summaryrefslogtreecommitdiff
path: root/package/webif/files/usr/lib/webif/validate.awk
diff options
context:
space:
mode:
Diffstat (limited to 'package/webif/files/usr/lib/webif/validate.awk')
-rw-r--r--package/webif/files/usr/lib/webif/validate.awk151
1 files changed, 151 insertions, 0 deletions
diff --git a/package/webif/files/usr/lib/webif/validate.awk b/package/webif/files/usr/lib/webif/validate.awk
new file mode 100644
index 000000000..60b5915e2
--- /dev/null
+++ b/package/webif/files/usr/lib/webif/validate.awk
@@ -0,0 +1,151 @@
+# $1 = type
+# $2 = variable name
+# $3 = field name
+# $4 = options
+# $5 = value
+BEGIN {
+ FS="|"
+ output=""
+}
+
+{
+ valid_type = 0
+ valid = 1
+ # XXX: weird hack, but it works...
+ n = split($0, param, "|")
+ value = param[5]
+ for (i = 6; i <= n; i++) value = value FS param[i]
+ verr = ""
+}
+
+$1 == "int" {
+ valid_type = 1
+ if (value !~ /^[0-9]*$/) { valid = 0; verr = "@TR<<Invalid value>>" }
+}
+
+# FIXME: add proper netmask validation
+($1 == "ip") || ($1 == "netmask") {
+ valid_type = 1
+ if ((value != "") && (value !~ /^[0-9][0-9]*\.[0-9][0-9]*\.[0-9][0-9]*\.[0-9][0-9]*$/)) valid = 0
+ else {
+ split(value, ipaddr, "\\.")
+ for (i = 1; i <= 4; i++) {
+ if ((ipaddr[i] < 0) || (ipaddr[i] > 255)) valid = 0
+ }
+ }
+ if (valid == 0) verr = "@TR<<Invalid value>>"
+}
+
+$1 == "wep" {
+ valid_type = 1
+ if (value !~ /^[0-9A-Fa-f]*$/) {
+ valid = 0
+ verr = "@TR<<Invalid value>>"
+ } else if ((length(value) != 0) && (length(value) != 10) && (length(value) != 26)) {
+ valid = 0
+ verr = "Invalid key length"
+ } else if (value ~ /0$/) {
+ valid = 0
+ verr = "Key must not end with '0'"
+ }
+}
+
+$1 == "hostname" {
+ valid_type = 1
+ if (value !~ /^[0-9a-zA-z\.\-]*$/) {
+ valid = 0
+ verr = "@TR<<Invalid value>>"
+ }
+}
+
+$1 == "string" {
+ valid_type = 1
+}
+
+$1 == "mac" {
+ valid_type = 1
+ if ((value != "") && (value !~ /^[0-9a-fA-F][0-9a-fA-F]:[0-9a-fA-F][0-9a-fA-F]:[0-9a-fA-F][0-9a-fA-F]:[0-9a-fA-F][0-9a-fA-F]:[0-9a-fA-F][0-9a-fA-F]:[0-9a-fA-F][0-9a-fA-F]$/)) {
+ valid = 0
+ verr = "@TR<<Invalid value>>"
+ }
+}
+
+$1 == "port" {
+ valid_type = 1
+ if (value !~ /^[0-9]*$/) {
+ valid = 0
+ verr = "@TR<<Invalid value>>"
+ }
+}
+
+$1 == "ports" {
+ valid_type = 1
+ n = split(value ",", ports, ",")
+ for (i = 1; i <= n; i++) {
+ if ((ports[i] !~ /^[0-9]*$/) && (ports[i] !~ /^[0-9][0-9]*-[0-9][0-9]*$/)) {
+ valid = 0
+ verr = "@TR<<Invalid value>>"
+ }
+ }
+}
+
+$1 == "wpapsk" {
+ valid_type = 1
+ if (length(value) > 64) {
+ valid = 0
+ verr = "String too long"
+ }
+ if ((length(value) != 0) && (length(value) < 8)) {
+ valid = 0
+ verr = "String too short"
+ }
+ if ((length(value) == 64) && (value ~ /[^0-9a-fA-F]/)) {
+ valid = 0
+ verr = "Invalid hex key"
+ }
+}
+
+valid_type != 1 { valid = 0 }
+
+valid == 1 {
+ n = split($4, options, " ")
+ for (i = 1; (valid == 1) && (i <= n); i++) {
+ if (options[i] == "required") {
+ if (value == "") { valid = 0; verr = "No value entered" }
+ } else if ((options[i] ~ /^min=/) && (value != "")) {
+ min = options[i]
+ sub(/^min=/, "", min)
+ min = int(min)
+ if ($1 == "int") {
+ if (value < min) { valid = 0; verr = "Value too small (minimum: " min ")" }
+ } else if ($1 == "string") {
+ if (length(value) < min) { valid = 0; verr = "Value too small (minimum length: " min ")"}
+ }
+ } else if ((options[i] ~ /^max=/) && (value != "")) {
+ max = options[i]
+ sub(/^max=/, "", max)
+ max = int(max)
+ if ($1 == "int") {
+ if (value > max) { valid = 0; verr = "@TR<<Value too large>> (@TR<<maximum>>: " max ")" }
+ } else if ($1 == "string") {
+ if (length(value) > max) { valid = 0; verr = "@TR<<String too short>> (@TR<<maximum>>: " max ")" }
+ }
+ } else if ((options[i] == "nodots") && ($1 == "hostname")) {
+ if (value ~ /\./) {
+ valid = 0
+ verr = "@TR<<Invalid value>>"
+ }
+ }
+ }
+}
+
+valid_type == 1 {
+ if (valid == 1) output = output $2 "=\"" value "\";\n"
+ else error = error "Error in " $3 ": " verr "<br />"
+}
+
+END {
+ print output "ERROR=\"" error "\";\n"
+ if (error == "") print "return 0"
+ else print "return 255"
+}