Home | History | Annotate | Line # | Download | only in gen
getpwent.c revision 1.61
      1 /*	$NetBSD: getpwent.c,v 1.61 2004/10/24 14:46:23 lukem Exp $	*/
      2 
      3 /*-
      4  * Copyright (c) 1997-2000, 2004 The NetBSD Foundation, Inc.
      5  * All rights reserved.
      6  *
      7  * This code is derived from software contributed to The NetBSD Foundation
      8  * by Luke Mewburn.
      9  *
     10  * Redistribution and use in source and binary forms, with or without
     11  * modification, are permitted provided that the following conditions
     12  * are met:
     13  * 1. Redistributions of source code must retain the above copyright
     14  *    notice, this list of conditions and the following disclaimer.
     15  * 2. Redistributions in binary form must reproduce the above copyright
     16  *    notice, this list of conditions and the following disclaimer in the
     17  *    documentation and/or other materials provided with the distribution.
     18  * 3. All advertising materials mentioning features or use of this software
     19  *    must display the following acknowledgement:
     20  *	This product includes software developed by the NetBSD
     21  *	Foundation, Inc. and its contributors.
     22  * 4. Neither the name of The NetBSD Foundation nor the names of its
     23  *    contributors may be used to endorse or promote products derived
     24  *    from this software without specific prior written permission.
     25  *
     26  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
     27  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
     28  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
     29  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
     30  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
     31  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
     32  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
     33  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
     34  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
     35  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
     36  * POSSIBILITY OF SUCH DAMAGE.
     37  */
     38 
     39 /*
     40  * Copyright (c) 1988, 1993
     41  *	The Regents of the University of California.  All rights reserved.
     42  *
     43  * Redistribution and use in source and binary forms, with or without
     44  * modification, are permitted provided that the following conditions
     45  * are met:
     46  * 1. Redistributions of source code must retain the above copyright
     47  *    notice, this list of conditions and the following disclaimer.
     48  * 2. Redistributions in binary form must reproduce the above copyright
     49  *    notice, this list of conditions and the following disclaimer in the
     50  *    documentation and/or other materials provided with the distribution.
     51  * 3. Neither the name of the University nor the names of its contributors
     52  *    may be used to endorse or promote products derived from this software
     53  *    without specific prior written permission.
     54  *
     55  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
     56  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
     57  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
     58  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
     59  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
     60  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
     61  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
     62  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
     63  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
     64  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
     65  * SUCH DAMAGE.
     66  */
     67 
     68 /*
     69  * Portions Copyright (c) 1994, 1995, Jason Downs.  All rights reserved.
     70  *
     71  * Redistribution and use in source and binary forms, with or without
     72  * modification, are permitted provided that the following conditions
     73  * are met:
     74  * 1. Redistributions of source code must retain the above copyright
     75  *    notice, this list of conditions and the following disclaimer.
     76  * 2. Redistributions in binary form must reproduce the above copyright
     77  *    notice, this list of conditions and the following disclaimer in the
     78  *    documentation and/or other materials provided with the distribution.
     79  *
     80  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR(S) ``AS IS'' AND ANY EXPRESS
     81  * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
     82  * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
     83  * DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR(S) BE LIABLE FOR ANY DIRECT,
     84  * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
     85  * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
     86  * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
     87  * CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
     88  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
     89  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
     90  * SUCH DAMAGE.
     91  */
     92 
     93 #include <sys/cdefs.h>
     94 #if defined(LIBC_SCCS) && !defined(lint)
     95 #if 0
     96 static char sccsid[] = "@(#)getpwent.c	8.2 (Berkeley) 4/27/95";
     97 #else
     98 __RCSID("$NetBSD: getpwent.c,v 1.61 2004/10/24 14:46:23 lukem Exp $");
     99 #endif
    100 #endif /* LIBC_SCCS and not lint */
    101 
    102 #include "namespace.h"
    103 #include <sys/param.h>
    104 
    105 #include <assert.h>
    106 #include <db.h>
    107 #include <errno.h>
    108 #include <fcntl.h>
    109 #include <limits.h>
    110 #include <netgroup.h>
    111 #include <nsswitch.h>
    112 #include <pwd.h>
    113 #include <stdarg.h>
    114 #include <stdio.h>
    115 #include <stdlib.h>
    116 #include <string.h>
    117 #include <syslog.h>
    118 #include <threadlib.h>
    119 #include <unistd.h>
    120 
    121 #ifdef HESIOD
    122 #include <hesiod.h>
    123 #endif
    124 
    125 #ifdef YP
    126 #include <machine/param.h>
    127 #include <rpc/rpc.h>
    128 #include <rpcsvc/yp_prot.h>
    129 #include <rpcsvc/ypclnt.h>
    130 #endif
    131 
    132 #include "pw_private.h"
    133 
    134 #define	_PASSWD_COMPAT	/* "passwd" defaults to compat, so always provide it */
    135 
    136 #define	GETPW_R_SIZE_MAX	1024	/* XXXLUKEM: move to {pwd,unistd}.h ? */
    137 
    138 #ifdef __weak_alias
    139 __weak_alias(endpwent,_endpwent)
    140 __weak_alias(getpwent,_getpwent)
    141 __weak_alias(getpwnam,_getpwnam)
    142 __weak_alias(getpwnam_r,_getpwnam_r)
    143 __weak_alias(getpwuid,_getpwuid)
    144 __weak_alias(getpwuid_r,_getpwuid_r)
    145 __weak_alias(setpassent,_setpassent)
    146 __weak_alias(setpwent,_setpwent)
    147 #endif
    148 
    149 #ifdef _REENTRANT
    150 static 	mutex_t			_pwmutex = MUTEX_INITIALIZER;
    151 #endif
    152 
    153 const char __yp_token[] = "__YP!";	/* Let pwd_mkdb pull this in. */
    154 
    155 static const ns_src defaultcompat[] = {
    156 	{ NSSRC_FILES,	NS_SUCCESS },
    157 	{ 0 }
    158 };
    159 
    160 static const ns_src defaultcompat_forceall[] = {
    161 	{ NSSRC_FILES,	NS_SUCCESS | NS_FORCEALL },
    162 	{ 0 }
    163 };
    164 
    165 static const ns_src defaultnis[] = {
    166 	{ NSSRC_NIS,	NS_SUCCESS },
    167 	{ 0 }
    168 };
    169 
    170 static const ns_src defaultnis_forceall[] = {
    171 	{ NSSRC_NIS,	NS_SUCCESS | NS_FORCEALL },
    172 	{ 0 }
    173 };
    174 
    175 
    176 /*
    177  * The pwd.db lookup techniques and data extraction code here must be kept
    178  * in sync with that in `pwd_mkdb'.
    179  */
    180 
    181 #if defined(YP) || defined(HESIOD)
    182 /*
    183  * _pw_parse
    184  *	Parses entry using pw_scan(3) (without the trailing \n)
    185  *	after copying to buf, and fills in pw with corresponding values.
    186  *	If old is non-zero, entry is in _PASSWORD_OLDFMT.
    187  *	Returns 1 if parsed successfully, 0 on parse failure.
    188  */
    189 static int
    190 _pw_parse(const char *entry, struct passwd *pw, char *buf, size_t buflen,
    191 	int old)
    192 {
    193 	int	flags;
    194 
    195 	_DIAGASSERT(entry != NULL);
    196 	_DIAGASSERT(pw != NULL);
    197 	_DIAGASSERT(buf != NULL);
    198 
    199 	if (strlcpy(buf, entry, buflen) >= buflen)
    200 		return 0;
    201 	flags = _PASSWORD_NOWARN;
    202 	if (old)
    203 		flags |= _PASSWORD_OLDFMT;
    204 	return __pw_scan(buf, pw, &flags);
    205 }
    206 #endif /* YP || HESIOD */
    207 
    208 /*
    209  * _pw_opendb
    210  *	if *db is NULL, dbopen(3) /etc/spwd.db or /etc/pwd.db (depending
    211  *	upon permissions, etc)
    212  */
    213 static int
    214 _pw_opendb(DB **db)
    215 {
    216 	static int	warned;
    217 
    218 	const char	*dbfile;
    219 
    220 	_DIAGASSERT(db != NULL);
    221 	if (*db != NULL)					/* open *db */
    222 		return NS_SUCCESS;
    223 
    224 	if (geteuid() == 0) {
    225 		dbfile = _PATH_SMP_DB;
    226 		*db = dbopen(dbfile, O_RDONLY, 0, DB_HASH, NULL);
    227 	}
    228 	if (*db == NULL) {
    229 		dbfile = _PATH_MP_DB;
    230 		*db = dbopen(dbfile, O_RDONLY, 0, DB_HASH, NULL);
    231 	}
    232 	if (*db == NULL) {
    233 		if (!warned) {
    234 			int	serrno = errno;
    235 			syslog(LOG_ERR, "%s: %m", dbfile);
    236 			errno = serrno;
    237 		}
    238 		warned = 1;
    239 		return NS_UNAVAIL;
    240 	}
    241 	return NS_SUCCESS;
    242 }
    243 
    244 /*
    245  * _pw_getkey
    246  *	Lookup key in *db, filling in pw
    247  *	with the result, allocating memory from buffer (size buflen).
    248  *	(The caller may point key.data to buffer on entry; the contents
    249  *	of key.data will be invalid on exit.)
    250  */
    251 static int
    252 _pw_getkey(DB *db, DBT *key,
    253 	struct passwd *pw, char *buffer, size_t buflen, int *pwflags)
    254 {
    255 	char		*p, *t;
    256 	DBT		data;
    257 
    258 	_DIAGASSERT(db != NULL);
    259 	_DIAGASSERT(key != NULL);
    260 	_DIAGASSERT(pw != NULL);
    261 	_DIAGASSERT(buffer != NULL);
    262 	/* pwflags may be NULL (if we don't care about them */
    263 
    264 	if (db == NULL)			/* this shouldn't happen */
    265 		return NS_UNAVAIL;
    266 
    267 	switch ((db->get)(db, key, &data, 0)) {
    268 	case 0:
    269 		break;			/* found */
    270 	case 1:
    271 		return NS_NOTFOUND;
    272 	case -1:
    273 		return NS_UNAVAIL;	/* error in db routines */
    274 	default:
    275 		abort();
    276 	}
    277 
    278 	p = (char *)data.data;
    279 	if (data.size > buflen) {
    280 		errno = ERANGE;
    281 		return NS_UNAVAIL;
    282 	}
    283 
    284 			/*
    285 			 * THE DECODING BELOW MUST MATCH THAT IN pwd_mkdb.
    286 			 */
    287 	t = buffer;
    288 #define	EXPAND(e)	e = t; while ((*t++ = *p++));
    289 #define	SCALAR(v)	memmove(&(v), p, sizeof v); p += sizeof v
    290 	EXPAND(pw->pw_name);
    291 	EXPAND(pw->pw_passwd);
    292 	SCALAR(pw->pw_uid);
    293 	SCALAR(pw->pw_gid);
    294 	SCALAR(pw->pw_change);
    295 	EXPAND(pw->pw_class);
    296 	EXPAND(pw->pw_gecos);
    297 	EXPAND(pw->pw_dir);
    298 	EXPAND(pw->pw_shell);
    299 	SCALAR(pw->pw_expire);
    300 	if (pwflags) {
    301 		/* See if there's any data left.  If so, read in flags. */
    302 		if (data.size > (size_t) (p - (char *)data.data)) {
    303 			SCALAR(*pwflags);
    304 		} else {				/* default */
    305 			*pwflags = _PASSWORD_NOUID|_PASSWORD_NOGID;
    306 		}
    307 	}
    308 
    309 	return NS_SUCCESS;
    310 }
    311 
    312 /*
    313  * _pw_memfrombuf
    314  *	Obtain want bytes from buffer (of size buflen) and return a pointer
    315  *	to the available memory after adjusting buffer/buflen.
