getpwent.c revision 1.11 1 /*
2 * Copyright (c) 1988 The Regents of the University of California.
3 * All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
13 * 3. All advertising materials mentioning features or use of this software
14 * must display the following acknowledgement:
15 * This product includes software developed by the University of
16 * California, Berkeley and its contributors.
17 * 4. Neither the name of the University nor the names of its contributors
18 * may be used to endorse or promote products derived from this software
19 * without specific prior written permission.
20 *
21 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31 * SUCH DAMAGE.
32 */
33
34 #if defined(LIBC_SCCS) && !defined(lint)
35 /*static char *sccsid = "from: @(#)getpwent.c 5.21 (Berkeley) 3/14/91";*/
36 static char *rcsid = "$Id: getpwent.c,v 1.11 1994/03/09 10:10:29 deraadt Exp $";
37 #endif /* LIBC_SCCS and not lint */
38
39 #include <sys/param.h>
40 #include <fcntl.h>
41 #include <db.h>
42 #include <syslog.h>
43 #include <pwd.h>
44 #include <utmp.h>
45 #include <errno.h>
46 #include <unistd.h>
47 #include <stdlib.h>
48 #include <string.h>
49 #include <limits.h>
50 #ifdef YP
51 #include <stdio.h>
52 #include <rpc/rpc.h>
53 #include <rpcsvc/yp_prot.h>
54 #include <rpcsvc/ypclnt.h>
55 #endif
56
57 static struct passwd _pw_passwd; /* password structure */
58 static DB *_pw_db; /* password database */
59 static int _pw_keynum; /* key counter */
60 static int _pw_stayopen; /* keep fd's open */
61 static int __hashpw(), __initdb();
62
63 #ifdef YP
64 static char *__ypcurrent, *__ypdomain;
65 static int __ypcurrentlen, __ypmode=0;
66 static char line[1024];
67
68 static int
69 __ypparse(pw, s)
70 struct passwd *pw;
71 char *s;
72 {
73 char *bp, *cp;
74
75 bp = s;
76 pw->pw_name = strsep(&bp, ":\n");
77 pw->pw_passwd = strsep(&bp, ":\n");
78 if (!(cp = strsep(&bp, ":\n")))
79 return 1;
80 pw->pw_uid = atoi(cp);
81 if (!(cp = strsep(&bp, ":\n")))
82 return 0;
83 pw->pw_gid = atoi(cp);
84 pw->pw_change = 0;
85 pw->pw_class = "";
86 pw->pw_gecos = strsep(&bp, ":\n");
87 pw->pw_dir = strsep(&bp, ":\n");
88 pw->pw_shell = strsep(&bp, ":\n");
89 pw->pw_expire = 0;
90 return 0;
91 }
92 #endif
93
94 struct passwd *
95 getpwent()
96 {
97 DBT key;
98 char bf[sizeof(_pw_keynum) + 1];
99 #ifdef YP
100 char *bp, *cp;
101 #endif
102
103 if (!_pw_db && !__initdb())
104 return((struct passwd *)NULL);
105
106 #ifdef YP
107 again:
108 if(__ypmode) {
109 char *key, *data;
110 int keylen, datalen;
111 int r;
112
113 if(!__ypdomain) {
114 if( _yp_check(&__ypdomain) == 0) {
115 __ypmode = 0;
116 goto again;
117 }
118 }
119 if(__ypcurrent) {
120 r = yp_next(__ypdomain, "passwd.byname",
121 __ypcurrent, __ypcurrentlen,
122 &key, &keylen, &data, &datalen);
123 free(__ypcurrent);
124 __ypcurrent = NULL;
125 /*printf("yp_next %d\n", r);*/
126 switch(r) {
127 case 0:
128 break;
129 default:
130 __ypcurrent = NULL;
131 __ypmode = 0;
132 free(data);
133 data = NULL;
134 goto again;
135 }
136 __ypcurrent = key;
137 __ypcurrentlen = keylen;
138 bcopy(data, line, datalen);
139 free(data);
140 data = NULL;
141 } else {
142 r = yp_first(__ypdomain, "passwd.byname",
143 &__ypcurrent, &__ypcurrentlen,
144 &data, &datalen);
145 /*printf("yp_first %d\n", r);*/
146 switch(r) {
147 case 0:
148 break;
149 default:
150 __ypmode = 0;
151 free(data);
152 goto again;
153 }
154 bcopy(data, line, datalen);
155 free(data);
156 data = NULL;
157 }
158 line[datalen] = '\0';
159 /*printf("line = %s\n", line);*/
160 bp = line;
161 goto parse;
162 }
163 #endif
164
