getpwent.c revision 1.83 1 /* $NetBSD: getpwent.c,v 1.83 2022/04/19 20:32:15 rillig Exp $ */
2
3 /*-
4 * Copyright (c) 1997-2000, 2004-2005 The NetBSD Foundation, Inc.
5 * All rights reserved.
6 *
7 * This code is derived from software contributed to The NetBSD Foundation
8 * by Luke Mewburn.
9 *
10 * Redistribution and use in source and binary forms, with or without
11 * modification, are permitted provided that the following conditions
12 * are met:
13 * 1. Redistributions of source code must retain the above copyright
14 * notice, this list of conditions and the following disclaimer.
15 * 2. Redistributions in binary form must reproduce the above copyright
16 * notice, this list of conditions and the following disclaimer in the
17 * documentation and/or other materials provided with the distribution.
18 *
19 * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
20 * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
21 * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
22 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
23 * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
24 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
25 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
26 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
27 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
28 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
29 * POSSIBILITY OF SUCH DAMAGE.
30 */
31
32 /*
33 * Copyright (c) 1988, 1993
34 * The Regents of the University of California. All rights reserved.
35 *
36 * Redistribution and use in source and binary forms, with or without
37 * modification, are permitted provided that the following conditions
38 * are met:
39 * 1. Redistributions of source code must retain the above copyright
40 * notice, this list of conditions and the following disclaimer.
41 * 2. Redistributions in binary form must reproduce the above copyright
42 * notice, this list of conditions and the following disclaimer in the
43 * documentation and/or other materials provided with the distribution.
44 * 3. Neither the name of the University nor the names of its contributors
45 * may be used to endorse or promote products derived from this software
46 * without specific prior written permission.
47 *
48 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
49 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
50 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
51 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
52 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
53 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
54 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
55 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
56 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
57 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
58 * SUCH DAMAGE.
59 */
60
61 /*
62 * Portions Copyright (c) 1994, 1995, Jason Downs. All rights reserved.
63 *
64 * Redistribution and use in source and binary forms, with or without
65 * modification, are permitted provided that the following conditions
66 * are met:
67 * 1. Redistributions of source code must retain the above copyright
68 * notice, this list of conditions and the following disclaimer.
69 * 2. Redistributions in binary form must reproduce the above copyright
70 * notice, this list of conditions and the following disclaimer in the
71 * documentation and/or other materials provided with the distribution.
72 *
73 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR(S) ``AS IS'' AND ANY EXPRESS
74 * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
75 * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
76 * DISCLAIMED. IN NO EVENT SHALL THE AUTHOR(S) BE LIABLE FOR ANY DIRECT,
77 * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
78 * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
79 * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
80 * CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
81 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
82 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
83 * SUCH DAMAGE.
84 */
85
86 #include <sys/cdefs.h>
87 #if defined(LIBC_SCCS) && !defined(lint)
88 #if 0
89 static char sccsid[] = "@(#)getpwent.c 8.2 (Berkeley) 4/27/95";
90 #else
91 __RCSID("$NetBSD: getpwent.c,v 1.83 2022/04/19 20:32:15 rillig Exp $");
92 #endif
93 #endif /* LIBC_SCCS and not lint */
94
95 #include "namespace.h"
96 #include "reentrant.h"
97
98 #include <sys/param.h>
99
100 #include <assert.h>
101 #include <db.h>
102 #include <errno.h>
103 #include <fcntl.h>
104 #include <limits.h>
105 #include <netgroup.h>
106 #include <nsswitch.h>
107 #include <pwd.h>
108 #include <stdarg.h>
109 #include <stdio.h>
110 #include <stdlib.h>
111 #include <string.h>
112 #include <syslog.h>
113 #include <unistd.h>
114
115 #ifdef HESIOD
116 #include <hesiod.h>
117 #endif
118
119 #ifdef YP
120 #include <rpc/rpc.h>
121 #include <rpcsvc/yp_prot.h>
122 #include <rpcsvc/ypclnt.h>
123 #endif
124
125 #include "pw_private.h"
126
127 #define _PASSWD_COMPAT /* "passwd" defaults to compat, so always provide it */
128
129 #ifdef __weak_alias
130 __weak_alias(endpwent,_endpwent)
131 __weak_alias(setpassent,_setpassent)
132 __weak_alias(setpwent,_setpwent)
133 #endif
134
135 #ifdef _REENTRANT
136 static mutex_t _pwmutex = MUTEX_INITIALIZER;
137 #endif
138
139 const char __yp_token[] = "__YP!"; /* Let pwd_mkdb pull this in. */
140
141
142 /*
143 * The pwd.db lookup techniques and data extraction code here must be kept
144 * in sync with that in `pwd_mkdb'.
