Home | History | Annotate | Line # | Download | only in gen
getpwent.c revision 1.14.4.2
      1  1.14.4.2      jtc /*	$NetBSD: getpwent.c,v 1.14.4.2 1996/09/19 20:03:04 jtc Exp $	*/
      2      1.12      cgd 
      3       1.1      cgd /*
      4      1.12      cgd  * Copyright (c) 1988, 1993
      5      1.12      cgd  *	The Regents of the University of California.  All rights reserved.
      6      1.14     phil  * Portions Copyright (c) 1994, 1995, Jason Downs.  All rights reserved.
      7       1.1      cgd  *
      8       1.1      cgd  * Redistribution and use in source and binary forms, with or without
      9       1.1      cgd  * modification, are permitted provided that the following conditions
     10       1.1      cgd  * are met:
     11       1.1      cgd  * 1. Redistributions of source code must retain the above copyright
     12       1.1      cgd  *    notice, this list of conditions and the following disclaimer.
     13       1.1      cgd  * 2. Redistributions in binary form must reproduce the above copyright
     14       1.1      cgd  *    notice, this list of conditions and the following disclaimer in the
     15       1.1      cgd  *    documentation and/or other materials provided with the distribution.
     16       1.1      cgd  * 3. All advertising materials mentioning features or use of this software
     17       1.1      cgd  *    must display the following acknowledgement:
     18       1.1      cgd  *	This product includes software developed by the University of
     19       1.1      cgd  *	California, Berkeley and its contributors.
     20       1.1      cgd  * 4. Neither the name of the University nor the names of its contributors
     21       1.1      cgd  *    may be used to endorse or promote products derived from this software
     22       1.1      cgd  *    without specific prior written permission.
     23       1.1      cgd  *
     24       1.1      cgd  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
     25       1.1      cgd  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
     26       1.1      cgd  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
     27       1.1      cgd  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
     28       1.1      cgd  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
     29       1.1      cgd  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
     30       1.1      cgd  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
     31       1.1      cgd  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
     32       1.1      cgd  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
     33       1.1      cgd  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
     34       1.1      cgd  * SUCH DAMAGE.
     35       1.1      cgd  */
     36       1.1      cgd 
     37       1.1      cgd #if defined(LIBC_SCCS) && !defined(lint)
     38      1.12      cgd #if 0
     39      1.12      cgd static char sccsid[] = "@(#)getpwent.c	8.1 (Berkeley) 6/4/93";
     40      1.12      cgd #else
     41  1.14.4.2      jtc static char rcsid[] = "$NetBSD: getpwent.c,v 1.14.4.2 1996/09/19 20:03:04 jtc Exp $";
     42      1.12      cgd #endif
     43       1.1      cgd #endif /* LIBC_SCCS and not lint */
     44       1.1      cgd 
     45  1.14.4.1      jtc #include "namespace.h"
     46       1.1      cgd #include <sys/param.h>
     47       1.1      cgd #include <fcntl.h>
     48       1.1      cgd #include <db.h>
     49       1.1      cgd #include <syslog.h>
     50       1.1      cgd #include <pwd.h>
     51       1.1      cgd #include <utmp.h>
     52       1.1      cgd #include <errno.h>
     53       1.1      cgd #include <unistd.h>
     54       1.1      cgd #include <stdlib.h>
     55       1.1      cgd #include <string.h>
     56       1.1      cgd #include <limits.h>
     57      1.14     phil #include <netgroup.h>
     58       1.4  deraadt #ifdef YP
     59      1.14     phil #include <machine/param.h>
     60       1.4  deraadt #include <stdio.h>
     61       1.4  deraadt #include <rpc/rpc.h>
     62       1.4  deraadt #include <rpcsvc/yp_prot.h>
     63       1.4  deraadt #include <rpcsvc/ypclnt.h>
     64  1.14.4.2      jtc #endif
     65  1.14.4.2      jtc 
     66  1.14.4.2      jtc #ifdef __weak_alias
     67  1.14.4.2      jtc __weak_alias(endpwent,_endpwent);
     68  1.14.4.2      jtc __weak_alias(getpwent,_getpwent);
     69  1.14.4.2      jtc __weak_alias(getpwnam,_getpwnam);
     70  1.14.4.2      jtc __weak_alias(getpwuid,_getpwuid);
     71  1.14.4.2      jtc __weak_alias(setpassent,_setpassent);
     72  1.14.4.2      jtc __weak_alias(setpwent,_setpwent);
     73       1.4  deraadt #endif
     74       1.1      cgd 
     75       1.1      cgd static struct passwd _pw_passwd;	/* password structure */
     76       1.1      cgd static DB *_pw_db;			/* password database */
     77       1.1      cgd static int _pw_keynum;			/* key counter */
     78       1.1      cgd static int _pw_stayopen;		/* keep fd's open */
     79      1.14     phil static int _pw_flags;			/* password flags */
     80      1.14     phil static int __hashpw __P((DBT *));
     81      1.14     phil static int __initdb __P((void));
     82      1.14     phil 
     83      1.14     phil const char __yp_token[] = "__YP!";	/* Let pwd_mkdb pull this in. */
     84       1.1      cgd 
     85       1.4  deraadt #ifdef YP
     86      1.14     phil enum _ypmode { YPMODE_NONE, YPMODE_FULL, YPMODE_USER, YPMODE_NETGRP };
     87      1.14     phil static enum _ypmode __ypmode;
     88      1.14     phil 
     89       1.4  deraadt static char     *__ypcurrent, *__ypdomain;
     90      1.14     phil static int      __ypcurrentlen;
     91      1.14     phil static struct passwd *__ypproto = (struct passwd *)NULL;
     92      1.14     phil static int	__ypflags;
     93       1.4  deraadt static char	line[1024];
     94      1.14     phil static long	prbuf[1024 / sizeof(long)];
     95      1.14     phil static DB *__ypexclude = (DB *)NULL;
     96      1.14     phil 
     97      1.14     phil static int __has_yppw __P((void));
     98      1.14     phil static int __ypexclude_add __P((const char *));