    316  *	Returns NULL if there is insufficient space.
    317  */
    318 static char *
    319 _pw_memfrombuf(size_t want, char **buffer, size_t *buflen)
    320 {
    321 	char	*rv;
    322 
    323 	if (want > *buflen) {
    324 		errno = ERANGE;
    325 		return NULL;
    326 	}
    327 	rv = *buffer;
    328 	*buffer += want;
    329 	*buflen -= want;
    330 	return rv;
    331 }
    332 
    333 /*
    334  * _pw_copy
    335  *	Copy the contents of frompw to pw; memory for strings
    336  *	and arrays will be allocated from buf (of size buflen).
    337  *	If proto != NULL, use various fields in proto in preference to frompw.
    338  *	Returns 1 if copied successfully, 0 on copy failure.
    339  *	NOTE: frompw must not use buf for its own pointers.
    340  */
    341 static int
    342 _pw_copy(const struct passwd *frompw, struct passwd *pw,
    343 	char *buf, size_t buflen, const struct passwd *protopw, int protoflags)
    344 {
    345 	size_t	count;
    346 	int	useproto;
    347 
    348 	_DIAGASSERT(frompw != NULL);
    349 	_DIAGASSERT(pw != NULL);
    350 	_DIAGASSERT(buf != NULL);
    351 	/* protopw may be NULL */
    352 
    353 	useproto = protopw && protopw->pw_name;
    354 
    355 #define	COPYSTR(to, from) \
    356 	do { \
    357 		count = strlen((from)); \
    358 		(to) = _pw_memfrombuf(count+1, &buf, &buflen); \
    359 		if ((to) == NULL) \
    360 			return 0; \
    361 		memmove((to), (from), count); \
    362 		to[count] = '\0'; \
    363 	} while (0)	/* LINTED */
    364 
    365 #define	COPYFIELD(field)	COPYSTR(pw->field, frompw->field)
    366 
    367 #define	COPYPROTOFIELD(field)	COPYSTR(pw->field, \
    368 		(useproto && *protopw->field ? protopw->field : frompw->field))
    369 
    370 	COPYFIELD(pw_name);
    371 
    372 #ifdef PW_OVERRIDE_PASSWD
    373 	COPYPROTOFIELD(pw_passwd);
    374 #else
    375 	COPYFIELD(pw_passwd);
    376 #endif
    377 
    378 	if (useproto && !(protoflags & _PASSWORD_NOUID))
    379 		pw->pw_uid = protopw->pw_uid;
    380 	else
    381 		pw->pw_uid = frompw->pw_uid;
    382 
    383 	if (useproto && !(protoflags & _PASSWORD_NOGID))
    384 		pw->pw_gid = protopw->pw_gid;
    385 	else
    386 		pw->pw_gid = frompw->pw_gid;
    387 
    388 	pw->pw_change = frompw->pw_change;
    389 	COPYFIELD(pw_class);
    390 	COPYPROTOFIELD(pw_gecos);
    391 	COPYPROTOFIELD(pw_dir);
    392 	COPYPROTOFIELD(pw_shell);
    393 
    394 #undef COPYSTR
    395 #undef COPYFIELD
    396 #undef COPYPROTOFIELD
    397 
    398 	return 1;
    399 }
    400 
    401 
    402 		/*
    403 		 *	files methods
    404 		 */
    405 
    406 	/* state shared between files methods */
    407 struct files_state {
    408 	int	 stayopen;		/* see getpassent(3) */
    409 	DB	*db;			/* passwd file handle */
    410 	int	 keynum;		/* key counter, -1 if no more */
    411 };
    412 
    413 static struct files_state	_files_state;
    414 					/* storage for non _r functions */
    415 static struct passwd		_files_passwd;
    416 static char			_files_passwdbuf[GETPW_R_SIZE_MAX];
    417 
    418 static int
    419 _files_start(struct files_state *state)
    420 {
    421 	int	rv;
    422 
    423 	_DIAGASSERT(state != NULL);
    424 
    425 	state->keynum = 0;
    426 	rv = _pw_opendb(&state->db);
    427 	if (rv != NS_SUCCESS)
    428 		return rv;
    429 	return NS_SUCCESS;
    430 }
    431 
    432 static int
    433 _files_end(struct files_state *state)
    434 {
    435 
    436 	_DIAGASSERT(state != NULL);
    437 
    438 	state->keynum = 0;
    439 	if (state->db) {
    440 		(void)(state->db->close)(state->db);
    441 		state->db = NULL;
    442 	}
    443 	return NS_SUCCESS;
    444 }
    445 
    446 /*
    447  * _files_pwscan
    448  *	Search state->db for the next desired entry.
    449  *	If search is _PW_KEYBYNUM, look for state->keynum.
    450  *	If search is _PW_KEYBYNAME, look for name.
    451  *	If search is _PW_KEYBYUID, look for uid.
    452  *	Sets *retval to the errno if the result is not NS_SUCCESS.
    453  */
    454 static int
    455 _files_pwscan(int *retval, struct passwd *pw, char *buffer, size_t buflen,
    456 	struct files_state *state, int search, const char *name, uid_t uid)
    457 {
    458 	const void	*from;
    459 	size_t		 fromlen;
    460 	DBT		 key;
    461 	int		 rv;
    462 
    463 	_DIAGASSERT(retval != NULL);
    464 	_DIAGASSERT(pw != NULL);
    465 	_DIAGASSERT(buffer != NULL);
    466 	_DIAGASSERT(state != NULL);
    467 	/* name is NULL to indicate searching for uid */
    468 
    469 	*retval = 0;
    470 
    471 	if (state->db == NULL) {	/* only start if file not open yet */
    472 		rv = _files_start(state);
    473 		if (rv != NS_SUCCESS)
    474 			goto filespwscan_out;
    475 	}
    476 
    477 	for (;;) {				/* search for a match */
    478 		switch (search) {
    479 		case _PW_KEYBYNUM:
    480 			if (state->keynum == -1)
    481 				return NS_NOTFOUND;	/* no more records */
    482 			state->keynum++;
    483 			from = &state->keynum;
    484 			fromlen = sizeof(state->keynum);
    485 			break;
    486 		case _PW_KEYBYNAME:
    487 			from = name;
    488 			fromlen = strlen(name);
    489 			break;
    490 		case _PW_KEYBYUID:
    491 			from = &uid;
    492 			fromlen = sizeof(uid);
    493 			break;
    494 		default:
    495 			abort();
    496 		}
    497 
    498 		if (buflen <= fromlen) {		/* buffer too small */
    499 			*retval = ERANGE;
    500 			return NS_UNAVAIL;
    501 		}
    502 		buffer[0] = search;			/* setup key */
    503 		memmove(buffer + 1, from, fromlen);
    504 		key.size = fromlen + 1;
    505 		key.data = (u_char *)buffer;
    506 
    507 							/* search for key */
    508 		rv = _pw_getkey(state->db, &key, pw, buffer, buflen, NULL);
    509 		if (rv != NS_SUCCESS)			/* no match */
    510 			break;
    511 		if (pw->pw_name[0] == '+' || pw->pw_name[0] == '-') {
    512 						/* if a compat line */
    513 			if (search == _PW_KEYBYNUM)
    514 				continue;	/* read next if pwent */
    515 			rv = NS_NOTFOUND;	/* don't match if pw{nam,uid} */
    516 			break;
    517 		}
    518 		break;
    519 	}
    520 
    521 	if (rv == NS_NOTFOUND && search == _PW_KEYBYNUM)
    522 		state->keynum = -1;		/* flag `no more records' */
    523 
    524 	if (rv == NS_SUCCESS) {
    525 		if ((search == _PW_KEYBYUID && pw->pw_uid != uid) ||
    526 		    (search == _PW_KEYBYNAME && strcmp(pw->pw_name, name) != 0))
    527 			rv = NS_NOTFOUND;
    528 	}
    529 
    530  filespwscan_out:
    531 	if (rv != NS_SUCCESS)
    532 		*retval = errno;
    533 	return rv;
    534 }
    535 
    536 /*ARGSUSED*/
    537 static int
    538 _files_setpwent(void *nsrv, void *nscb, va_list ap)
    539 {
    540 
    541 	_files_state.stayopen = 0;
    542 	return _files_start(&_files_state);
    543 }
    544 
    545 /*ARGSUSED*/
    546 static int
    547 _files_setpassent(void *nsrv, void *nscb, va_list ap)
    548 {
    549 	int	*retval		= va_arg(ap, int *);
    550 	int	 stayopen	= va_arg(ap, int);
    551 
    552 	int	rv;
    553 
    554 	_files_state.stayopen = stayopen;
    555 	rv = _files_start(&_files_state);
    556 	*retval = (rv == NS_SUCCESS);
    557 	return rv;
    558 }
    559 
    560 /*ARGSUSED*/
    561 static int
    562 _files_endpwent(void *nsrv, void *nscb, va_list ap)
    563 {
    564 
    565 	_files_state.stayopen = 0;
    566 	return _files_end(&_files_state);
    567 }
    568 
    569 /*ARGSUSED*/
    570 static int
    571 _files_getpwent(void *nsrv, void *nscb, va_list ap)
    572 {
    573 	struct passwd	**retval = va_arg(ap, struct passwd **);
    574 
    575 	int	rv, rerror;
    576 
    577 	_DIAGASSERT(retval != NULL);
    578 
    579 	*retval = NULL;
    580 	rv = _files_pwscan(&rerror, &_files_passwd,
    581 	    _files_passwdbuf, sizeof(_files_passwdbuf),
    582 	    &_files_state, _PW_KEYBYNUM, NULL, 0);
    583 	if (rv == NS_SUCCESS)
    584 		*retval = &_files_passwd;
    585 	return rv;
    586 }
    587 
    588 /*ARGSUSED*/
    589 static int
    590 _files_getpwnam(void *nsrv, void *nscb, va_list ap)
    591 {
    592 	struct passwd	**retval = va_arg(ap, struct passwd **);
    593 	const char	*name	= va_arg(ap, const char *);
    594 
    595 	int	rv, rerror;
    596 
    597 	_DIAGASSERT(retval != NULL);
    598 
    599 	*retval = NULL;
    600 	rv = _files_start(&_files_state);
    601 	if (rv != NS_SUCCESS)
    602 		return rv;
    603 	rv = _files_pwscan(&rerror, &_files_passwd,