145 */
146
147 #if defined(YP) || defined(HESIOD)
148 /*
149 * _pw_parse
150 * Parses entry using pw_scan(3) (without the trailing \n)
151 * after copying to buf, and fills in pw with corresponding values.
152 * If old is non-zero, entry is in _PASSWORD_OLDFMT.
153 * Returns 1 if parsed successfully, 0 on parse failure.
154 */
155 static int
156 _pw_parse(const char *entry, struct passwd *pw, char *buf, size_t buflen,
157 int old)
158 {
159 int flags;
160
161 _DIAGASSERT(entry != NULL);
162 _DIAGASSERT(pw != NULL);
163 _DIAGASSERT(buf != NULL);
164
165 if (strlcpy(buf, entry, buflen) >= buflen)
166 return 0;
167 flags = _PASSWORD_NOWARN;
168 if (old)
169 flags |= _PASSWORD_OLDFMT;
170 return __pw_scan(buf, pw, &flags);
171 }
172 #endif /* YP || HESIOD */
173
174 /*
175 * _pw_opendb
176 * if *db is NULL, dbopen(3) /etc/spwd.db or /etc/pwd.db (depending
177 * upon permissions, etc)
178 */
179 static int
180 _pw_opendb(DB **db, int *version)
181 {
182 static int warned;
183 DBT key;
184 DBT value;
185
186 const char *dbfile = NULL;
187
188 _DIAGASSERT(db != NULL);
189 _DIAGASSERT(version != NULL);
190 if (*db != NULL) /* open *db */
191 return NS_SUCCESS;
192
193 if (geteuid() == 0) {
194 dbfile = _PATH_SMP_DB;
195 *db = dbopen(dbfile, O_RDONLY, 0, DB_HASH, NULL);
196 }
197 if (*db == NULL) {
198 dbfile = _PATH_MP_DB;
199 *db = dbopen(dbfile, O_RDONLY, 0, DB_HASH, NULL);
200 }
201 if (*db == NULL) {
202 if (!warned) {
203 int serrno = errno;
204 syslog(LOG_ERR, "%s: %m", dbfile);
205 errno = serrno;
206 }
207 warned = 1;
208 return NS_UNAVAIL;
209 }
210 key.data = __UNCONST("VERSION");
211 key.size = strlen((char *)key.data) + 1;
212 switch ((*(*db)->get)(*db, &key, &value, 0)) {
213 case 0:
214 if (sizeof(*version) != value.size)
215 return NS_UNAVAIL;
216 (void)memcpy(version, value.data, value.size);
217 break; /* found */
218 case 1:
219 *version = 0; /* not found */
220 break;
221 case -1:
222 return NS_UNAVAIL; /* error in db routines */
223 default:
224 abort();
225 }
226 return NS_SUCCESS;
227 }
228
229 /*
230 * _pw_getkey
231 * Lookup key in *db, filling in pw
232 * with the result, allocating memory from buffer (size buflen).
233 * (The caller may point key.data to buffer on entry; the contents
234 * of key.data will be invalid on exit.)