     99      1.14     phil static int __ypexclude_is __P((const char *));
    100      1.14     phil static void __ypproto_set __P((void));
    101      1.14     phil 
    102      1.14     phil static int
    103      1.14     phil __ypexclude_add(name)
    104      1.14     phil const char *name;
    105      1.14     phil {
    106      1.14     phil 	DBT key, data;
    107      1.14     phil 
    108      1.14     phil 	/* initialize the exclusion table if needed. */
    109      1.14     phil 	if(__ypexclude == (DB *)NULL) {
    110      1.14     phil 		__ypexclude = dbopen(NULL, O_RDWR, 600, DB_HASH, NULL);
    111      1.14     phil 		if(__ypexclude == (DB *)NULL)
    112      1.14     phil 			return(1);
    113      1.14     phil 	}
    114      1.14     phil 
    115      1.14     phil 	/* set up the key */
    116      1.14     phil 	key.data = (char *)name;
    117      1.14     phil 	key.size = strlen(name);
    118      1.14     phil 
    119      1.14     phil 	/* data is nothing. */
    120      1.14     phil 	data.data = NULL;
    121      1.14     phil 	data.size = 0;
    122      1.14     phil 
    123      1.14     phil 	/* store it */
    124      1.14     phil 	if((__ypexclude->put)(__ypexclude, &key, &data, 0) == -1)
    125      1.14     phil 		return(1);
    126      1.14     phil 
    127      1.14     phil 	return(0);
    128      1.14     phil }
    129      1.14     phil 
    130      1.14     phil static int
    131      1.14     phil __ypexclude_is(name)
    132      1.14     phil const char *name;
    133      1.14     phil {
    134      1.14     phil 	DBT key, data;
    135      1.14     phil 
    136      1.14     phil 	if(__ypexclude == (DB *)NULL)
    137      1.14     phil 		return(0);	/* nothing excluded */
    138      1.14     phil 
    139      1.14     phil 	/* set up the key */
    140      1.14     phil 	key.data = (char *)name;
    141      1.14     phil 	key.size = strlen(name);
    142      1.14     phil 
    143      1.14     phil 	if((__ypexclude->get)(__ypexclude, &key, &data, 0) == 0)
    144      1.14     phil 		return(1);	/* excluded */
    145      1.14     phil 
    146      1.14     phil 	return(0);
    147      1.14     phil }
    148      1.14     phil 
    149      1.14     phil static void
    150      1.14     phil __ypproto_set()
    151      1.14     phil {
    152      1.14     phil 	register char *ptr;
    153      1.14     phil 	register struct passwd *pw = &_pw_passwd;
    154      1.14     phil 
    155      1.14     phil 	/* make this the new prototype */
    156      1.14     phil 	ptr = (char *)prbuf;
    157      1.14     phil 
    158      1.14     phil 	/* first allocate the struct. */
    159      1.14     phil 	__ypproto = (struct passwd *)ptr;
    160      1.14     phil 	ptr += sizeof(struct passwd);
    161      1.14     phil 
    162      1.14     phil 	/* name */
    163      1.14     phil 	if(pw->pw_name && (pw->pw_name)[0]) {
    164      1.14     phil 		ptr = (char *)ALIGN(ptr);
    165      1.14     phil 		bcopy(pw->pw_name, ptr, strlen(pw->pw_name) + 1);
    166      1.14     phil 		__ypproto->pw_name = ptr;
    167      1.14     phil 		ptr += (strlen(pw->pw_name) + 1);
    168      1.14     phil 	} else
    169      1.14     phil 		__ypproto->pw_name = (char *)NULL;
    170      1.14     phil 
    171      1.14     phil 	/* password */
    172      1.14     phil 	if(pw->pw_passwd && (pw->pw_passwd)[0]) {
    173      1.14     phil 		ptr = (char *)ALIGN(ptr);
    174      1.14     phil 		bcopy(pw->pw_passwd, ptr, strlen(pw->pw_passwd) + 1);
    175      1.14     phil 		__ypproto->pw_passwd = ptr;
    176      1.14     phil 		ptr += (strlen(pw->pw_passwd) + 1);
    177      1.14     phil 	} else
    178      1.14     phil 		__ypproto->pw_passwd = (char *)NULL;
    179      1.14     phil 
    180      1.14     phil 	/* uid */
    181      1.14     phil 	__ypproto->pw_uid = pw->pw_uid;
    182      1.14     phil 
    183      1.14     phil 	/* gid */
    184      1.14     phil 	__ypproto->pw_gid = pw->pw_gid;
    185      1.14     phil 
    186      1.14     phil 	/* change (ignored anyway) */
    187      1.14     phil 	__ypproto->pw_change = pw->pw_change;
    188      1.14     phil 
    189      1.14     phil 	/* class (ignored anyway) */
    190      1.14     phil 	__ypproto->pw_class = "";
    191      1.14     phil 
    192      1.14     phil 	/* gecos */
    193      1.14     phil 	if(pw->pw_gecos && (pw->pw_gecos)[0]) {
    194      1.14     phil 		ptr = (char *)ALIGN(ptr);
    195      1.14     phil 		bcopy(pw->pw_gecos, ptr, strlen(pw->pw_gecos) + 1);
    196      1.14     phil 		__ypproto->pw_gecos = ptr;
    197      1.14     phil 		ptr += (strlen(pw->pw_gecos) + 1);
    198      1.14     phil 	} else
    199      1.14     phil 		__ypproto->pw_gecos = (char *)NULL;
    200      1.14     phil 
    201      1.14     phil 	/* dir */
    202      1.14     phil 	if(pw->pw_dir && (pw->pw_dir)[0]) {
    203      1.14     phil 		ptr = (char *)ALIGN(ptr);
    204      1.14     phil 		bcopy(pw->pw_dir, ptr, strlen(pw->pw_dir) + 1);
    205      1.14     phil 		__ypproto->pw_dir = ptr;
    206      1.14     phil 		ptr += (strlen(pw->pw_dir) + 1);
    207      1.14     phil 	} else
    208      1.14     phil 		__ypproto->pw_dir = (char *)NULL;
    209      1.14     phil 
    210      1.14     phil 	/* shell */
    211      1.14     phil 	if(pw->pw_shell && (pw->pw_shell)[0]) {
    212      1.14     phil 		ptr = (char *)ALIGN(ptr);
    213      1.14     phil 		bcopy(pw->pw_shell, ptr, strlen(pw->pw_shell) + 1);
    214      1.14     phil 		__ypproto->pw_shell = ptr;
    215      1.14     phil 		ptr += (strlen(pw->pw_shell) + 1);
    216      1.14     phil 	} else
    217      1.14     phil 		__ypproto->pw_shell = (char *)NULL;
    218      1.14     phil 
    219      1.14     phil 	/* expire (ignored anyway) */
    220      1.14     phil 	__ypproto->pw_expire = pw->pw_expire;
    221      1.14     phil 
    222      1.14     phil 	/* flags */
    223      1.14     phil 	__ypflags = _pw_flags;
    224      1.14     phil }
    225       1.4  deraadt 
    226       1.5  deraadt static int