    604 	    _files_passwdbuf, sizeof(_files_passwdbuf),
    605 	    &_files_state, _PW_KEYBYNAME, name, 0);
    606 	if (!_files_state.stayopen)
    607 		_files_end(&_files_state);
    608 	if (rv == NS_SUCCESS)
    609 		*retval = &_files_passwd;
    610 	return rv;
    611 }
    612 
    613 /*ARGSUSED*/
    614 static int
    615 _files_getpwnam_r(void *nsrv, void *nscb, va_list ap)
    616 {
    617 	int		*retval	= va_arg(ap, int *);
    618 	const char	*name	= va_arg(ap, const char *);
    619 	struct passwd	*pw	= va_arg(ap, struct passwd *);
    620 	char		*buffer	= va_arg(ap, char *);
    621 	size_t		 buflen	= va_arg(ap, size_t);
    622 	struct passwd  **result	= va_arg(ap, struct passwd **);
    623 
    624 	struct files_state state;
    625 	int	rv;
    626 
    627 	_DIAGASSERT(retval != NULL);
    628 	_DIAGASSERT(pw != NULL);
    629 	_DIAGASSERT(buffer != NULL);
    630 	_DIAGASSERT(result != NULL);
    631 
    632 	*result = NULL;
    633 	memset(&state, 0, sizeof(state));
    634 	rv = _files_pwscan(retval, pw, buffer, buflen, &state,
    635 	    _PW_KEYBYNAME, name, 0);
    636 	_files_end(&state);
    637 	if (rv == NS_SUCCESS)
    638 		*result = pw;
    639 	return rv;
    640 }
    641 
    642 /*ARGSUSED*/
    643 static int
    644 _files_getpwuid(void *nsrv, void *nscb, va_list ap)
    645 {
    646 	struct passwd	**retval = va_arg(ap, struct passwd **);
    647 	uid_t		 uid	= va_arg(ap, uid_t);
    648 
    649 	int	rv, rerror;
    650 
    651 	_DIAGASSERT(retval != NULL);
    652 
    653 	*retval = NULL;
    654 	rv = _files_start(&_files_state);
    655 	if (rv != NS_SUCCESS)
    656 		return rv;
    657 	rv = _files_pwscan(&rerror, &_files_passwd,
    658 	    _files_passwdbuf, sizeof(_files_passwdbuf),
    659 	    &_files_state, _PW_KEYBYUID, NULL, uid);
    660 	if (!_files_state.stayopen)
    661 		_files_end(&_files_state);
    662 	if (rv == NS_SUCCESS)
    663 		*retval = &_files_passwd;
    664 	return rv;
    665 }
    666 
    667 /*ARGSUSED*/
    668 static int
    669 _files_getpwuid_r(void *nsrv, void *nscb, va_list ap)
    670 {
    671 	int		*retval	= va_arg(ap, int *);
    672 	uid_t		 uid	= va_arg(ap, uid_t);
    673 	struct passwd	*pw	= va_arg(ap, struct passwd *);
    674 	char		*buffer	= va_arg(ap, char *);
    675 	size_t		 buflen	= va_arg(ap, size_t);
    676 	struct passwd  **result	= va_arg(ap, struct passwd **);
    677 
    678 	struct files_state state;
    679 	int	rv;
    680 
    681 	_DIAGASSERT(retval != NULL);
    682 	_DIAGASSERT(pw != NULL);
    683 	_DIAGASSERT(buffer != NULL);
    684 	_DIAGASSERT(result != NULL);
    685 
    686 	*result = NULL;
    687 	memset(&state, 0, sizeof(state));
    688 	rv = _files_pwscan(retval, pw, buffer, buflen, &state,
    689 	    _PW_KEYBYUID, NULL, uid);
    690 	_files_end(&state);
    691 	if (rv == NS_SUCCESS)
    692 		*result = pw;
    693 	return rv;
    694 }
    695 
    696 
    697 #ifdef HESIOD
    698 		/*
    699 		 *	dns methods
    700 		 */
    701 
    702 	/* state shared between dns methods */
    703 struct dns_state {
    704 	int	 stayopen;		/* see getpassent(3) */
    705 	void	*context;		/* Hesiod context */
    706 	int	 num;			/* passwd index, -1 if no more */
    707 };
    708 
    709 static struct dns_state		_dns_state;
    710 					/* storage for non _r functions */
    711 static struct passwd		_dns_passwd;
    712 static char			_dns_passwdbuf[GETPW_R_SIZE_MAX];
    713 
    714 static int
    715 _dns_start(struct dns_state *state)
    716 {
    717 
    718 	_DIAGASSERT(state != NULL);
    719 
    720 	state->num = 0;
    721 	if (state->context == NULL) {			/* setup Hesiod */
    722 		if (hesiod_init(&state->context) == -1)
    723 			return NS_UNAVAIL;
    724 	}
    725 
    726 	return NS_SUCCESS;
    727 }
    728 
    729 static int
    730 _dns_end(struct dns_state *state)
    731 {
    732 
    733 	_DIAGASSERT(state != NULL);
    734 
    735 	state->num = 0;
    736 	if (state->context) {
    737 		hesiod_end(state->context);
    738 		state->context = NULL;
    739 	}
    740 	return NS_SUCCESS;
    741 }
    742 
    743 /*
    744  * _dns_pwscan
    745  *	Look for the Hesiod name provided in buffer in the NULL-terminated
    746  *	list of zones,
    747  *	and decode into pw/buffer/buflen.
    748  */
    749 static int
    750 _dns_pwscan(int *retval, struct passwd *pw, char *buffer, size_t buflen,
    751 	struct dns_state *state, const char **zones)
    752 {
    753 	const char	**curzone;
    754 	char		**hp, *ep;
    755 	int		rv;
    756 
    757 	_DIAGASSERT(retval != NULL);
    758 	_DIAGASSERT(pw != NULL);
    759 	_DIAGASSERT(buffer != NULL);
    760 	_DIAGASSERT(state != NULL);
    761 	_DIAGASSERT(zones != NULL);
    762 
    763 	*retval = 0;
    764 
    765 	if (state->context == NULL) {	/* only start if Hesiod not setup */
    766 		rv = _dns_start(state);
    767 		if (rv != NS_SUCCESS)
    768 			return rv;
    769 	}
    770 
    771 	hp = NULL;
    772 	rv = NS_NOTFOUND;
    773 
    774 	for (curzone = zones; *curzone; curzone++) {	/* search zones */
    775 		hp = hesiod_resolve(state->context, buffer, *curzone);
    776 		if (hp != NULL)
    777 			break;
    778 		if (errno != ENOENT) {
    779 			rv = NS_UNAVAIL;
    780 			goto dnspwscan_out;
    781 		}
    782 	}
    783 	if (*curzone == NULL)
    784 		goto dnspwscan_out;
    785 
    786 	if ((ep = strchr(hp[0], '\n')) != NULL)
    787 		*ep = '\0';				/* clear trailing \n */
    788 	if (_pw_parse(hp[0], pw, buffer, buflen, 1))	/* validate line */
    789 		rv = NS_SUCCESS;
    790 	else
    791 		rv = NS_UNAVAIL;
    792 
    793  dnspwscan_out:
    794 	if (rv != NS_SUCCESS)
    795 		*retval = errno;
    796 	if (hp)
    797 		hesiod_free_list(state->context, hp);
    798 	return rv;
    799 }
    800 
    801 /*ARGSUSED*/
    802 static int
    803 _dns_setpwent(void *nsrv, void *nscb, va_list ap)
    804 {
    805 
    806 	_dns_state.stayopen = 0;
    807 	return _dns_start(&_dns_state);
    808 }
    809 
    810 /*ARGSUSED*/
    811 static int
    812 _dns_setpassent(void *nsrv, void *nscb, va_list ap)
    813 {
    814 	int	*retval		= va_arg(ap, int *);
    815 	int	 stayopen	= va_arg(ap, int);
    816 
    817 	int	rv;
    818 
    819 	_dns_state.stayopen = stayopen;
    820 	rv = _dns_start(&_dns_state);
    821 	*retval = (rv == NS_SUCCESS);
    822 	return rv;
    823 }
    824 
    825 /*ARGSUSED*/
    826 static int
    827 _dns_endpwent(void *nsrv, void *nscb, va_list ap)
    828 {
    829 
    830 	_dns_state.stayopen = 0;
    831 	return _dns_end(&_dns_state);
    832 }
    833 
    834 /*ARGSUSED*/
    835 static int
    836 _dns_getpwent(void *nsrv, void *nscb, va_list ap)
    837 {
    838 	struct passwd	**retval = va_arg(ap, struct passwd **);
    839 
    840 	char	**hp, *ep;
    841 	int	  rv;
    842 
    843 	_DIAGASSERT(retval != NULL);
    844 
    845 	*retval = NULL;
    846 
    847 	if (_dns_state.num == -1)			/* exhausted search */
    848 		return NS_NOTFOUND;
    849 
    850 	if (_dns_state.context == NULL) {
    851 			/* only start if Hesiod not setup */
    852 		rv = _dns_start(&_dns_state);
    853 		if (rv != NS_SUCCESS)
    854 			return rv;
    855 	}
    856 
    857 	hp = NULL;
    858 	rv = NS_NOTFOUND;
    859 
    860 							/* find passwd-NNN */
    861 	snprintf(_dns_passwdbuf, sizeof(_dns_passwdbuf),
    862 	    "passwd-%u", _dns_state.num);
    863 	_dns_state.num++;
    864 
    865 	hp = hesiod_resolve(_dns_state.context, _dns_passwdbuf, "passwd");
    866 	if (hp == NULL) {
    867 		if (errno == ENOENT)
    868 			_dns_state.num = -1;
    869 		else
    870 			rv = NS_UNAVAIL;
    871 	} else {
    872 		if ((ep = strchr(hp[0], '\n')) != NULL)
    873 			*ep = '\0';			/* clear trailing \n */
    874 							/* validate line */
    875 		if (_pw_parse(hp[0], &_dns_passwd,
    876 		    _dns_passwdbuf, sizeof(_dns_passwdbuf), 1))
    877 			rv = NS_SUCCESS;
    878 		else
    879 			rv = NS_UNAVAIL;
    880 	}
    881 
    882 	if (hp)
    883 		hesiod_free_list(_dns_state.context, hp);
    884 	if (rv == NS_SUCCESS)
    885 		*retval = &_dns_passwd;
    886 	return rv;
    887 }
    888 
    889 static const char *_dns_uid_zones[] = {
    890 	"uid",
    891 	"passwd",
    892 	NULL
    893 };
    894 
    895 /*ARGSUSED*/
    896 static int
    897 _dns_getpwuid(void *nsrv, void *nscb, va_list ap)
    898 {
    899 	struct passwd	**retval = va_arg(ap, struct passwd **);