165 ++_pw_keynum;
166 bf[0] = _PW_KEYBYNUM;
167 bcopy((char *)&_pw_keynum, bf + 1, sizeof(_pw_keynum));
168 key.data = (u_char *)bf;
169 key.size = sizeof(_pw_keynum) + 1;
170 if(__hashpw(&key)) {
171 #ifdef YP
172 if(strcmp(_pw_passwd.pw_name, "+") == 0) {
173 __ypmode = 1;
174 goto again;
175 }
176 #endif
177 return &_pw_passwd;
178 }
179 return (struct passwd *)NULL;
180
181 #ifdef YP
182 parse:
183 _pw_passwd.pw_name = strsep(&bp, ":\n");
184 _pw_passwd.pw_passwd = strsep(&bp, ":\n");
185 if (!(cp = strsep(&bp, ":\n")))
186 goto again;
187 _pw_passwd.pw_uid = atoi(cp);
188 if (!(cp = strsep(&bp, ":\n")))
189 goto again;
190 _pw_passwd.pw_gid = atoi(cp);
191 _pw_passwd.pw_change = 0;
192 _pw_passwd.pw_class = "";
193 _pw_passwd.pw_gecos = strsep(&bp, ":\n");
194 _pw_passwd.pw_dir = strsep(&bp, ":\n");
195 _pw_passwd.pw_shell = strsep(&bp, ":\n");
196 _pw_passwd.pw_expire = 0;
197 return &_pw_passwd;
198 #endif
199 }
200
201 struct passwd *
202 getpwnam(name)
203 const char *name;
204 {
205 DBT key;
206 int len, rval;
207 char bf[UT_NAMESIZE + 1];
208
209 if (!_pw_db && !__initdb())
210 return((struct passwd *)NULL);
211
212 #ifdef YP
213 bf[0] = _PW_KEYBYNAME;
214 len = strlen("+");
215 bcopy("+", bf + 1, MIN(len, UT_NAMESIZE));
216 key.data = (u_char *)bf;
217 key.size = len + 1;
218
219 /*
220 * If there is a user called "+", then YP is active. In that
221 * case we must sequence through the passwd file in sequence.
222 */
223 if ( __hashpw(&key)) {
224 int r;
225
226 for(_pw_keynum=1; _pw_keynum; _pw_keynum++) {
227 bf[0] = _PW_KEYBYNUM;
228 bcopy((char *)&_pw_keynum, bf + 1, sizeof(_pw_keynum));
229 key.data = (u_char *)bf;
230 key.size = sizeof(_pw_keynum) + 1;
231 if(__hashpw(&key) == 0)
232 break;
233 if(strcmp(_pw_passwd.pw_name, "+") == 0) {
234 if(!__ypdomain) {
235 if(_yp_check(&__ypdomain) == 0) {
236 continue;
237 }
238 }
239 if(__ypcurrent) {
240 free(__ypcurrent);
241 __ypcurrent = NULL;
242 }
243 r = yp_match(__ypdomain, "passwd.byname",
244 name, strlen(name),
245 &__ypcurrent, &__ypcurrentlen);
246 switch(r) {
247 case 0:
248 break;
249 default:
250 free(__ypcurrent);
251 __ypcurrent = NULL;
252 continue;
253 }
254 bcopy(__ypcurrent, line, __ypcurrentlen);
255 line[__ypcurrentlen] = '\0';
256 if(__ypparse(&_pw_passwd, line))
257 continue;
258 }
259 if( strcmp(_pw_passwd.pw_name, name) == 0) {
260 if (!_pw_stayopen) {
261 (void)(_pw_db->close)(_pw_db);
262 _pw_db = (DB *)NULL;
263 }
264 return &_pw_passwd;
265 }
266 continue;
267 }
268 if (!_pw_stayopen) {
269 (void)(_pw_db->close)(_pw_db);
270 _pw_db = (DB *)NULL;
271 }
272 return (struct passwd *)NULL;
273 }
274 #endif /* YP */
275
276 bf[0] = _PW_KEYBYNAME;
277 len = strlen(name);
278 bcopy(name, bf + 1, MIN(len, UT_NAMESIZE));
279 key.data = (u_char *)bf;
280 key.size = len + 1;
281 rval = __hashpw(&key);
282
283 if (!_pw_stayopen) {
284 (void)(_pw_db->close)(_pw_db);
285 _pw_db = (DB *)NULL;
286 }
287 return(rval ? &_pw_passwd : (struct passwd *)NULL);
288 }
289
290 struct passwd *
291 #ifdef __STDC__
292 getpwuid(uid_t uid)
293 #else
294 getpwuid(uid)
295 int uid;
296 #endif
297 {
298 DBT key;
299 char bf[sizeof(_pw_keynum) + 1];
300 int keyuid, rval, len;
301
302 if (!_pw_db && !__initdb())
303 return((struct passwd *)NULL);
304
305 #ifdef YP
306 bf[0] = _PW_KEYBYNAME;
307 len = strlen("+");
308 bcopy("+", bf + 1, MIN(len, UT_NAMESIZE));
309 key.data = (u_char *)bf;
310 key.size = len + 1;
311
312 /*
313 * If there is a user called "+", then YP is active. In that
314 * case we must sequence through the passwd file in sequence.