    227       1.5  deraadt __ypparse(pw, s)
    228       1.4  deraadt struct passwd *pw;
    229       1.4  deraadt char *s;
    230       1.4  deraadt {
    231       1.4  deraadt 	char *bp, *cp;
    232       1.4  deraadt 
    233      1.14     phil 	/* since this is currently using strsep(), parse it first */
    234       1.4  deraadt 	bp = s;
    235       1.4  deraadt 	pw->pw_name = strsep(&bp, ":\n");
    236       1.4  deraadt 	pw->pw_passwd = strsep(&bp, ":\n");
    237       1.4  deraadt 	if (!(cp = strsep(&bp, ":\n")))
    238       1.4  deraadt 		return 1;
    239       1.4  deraadt 	pw->pw_uid = atoi(cp);
    240       1.4  deraadt 	if (!(cp = strsep(&bp, ":\n")))
    241      1.13  mycroft 		return 1;
    242       1.4  deraadt 	pw->pw_gid = atoi(cp);
    243       1.4  deraadt 	pw->pw_change = 0;
    244       1.4  deraadt 	pw->pw_class = "";
    245       1.4  deraadt 	pw->pw_gecos = strsep(&bp, ":\n");
    246       1.4  deraadt 	pw->pw_dir = strsep(&bp, ":\n");
    247       1.4  deraadt 	pw->pw_shell = strsep(&bp, ":\n");
    248       1.4  deraadt 	pw->pw_expire = 0;
    249      1.14     phil 
    250      1.14     phil 	/* now let the prototype override, if set. */
    251      1.14     phil 	if(__ypproto != (struct passwd *)NULL) {
    252      1.14     phil #ifdef YP_OVERRIDE_PASSWD
    253      1.14     phil 		if(__ypproto->pw_passwd != (char *)NULL)
    254      1.14     phil 			pw->pw_passwd = __ypproto->pw_passwd;
    255      1.14     phil #endif
    256      1.14     phil 		if(!(__ypflags & _PASSWORD_NOUID))
    257      1.14     phil 			pw->pw_uid = __ypproto->pw_uid;
    258      1.14     phil 		if(!(__ypflags & _PASSWORD_NOGID))
    259      1.14     phil 			pw->pw_gid = __ypproto->pw_gid;
    260      1.14     phil 		if(__ypproto->pw_gecos != (char *)NULL)
    261      1.14     phil 			pw->pw_gecos = __ypproto->pw_gecos;
    262      1.14     phil 		if(__ypproto->pw_dir != (char *)NULL)
    263      1.14     phil 			pw->pw_dir = __ypproto->pw_dir;
    264      1.14     phil 		if(__ypproto->pw_shell != (char *)NULL)
    265      1.14     phil 			pw->pw_shell = __ypproto->pw_shell;
    266      1.14     phil 	}
    267       1.4  deraadt 	return 0;
    268       1.4  deraadt }
    269       1.4  deraadt #endif
    270       1.4  deraadt 
    271       1.1      cgd struct passwd *
    272       1.1      cgd getpwent()
    273       1.1      cgd {
    274       1.1      cgd 	DBT key;
    275       1.1      cgd 	char bf[sizeof(_pw_keynum) + 1];
    276       1.4  deraadt #ifdef YP
    277      1.13  mycroft 	char *cp;
    278      1.14     phil 	static char *name = (char *)NULL;
    279      1.14     phil 	const char *user, *host, *dom;
    280      1.14     phil 	int has_yppw;
    281       1.4  deraadt #endif
    282       1.1      cgd 
    283       1.1      cgd 	if (!_pw_db && !__initdb())
    284       1.1      cgd 		return((struct passwd *)NULL);
    285       1.1      cgd 
    286       1.4  deraadt #ifdef YP
    287      1.14     phil 	has_yppw = __has_yppw();
    288      1.14     phil 
    289       1.4  deraadt again:
    290      1.14     phil 	if(has_yppw && (__ypmode != YPMODE_NONE)) {
    291       1.4  deraadt 		char *key, *data;
    292       1.4  deraadt 		int keylen, datalen;
    293      1.14     phil 		int r, s;
    294       1.4  deraadt 
    295       1.4  deraadt 		if(!__ypdomain) {
    296       1.4  deraadt 			if( _yp_check(&__ypdomain) == 0) {
    297      1.14     phil 				__ypmode = YPMODE_NONE;
    298       1.4  deraadt 				goto again;
    299       1.4  deraadt 			}
    300       1.4  deraadt 		}
    301      1.14     phil 		switch(__ypmode) {
    302      1.14     phil 		case YPMODE_FULL:
    303      1.14     phil 			if(__ypcurrent) {
    304      1.14     phil 				r = yp_next(__ypdomain, "passwd.byname",
    305      1.14     phil 					__ypcurrent, __ypcurrentlen,
    306      1.14     phil 					&key, &keylen, &data, &datalen);
    307      1.14     phil 				free(__ypcurrent);
    308      1.14     phil 				if(r != 0) {
    309      1.14     phil 					__ypcurrent = NULL;
    310      1.14     phil 					__ypmode = YPMODE_NONE;
    311      1.14     phil 					if(data)
    312      1.14     phil 						free(data);
    313      1.14     phil 					data = NULL;
    314      1.14     phil 					goto again;
    315      1.14     phil 				}
    316      1.14     phil 				__ypcurrent = key;
    317      1.14     phil 				__ypcurrentlen = keylen;
    318      1.14     phil 				bcopy(data, line, datalen);
    319      1.14     phil 				free(data);
    320      1.14     phil 				data = NULL;
    321      1.14     phil 			} else {
    322      1.14     phil 				r = yp_first(__ypdomain, "passwd.byname",
    323      1.14     phil 					&__ypcurrent, &__ypcurrentlen,
    324      1.14     phil 					&data, &datalen);
    325      1.14     phil 				if(r != 0) {
    326      1.14     phil 					__ypmode = YPMODE_NONE;
    327      1.14     phil 					if(data)
    328      1.14     phil 						free(data);
    329      1.14     phil 					goto again;
    330      1.14     phil 				}
    331      1.14     phil 				bcopy(data, line, datalen);
    332       1.4  deraadt 				free(data);
    333       1.4  deraadt 				data = NULL;
    334      1.14     phil 			}
    335      1.14     phil 			break;
    336      1.14     phil 		case YPMODE_NETGRP:
    337      1.14     phil 			s = getnetgrent(&host, &user, &dom);
    338      1.14     phil 			if(s == 0) {	/* end of group */
    339      1.14     phil 				endnetgrent();
    340      1.14     phil 				__ypmode = YPMODE_NONE;
    341      1.14     phil 				goto again;
    342      1.14     phil 			}
    343      1.14     phil 			if(user && *user) {
    344      1.14     phil 				r = yp_match(__ypdomain, "passwd.byname",
    345      1.14     phil 					user, strlen(user),
    346      1.14     phil 					&data, &datalen);
    347      1.14     phil 			} else
    348      1.14     phil 				goto again;
    349      1.14     phil 			if(r != 0) {
    350      1.14     phil 				/*
    351      1.14     phil 				 * if the netgroup is invalid, keep looking
    352      1.14     phil 				 * as there may be valid users later on.