    900 	uid_t		 uid	= va_arg(ap, uid_t);
    901 
    902 	int	rv, rerror;
    903 
    904 	_DIAGASSERT(retval != NULL);
    905 
    906 	*retval = NULL;
    907 	rv = _dns_start(&_dns_state);
    908 	if (rv != NS_SUCCESS)
    909 		return rv;
    910 	snprintf(_dns_passwdbuf, sizeof(_dns_passwdbuf),
    911 	    "%u", (unsigned int)uid);
    912 	rv = _dns_pwscan(&rerror, &_dns_passwd,
    913 	    _dns_passwdbuf, sizeof(_dns_passwdbuf),
    914 	    &_dns_state, _dns_uid_zones);
    915 	if (!_dns_state.stayopen)
    916 		_dns_end(&_dns_state);
    917 	if (rv == NS_SUCCESS && uid == _dns_passwd.pw_uid)
    918 		*retval = &_dns_passwd;
    919 	return rv;
    920 }
    921 
    922 /*ARGSUSED*/
    923 static int
    924 _dns_getpwuid_r(void *nsrv, void *nscb, va_list ap)
    925 {
    926 	int		*retval	= va_arg(ap, int *);
    927 	uid_t		 uid	= va_arg(ap, uid_t);
    928 	struct passwd	*pw	= va_arg(ap, struct passwd *);
    929 	char		*buffer	= va_arg(ap, char *);
    930 	size_t		 buflen	= va_arg(ap, size_t);
    931 	struct passwd  **result	= va_arg(ap, struct passwd **);
    932 
    933 	struct dns_state state;
    934 	int	rv;
    935 
    936 	_DIAGASSERT(retval != NULL);
    937 	_DIAGASSERT(pw != NULL);
    938 	_DIAGASSERT(buffer != NULL);
    939 	_DIAGASSERT(result != NULL);
    940 
    941 	*result = NULL;
    942 	memset(&state, 0, sizeof(state));
    943 	snprintf(buffer, buflen, "%u", (unsigned int)uid);
    944 	rv = _dns_pwscan(retval, pw, buffer, buflen, &state, _dns_uid_zones);
    945 	_dns_end(&state);
    946 	if (rv != NS_SUCCESS)
    947 		return rv;
    948 	if (uid == pw->pw_uid) {
    949 		*result = pw;
    950 		return NS_SUCCESS;
    951 	} else
    952 		return NS_NOTFOUND;
    953 }
    954 
    955 static const char *_dns_nam_zones[] = {
    956 	"passwd",
    957 	NULL
    958 };
    959 
    960 /*ARGSUSED*/
    961 static int
    962 _dns_getpwnam(void *nsrv, void *nscb, va_list ap)
    963 {
    964 	struct passwd	**retval = va_arg(ap, struct passwd **);
    965 	const char	*name	= va_arg(ap, const char *);
    966 
    967 	int	rv, rerror;
    968 
    969 	_DIAGASSERT(retval != NULL);
    970 
    971 	*retval = NULL;
    972 	rv = _dns_start(&_dns_state);
    973 	if (rv != NS_SUCCESS)
    974 		return rv;
    975 	snprintf(_dns_passwdbuf, sizeof(_dns_passwdbuf), "%s", name);
    976 	rv = _dns_pwscan(&rerror, &_dns_passwd,
    977 	    _dns_passwdbuf, sizeof(_dns_passwdbuf),
    978 	    &_dns_state, _dns_nam_zones);
    979 	if (!_dns_state.stayopen)
    980 		_dns_end(&_dns_state);
    981 	if (rv == NS_SUCCESS && strcmp(name, _dns_passwd.pw_name) == 0)
    982 		*retval = &_dns_passwd;
    983 	return rv;
    984 }
    985 
    986 /*ARGSUSED*/
    987 static int
    988 _dns_getpwnam_r(void *nsrv, void *nscb, va_list ap)
    989 {
    990 	int		*retval	= va_arg(ap, int *);
    991 	const char	*name	= va_arg(ap, const char *);
    992 	struct passwd	*pw	= va_arg(ap, struct passwd *);
    993 	char		*buffer	= va_arg(ap, char *);
    994 	size_t		 buflen	= va_arg(ap, size_t);
    995 	struct passwd  **result	= va_arg(ap, struct passwd **);
    996 
    997 	struct dns_state state;
    998 	int	rv;
    999 
   1000 	_DIAGASSERT(retval != NULL);
   1001 	_DIAGASSERT(pw != NULL);
   1002 	_DIAGASSERT(buffer != NULL);
   1003 	_DIAGASSERT(result != NULL);
   1004 
   1005 	*result = NULL;
   1006 	memset(&state, 0, sizeof(state));
   1007 	snprintf(buffer, buflen, "%s", name);
   1008 	rv = _dns_pwscan(retval, pw, buffer, buflen, &state, _dns_nam_zones);
   1009 	_dns_end(&state);
   1010 	if (rv != NS_SUCCESS)
   1011 		return rv;
   1012 	if (strcmp(name, pw->pw_name) == 0) {
   1013 		*result = pw;
   1014 		return NS_SUCCESS;
   1015 	} else
   1016 		return NS_NOTFOUND;
   1017 }
   1018 
   1019 #endif /* HESIOD */
   1020 
   1021 
   1022 #ifdef YP
   1023 		/*
   1024 		 *	nis methods
   1025 		 */
   1026 	/* state shared between nis methods */
   1027 struct nis_state {
   1028 	int		 stayopen;	/* see getpassent(3) */
   1029 	char		*domain;	/* NIS domain */
   1030 	int		 done;		/* non-zero if search exhausted */
   1031 	char		*current;	/* current first/next match */
   1032 	int		 currentlen;	/* length of _nis_current */
   1033 	enum {				/* shadow map type */
   1034 		NISMAP_UNKNOWN,		/*  unknown ... */
   1035 		NISMAP_NONE,		/*  none: use "passwd.by*" */
   1036 		NISMAP_ADJUNCT,		/*  pw_passwd from "passwd.adjunct.*" */
   1037 		NISMAP_MASTER		/*  all from "master.passwd.by*" */
   1038 	}		 maptype;
   1039 };
   1040 
   1041 static struct nis_state		_nis_state;
   1042 					/* storage for non _r functions */
   1043 static struct passwd		_nis_passwd;
   1044 static char			_nis_passwdbuf[GETPW_R_SIZE_MAX];
   1045 
   1046 	/* macros for deciding which NIS maps to use. */
   1047 #define	PASSWD_BYNAME(x)	((x)->maptype == NISMAP_MASTER \
   1048 				    ? "master.passwd.byname" : "passwd.byname")
   1049 #define	PASSWD_BYUID(x)		((x)->maptype == NISMAP_MASTER \
   1050 				    ? "master.passwd.byuid" : "passwd.byuid")
   1051 
   1052 static int
   1053 _nis_start(struct nis_state *state)
   1054 {
   1055 
   1056 	_DIAGASSERT(state != NULL);
   1057 
   1058 	state->done = 0;
   1059 	if (state->current) {
   1060 		free(state->current);
   1061 		state->current = NULL;
   1062 	}
   1063 	if (state->domain == NULL) {			/* setup NIS */
   1064 		switch (yp_get_default_domain(&state->domain)) {
   1065 		case 0:
   1066 			break;
   1067 		case YPERR_RESRC:
   1068 			return NS_TRYAGAIN;
   1069 		default:
   1070 			return NS_UNAVAIL;
   1071 		}
   1072 	}
   1073 
   1074 				/* determine where to get pw_passwd from */
   1075 	if (state->maptype == NISMAP_UNKNOWN) {
   1076 		int	r, order;
   1077 
   1078 		state->maptype = NISMAP_NONE;	/* default to no adjunct */
   1079 		if (geteuid() != 0)		/* non-root can't use adjunct */
   1080 			return NS_SUCCESS;
   1081 
   1082 						/* look for "master.passwd.*" */
   1083 		r = yp_order(state->domain, "master.passwd.byname", &order);
   1084 		if (r == 0) {
   1085 			state->maptype = NISMAP_MASTER;
   1086 			return NS_SUCCESS;
   1087 		}
   1088 
   1089 			/* master.passwd doesn't exist, try passwd.adjunct */
   1090 		if (r == YPERR_MAP) {
   1091 			r = yp_order(state->domain, "passwd.adjunct.byname",
   1092 			    &order);
   1093 			if (r == 0)
   1094 				state->maptype = NISMAP_ADJUNCT;
   1095 		}
   1096 	}
   1097 	return NS_SUCCESS;
   1098 }
   1099 
   1100 static int
   1101 _nis_end(struct nis_state *state)
   1102 {
   1103 
   1104 	_DIAGASSERT(state != NULL);
   1105 
   1106 	if (state->domain)
   1107 		state->domain = NULL;
   1108 	state->done = 0;
   1109 	if (state->current)
   1110 		free(state->current);
   1111 	state->current = NULL;
   1112 	state->maptype = NISMAP_UNKNOWN;
   1113 	return NS_SUCCESS;
   1114 }
   1115 
   1116 /*
   1117  * nis_parse
   1118  *	wrapper to _pw_parse that obtains the real password from the
   1119  *	"passwd.adjunct.byname" NIS map if the maptype is NISMAP_ADJUNCT.
   1120  */
   1121 static int
   1122 _nis_parse(const char *entry, struct passwd *pw, char *buf, size_t buflen,
   1123 	struct nis_state *state)
   1124 {
   1125 	size_t	elen;
   1126 
   1127 	_DIAGASSERT(entry != NULL);
   1128 	_DIAGASSERT(pw != NULL);
   1129 	_DIAGASSERT(buf != NULL);
   1130 	_DIAGASSERT(state != NULL);
   1131 
   1132 	elen = strlen(entry);
   1133 	if (elen >= buflen)
   1134 		return 0;
   1135 	if (! _pw_parse(entry, pw, buf, buflen,
   1136 	    !(state->maptype == NISMAP_MASTER)))
   1137 		return 0;
   1138 
   1139 	if ((state->maptype == NISMAP_ADJUNCT) &&
   1140 	    (strstr(pw->pw_passwd, "##") != NULL)) {
   1141 		char	*data;
   1142 		int	datalen;
   1143 
   1144 		if (yp_match(state->domain, "passwd.adjunct.byname",
   1145 		    pw->pw_name, (int)strlen(pw->pw_name),
   1146 		    &data, &datalen) == 0) {
   1147 			char	*bp, *ep;
   1148 						/* skip name to get password */
   1149 			ep = data;
   1150 			if ((bp = strsep(&ep, ":")) != NULL &&
   1151 			    (bp = strsep(&ep, ":")) != NULL) {
   1152 					/* store new pw_passwd after entry */
   1153 				strlcpy(buf + elen, bp, buflen - elen);
   1154 				pw->pw_passwd = &buf[elen];
   1155 			}
   1156 			free(data);
   1157 		}
   1158 	}
   1159 
   1160 	return 1;
   1161 }
   1162 
   1163 
   1164 /*
   1165  * _nis_pwscan
   1166  *	Look for the yp key provided in buffer from map,
   1167  *	and decode into pw/buffer/buflen.
