_disable_tlsv1_2=1", )),
    OPT_KEYWORD("phase2",
                NM_MAKE_STRV("auth=PAP",
                             "auth=CHAP",
                             "auth=MSCHAP",
                             "auth=MSCHAPV2",
                             "auth=GTC",
                             "auth=OTP",
                             "auth=MD5",
                             "auth=TLS",
                             "autheap=MD5",
                             "autheap=MSCHAPV2",
                             "autheap=OTP",
                             "autheap=GTC",
                             "autheap=TLS", )),
    OPT_BYTES("pin", 0),
    OPT_BYTES("private_key", 65536),
    OPT_BYTES("private_key2", 65536),
    OPT_BYTES("private_key2_passwd", 1024),
    OPT_BYTES("private_key_passwd", 1024),
    OPT_INT("proactive_key_caching", 0, 1),
    OPT_KEYWORD("proto", NM_MAKE_STRV("WPA", "RSN", )),
    OPT_BYTES("psk", 0),
    OPT_INT("scan_ssid", 0, 1),
    OPT_BYTES("ssid", 32),
    OPT_BYTES("subject_match", 0),
    OPT_BYTES("subject_match2", 0),
    OPT_BYTES("wep_key0", 0),
    OPT_BYTES("wep_key1", 0),
    OPT_BYTES("wep_key2", 0),
    OPT_BYTES("wep_key3", 0),
    OPT_INT("wep_tx_keyidx", 0, 3),
    OPT_INT("wps_disabled", 0, 1),
};

static gboolean
validate_type_int(const struct Opt *opt, const char *value, const guint32 len)
{
    gint64 v;

    nm_assert(opt);
    nm_assert(value);

    v = _nm_utils_ascii_str_to_int64(value, 10, opt->int_low, opt->int_high, G_MININT64);
    return v != G_MININT64 || errno == 0;
}

static gboolean
validate_type_bytes(const struct Opt *opt, const char *value, const guint32 len)
{
    guint32 check_len;

    nm_assert(opt);
    nm_assert(value);

    check_len = opt->int_high ?: 255;
    if (len > check_len)
        return FALSE;

    return TRUE;
}

static gboolean
validate_type_utf8(const struct Opt *opt, const char *value, const guint32 len)
{
    guint32 check_len;

    nm_assert(opt);
    nm_assert(value);

    check_len = opt->int_high ?: 255;
    /* Note that we deliberately don't validate the UTF-8, because
     * some "UTF-8" fields, such as 8021x.password, do not actually
     * have to be valid UTF-8 */
    if (g_utf8_strlen(value, len) > check_len)
        return FALSE;

    return TRUE;
}

static gboolean
validate_type_keyword(const struct Opt *opt, const char *value, const guint32 len)
{
    gs_free char *value_free = NULL;

    nm_assert(opt);
    nm_assert(value);

    /* Allow everything */
    if (!opt->str_allowed)
        return TRUE;

    value = nm_strndup_a(300, value, len, &value_free);

    /* validate each space-separated word in 'value' */

    while (TRUE) {
        char *s;

        while (value[0] == ' ')
            value++;

        if (value[0] == '\0')
            return TRUE;

        s = strchr(value, ' ');
        if (s) {
            s[0] = '\0';
            s++;
        }

        if (nm_utils_strv_find_first((char **) opt->str_allowed, -1, value) < 0)
            return FALSE;

        if (!s)
            return TRUE;

        value = s;
    }
}

NMSupplOptType
nm_supplicant_settings_verify_setting(const char *key, const char *value, const guint32 len)
{
    static const validate_func validate_table[_NM_SUPPL_OPT_TYPE_NUM - 1] = {
        [NM_SUPPL_OPT_TYPE_INT - 1]     = validate_type_int,
        [NM_SUPPL_OPT_TYPE_BYTES - 1]   = validate_type_bytes,
        [NM_SUPPL_OPT_TYPE_UTF8 - 1]    = validate_type_utf8,
        [NM_SUPPL_OPT_TYPE_KEYWORD - 1] = validate_type_keyword,
    };
    const struct Opt *opt;
    gssize            opt_idx;

    g_return_val_if_fail(key, FALSE);
    g_return_val_if_fail(value, FALSE);

    if (NM_MORE_ASSERT_ONCE(5)) {
        gsize i;

        for (i = 0; i < G_N_ELEMENTS(opt_table); i++) {
            opt = &opt_table[i];

            nm_assert(opt->key);
            nm_assert(opt->type > NM_SUPPL_OPT_TYPE_INVALID);
            nm_assert(opt->type < _NM_SUPPL_OPT_TYPE_NUM);
            if (i > 0)
                nm_assert(strcmp(opt[-1].key, opt->key) < 0);
            nm_assert(validate_table[opt->type - 1]);

            nm_assert(!opt->str_allowed || (opt->type == NM_SUPPL_OPT_TYPE_KEYWORD));
            nm_assert(!opt->str_allowed || NM_PTRARRAY_LEN(opt->str_allowed) > 0);

            nm_assert(opt->int_low == 0 || opt->type == NM_SUPPL_OPT_TYPE_INT);

            nm_assert(opt->int_high == 0
                      || NM_IN_SET(opt->type,
                                   NM_SUPPL_OPT_TYPE_INT,
                                   NM_SUPPL_OPT_TYPE_UTF8,
                                   NM_SUPPL_OPT_TYPE_BYTES));

            nm_assert(opt->type != NM_SUPPL_OPT_TYPE_INT || opt->int_low < opt->int_high);
        }
    }

    opt_idx = nm_utils_array_find_binary_search(opt_table,
                                                sizeof(opt_table[0]),
                                                G_N_ELEMENTS(opt_table),
                                                &key,
                                                nm_strcmp_p_with_data,
                                                NULL);
    if (opt_idx < 0) {
        if (nm_streq(key, "mode")) {
            if (len != 1)
                return NM_SUPPL_OPT_TYPE_INVALID;
            if (!NM_IN_SET(value[0], '1', '2', '5'))
                return NM_SUPPL_OPT_TYPE_INVALID;
            return NM_SUPPL_OPT_TYPE_INT;
        }
        return NM_SUPPL_OPT_TYPE_INVALID;
    }

    opt = &opt_table[opt_idx];
    if (!((validate_table[opt->type - 1])(opt, value, len)))
        return NM_SUPPL_OPT_TYPE_INVALID;

    return opt->type;
}