    353      1.14     phil 				 */
    354      1.14     phil 				if(data)
    355      1.14     phil 					free(data);
    356       1.4  deraadt 				goto again;
    357       1.4  deraadt 			}
    358       1.4  deraadt 			bcopy(data, line, datalen);
    359       1.4  deraadt 			free(data);
    360      1.14     phil 			data = (char *)NULL;
    361      1.14     phil 			break;
    362      1.14     phil 		case YPMODE_USER:
    363      1.14     phil 			if(name != (char *)NULL) {
    364      1.14     phil 				r = yp_match(__ypdomain, "passwd.byname",
    365      1.14     phil 					name, strlen(name),
    366      1.14     phil 					&data, &datalen);
    367      1.14     phil 				__ypmode = YPMODE_NONE;
    368      1.14     phil 				free(name);
    369      1.14     phil 				name = (char *)NULL;
    370      1.14     phil 				if(r != 0) {
    371      1.14     phil 					if(data)
    372      1.14     phil 						free(data);
    373      1.14     phil 					goto again;
    374      1.14     phil 				}
    375      1.14     phil 				bcopy(data, line, datalen);
    376       1.4  deraadt 				free(data);
    377      1.14     phil 				data = (char *)NULL;
    378      1.14     phil 			} else {		/* XXX */
    379      1.14     phil 				__ypmode = YPMODE_NONE;
    380       1.4  deraadt 				goto again;
    381       1.4  deraadt 			}
    382      1.14     phil 			break;
    383       1.4  deraadt 		}
    384      1.14     phil 
    385       1.4  deraadt 		line[datalen] = '\0';
    386      1.13  mycroft 		if (__ypparse(&_pw_passwd, line))
    387      1.13  mycroft 			goto again;
    388      1.13  mycroft 		return &_pw_passwd;
    389       1.4  deraadt 	}
    390       1.4  deraadt #endif
    391       1.4  deraadt 
    392       1.1      cgd 	++_pw_keynum;
    393       1.1      cgd 	bf[0] = _PW_KEYBYNUM;
    394       1.1      cgd 	bcopy((char *)&_pw_keynum, bf + 1, sizeof(_pw_keynum));
    395       1.1      cgd 	key.data = (u_char *)bf;
    396       1.1      cgd 	key.size = sizeof(_pw_keynum) + 1;
    397       1.4  deraadt 	if(__hashpw(&key)) {
    398       1.4  deraadt #ifdef YP
    399      1.14     phil 		/* if we don't have YP at all, don't bother. */
    400      1.14     phil 		if(has_yppw) {
    401      1.14     phil 			if(_pw_passwd.pw_name[0] == '+') {
    402      1.14     phil 				/* set the mode */
    403      1.14     phil 				switch(_pw_passwd.pw_name[1]) {
    404      1.14     phil 				case '\0':
    405      1.14     phil 					__ypmode = YPMODE_FULL;
    406      1.14     phil 					break;
    407      1.14     phil 				case '@':
    408      1.14     phil 					__ypmode = YPMODE_NETGRP;
    409      1.14     phil 					setnetgrent(_pw_passwd.pw_name + 2);
    410      1.14     phil 					break;
    411      1.14     phil 				default:
    412      1.14     phil 					__ypmode = YPMODE_USER;
    413      1.14     phil 					name = strdup(_pw_passwd.pw_name + 1);
    414      1.14     phil 					break;
    415      1.14     phil 				}
    416      1.14     phil 
    417      1.14     phil 				/* save the prototype */
    418      1.14     phil 				__ypproto_set();
    419      1.14     phil 				goto again;
    420      1.14     phil 			} else if(_pw_passwd.pw_name[0] == '-') {
    421      1.14     phil 				/* an attempted exclusion */
    422      1.14     phil 				switch(_pw_passwd.pw_name[1]) {
    423      1.14     phil 				case '\0':
    424      1.14     phil 					break;
    425      1.14     phil 				case '@':
    426      1.14     phil 					setnetgrent(_pw_passwd.pw_name + 2);
    427      1.14     phil 					while(getnetgrent(&host, &user, &dom)) {
    428      1.14     phil 						if(user && *user)
    429      1.14     phil 							__ypexclude_add(user);
    430      1.14     phil 					}
    431      1.14     phil 					endnetgrent();
    432      1.14     phil 					break;
    433      1.14     phil 				default:
    434      1.14     phil 					__ypexclude_add(_pw_passwd.pw_name + 1);
    435      1.14     phil 					break;
    436      1.14     phil 				}
    437      1.14     phil 				goto again;
    438      1.14     phil 			}
    439       1.4  deraadt 		}
    440       1.4  deraadt #endif
    441       1.4  deraadt 		return &_pw_passwd;
    442       1.4  deraadt 	}
    443       1.4  deraadt 	return (struct passwd *)NULL;
    444       1.1      cgd }
    445       1.1      cgd 
    446      1.14     phil #ifdef YP
    447      1.14     phil 
    448      1.14     phil /*
    449      1.14     phil  * See if the YP token is in the database.  Only works if pwd_mkdb knows
    450      1.14     phil  * about the token.
    451      1.14     phil  */
    452      1.14     phil static int
    453      1.14     phil __has_yppw()
    454      1.14     phil {
    455      1.14     phil 	DBT key, data;
    456      1.14     phil 	DBT pkey, pdata;
    457      1.14     phil 	int len;
    458      1.14     phil 	char bf[UT_NAMESIZE];
    459      1.14     phil 
    460      1.14     phil 	key.data = (u_char *)__yp_token;
    461      1.14     phil 	key.size = strlen(__yp_token);
    462      1.14     phil 
    463      1.14     phil 	/* Pre-token database support. */
    464      1.14     phil 	bf[0] = _PW_KEYBYNAME;
    465      1.14     phil 	len = strlen("+");
    466      1.14     phil 	bcopy("+", bf + 1, MIN(len, UT_NAMESIZE));
    467      1.14     phil 	pkey.data = (u_char *)bf;
    468      1.14     phil 	pkey.size = len + 1;
    469      1.14     phil 
    470      1.14     phil 	if ((_pw_db->get)(_pw_db, &key, &data, 0)
    471      1.14     phil 	    && (_pw_db->get)(_pw_db, &pkey, &pdata, 0))
    472      1.14     phil 		return(0);	/* No YP. */
    473      1.14     phil 	return(1);
    474      1.14     phil }
    475      1.14     phil #endif
    476      1.14     phil 
    477       1.1      cgd struct passwd *
    478       1.1      cgd getpwnam(name)
    479       1.1      cgd 	const char *name;
    480       1.1      cgd {
    481       1.1      cgd 	DBT key;
    482      1.10  deraadt 	int len, rval;
    483      1.10  deraadt 	char bf[UT_NAMESIZE + 1];
    484      1.10  deraadt 
    485      1.10  deraadt 	if (!_pw_db && !__initdb())
    486      1.10  deraadt 		return((struct passwd *)NULL);
    487       1.4  deraadt 
    488       1.4  deraadt #ifdef YP
    489      1.10  deraadt 	/*
    490      1.14     phil 	 * If YP is active, we must sequence through the passwd file
    491      1.14     phil 	 * in sequence.