   1168  */
   1169 static int
   1170 _nis_pwscan(int *retval, struct passwd *pw, char *buffer, size_t buflen,
   1171 	struct nis_state *state, const char *map)
   1172 {
   1173 	char	*data;
   1174 	int	nisr, rv, datalen;
   1175 
   1176 	_DIAGASSERT(retval != NULL);
   1177 	_DIAGASSERT(pw != NULL);
   1178 	_DIAGASSERT(buffer != NULL);
   1179 	_DIAGASSERT(state != NULL);
   1180 	_DIAGASSERT(map != NULL);
   1181 
   1182 	*retval = 0;
   1183 
   1184 	if (state->domain == NULL) {	/* only start if NIS not setup */
   1185 		rv = _nis_start(state);
   1186 		if (rv != NS_SUCCESS)
   1187 			return rv;
   1188 	}
   1189 
   1190 	data = NULL;
   1191 	rv = NS_NOTFOUND;
   1192 
   1193 							/* search map */
   1194 	nisr = yp_match(state->domain, map, buffer, (int)strlen(buffer),
   1195 	    &data, &datalen);
   1196 	switch (nisr) {
   1197 	case 0:
   1198 		data[datalen] = '\0';			/* clear trailing \n */
   1199 		if (_nis_parse(data, pw, buffer, buflen, state))
   1200 			rv = NS_SUCCESS;		/* validate line */
   1201 		else
   1202 			rv = NS_UNAVAIL;
   1203 		break;
   1204 	case YPERR_KEY:
   1205 		break;
   1206 	default:
   1207 		rv = NS_UNAVAIL;
   1208 		break;
   1209 	}
   1210 
   1211 	if (rv != NS_SUCCESS)
   1212 		*retval = errno;
   1213 	if (data)
   1214 		free(data);
   1215 	return rv;
   1216 }
   1217 
   1218 /*ARGSUSED*/
   1219 static int
   1220 _nis_setpwent(void *nsrv, void *nscb, va_list ap)
   1221 {
   1222 
   1223 	_nis_state.stayopen = 0;
   1224 	return _nis_start(&_nis_state);
   1225 }
   1226 
   1227 /*ARGSUSED*/
   1228 static int
   1229 _nis_setpassent(void *nsrv, void *nscb, va_list ap)
   1230 {
   1231 	int	*retval		= va_arg(ap, int *);
   1232 	int	 stayopen	= va_arg(ap, int);
   1233 
   1234 	int	rv;
   1235 
   1236 	_nis_state.stayopen = stayopen;
   1237 	rv = _nis_start(&_nis_state);
   1238 	*retval = (rv == NS_SUCCESS);
   1239 	return rv;
   1240 }
   1241 
   1242 /*ARGSUSED*/
   1243 static int
   1244 _nis_endpwent(void *nsrv, void *nscb, va_list ap)
   1245 {
   1246 
   1247 	return _nis_end(&_nis_state);
   1248 }
   1249 
   1250 
   1251 /*ARGSUSED*/
   1252 static int
   1253 _nis_getpwent(void *nsrv, void *nscb, va_list ap)
   1254 {
   1255 	struct passwd	**retval = va_arg(ap, struct passwd **);
   1256 
   1257 	char	*key, *data;
   1258 	int	keylen, datalen, rv, nisr;
   1259 
   1260 	_DIAGASSERT(retval != NULL);
   1261 
   1262 	*retval = NULL;
   1263 
   1264 	if (_nis_state.done)				/* exhausted search */
   1265 		return NS_NOTFOUND;
   1266 	if (_nis_state.domain == NULL) {
   1267 					/* only start if NIS not setup */
   1268 		rv = _nis_start(&_nis_state);
   1269 		if (rv != NS_SUCCESS)
   1270 			return rv;
   1271 	}
   1272 
   1273 	key = NULL;
   1274 	data = NULL;
   1275 	rv = NS_NOTFOUND;
   1276 
   1277 	if (_nis_state.current) {			/* already searching */
   1278 		nisr = yp_next(_nis_state.domain, PASSWD_BYNAME(&_nis_state),
   1279 		    _nis_state.current, _nis_state.currentlen,
   1280 		    &key, &keylen, &data, &datalen);
   1281 		free(_nis_state.current);
   1282 		_nis_state.current = NULL;
   1283 		switch (nisr) {
   1284 		case 0:
   1285 			_nis_state.current = key;
   1286 			_nis_state.currentlen = keylen;
   1287 			key = NULL;
   1288 			break;
   1289 		case YPERR_NOMORE:
   1290 			_nis_state.done = 1;
   1291 			goto nisent_out;
   1292 		default:
   1293 			rv = NS_UNAVAIL;
   1294 			goto nisent_out;
   1295 		}
   1296 	} else {					/* new search */
   1297 		if (yp_first(_nis_state.domain, PASSWD_BYNAME(&_nis_state),
   1298 		    &_nis_state.current, &_nis_state.currentlen,
   1299 		    &data, &datalen)) {
   1300 			rv = NS_UNAVAIL;
   1301 			goto nisent_out;
   1302 		}
   1303 	}
   1304 
   1305 	data[datalen] = '\0';				/* clear trailing \n */
   1306 							/* validate line */
   1307 	if (_nis_parse(data, &_nis_passwd,
   1308 	    _nis_passwdbuf, sizeof(_nis_passwdbuf), &_nis_state))
   1309 		rv = NS_SUCCESS;
   1310 	else
   1311 		rv = NS_UNAVAIL;
   1312 
   1313  nisent_out:
   1314 	if (key)
   1315 		free(key);
   1316 	if (data)
   1317 		free(data);
   1318 	if (rv == NS_SUCCESS)
   1319 		*retval = &_nis_passwd;
   1320 	return rv;
   1321 }
   1322 
   1323 /*ARGSUSED*/
   1324 static int
   1325 _nis_getpwuid(void *nsrv, void *nscb, va_list ap)
   1326 {
   1327 	struct passwd	**retval = va_arg(ap, struct passwd **);
   1328 	uid_t		 uid	= va_arg(ap, uid_t);
   1329 
   1330 	int	rv, rerror;
   1331 
   1332 	_DIAGASSERT(retval != NULL);
   1333 
   1334 	*retval = NULL;
   1335 	rv = _nis_start(&_nis_state);
   1336 	if (rv != NS_SUCCESS)
   1337 		return rv;
   1338 	snprintf(_nis_passwdbuf, sizeof(_nis_passwdbuf), "%u", (unsigned int)uid);
   1339 	rv = _nis_pwscan(&rerror, &_nis_passwd,
   1340 	    _nis_passwdbuf, sizeof(_nis_passwdbuf),
   1341 	    &_nis_state, PASSWD_BYUID(&_nis_state));
   1342 	if (!_nis_state.stayopen)
   1343 		_nis_end(&_nis_state);
   1344 	if (rv == NS_SUCCESS && uid == _nis_passwd.pw_uid)
   1345 		*retval = &_nis_passwd;
   1346 	return rv;
   1347 }
   1348 
   1349 /*ARGSUSED*/
   1350 static int
   1351 _nis_getpwuid_r(void *nsrv, void *nscb, va_list ap)
   1352 {
   1353 	int		*retval	= va_arg(ap, int *);
   1354 	uid_t		 uid	= va_arg(ap, uid_t);
   1355 	struct passwd	*pw	= va_arg(ap, struct passwd *);
   1356 	char		*buffer	= va_arg(ap, char *);
   1357 	size_t		 buflen	= va_arg(ap, size_t);
   1358 	struct passwd  **result	= va_arg(ap, struct passwd **);
   1359 
   1360 	struct nis_state state;
   1361 	int	rv;
   1362 
   1363 	_DIAGASSERT(retval != NULL);
   1364 	_DIAGASSERT(pw != NULL);
   1365 	_DIAGASSERT(buffer != NULL);
   1366 	_DIAGASSERT(result != NULL);
   1367 
   1368 	*result = NULL;
   1369 	memset(&state, 0, sizeof(state));
   1370 	rv = _nis_start(&state);
   1371 	if (rv != NS_SUCCESS)
   1372 		return rv;
   1373 	snprintf(buffer, buflen, "%u", (unsigned int)uid);
   1374 	rv = _nis_pwscan(retval, pw, buffer, buflen,
   1375 	    &state, PASSWD_BYUID(&state));
   1376 	_nis_end(&state);
   1377 	if (rv != NS_SUCCESS)
   1378 		return rv;
   1379 	if (uid == pw->pw_uid) {
   1380 		*result = pw;
   1381 		return NS_SUCCESS;
   1382 	} else
   1383 		return NS_NOTFOUND;
   1384 }
   1385 
   1386 /*ARGSUSED*/
   1387 static int
   1388 _nis_getpwnam(void *nsrv, void *nscb, va_list ap)
   1389 {
   1390 	struct passwd	**retval = va_arg(ap, struct passwd **);
   1391 	const char	*name	= va_arg(ap, const char *);
   1392 
   1393 	int	rv, rerror;
   1394 
   1395 	_DIAGASSERT(retval != NULL);
   1396 
   1397 	*retval = NULL;
   1398 	rv = _nis_start(&_nis_state);
   1399 	if (rv != NS_SUCCESS)
   1400 		return rv;
   1401 	snprintf(_nis_passwdbuf, sizeof(_nis_passwdbuf), "%s", name);
   1402 	rv = _nis_pwscan(&rerror, &_nis_passwd,
   1403 	    _nis_passwdbuf, sizeof(_nis_passwdbuf),
   1404 	    &_nis_state, PASSWD_BYNAME(&_nis_state));
   1405 	if (!_nis_state.stayopen)
   1406 		_nis_end(&_nis_state);
   1407 	if (rv == NS_SUCCESS && strcmp(name, _nis_passwd.pw_name) == 0)
   1408 		*retval = &_nis_passwd;
   1409 	return rv;
   1410 }
   1411 
   1412 /*ARGSUSED*/
   1413 static int
   1414 _nis_getpwnam_r(void *nsrv, void *nscb, va_list ap)
   1415 {
   1416 	int		*retval	= va_arg(ap, int *);
   1417 	const char	*name	= va_arg(ap, const char *);
   1418 	struct passwd	*pw	= va_arg(ap, struct passwd *);
   1419 	char		*buffer	= va_arg(ap, char *);
   1420 	size_t		 buflen	= va_arg(ap, size_t);
   1421 	struct passwd  **result	= va_arg(ap, struct passwd **);
   1422 
   1423 	struct nis_state state;
   1424 	int	rv;
   1425 
   1426 	_DIAGASSERT(retval != NULL);
   1427 	_DIAGASSERT(pw != NULL);
   1428 	_DIAGASSERT(buffer != NULL);
   1429 	_DIAGASSERT(result != NULL);
   1430 
   1431 	*result = NULL;
   1432 	snprintf(buffer, buflen, "%s", name);
   1433 	memset(&state, 0, sizeof(state));
   1434 	rv = _nis_start(&state);
   1435 	if (rv != NS_SUCCESS)
   1436 		return rv;
   1437 	rv = _nis_pwscan(retval, pw, buffer, buflen,
   1438 	    &state, PASSWD_BYNAME(&state));
   1439 	_nis_end(&state);
   1440 	if (rv != NS_SUCCESS)
   1441 		return rv;
   1442 	if (strcmp(name, pw->pw_name) == 0) {
   1443 		*result = pw;
   1444 		return NS_SUCCESS;
   1445 	} else
   1446 		return NS_NOTFOUND;
   1447 }
   1448 
   1449 #endif /* YP */
   1450 
   1451 
   1452 #ifdef _PASSWD_COMPAT
   1453 		/*
   1454 		 *	compat methods
   1455 		 */
   1456 
   1457 	/* state shared between compat methods */
   1458 
   1459 struct compat_state {
   1460 	int		 stayopen;	/* see getpassent(3) */
   1461 	DB		*db;		/* passwd DB */
   1462 	int		 keynum;	/* key counter, -1 if no more */
   1463 	enum {				/* current compat mode */
   1464 		COMPAT_NOTOKEN = 0,	/*  no compat token present */
   1465 		COMPAT_NONE,		/*  parsing normal pwd.db line */
   1466 		COMPAT_FULL,		/*  parsing `+' entries */
   1467 		COMPAT_USER,		/*  parsing `+name' entries */
   1468 		COMPAT_NETGROUP		/*  parsing `+@netgroup' entries */
   1469 	}		 mode;
   1470 	char		*user;		/* COMPAT_USER "+name" */
   1471 	DB		*exclude;	/* compat exclude DB */
   1472 	struct passwd	 proto;		/* proto passwd entry */
   1473 	char		 protobuf[GETPW_R_SIZE_MAX]; /* buffer for proto ptrs */
   1474 	int		 protoflags;	/* proto passwd flags */
   1475 };
   1476 
   1477 static struct compat_state	_compat_state;
   1478 					/* storage for non _r functions */
   1479 static struct passwd		_compat_passwd;
   1480 static char			_compat_passwdbuf[GETPW_R_SIZE_MAX];
   1481 
   1482 static int
   1483 _compat_start(struct compat_state *state)
   1484 {
   1485 	int	rv;
   1486 
   1487 	_DIAGASSERT(state != NULL);
   1488 
   1489 	state->keynum = 0;
   1490 	if (state->db == NULL) {		/* not open yet */
   1491 		DBT	key, data;
   1492 		DBT	pkey, pdata;
   1493 		char	bf[MAXLOGNAME];
   1494 
   1495 		rv = _pw_opendb(&state->db);
   1496 		if (rv != NS_SUCCESS)
   1497 			return rv;
   1498 
   1499 		state->mode = COMPAT_NOTOKEN;
   1500 
   1501 		/*
   1502 		 *	Determine if the "compat" token is present in pwd.db;
   1503 		 *	either "__YP!" or PW_KEYBYNAME+"+".