315 */
316 if ( __hashpw(&key)) {
317 char uidbuf[20];
318 int r;
319
320 for(_pw_keynum=1; _pw_keynum; _pw_keynum++) {
321 bf[0] = _PW_KEYBYNUM;
322 bcopy((char *)&_pw_keynum, bf + 1, sizeof(_pw_keynum));
323 key.data = (u_char *)bf;
324 key.size = sizeof(_pw_keynum) + 1;
325 if(__hashpw(&key) == 0)
326 break;
327 if(strcmp(_pw_passwd.pw_name, "+") == 0) {
328 if(!__ypdomain) {
329 if(_yp_check(&__ypdomain) == 0) {
330 continue;
331 }
332 }
333 if(__ypcurrent) {
334 free(__ypcurrent);
335 __ypcurrent = NULL;
336 }
337 sprintf(uidbuf, "%d", uid);
338 r = yp_match(__ypdomain, "passwd.byuid",
339 uidbuf, strlen(uidbuf),
340 &__ypcurrent, &__ypcurrentlen);
341 switch(r) {
342 case 0:
343 break;
344 default:
345 free(__ypcurrent);
346 __ypcurrent = NULL;
347 continue;
348 }
349 bcopy(__ypcurrent, line, __ypcurrentlen);
350 line[__ypcurrentlen] = '\0';
351 if(__ypparse(&_pw_passwd, line))
352 continue;
353 }
354 if( _pw_passwd.pw_uid == uid) {
355 if (!_pw_stayopen) {
356 (void)(_pw_db->close)(_pw_db);
357 _pw_db = (DB *)NULL;
358 }
359 return &_pw_passwd;
360 }
361 continue;
362 }
363 if (!_pw_stayopen) {
364 (void)(_pw_db->close)(_pw_db);
365 _pw_db = (DB *)NULL;
366 }
367 return (struct passwd *)NULL;
368 }
369 #endif /* YP */
370
371 bf[0] = _PW_KEYBYUID;
372 keyuid = uid;
373 bcopy(&keyuid, bf + 1, sizeof(keyuid));
374 key.data = (u_char *)bf;
375 key.size = sizeof(keyuid) + 1;
376 rval = __hashpw(&key);
377
378 if (!_pw_stayopen) {
379 (void)(_pw_db->close)(_pw_db);
380 _pw_db = (DB *)NULL;
381 }
382 return(rval ? &_pw_passwd : (struct passwd *)NULL);
383 }
384
385 int
386 setpassent(stayopen)
387 int stayopen;
388 {
389 _pw_keynum = 0;
390 _pw_stayopen = stayopen;
391 #ifdef YP
392 __ypmode = 0;
393 if(__ypcurrent)
394 free(__ypcurrent);
395 __ypcurrent = NULL;
396 #endif
397 return(1);
398 }
399
400 void
401 setpwent()
402 {
403 (void) setpassent(0);
404 }
405
406 void
407 endpwent()
408 {
409 _pw_keynum = 0;
410 if (_pw_db) {
411 (void)(_pw_db->close)(_pw_db);
412 _pw_db = (DB *)NULL;
413 }
414 #ifdef YP
415 __ypmode = 0;
416 if(__ypcurrent)
417 free(__ypcurrent);
418 __ypcurrent = NULL;
419 #endif
420 }
421
422 static int
423 __initdb()
424 {
425 static int warned;
426 char *p;
427
428 p = (geteuid()) ? _PATH_MP_DB : _PATH_SMP_DB;
429 _pw_db = dbopen(p, O_RDONLY, 0, DB_HASH, NULL);
430 if (_pw_db)
431 return(1);
432 if (!warned)
433 syslog(LOG_ERR, "%s: %m", p);
434 warned = 1;
435 return(0);
436 }
437
438 static int
439 __hashpw(key)
440 DBT *key;
441 {
442 register char *p, *t;
443 static u_int max;
444 static char *line;
445 DBT data;
446
447 if ((_pw_db->get)(_pw_db, key, &data, 0))
448 return(0);
449 p = (char *)data.data;
450 if (data.size > max && !(line = realloc(line, max += 1024)))
451 return(0);
452
453 t = line;
454 #define EXPAND(e) e = t; while (*t++ = *p++);
455 EXPAND(_pw_passwd.pw_name);
456 EXPAND(_pw_passwd.pw_passwd);
457 bcopy(p, (char *)&_pw_passwd.pw_uid, sizeof(int));
458 p += sizeof(int);
459 bcopy(p, (char *)&_pw_passwd.pw_gid, sizeof(int));
460 p += sizeof(int);
461 bcopy(p, (char *)&_pw_passwd.pw_change, sizeof(time_t));
462 p += sizeof(time_t);
463 EXPAND(_pw_passwd.pw_class);
464 EXPAND(_pw_passwd.pw_gecos);
465 EXPAND(_pw_passwd.pw_dir);
466 EXPAND(_pw_passwd.pw_shell);
467 bcopy(p, (char *)&_pw_passwd.pw_expire, sizeof(time_t));
468 p += sizeof(time_t);
469 return(1);
470 }
471