    492      1.10  deraadt 	 */
    493      1.14     phil 	if (__has_yppw()) {
    494      1.10  deraadt 		int r;
    495      1.14     phil 		int s = -1;
    496      1.14     phil 		const char *host, *user, *dom;
    497       1.4  deraadt 
    498      1.10  deraadt 		for(_pw_keynum=1; _pw_keynum; _pw_keynum++) {
    499      1.10  deraadt 			bf[0] = _PW_KEYBYNUM;
    500      1.10  deraadt 			bcopy((char *)&_pw_keynum, bf + 1, sizeof(_pw_keynum));
    501      1.10  deraadt 			key.data = (u_char *)bf;
    502      1.10  deraadt 			key.size = sizeof(_pw_keynum) + 1;
    503      1.10  deraadt 			if(__hashpw(&key) == 0)
    504      1.10  deraadt 				break;
    505      1.14     phil 			switch(_pw_passwd.pw_name[0]) {
    506      1.14     phil 			case '+':
    507      1.10  deraadt 				if(!__ypdomain) {
    508      1.10  deraadt 					if(_yp_check(&__ypdomain) == 0) {
    509      1.10  deraadt 						continue;
    510      1.10  deraadt 					}
    511      1.10  deraadt 				}
    512      1.14     phil 				/* save the prototype */
    513      1.14     phil 				__ypproto_set();
    514      1.14     phil 
    515      1.14     phil 				switch(_pw_passwd.pw_name[1]) {
    516      1.14     phil 				case '\0':
    517      1.14     phil 					if(__ypcurrent) {
    518      1.14     phil 						free(__ypcurrent);
    519      1.14     phil 						__ypcurrent = NULL;
    520      1.14     phil 					}
    521      1.14     phil 					r = yp_match(__ypdomain,
    522      1.14     phil 						"passwd.byname",
    523      1.14     phil 						name, strlen(name),
    524      1.14     phil 						&__ypcurrent, &__ypcurrentlen);
    525      1.14     phil 					if(r != 0) {
    526      1.14     phil 						if(__ypcurrent)
    527      1.14     phil 							free(__ypcurrent);
    528      1.14     phil 						__ypcurrent = NULL;
    529      1.14     phil 						continue;
    530      1.14     phil 					}
    531      1.14     phil 					break;
    532      1.14     phil 				case '@':
    533      1.14     phil pwnam_netgrp:
    534      1.14     phil 					if(__ypcurrent) {
    535      1.14     phil 						free(__ypcurrent);
    536      1.14     phil 						__ypcurrent = NULL;
    537      1.14     phil 					}
    538      1.14     phil 					if(s == -1)	/* first time */
    539      1.14     phil 						setnetgrent(_pw_passwd.pw_name + 2);
    540      1.14     phil 					s = getnetgrent(&host, &user, &dom);
    541      1.14     phil 					if(s == 0) {	/* end of group */
    542      1.14     phil 						endnetgrent();
    543      1.14     phil 						s = -1;
    544      1.14     phil 						continue;
    545      1.14     phil 					} else {
    546      1.14     phil 						if(user && *user) {
    547      1.14     phil 							r = yp_match(__ypdomain,
    548      1.14     phil 							    "passwd.byname",
    549      1.14     phil 							    user, strlen(user),
    550      1.14     phil 							    &__ypcurrent,
    551      1.14     phil 							    &__ypcurrentlen);
    552      1.14     phil 						} else
    553      1.14     phil 							goto pwnam_netgrp;
    554      1.14     phil 						if(r != 0) {
    555      1.14     phil 							if(__ypcurrent)
    556      1.14     phil 							    free(__ypcurrent);
    557      1.14     phil 							__ypcurrent = NULL;
    558      1.14     phil 							/*
    559      1.14     phil 							 * just because this
    560      1.14     phil 							 * user is bad, doesn't
    561      1.14     phil 							 * mean they all are.