   1504 		 *	Only works if pwd_mkdb installs the token.
   1505 		 */
   1506 		key.data = (u_char *)__UNCONST(__yp_token);
   1507 		key.size = strlen(__yp_token);
   1508 
   1509 		bf[0] = _PW_KEYBYNAME;	 /* Pre-token database support. */
   1510 		bf[1] = '+';
   1511 		pkey.data = (u_char *)bf;
   1512 		pkey.size = 2;
   1513 
   1514 		if ((state->db->get)(state->db, &key, &data, 0) == 0
   1515 		    || (state->db->get)(state->db, &pkey, &pdata, 0) == 0)
   1516 			state->mode = COMPAT_NONE;
   1517 	}
   1518 	return NS_SUCCESS;
   1519 }
   1520 
   1521 static int
   1522 _compat_end(struct compat_state *state)
   1523 {
   1524 
   1525 	_DIAGASSERT(state != NULL);
   1526 
   1527 	state->keynum = 0;
   1528 	if (state->db) {
   1529 		(void)(state->db->close)(state->db);
   1530 		state->db = NULL;
   1531 	}
   1532 	state->mode = COMPAT_NOTOKEN;
   1533 	if (state->user)
   1534 		free(state->user);
   1535 	state->user = NULL;
   1536 	if (state->exclude != NULL)
   1537 		(void)(state->exclude->close)(state->exclude);
   1538 	state->exclude = NULL;
   1539 	state->proto.pw_name = NULL;
   1540 	state->protoflags = 0;
   1541 	return NS_SUCCESS;
   1542 }
   1543 
   1544 /*
   1545  * _compat_add_exclude
   1546  *	add the name to the exclude list in state->exclude.
   1547  */
   1548 static int
   1549 _compat_add_exclude(struct compat_state *state, const char *name)
   1550 {
   1551 	DBT	key, data;
   1552 
   1553 	_DIAGASSERT(state != NULL);
   1554 	_DIAGASSERT(name != NULL);
   1555 
   1556 				/* initialize the exclusion table if needed */
   1557 	if (state->exclude == NULL) {
   1558 		state->exclude = dbopen(NULL, O_RDWR, 600, DB_HASH, NULL);
   1559 		if (state->exclude == NULL)
   1560 			return 0;
   1561 	}
   1562 
   1563 	key.size = strlen(name);			/* set up the key */
   1564 	key.data = (u_char *)__UNCONST(name);
   1565 
   1566 	data.data = NULL;				/* data is nothing */
   1567 	data.size = 0;
   1568 
   1569 							/* store it */
   1570 	if ((state->exclude->put)(state->exclude, &key, &data, 0) == -1)
   1571 		return 0;
   1572 
   1573 	return 1;
   1574 }
   1575 
   1576 /*
   1577  * _compat_is_excluded
   1578  *	test if a name is on the compat mode exclude list
   1579  */
   1580 static int
   1581 _compat_is_excluded(struct compat_state *state, const char *name)
   1582 {
   1583 	DBT	key, data;
   1584 
   1585 	_DIAGASSERT(state != NULL);
   1586 	_DIAGASSERT(name != NULL);
   1587 
   1588 	if (state->exclude == NULL)
   1589 		return 0;	/* nothing excluded */
   1590 
   1591 	key.size = strlen(name);			/* set up the key */
   1592 	key.data = (u_char *)__UNCONST(name);
   1593 
   1594 	if ((state->exclude->get)(state->exclude, &key, &data, 0) == 0)
   1595 		return 1;				/* is excluded */
   1596 
   1597 	return 0;
   1598 }
   1599 
   1600 
   1601 /*
   1602  * _passwdcompat_bad
   1603  *	log an error if "files" or "compat" is specified in
   1604  *	passwd_compat database
   1605  */
   1606 /*ARGSUSED*/
   1607 static int
   1608 _passwdcompat_bad(void *nsrv, void *nscb, va_list ap)
   1609 {
   1610 	static int warned;
   1611 
   1612 	_DIAGASSERT(cb_data != NULL);
   1613 
   1614 	if (!warned) {
   1615 		syslog(LOG_ERR,
   1616 			"nsswitch.conf passwd_compat database can't use '%s'",
   1617 			(char *)nscb);
   1618 	}
   1619 	warned = 1;
   1620 	return NS_UNAVAIL;
   1621 }
   1622 
   1623 /*
   1624  * _passwdcompat_setpassent
   1625  *	Call setpassent for all passwd_compat sources.
   1626  */
   1627 static int
   1628 _passwdcompat_setpassent(int stayopen)
   1629 {
   1630 	static const ns_dtab dtab[] = {
   1631 		NS_FILES_CB(_passwdcompat_bad, "files")
   1632 		NS_DNS_CB(_dns_setpassent, NULL)
   1633 		NS_NIS_CB(_nis_setpassent, NULL)
   1634 		NS_COMPAT_CB(_passwdcompat_bad, "compat")
   1635 		{ 0 }
   1636 	};
   1637 
   1638 	int	rv, result;
   1639 
   1640 	rv = nsdispatch(NULL, dtab, NSDB_PASSWD_COMPAT, "setpassent",
   1641 	    defaultnis_forceall, &result, stayopen);
   1642 	return rv;
   1643 }
   1644 
   1645 /*
   1646  * _passwdcompat_endpwent
   1647  *	Call endpwent for all passwd_compat sources.
   1648  */
   1649 static int
   1650 _passwdcompat_endpwent(void)
   1651 {
   1652 	static const ns_dtab dtab[] = {
   1653 		NS_FILES_CB(_passwdcompat_bad, "files")
   1654 		NS_DNS_CB(_dns_endpwent, NULL)
   1655 		NS_NIS_CB(_nis_endpwent, NULL)
   1656 		NS_COMPAT_CB(_passwdcompat_bad, "compat")
   1657 		{ 0 }
   1658 	};
   1659 
   1660 	return nsdispatch(NULL, dtab, NSDB_PASSWD_COMPAT, "endpwent",
   1661 	    defaultnis_forceall);
   1662 }
   1663 
   1664 /*
   1665  * _passwdcompat_pwscan
   1666  *	When a name lookup in compat mode is required (e.g., `+name', or a
   1667  *	name in `+@netgroup'), look it up in the 'passwd_compat' nsswitch
   1668  *	database.
   1669  *	Fail if passwd_compat contains files or compat.
   1670  */
   1671 static int
   1672 _passwdcompat_pwscan(struct passwd *pw, char *buffer, size_t buflen,
   1673 	int search, const char *name, uid_t uid)
   1674 {
   1675 	static const ns_dtab compatentdtab[] = {
   1676 		NS_FILES_CB(_passwdcompat_bad, "files")
   1677 		NS_DNS_CB(_dns_getpwent, NULL)
   1678 		NS_NIS_CB(_nis_getpwent, NULL)
   1679 		NS_COMPAT_CB(_passwdcompat_bad, "compat")
   1680 		{ 0 }
   1681 	};
   1682 	static const ns_dtab compatuiddtab[] = {
   1683 		NS_FILES_CB(_passwdcompat_bad, "files")
   1684 		NS_DNS_CB(_dns_getpwuid_r, NULL)
   1685 		NS_NIS_CB(_nis_getpwuid_r, NULL)
   1686 		NS_COMPAT_CB(_passwdcompat_bad, "compat")
   1687 		{ 0 }
   1688 	};
   1689 	static const ns_dtab compatnamdtab[] = {
   1690 		NS_FILES_CB(_passwdcompat_bad, "files")
   1691 		NS_DNS_CB(_dns_getpwnam_r, NULL)
   1692 		NS_NIS_CB(_nis_getpwnam_r, NULL)
   1693 		NS_COMPAT_CB(_passwdcompat_bad, "compat")
   1694 		{ 0 }
   1695 	};
   1696 
   1697 	int		rv, crv;
   1698 	struct passwd	*cpw;
   1699 
   1700 	switch (search) {
   1701 	case _PW_KEYBYNUM:
   1702 /* XXXREENTRANT: implement & use getpwent_r */
   1703 		rv = nsdispatch(NULL, compatentdtab,
   1704 		    NSDB_PASSWD_COMPAT, "getpwent", defaultnis,
   1705 		    &cpw);
   1706 		if (rv == NS_SUCCESS &&
   1707 		    ! _pw_copy(cpw, pw, buffer, buflen, NULL, 0)) {
   1708 			errno = ERANGE;
   1709 			rv = NS_UNAVAIL;
   1710 		}
   1711 		break;
   1712 	case _PW_KEYBYNAME:
   1713 		_DIAGASSERT(name != NULL);
   1714 		rv = nsdispatch(NULL, compatnamdtab,
   1715 		    NSDB_PASSWD_COMPAT, "getpwnam_r", defaultnis,
   1716 		    &crv, name, pw, buffer, buflen, &cpw);
   1717 		break;
   1718 	case _PW_KEYBYUID:
   1719 		rv = nsdispatch(NULL, compatuiddtab,
   1720 		    NSDB_PASSWD_COMPAT, "getpwuid_r", defaultnis,
   1721 		    &crv, uid, pw, buffer, buflen, &cpw);
   1722 		break;
   1723 	default:
   1724 		abort();
   1725 		/*NOTREACHED*/
   1726 	}
   1727 	return rv;
   1728 }
   1729 
   1730 /*
   1731  * _compat_pwscan
   1732  *	Search state->db for the next desired entry.
   1733  *	If search is _PW_KEYBYNUM, look for state->keynum.
   1734  *	If search is _PW_KEYBYNAME, look for name.
   1735  *	If search is _PW_KEYBYUID, look for uid.
   1736  *	Sets *retval to the errno if the result is not NS_SUCCESS.