235 */
236 static int
237 _pw_getkey(DB *db, DBT *key,
238 struct passwd *pw, char *buffer, size_t buflen, int *pwflags,
239 int version)
240 {
241 char *p, *t;
242 DBT data;
243
244 _DIAGASSERT(db != NULL);
245 _DIAGASSERT(key != NULL);
246 _DIAGASSERT(pw != NULL);
247 _DIAGASSERT(buffer != NULL);
248 /* pwflags may be NULL (if we don't care about them */
249
250 if (db == NULL) /* this shouldn't happen */
251 return NS_UNAVAIL;
252
253 switch ((db->get)(db, key, &data, 0)) {
254 case 0:
255 break; /* found */
256 case 1:
257 return NS_NOTFOUND; /* not found */
258 case -1:
259 return NS_UNAVAIL; /* error in db routines */
260 default:
261 abort();
262 }
263
264 p = (char *)data.data;
265 if (data.size > buflen) {
266 errno = ERANGE;
267 return NS_UNAVAIL;
268 }
269
270 /*
271 * THE DECODING BELOW MUST MATCH THAT IN pwd_mkdb.
272 */
273 t = buffer;
274 #define MACRO(a) do { a } while (0)
275 #define EXPAND(e) MACRO(e = t; while ((*t++ = *p++));)
276 #define SCALAR(v) MACRO(memmove(&(v), p, sizeof v); p += sizeof v;)
277 EXPAND(pw->pw_name);
278 EXPAND(pw->pw_passwd);
279 SCALAR(pw->pw_uid);
280 SCALAR(pw->pw_gid);
281 if (version == 0) {
282 int32_t tmp;
283 SCALAR(tmp);
284 pw->pw_change = tmp;
285 } else
286 SCALAR(pw->pw_change);
287 EXPAND(pw->pw_class);
288 EXPAND(pw->pw_gecos);
289 EXPAND(pw->pw_dir);
290 EXPAND(pw->pw_shell);
291 if (version == 0) {
292 int32_t tmp;
293 SCALAR(tmp);
294 pw->pw_expire = tmp;
295 } else
296 SCALAR(pw->pw_expire);
297 if (pwflags) {
298 /* See if there's any data left. If so, read in flags. */
299 if (data.size > (size_t) (p - (char *)data.data)) {
300 SCALAR(*pwflags);
301 } else { /* default */
302 *pwflags = _PASSWORD_NOUID|_PASSWORD_NOGID;
303 }
304 }
305
306 return NS_SUCCESS;
307 }
308
309 /*
310 * _pw_memfrombuf
311 * Obtain want bytes from buffer (of size buflen) and return a pointer
312 * to the available memory after adjusting buffer/buflen.
313 * Returns NULL if there is insufficient space.
314 */
315 static char *
316 _pw_memfrombuf(size_t want, char **buffer, size_t *buflen)
317 {
318 char *rv;
319
320 if (want > *buflen) {
321 errno = ERANGE;
322 return NULL;
323 }
324 rv = *buffer;
325 *buffer += want;
326 *buflen -= want;
327 return rv;
328 }
329
330 /*
331 * _pw_copy
332 * Copy the contents of frompw to pw; memory for strings
333 * and arrays will be allocated from buf (of size buflen).
334 * If proto != NULL, use various fields in proto in preference to frompw.
335 * Returns 1 if copied successfully, 0 on copy failure.
336 * NOTE: frompw must not use buf for its own pointers.