    562      1.14     phil 							 */
    563      1.14     phil 							goto pwnam_netgrp;
    564      1.14     phil 						}
    565      1.14     phil 					}
    566      1.10  deraadt 					break;
    567      1.10  deraadt 				default:
    568      1.14     phil 					if(__ypcurrent) {
    569      1.14     phil 						free(__ypcurrent);
    570      1.14     phil 						__ypcurrent = NULL;
    571      1.14     phil 					}
    572      1.14     phil 					user = _pw_passwd.pw_name + 1;
    573      1.14     phil 					r = yp_match(__ypdomain,
    574      1.14     phil 						"passwd.byname",
    575      1.14     phil 						user, strlen(user),
    576      1.14     phil 						&__ypcurrent,
    577      1.14     phil 						&__ypcurrentlen);
    578      1.14     phil 					if(r != 0) {
    579      1.14     phil 						if(__ypcurrent)
    580      1.14     phil 							free(__ypcurrent);
    581      1.14     phil 						__ypcurrent = NULL;
    582      1.14     phil 						continue;
    583      1.14     phil 					}
    584      1.14     phil 					break;
    585       1.4  deraadt 				}
    586      1.10  deraadt 				bcopy(__ypcurrent, line, __ypcurrentlen);
    587      1.10  deraadt 				line[__ypcurrentlen] = '\0';
    588      1.14     phil 				if(__ypparse(&_pw_passwd, line)
    589      1.14     phil 				   || __ypexclude_is(_pw_passwd.pw_name)) {
    590      1.14     phil 					if(s == 1)	/* inside netgrp */
    591      1.14     phil 						goto pwnam_netgrp;
    592      1.10  deraadt 					continue;
    593      1.14     phil 				}
    594      1.14     phil 				break;
    595      1.14     phil 			case '-':
    596      1.14     phil 				/* attempted exclusion */
    597      1.14     phil 				switch(_pw_passwd.pw_name[1]) {
    598      1.14     phil 				case '\0':
    599      1.14     phil 					break;
    600      1.14     phil 				case '@':
    601      1.14     phil 					setnetgrent(_pw_passwd.pw_name + 2);
    602      1.14     phil 					while(getnetgrent(&host, &user, &dom)) {
    603      1.14     phil 						if(user && *user)
    604      1.14     phil 							__ypexclude_add(user);
    605      1.14     phil 					}
    606      1.14     phil 					endnetgrent();
    607      1.14     phil 					break;
    608      1.14     phil 				default:
    609      1.14     phil 					__ypexclude_add(_pw_passwd.pw_name + 1);
    610      1.14     phil 					break;
    611      1.14     phil 				}
    612      1.14     phil 				break;
    613      1.14     phil 
    614      1.14     phil 				continue;
    615       1.4  deraadt 			}
    616      1.14     phil 			if(strcmp(_pw_passwd.pw_name, name) == 0) {
    617      1.10  deraadt 				if (!_pw_stayopen) {
    618      1.10  deraadt 					(void)(_pw_db->close)(_pw_db);
    619      1.10  deraadt 					_pw_db = (DB *)NULL;
    620      1.10  deraadt 				}
    621      1.14     phil 				if(__ypexclude != (DB *)NULL) {
    622      1.14     phil 					(void)(__ypexclude->close)(__ypexclude);
    623      1.14     phil 					__ypexclude = (DB *)NULL;
    624      1.14     phil 				}
    625      1.14     phil 				__ypproto = (struct passwd *)NULL;
    626      1.10  deraadt 				return &_pw_passwd;
    627       1.4  deraadt 			}
    628      1.14     phil 			if(s == 1)	/* inside netgrp */
    629      1.14     phil 				goto pwnam_netgrp;
    630      1.10  deraadt 			continue;
    631       1.4  deraadt 		}
    632      1.10  deraadt 		if (!_pw_stayopen) {
    633      1.10  deraadt 			(void)(_pw_db->close)(_pw_db);
    634      1.10  deraadt 			_pw_db = (DB *)NULL;
    635       1.4  deraadt 		}
    636      1.14     phil 		if(__ypexclude != (DB *)NULL) {
    637      1.14     phil 			(void)(__ypexclude->close)(__ypexclude);
    638      1.14     phil 			__ypexclude = (DB *)NULL;
    639      1.14     phil 		}
    640      1.14     phil 		__ypproto = (struct passwd *)NULL;
    641      1.10  deraadt 		return (struct passwd *)NULL;
    642       1.4  deraadt 	}
    643      1.10  deraadt #endif /* YP */
    644       1.1      cgd 
    645       1.1      cgd 	bf[0] = _PW_KEYBYNAME;
    646       1.1      cgd 	len = strlen(name);
    647       1.1      cgd 	bcopy(name, bf + 1, MIN(len, UT_NAMESIZE));
    648       1.1      cgd 	key.data = (u_char *)bf;
    649       1.1      cgd 	key.size = len + 1;
    650       1.1      cgd 	rval = __hashpw(&key);
    651       1.1      cgd 
    652       1.1      cgd 	if (!_pw_stayopen) {
    653       1.1      cgd 		(void)(_pw_db->close)(_pw_db);
    654       1.1      cgd 		_pw_db = (DB *)NULL;
    655       1.1      cgd 	}
    656       1.1      cgd 	return(rval ? &_pw_passwd : (struct passwd *)NULL);
    657       1.1      cgd }
    658       1.1      cgd 
    659       1.1      cgd struct passwd *
    660       1.1      cgd #ifdef __STDC__
    661       1.1      cgd getpwuid(uid_t uid)
    662       1.1      cgd #else
    663       1.1      cgd getpwuid(uid)
    664       1.1      cgd 	int uid;
    665       1.1      cgd #endif
    666       1.1      cgd {
    667       1.1      cgd 	DBT key;
    668      1.10  deraadt 	char bf[sizeof(_pw_keynum) + 1];
    669      1.14     phil 	int keyuid, rval;
    670      1.10  deraadt 
    671      1.10  deraadt 	if (!_pw_db && !__initdb())
    672      1.10  deraadt 		return((struct passwd *)NULL);
    673       1.4  deraadt 
    674       1.4  deraadt #ifdef YP
    675      1.10  deraadt 	/*
    676      1.14     phil 	 * If YP is active, we must sequence through the passwd file
    677      1.14     phil 	 * in sequence.
    678      1.10  deraadt 	 */
    679      1.14     phil 	if (__has_yppw()) {
    680      1.10  deraadt 		char uidbuf[20];
    681      1.10  deraadt 		int r;
    682      1.14     phil 		int s = -1;
    683      1.14     phil 		const char *host, *user, *dom;
    684       1.4  deraadt 
    685      1.14     phil 		sprintf(uidbuf, "%d", uid);
    686      1.10  deraadt 		for(_pw_keynum=1; _pw_keynum; _pw_keynum++) {
    687      1.10  deraadt 			bf[0] = _PW_KEYBYNUM;
    688      1.10  deraadt 			bcopy((char *)&_pw_keynum, bf + 1, sizeof(_pw_keynum));
    689      1.10  deraadt 			key.data = (u_char *)bf;
    690      1.10  deraadt 			key.size = sizeof(_pw_keynum) + 1;
    691      1.10  deraadt 			if(__hashpw(&key) == 0)
    692      1.10  deraadt 				break;
    693      1.14     phil 			switch(_pw_passwd.pw_name[0]) {
    694      1.14     phil 			case '+':
    695      1.10  deraadt 				if(!__ypdomain) {
    696      1.10  deraadt 					if(_yp_check(&__ypdomain) == 0) {
    697      1.10  deraadt 						continue;
    698      1.10  deraadt 					}
    699      1.10  deraadt 				}
    700      1.14     phil 				/* save the prototype */
    701      1.14     phil 				__ypproto_set();
    702      1.14     phil 
    703      1.14     phil 				switch(_pw_passwd.pw_name[1]) {
    704      1.14     phil 				case '\0':
    705      1.14     phil 					if(__ypcurrent) {
    706      1.14     phil 						free(__ypcurrent);
    707      1.14     phil 						__ypcurrent = NULL;
    708      1.14     phil 					}
    709      1.14     phil 					r = yp_match(__ypdomain, "passwd.byuid",
    710      1.14     phil 						uidbuf, strlen(uidbuf),
    711      1.14     phil 						&__ypcurrent, &__ypcurrentlen);
    712      1.14     phil 					if(r != 0) {
    713      1.14     phil 						if(__ypcurrent)
    714      1.14     phil 							free(__ypcurrent);
    715      1.14     phil 						__ypcurrent = NULL;
    716      1.14     phil 						continue;
    717      1.14     phil 					}
    718      1.14     phil 					break;
    719      1.14     phil 				case '@':
    720      1.14     phil pwuid_netgrp:
    721      1.14     phil 					if(__ypcurrent) {
    722      1.14     phil 						free(__ypcurrent);
    723      1.14     phil 						__ypcurrent = NULL;
    724      1.14     phil 					}
    725      1.14     phil 					if(s == -1)	/* first time */
    726      1.14     phil 						setnetgrent(_pw_passwd.pw_name + 2);
    727      1.14     phil 					s = getnetgrent(&host, &user, &dom);
    728      1.14     phil 					if(s == 0) {	/* end of group */
    729      1.14     phil 						endnetgrent();
    730      1.14     phil 						s = -1;
    731      1.14     phil 						continue;
    732      1.14     phil 					} else {
    733      1.14     phil 						if(user && *user) {
    734      1.14     phil 							r = yp_match(__ypdomain,
    735      1.14     phil 							    "passwd.byname",
    736      1.14     phil 							    user, strlen(user),
    737      1.14     phil 							    &__ypcurrent,
    738      1.14     phil 							    &__ypcurrentlen);
    739      1.14     phil 						} else
    740      1.14     phil 							goto pwuid_netgrp;
    741      1.14     phil 						if(r != 0) {
    742      1.14     phil 							if(__ypcurrent)
    743      1.14     phil 							    free(__ypcurrent);
    744      1.14     phil 							__ypcurrent = NULL;
    745      1.14     phil 							/*
    746      1.14     phil                                                          * just because this
    747      1.14     phil 							 * user is bad, doesn't
    748      1.14     phil 							 * mean they all are.