   1737  */
   1738 static int
   1739 _compat_pwscan(int *retval, struct passwd *pw, char *buffer, size_t buflen,
   1740 	struct compat_state *state, int search, const char *name, uid_t uid)
   1741 {
   1742 	DBT		 key;
   1743 	int		 rv, r, pwflags;
   1744 	const char	*user, *host, *dom;
   1745 	const void	*from;
   1746 	size_t		 fromlen;
   1747 
   1748 	_DIAGASSERT(retval != NULL);
   1749 	_DIAGASSERT(pw != NULL);
   1750 	_DIAGASSERT(buffer != NULL);
   1751 	_DIAGASSERT(state != NULL);
   1752 	/* name may be NULL */
   1753 
   1754 	*retval = 0;
   1755 
   1756 	if (state->db == NULL) {
   1757 		rv = _compat_start(state);
   1758 		if (rv != NS_SUCCESS)
   1759 			return rv;
   1760 	}
   1761 	if (buflen <= 1) {			/* buffer too small */
   1762 		*retval = ERANGE;
   1763 		return NS_UNAVAIL;
   1764 	}
   1765 
   1766 	for (;;) {				/* loop over pwd.db */
   1767 		rv = NS_NOTFOUND;
   1768 		if (state->mode != COMPAT_NOTOKEN &&
   1769 		    state->mode != COMPAT_NONE) {
   1770 						/* doing a compat lookup */
   1771 			struct passwd	cpw;
   1772 			char		cbuf[GETPW_R_SIZE_MAX];
   1773 
   1774 			switch (state->mode) {
   1775 
   1776 			case COMPAT_FULL:
   1777 					/* get next user */
   1778 				rv = _passwdcompat_pwscan(&cpw,
   1779 				    cbuf, sizeof(cbuf),
   1780 				    _PW_KEYBYNUM, NULL, 0);
   1781 				if (rv != NS_SUCCESS)
   1782 					state->mode = COMPAT_NONE;
   1783 				break;
   1784 
   1785 			case COMPAT_NETGROUP:
   1786 /* XXXREENTRANT: getnetgrent is not thread safe */
   1787 					/* get next user from netgroup */
   1788 				r = getnetgrent(&host, &user, &dom);
   1789 				if (r == 0) {	/* end of group */
   1790 					endnetgrent();
   1791 					state->mode = COMPAT_NONE;
   1792 					break;
   1793 				}
   1794 				if (!user || !*user)
   1795 					break;
   1796 				rv = _passwdcompat_pwscan(&cpw,
   1797 				    cbuf, sizeof(cbuf),
   1798 				    _PW_KEYBYNAME, user, 0);
   1799 				break;
   1800 
   1801 			case COMPAT_USER:
   1802 					/* get specific user */
   1803 				if (state->user == NULL) {
   1804 					state->mode = COMPAT_NONE;
   1805 					break;
   1806 				}
   1807 				rv = _passwdcompat_pwscan(&cpw,
   1808 				    cbuf, sizeof(cbuf),
   1809 				    _PW_KEYBYNAME, state->user, 0);
   1810 				free(state->user);
   1811 				state->user = NULL;
   1812 				state->mode = COMPAT_NONE;
   1813 				break;
   1814 
   1815 			case COMPAT_NOTOKEN:
   1816 			case COMPAT_NONE:
   1817 				abort();
   1818 
   1819 			}
   1820 			if (rv != NS_SUCCESS)	/* if not matched, next loop */
   1821 				continue;
   1822 
   1823 				/* copy cpw to pw, applying prototype */
   1824 			if (! _pw_copy(&cpw, pw, buffer, buflen,
   1825 			    &state->proto, state->protoflags)) {
   1826 				rv = NS_UNAVAIL;
   1827 				break;
   1828 			}
   1829 
   1830 			if (_compat_is_excluded(state, pw->pw_name))
   1831 				continue;	/* excluded; next loop */
   1832 
   1833 			if ((search == _PW_KEYBYNAME
   1834 					&& strcmp(pw->pw_name, name) != 0)
   1835 			    || (search == _PW_KEYBYUID && pw->pw_uid != uid)) {
   1836 				continue;	/* not specific; next loop */
   1837 			}
   1838 
   1839 			break;			/* exit loop if found */
   1840 		} else {			/* not a compat line */
   1841 			state->proto.pw_name = NULL;
   1842 						/* clear prototype */
   1843 		}
   1844 
   1845 		if (state->mode == COMPAT_NOTOKEN) {
   1846 				/* no compat token; do direct lookup */
   1847 			switch (search) {
   1848 			case _PW_KEYBYNUM:
   1849 				if (state->keynum == -1)  /* no more records */
   1850 					return NS_NOTFOUND;
   1851 				state->keynum++;
   1852 				from = &state->keynum;
   1853 				fromlen = sizeof(state->keynum);
   1854 				break;
   1855 			case _PW_KEYBYNAME:
   1856 				from = name;
   1857 				fromlen = strlen(name);
   1858 				break;
   1859 			case _PW_KEYBYUID:
   1860 				from = &uid;
   1861 				fromlen = sizeof(uid);
   1862 				break;
   1863 			default:
   1864 				abort();
   1865 			}
   1866 			buffer[0] = search;
   1867 		} else {
   1868 				/* compat token; do line by line */
   1869 			if (state->keynum == -1)  /* no more records */
   1870 				return NS_NOTFOUND;
   1871 			state->keynum++;
   1872 			from = &state->keynum;
   1873 			fromlen = sizeof(state->keynum);
   1874 			buffer[0] = _PW_KEYBYNUM;
   1875 		}
   1876 
   1877 		if (buflen <= fromlen) {		/* buffer too small */
   1878 			*retval = ERANGE;
   1879 			return NS_UNAVAIL;
   1880 		}
   1881 		memmove(buffer + 1, from, fromlen);	/* setup key */
   1882 		key.size = fromlen + 1;
   1883 		key.data = (u_char *)buffer;
   1884 
   1885 		rv = _pw_getkey(state->db, &key, pw, buffer, buflen, &pwflags);
   1886 		if (rv != NS_SUCCESS)		/* stop on error */
   1887 			break;
   1888 
   1889 		if (state->mode == COMPAT_NOTOKEN)
   1890 			break;			/* stop if no compat token */
   1891 
   1892 		if (pw->pw_name[0] == '+') {
   1893 						/* compat inclusion */
   1894 			switch(pw->pw_name[1]) {
   1895 			case '\0':		/* `+' */
   1896 				state->mode = COMPAT_FULL;
   1897 						/* reset passwd_compat search */
   1898 /* XXXREENTRANT: setpassent is not thread safe ? */
   1899 				(void) _passwdcompat_setpassent(0);
   1900 				break;
   1901 			case '@':		/* `+@netgroup' */
   1902 				state->mode = COMPAT_NETGROUP;
   1903 						/* reset netgroup search */
   1904 /* XXXREENTRANT: setnetgrent is not thread safe */
   1905 				setnetgrent(pw->pw_name + 2);
   1906 				break;
   1907 			default:		/* `+name' */
   1908 				state->mode = COMPAT_USER;
   1909 				if (state->user)
   1910 					free(state->user);
   1911 				state->user = strdup(pw->pw_name + 1);
   1912 				break;
   1913 			}
   1914 						/* save the prototype */
   1915 			state->protoflags = pwflags;
   1916 			if (! _pw_copy(pw, &state->proto, state->protobuf,
   1917 			    sizeof(state->protobuf), NULL, 0)) {
   1918 				rv = NS_UNAVAIL;
   1919 				break;
   1920 			}
   1921 			continue;		/* loop again after inclusion */
   1922 		} else if (pw->pw_name[0] == '-') {
   1923 						/* compat exclusion */
   1924 			rv = NS_SUCCESS;
   1925 			switch(pw->pw_name[1]) {
   1926 			case '\0':		/* `-' */
   1927 				break;
   1928 			case '@':		/* `-@netgroup' */
   1929 /* XXXREENTRANT: {set,get,end}netgrent is not thread safe */
   1930 				setnetgrent(pw->pw_name + 2);
   1931 				while (getnetgrent(&host, &user, &dom)) {
   1932 					if (!user || !*user)
   1933 						continue;
   1934 					if (! _compat_add_exclude(state,user)) {
   1935 						rv = NS_UNAVAIL;
   1936 						break;
   1937 					}
   1938 				}
   1939 				endnetgrent();
   1940 				break;
   1941 			default:		/* `-name' */
   1942 				if (! _compat_add_exclude(state,
   1943 				    pw->pw_name + 1)) {
   1944 					rv = NS_UNAVAIL;
   1945 				}
   1946 				break;
   1947 			}
   1948 			if (rv != NS_SUCCESS)	/* exclusion failure */
   1949 				break;
   1950 			continue;		/* loop again after exclusion */
   1951 		}
   1952 		if (search == _PW_KEYBYNUM ||
   1953 		    (search == _PW_KEYBYUID && pw->pw_uid == uid) ||
   1954 		    (search == _PW_KEYBYNAME && strcmp(pw->pw_name, name) == 0))
   1955 			break;			/* token mode match found */
   1956 	}
   1957 
   1958 	if (rv == NS_NOTFOUND &&
   1959 	    (search == _PW_KEYBYNUM || state->mode != COMPAT_NOTOKEN))
   1960 		state->keynum = -1;		/* flag `no more records' */
   1961 
   1962 	if (rv == NS_SUCCESS) {
   1963 		if ((search == _PW_KEYBYNAME && strcmp(pw->pw_name, name) != 0)
   1964 		    || (search == _PW_KEYBYUID && pw->pw_uid != uid))
   1965 			rv = NS_NOTFOUND;
   1966 	}
   1967 
   1968 	if (rv != NS_SUCCESS)
   1969 		*retval = errno;
   1970 	return rv;
   1971 }
   1972 
   1973 /*ARGSUSED*/
   1974 static int
   1975 _compat_setpwent(void *nsrv, void *nscb, va_list ap)
   1976 {
   1977 
   1978 					/* force passwd_compat setpwent() */
   1979 	(void) _passwdcompat_setpassent(0);
   1980 
   1981 					/* reset state, keep db open */
   1982 	_compat_state.stayopen = 0;
   1983 	return _compat_start(&_compat_state);
   1984 }
   1985 
   1986 /*ARGSUSED*/
   1987 static int
   1988 _compat_setpassent(void *nsrv, void *nscb, va_list ap)
   1989 {
   1990 	int	*retval		= va_arg(ap, int *);
   1991 	int	 stayopen	= va_arg(ap, int);
   1992 
   1993 	int	rv;
   1994 
   1995 					/* force passwd_compat setpassent() */
   1996 	(void) _passwdcompat_setpassent(stayopen);
   1997 
   1998 	_compat_state.stayopen = stayopen;
   1999 	rv = _compat_start(&_compat_state);
   2000 	*retval = (rv == NS_SUCCESS);
   2001 	return rv;
   2002 }
   2003 
   2004 /*ARGSUSED*/
   2005 static int
   2006 _compat_endpwent(void *nsrv, void *nscb, va_list ap)
   2007 {
   2008 
   2009 					/* force passwd_compat endpwent() */
   2010 	(void) _passwdcompat_endpwent();
   2011 
   2012 					/* reset state, close db */
   2013 	_compat_state.stayopen = 0;
   2014 	return _compat_end(&_compat_state);
   2015 }
   2016 
   2017 
   2018 /*ARGSUSED*/
   2019 static int
   2020 _compat_getpwent(void *nsrv, void *nscb, va_list ap)
   2021 {
   2022 	struct passwd	**retval = va_arg(ap, struct passwd **);
   2023 
   2024 	int	rv, rerror;
   2025 
   2026 	_DIAGASSERT(retval != NULL);