    749      1.14     phil 							 */
    750      1.14     phil 							goto pwuid_netgrp;
    751      1.14     phil 						}
    752      1.14     phil 					}
    753      1.10  deraadt 					break;
    754      1.10  deraadt 				default:
    755      1.14     phil 					if(__ypcurrent) {
    756      1.14     phil 						free(__ypcurrent);
    757      1.14     phil 						__ypcurrent = NULL;
    758      1.14     phil 					}
    759      1.14     phil 					user = _pw_passwd.pw_name + 1;
    760      1.14     phil 					r = yp_match(__ypdomain,
    761      1.14     phil 						"passwd.byname",
    762      1.14     phil 						user, strlen(user),
    763      1.14     phil 						&__ypcurrent,
    764      1.14     phil 						&__ypcurrentlen);
    765      1.14     phil 					if(r != 0) {
    766      1.14     phil 						if(__ypcurrent)
    767      1.14     phil 							free(__ypcurrent);
    768      1.14     phil 						__ypcurrent = NULL;
    769      1.14     phil 						continue;
    770      1.14     phil 					}
    771      1.14     phil 					break;
    772       1.4  deraadt 				}
    773      1.10  deraadt 				bcopy(__ypcurrent, line, __ypcurrentlen);
    774      1.10  deraadt 				line[__ypcurrentlen] = '\0';
    775      1.14     phil 				if(__ypparse(&_pw_passwd, line)
    776      1.14     phil 				   || __ypexclude_is(_pw_passwd.pw_name)) {
    777      1.14     phil 					if(s == 1)	/* inside netgroup */
    778      1.14     phil 						goto pwuid_netgrp;
    779      1.10  deraadt 					continue;
    780      1.14     phil 				}
    781      1.14     phil 				break;
    782      1.14     phil 			case '-':
    783      1.14     phil 				/* attempted exclusion */
    784      1.14     phil 				switch(_pw_passwd.pw_name[1]) {
    785      1.14     phil 				case '\0':
    786      1.14     phil 					break;
    787      1.14     phil 				case '@':
    788      1.14     phil 					setnetgrent(_pw_passwd.pw_name + 2);
    789      1.14     phil 					while(getnetgrent(&host, &user, &dom)) {
    790      1.14     phil 						if(user && *user)
    791      1.14     phil 							__ypexclude_add(user);
    792      1.14     phil 					}
    793      1.14     phil 					endnetgrent();
    794      1.14     phil 					break;
    795      1.14     phil 				default:
    796      1.14     phil 					__ypexclude_add(_pw_passwd.pw_name + 1);
    797      1.14     phil 					break;
    798      1.14     phil 				}
    799      1.14     phil 				break;
    800      1.14     phil 
    801      1.14     phil 				continue;
    802       1.4  deraadt 			}
    803      1.10  deraadt 			if( _pw_passwd.pw_uid == uid) {
    804      1.10  deraadt 				if (!_pw_stayopen) {
    805      1.10  deraadt 					(void)(_pw_db->close)(_pw_db);
    806      1.10  deraadt 					_pw_db = (DB *)NULL;
    807      1.10  deraadt 				}
    808      1.14     phil 				if (__ypexclude != (DB *)NULL) {
    809      1.14     phil 					(void)(__ypexclude->close)(__ypexclude);
    810      1.14     phil 					__ypexclude = (DB *)NULL;
    811      1.14     phil 				}
    812      1.14     phil 				__ypproto = NULL;
    813      1.10  deraadt 				return &_pw_passwd;
    814       1.4  deraadt 			}
    815      1.14     phil 			if(s == 1)	/* inside netgroup */
    816      1.14     phil 				goto pwuid_netgrp;
    817      1.10  deraadt 			continue;
    818       1.4  deraadt 		}
    819      1.10  deraadt 		if (!_pw_stayopen) {
    820      1.10  deraadt 			(void)(_pw_db->close)(_pw_db);
    821      1.10  deraadt 			_pw_db = (DB *)NULL;
    822       1.4  deraadt 		}
    823      1.14     phil 		if(__ypexclude != (DB *)NULL) {
    824      1.14     phil 			(void)(__ypexclude->close)(__ypexclude);
    825      1.14     phil 			__ypexclude = (DB *)NULL;
    826      1.14     phil 		}
    827      1.14     phil 		__ypproto = (struct passwd *)NULL;
    828      1.10  deraadt 		return (struct passwd *)NULL;
    829       1.4  deraadt 	}
    830      1.10  deraadt #endif /* YP */
    831       1.1      cgd 
    832       1.1      cgd 	bf[0] = _PW_KEYBYUID;
    833       1.1      cgd 	keyuid = uid;
    834       1.1      cgd 	bcopy(&keyuid, bf + 1, sizeof(keyuid));
    835       1.1      cgd 	key.data = (u_char *)bf;
    836       1.1      cgd 	key.size = sizeof(keyuid) + 1;
    837       1.1      cgd 	rval = __hashpw(&key);
    838       1.1      cgd 
    839       1.1      cgd 	if (!_pw_stayopen) {
    840       1.1      cgd 		(void)(_pw_db->close)(_pw_db);
    841       1.1      cgd 		_pw_db = (DB *)NULL;
    842       1.1      cgd 	}
    843       1.1      cgd 	return(rval ? &_pw_passwd : (struct passwd *)NULL);
    844       1.1      cgd }
    845       1.1      cgd 
    846       1.1      cgd int
    847       1.1      cgd setpassent(stayopen)
    848       1.1      cgd 	int stayopen;
    849       1.1      cgd {