   2027 
   2028 	*retval = NULL;
   2029 	rv = _compat_pwscan(&rerror, &_compat_passwd,
   2030 	    _compat_passwdbuf, sizeof(_compat_passwdbuf),
   2031 	    &_compat_state, _PW_KEYBYNUM, NULL, 0);
   2032 	if (rv == NS_SUCCESS)
   2033 		*retval = &_compat_passwd;
   2034 	return rv;
   2035 }
   2036 
   2037 /*ARGSUSED*/
   2038 static int
   2039 _compat_getpwnam(void *nsrv, void *nscb, va_list ap)
   2040 {
   2041 	struct passwd	**retval = va_arg(ap, struct passwd **);
   2042 	const char	*name	= va_arg(ap, const char *);
   2043 
   2044 	int	rv, rerror;
   2045 
   2046 	_DIAGASSERT(retval != NULL);
   2047 
   2048 	*retval = NULL;
   2049 	rv = _compat_start(&_compat_state);
   2050 	if (rv != NS_SUCCESS)
   2051 		return rv;
   2052 	rv = _compat_pwscan(&rerror, &_compat_passwd,
   2053 	    _compat_passwdbuf, sizeof(_compat_passwdbuf),
   2054 	    &_compat_state, _PW_KEYBYNAME, name, 0);
   2055 	if (!_compat_state.stayopen)
   2056 		_compat_end(&_compat_state);
   2057 	if (rv == NS_SUCCESS)
   2058 		*retval = &_compat_passwd;
   2059 	return rv;
   2060 }
   2061 
   2062 /*ARGSUSED*/
   2063 static int
   2064 _compat_getpwnam_r(void *nsrv, void *nscb, va_list ap)
   2065 {
   2066 	int		*retval	= va_arg(ap, int *);
   2067 	const char	*name	= va_arg(ap, const char *);
   2068 	struct passwd	*pw	= va_arg(ap, struct passwd *);
   2069 	char		*buffer	= va_arg(ap, char *);
   2070 	size_t		 buflen	= va_arg(ap, size_t);
   2071 	struct passwd  **result	= va_arg(ap, struct passwd **);
   2072 
   2073 	struct compat_state	state;
   2074 	int		rv;
   2075 
   2076 	_DIAGASSERT(retval != NULL);
   2077 	_DIAGASSERT(pw != NULL);
   2078 	_DIAGASSERT(buffer != NULL);
   2079 	_DIAGASSERT(result != NULL);
   2080 
   2081 	*result = NULL;
   2082 	memset(&state, 0, sizeof(state));
   2083 	rv = _compat_pwscan(retval, pw, buffer, buflen, &state,
   2084 	    _PW_KEYBYNAME, name, 0);
   2085 	_compat_end(&state);
   2086 	if (rv == NS_SUCCESS)
   2087 		*result = pw;
   2088 	return rv;
   2089 }
   2090 
   2091 /*ARGSUSED*/
   2092 static int
   2093 _compat_getpwuid(void *nsrv, void *nscb, va_list ap)
   2094 {
   2095 	struct passwd	**retval = va_arg(ap, struct passwd **);
   2096 	uid_t		 uid	= va_arg(ap, uid_t);
   2097 
   2098 	int	rv, rerror;
   2099 
   2100 	_DIAGASSERT(retval != NULL);
   2101 
   2102 	*retval = NULL;
   2103 	rv = _compat_start(&_compat_state);
   2104 	if (rv != NS_SUCCESS)
   2105 		return rv;
   2106 	rv = _compat_pwscan(&rerror, &_compat_passwd,
   2107 	    _compat_passwdbuf, sizeof(_compat_passwdbuf),
   2108 	    &_compat_state, _PW_KEYBYUID, NULL, uid);
   2109 	if (!_compat_state.stayopen)
   2110 		_compat_end(&_compat_state);
   2111 	if (rv == NS_SUCCESS)
   2112 		*retval = &_compat_passwd;
   2113 	return rv;
   2114 }
   2115 
   2116 /*ARGSUSED*/
   2117 static int
   2118 _compat_getpwuid_r(void *nsrv, void *nscb, va_list ap)
   2119 {
   2120 	int		*retval	= va_arg(ap, int *);
   2121 	uid_t		 uid	= va_arg(ap, uid_t);
   2122 	struct passwd	*pw	= va_arg(ap, struct passwd *);
   2123 	char		*buffer	= va_arg(ap, char *);
   2124 	size_t		 buflen	= va_arg(ap, size_t);
   2125 	struct passwd  **result	= va_arg(ap, struct passwd **);
   2126 
   2127 	struct compat_state	state;
   2128 	int		rv;
   2129 
   2130 	_DIAGASSERT(retval != NULL);
   2131 	_DIAGASSERT(pw != NULL);
   2132 	_DIAGASSERT(buffer != NULL);
   2133 	_DIAGASSERT(result != NULL);
   2134 
   2135 	*result = NULL;
   2136 	memset(&state, 0, sizeof(state));
   2137 	rv = _compat_pwscan(retval, pw, buffer, buflen, &state,
   2138 	    _PW_KEYBYUID, NULL, uid);
   2139 	_compat_end(&state);
   2140 	if (rv == NS_SUCCESS)
   2141 		*result = pw;
   2142 	return rv;
   2143 }
   2144 
   2145 #endif /* _PASSWD_COMPAT */
   2146 
   2147 
   2148 		/*
   2149 		 *	public functions
   2150 		 */
   2151 
   2152 struct passwd *
   2153 getpwent(void)
   2154 {
   2155 	int		r;
   2156 	struct passwd	*retval;
   2157 
   2158 	static const ns_dtab dtab[] = {
   2159 		NS_FILES_CB(_files_getpwent, NULL)
   2160 		NS_DNS_CB(_dns_getpwent, NULL)
   2161 		NS_NIS_CB(_nis_getpwent, NULL)
   2162 		NS_COMPAT_CB(_compat_getpwent, NULL)
   2163 		{ 0 }
   2164 	};
   2165 
   2166 	mutex_lock(&_pwmutex);
   2167 	r = nsdispatch(NULL, dtab, NSDB_PASSWD, "getpwent", defaultcompat,
   2168 	    &retval);
   2169 	mutex_unlock(&_pwmutex);
   2170 	return (r == NS_SUCCESS) ? retval : NULL;
   2171 }
   2172 
   2173 struct passwd *
   2174 getpwnam(const char *name)
   2175 {
   2176 	int		rv;
   2177 	struct passwd	*retval;
   2178 
   2179 	static const ns_dtab dtab[] = {
   2180 		NS_FILES_CB(_files_getpwnam, NULL)
   2181 		NS_DNS_CB(_dns_getpwnam, NULL)
   2182 		NS_NIS_CB(_nis_getpwnam, NULL)
   2183 		NS_COMPAT_CB(_compat_getpwnam, NULL)
   2184 		{ 0 }
   2185 	};
   2186 
   2187 	mutex_lock(&_pwmutex);
   2188 	rv = nsdispatch(NULL, dtab, NSDB_PASSWD, "getpwnam", defaultcompat,
   2189 	    &retval, name);
   2190 	mutex_unlock(&_pwmutex);
   2191 	return (rv == NS_SUCCESS) ? retval : NULL;
   2192 }
   2193 
   2194 int
   2195 getpwnam_r(const char *name, struct passwd *pwd, char *buffer, size_t buflen,
   2196 	struct passwd **result)
   2197 {
   2198 	int	r, retval;
   2199 
   2200 	static const ns_dtab dtab[] = {
   2201 		NS_FILES_CB(_files_getpwnam_r, NULL)
   2202 		NS_DNS_CB(_dns_getpwnam_r, NULL)
   2203 		NS_NIS_CB(_nis_getpwnam_r, NULL)
   2204 		NS_COMPAT_CB(_compat_getpwnam_r, NULL)
   2205 		{ 0 }
   2206 	};
   2207 
   2208 	_DIAGASSERT(name != NULL);
   2209 	_DIAGASSERT(pwd != NULL);
   2210 	_DIAGASSERT(buffer != NULL);
   2211 	_DIAGASSERT(result != NULL);
   2212 
   2213 	*result = NULL;
   2214 	retval = 0;
   2215 	mutex_lock(&_pwmutex);
   2216 	r = nsdispatch(NULL, dtab, NSDB_PASSWD, "getpwnam_r", defaultcompat,
   2217 	    &retval, name, pwd, buffer, buflen, result);
   2218 	mutex_unlock(&_pwmutex);
   2219 	return (r == NS_SUCCESS) ? 0 : retval ? retval : ENOENT;
   2220 }
   2221 
   2222 struct passwd *
   2223 getpwuid(uid_t uid)
   2224 {
   2225 	int		rv;
   2226 	struct passwd	*retval;
   2227 
   2228 	static const ns_dtab dtab[] = {
   2229 		NS_FILES_CB(_files_getpwuid, NULL)
   2230 		NS_DNS_CB(_dns_getpwuid, NULL)
   2231 		NS_NIS_CB(_nis_getpwuid, NULL)
   2232 		NS_COMPAT_CB(_compat_getpwuid, NULL)
   2233 		{ 0 }
   2234 	};
   2235 
   2236 	mutex_lock(&_pwmutex);
   2237 	rv = nsdispatch(NULL, dtab, NSDB_PASSWD, "getpwuid", defaultcompat,
   2238 	    &retval, uid);
   2239 	mutex_unlock(&_pwmutex);
   2240 	return (rv == NS_SUCCESS) ? retval : NULL;
   2241 }
   2242 
   2243 int
   2244 getpwuid_r(uid_t uid, struct passwd *pwd, char *buffer, size_t buflen,
   2245 	struct passwd **result)
   2246 {
   2247 	int	r, retval;
   2248 
   2249 	static const ns_dtab dtab[] = {
   2250 		NS_FILES_CB(_files_getpwuid_r, NULL)
   2251 		NS_DNS_CB(_dns_getpwuid_r, NULL)
   2252 		NS_NIS_CB(_nis_getpwuid_r, NULL)
   2253 		NS_COMPAT_CB(_compat_getpwuid_r, NULL)
   2254 		{ 0 }
   2255 	};
   2256 
   2257 	_DIAGASSERT(pwd != NULL);
   2258 	_DIAGASSERT(buffer != NULL);
   2259 	_DIAGASSERT(result != NULL);
   2260 
   2261 	*result = NULL;
   2262 	retval = 0;
   2263 	mutex_lock(&_pwmutex);
   2264 	r = nsdispatch(NULL, dtab, NSDB_PASSWD, "getpwuid_r", defaultcompat,
   2265 	    &retval, uid, pwd, buffer, buflen, result);
   2266 	mutex_unlock(&_pwmutex);
   2267 	return (r == NS_SUCCESS) ? 0 : retval ? retval : ENOENT;
   2268 }
   2269 
   2270 void
   2271 endpwent(void)
   2272 {
   2273 	static const ns_dtab dtab[] = {
   2274 		NS_FILES_CB(_files_endpwent, NULL)
   2275 		NS_DNS_CB(_dns_endpwent, NULL)
   2276 		NS_NIS_CB(_nis_endpwent, NULL)
   2277 		NS_COMPAT_CB(_compat_endpwent, NULL)
   2278 		{ 0 }
   2279 	};
   2280 
   2281 	mutex_lock(&_pwmutex);
   2282 					/* force all endpwent() methods */
   2283 	(void) nsdispatch(NULL, dtab, NSDB_PASSWD, "endpwent",
   2284 	    defaultcompat_forceall);
   2285 	mutex_unlock(&_pwmutex);
   2286 }
   2287 
   2288 /*ARGSUSED*/
   2289 int
   2290 setpassent(int stayopen)
   2291 {
   2292 	static const ns_dtab dtab[] = {
   2293 		NS_FILES_CB(_files_setpassent, NULL)
   2294 		NS_DNS_CB(_dns_setpassent, NULL)
   2295 		NS_NIS_CB(_nis_setpassent, NULL)
   2296 		NS_COMPAT_CB(_compat_setpassent, NULL)
   2297 		{ 0 }
   2298 	};
   2299 	int	rv, retval;
   2300 
   2301 	mutex_lock(&_pwmutex);
   2302 					/* force all setpassent() methods */
   2303 	rv = nsdispatch(NULL, dtab, NSDB_PASSWD, "setpassent",
   2304 	    defaultcompat_forceall, &retval, stayopen);
   2305 	mutex_unlock(&_pwmutex);
   2306 	return (rv == NS_SUCCESS) ? retval : 0;
   2307 }
   2308 
   2309 void
   2310 setpwent(void)
   2311 {
   2312 	static const ns_dtab dtab[] = {
   2313 		NS_FILES_CB(_files_setpwent, NULL)
   2314 		NS_DNS_CB(_dns_setpwent, NULL)
   2315 		NS_NIS_CB(_nis_setpwent, NULL)
   2316 		NS_COMPAT_CB(_compat_setpwent, NULL)
   2317 		{ 0 }
   2318 	};
   2319 
   2320 	mutex_lock(&_pwmutex);
   2321 					/* force all setpwent() methods */
   2322 	(void) nsdispatch(NULL, dtab, NSDB_PASSWD, "setpwent",
   2323 	    defaultcompat_forceall);
   2324 	mutex_unlock(&_pwmutex);
   2325 }
   2326