    850       1.1      cgd 	_pw_keynum = 0;
    851       1.1      cgd 	_pw_stayopen = stayopen;
    852       1.9      jtc #ifdef YP
    853      1.14     phil 	__ypmode = YPMODE_NONE;
    854       1.9      jtc 	if(__ypcurrent)
    855       1.9      jtc 		free(__ypcurrent);
    856       1.9      jtc 	__ypcurrent = NULL;
    857      1.14     phil 	if(__ypexclude != (DB *)NULL) {
    858      1.14     phil 		(void)(__ypexclude->close)(__ypexclude);
    859      1.14     phil 		__ypexclude = (DB *)NULL;
    860      1.14     phil 	}
    861      1.14     phil 	__ypproto = (struct passwd *)NULL;
    862       1.9      jtc #endif
    863       1.1      cgd 	return(1);
    864       1.1      cgd }
    865       1.1      cgd 
    866       1.8      jtc void
    867       1.1      cgd setpwent()
    868       1.1      cgd {
    869       1.9      jtc 	(void) setpassent(0);
    870       1.1      cgd }
    871       1.1      cgd 
    872       1.1      cgd void
    873       1.1      cgd endpwent()
    874       1.1      cgd {
    875       1.1      cgd 	_pw_keynum = 0;
    876       1.1      cgd 	if (_pw_db) {
    877       1.1      cgd 		(void)(_pw_db->close)(_pw_db);
    878       1.1      cgd 		_pw_db = (DB *)NULL;
    879       1.1      cgd 	}
    880       1.4  deraadt #ifdef YP
    881      1.14     phil 	__ypmode = YPMODE_NONE;
    882       1.4  deraadt 	if(__ypcurrent)
    883       1.4  deraadt 		free(__ypcurrent);
    884       1.4  deraadt 	__ypcurrent = NULL;
    885      1.14     phil 	if(__ypexclude != (DB *)NULL) {
    886      1.14     phil 		(void)(__ypexclude->close)(__ypexclude);
    887      1.14     phil 		__ypexclude = (DB *)NULL;
    888      1.14     phil 	}
    889      1.14     phil 	__ypproto = (struct passwd *)NULL;
    890       1.4  deraadt #endif
    891       1.1      cgd }
    892       1.1      cgd 
    893       1.4  deraadt static int
    894       1.1      cgd __initdb()
    895       1.1      cgd {
    896       1.1      cgd 	static int warned;
    897       1.1      cgd 	char *p;
    898       1.1      cgd 
    899      1.14     phil #ifdef YP
    900      1.14     phil 	__ypmode = YPMODE_NONE;
    901      1.14     phil #endif
    902       1.1      cgd 	p = (geteuid()) ? _PATH_MP_DB : _PATH_SMP_DB;
    903       1.3   proven 	_pw_db = dbopen(p, O_RDONLY, 0, DB_HASH, NULL);
    904       1.1      cgd 	if (_pw_db)
    905       1.1      cgd 		return(1);
    906       1.1      cgd 	if (!warned)
    907       1.1      cgd 		syslog(LOG_ERR, "%s: %m", p);
    908      1.11  deraadt 	warned = 1;
    909       1.1      cgd 	return(0);
    910       1.1      cgd }
    911       1.1      cgd 
    912       1.4  deraadt static int
    913       1.1      cgd __hashpw(key)
    914       1.1      cgd 	DBT *key;
    915       1.1      cgd {
    916       1.1      cgd 	register char *p, *t;
    917       1.1      cgd 	static u_int max;
    918       1.1      cgd 	static char *line;
    919       1.1      cgd 	DBT data;
    920       1.1      cgd 
    921       1.1      cgd 	if ((_pw_db->get)(_pw_db, key, &data, 0))
    922       1.1      cgd 		return(0);
    923       1.1      cgd 	p = (char *)data.data;
    924      1.14     phil 	if (data.size > max && !(line = realloc(line, (max += 1024))))
    925       1.1      cgd 		return(0);
    926       1.1      cgd 
    927       1.1      cgd 	t = line;
    928      1.14     phil #define	EXPAND(e)	e = t; while ((*t++ = *p++));
    929       1.1      cgd 	EXPAND(_pw_passwd.pw_name);
    930       1.1      cgd 	EXPAND(_pw_passwd.pw_passwd);
    931       1.1      cgd 	bcopy(p, (char *)&_pw_passwd.pw_uid, sizeof(int));
    932       1.1      cgd 	p += sizeof(int);
    933       1.1      cgd 	bcopy(p, (char *)&_pw_passwd.pw_gid, sizeof(int));
    934       1.1      cgd 	p += sizeof(int);
    935       1.1      cgd 	bcopy(p, (char *)&_pw_passwd.pw_change, sizeof(time_t));
    936       1.1      cgd 	p += sizeof(time_t);
    937       1.1      cgd 	EXPAND(_pw_passwd.pw_class);
    938       1.1      cgd 	EXPAND(_pw_passwd.pw_gecos);
    939       1.1      cgd 	EXPAND(_pw_passwd.pw_dir);
    940       1.1      cgd 	EXPAND(_pw_passwd.pw_shell);
    941       1.1      cgd 	bcopy(p, (char *)&_pw_passwd.pw_expire, sizeof(time_t));
    942       1.1      cgd 	p += sizeof(time_t);
    943      1.14     phil 
    944      1.14     phil 	/* See if there's any data left.  If so, read in flags. */
    945      1.14     phil 	if (data.size > (p - (char *)data.data)) {
    946      1.14     phil 		bcopy(p, (char *)&_pw_flags, sizeof(int));
    947      1.14     phil 		p += sizeof(int);
    948      1.14     phil 	} else
    949      1.14     phil 		_pw_flags = _PASSWORD_NOUID|_PASSWORD_NOGID;	/* default */
    950      1.14     phil 
    951       1.1      cgd 	return(1);
    952       1.1      cgd }
    953