337 */
338 static int
339 _pw_copy(const struct passwd *frompw, struct passwd *pw,
340 char *buf, size_t buflen, const struct passwd *protopw, int protoflags)
341 {
342 size_t count;
343 int useproto;
344
345 _DIAGASSERT(frompw != NULL);
346 _DIAGASSERT(pw != NULL);
347 _DIAGASSERT(buf != NULL);
348 /* protopw may be NULL */
349
350 useproto = protopw && protopw->pw_name;
351
352 #define COPYSTR(to, from) \
353 do { \
354 count = strlen((from)); \
355 (to) = _pw_memfrombuf(count+1, &buf, &buflen); \
356 if ((to) == NULL) \
357 return 0; \
358 memmove((to), (from), count); \
359 to[count] = '\0'; \
360 } while (0) /* LINTED */
361
362 #define COPYFIELD(field) COPYSTR(pw->field, frompw->field)
363
364 #define COPYPROTOFIELD(field) COPYSTR(pw->field, \
365 (useproto && *protopw->field ? protopw->field : frompw->field))
366
367 COPYFIELD(pw_name);
368
369 #ifdef PW_OVERRIDE_PASSWD
370 COPYPROTOFIELD(pw_passwd);
371 #else
372 COPYFIELD(pw_passwd);
373 #endif
374
375 if (useproto && !(protoflags & _PASSWORD_NOUID))
376 pw->pw_uid = protopw->pw_uid;
377 else
378 pw->pw_uid = frompw->pw_uid;
379
380 if (useproto && !(protoflags & _PASSWORD_NOGID))
381 pw->pw_gid = protopw->pw_gid;
382 else
383 pw->pw_gid = frompw->pw_gid;
384
385 pw->pw_change = frompw->pw_change;
386 COPYFIELD(pw_class);
387 COPYPROTOFIELD(pw_gecos);
388 COPYPROTOFIELD(pw_dir);
389 COPYPROTOFIELD(pw_shell);
390
391 #undef COPYSTR
392 #undef COPYFIELD
393 #undef COPYPROTOFIELD
394
395 return 1;
396 }
397
398
399 /*
400 * files methods
401 */
402
403 /* state shared between files methods */
404 struct files_state {
405 int stayopen; /* see getpassent(3) */
406 DB *db; /* passwd file handle */
407 int keynum; /* key counter, -1 if no more */
408 int version;
409 };
410
411 static struct files_state _files_state;
412 /* storage for non _r functions */
413 static struct passwd _files_passwd;
414 static char _files_passwdbuf[_GETPW_R_SIZE_MAX];
415
416 static int
417 _files_start(struct files_state *state)
418 {
419 int rv;
420
421 _DIAGASSERT(state != NULL);
422
423 state->keynum = 0;
424 rv = _pw_opendb(&state->db, &state->version);
425 if (rv != NS_SUCCESS)
426 return rv;
427 return NS_SUCCESS;
428 }
429
430 static int
431 _files_end(struct files_state *state)
432 {
433
434 _DIAGASSERT(state != NULL);
435
436 state->keynum = 0;
437 if (state->db) {
438 (void)(state->db->close)(state->db);
439 state->db = NULL;
440 }
441 return NS_SUCCESS;
442 }
443
444 /*
445 * _files_pwscan
446 * Search state->db for the next desired entry.
447 * If search is _PW_KEYBYNUM, look for state->keynum.
448 * If search is _PW_KEYBYNAME, look for name.
449 * If search is _PW_KEYBYUID, look for uid.
450 * Sets *retval to the errno if the result is not NS_SUCCESS
451 * or NS_NOTFOUND.
452 */
453 static int
454 _files_pwscan(int *retval, struct passwd *pw, char *buffer, size_t buflen,
455 struct files_state *state, int search, const char *name, uid_t uid)
456 {
457 const void *from;
458 size_t fromlen;
459 DBT key;
460 int rv;
461
462 _DIAGASSERT(retval != NULL);
463 _DIAGASSERT(pw != NULL);
464 _DIAGASSERT(buffer != NULL);
465 _DIAGASSERT(state != NULL);
466 /* name is NULL to indicate searching for uid */
467
468 *retval = 0;
469
470 if (state->db == NULL) { /* only start if file not open yet */
471 rv = _files_start(state);
472 if (rv != NS_SUCCESS)
473 goto filespwscan_out;
474 }
475
476 for (;;) { /* search for a match */
477 switch (search) {
478 case _PW_KEYBYNUM:
479 if (state->keynum == -1)
480 return NS_NOTFOUND; /* no more records */
481 state->keynum++;
482 from = &state->keynum;
483 fromlen = sizeof(state->keynum);
484 break;
485 case _PW_KEYBYNAME:
486 from = name;
487 fromlen = strlen(name);
488 break;
489 case _PW_KEYBYUID:
490 from = &uid;
491 fromlen = sizeof(uid);
492 break;
493 default:
494 abort();
495 }
496
497 if (buflen <= fromlen) { /* buffer too small */
498 *retval = ERANGE;
499 return NS_UNAVAIL;
500 }
501 buffer[0] = search; /* setup key */
502 memmove(buffer + 1, from, fromlen);
503 key.size = fromlen + 1;
504 key.data = (u_char *)buffer;
505
506 /* search for key */
507 rv = _pw_getkey(state->db, &key, pw, buffer, buflen, NULL,
508 state->version);
509 if (rv != NS_SUCCESS) /* no match */
510 break;
511 if (pw->pw_name[0] == '+' || pw->pw_name[0] == '-') {
512 /* if a compat line */
513 if (search == _PW_KEYBYNUM)
514 continue; /* read next if pwent */
515 rv = NS_NOTFOUND; /* don't match if pw{nam,uid} */
516 break;
517 }
518 break;
519 }
520
521 if (rv == NS_NOTFOUND && search == _PW_KEYBYNUM)
522 state->keynum = -1; /* flag `no more records' */
523
524 if (rv == NS_SUCCESS) {
525 if ((search == _PW_KEYBYUID && pw->pw_uid != uid) ||
526 (search == _PW_KEYBYNAME && strcmp(pw->pw_name, name) != 0))
527 rv = NS_NOTFOUND;
528 }
529
530 filespwscan_out:
531 if (rv != NS_SUCCESS && rv != NS_NOTFOUND)
532 *retval = errno;
533 return rv;
534 }
535
536 /*ARGSUSED*/
537 static int
538 _files_setpwent(void *nsrv, void *nscb, va_list ap)
539 {
540
541 _files_state.stayopen = 0;
542 return _files_start(&_files_state);
543 }
544
545 /*ARGSUSED*/
546 static int
547 _files_setpassent(void *nsrv, void *nscb, va_list ap)
548 {
549 int *retval = va_arg(ap, int *);
550 int stayopen = va_arg(ap, int);
551
552 int rv;
553
554 _files_state.stayopen = stayopen;
555 rv = _files_start(&_files_state);
556 *retval = (rv == NS_SUCCESS);
557 return rv;
558 }
559
560 /*ARGSUSED*/
561 static int
562 _files_endpwent(void *nsrv, void *nscb, va_list ap)
563 {
564
565 _files_state.stayopen = 0;
566 return _files_end(&_files_state);
567 }
568
569 /*ARGSUSED*/
570 static int
571 _files_getpwent(void *nsrv, void *nscb, va_list ap)
572 {
573 struct passwd **retval = va_arg(ap, struct passwd **);
574
575 int rv, rerror;
576
577 _DIAGASSERT(retval != NULL);
578
579 *retval = NULL;
580 rv = _files_pwscan(&rerror, &_files_passwd,
581 _files_passwdbuf, sizeof(_files_passwdbuf),
582 &_files_state, _PW_KEYBYNUM, NULL, 0);
583 if (rv == NS_SUCCESS)
584 *retval = &_files_passwd;
585 return rv;
586 }
587
588 /*ARGSUSED*/
589 static int
590 _files_getpwent_r(void *nsrv, void *nscb, va_list ap)
591 {
592 int *retval = va_arg(ap, int *);
593 struct passwd *pw = va_arg(ap, struct passwd *);
594 char *buffer = va_arg(ap, char *);
595 size_t buflen = va_arg(ap, size_t);
596 struct passwd **result = va_arg(ap, struct passwd **);
597
598 int rv;
599
600 _DIAGASSERT(retval != NULL);
601 _DIAGASSERT(pw != NULL);
602 _DIAGASSERT(buffer != NULL);
603 _DIAGASSERT(result != NULL);
604
605 rv = _files_pwscan(retval, pw, buffer, buflen, &_files_state,
606 _PW_KEYBYNUM, NULL, 0);
607 if (rv == NS_SUCCESS)
608 *result = pw;
609 else
610 *result = NULL;
611 return rv;
612 }
613
614 /*ARGSUSED*/
615 static int
616 _files_getpwnam(void *nsrv, void *nscb, va_list ap)
617 {
618 struct passwd **retval = va_arg(ap, struct passwd **);
619 const char *name = va_arg(ap, const char *);
620
621 int rv, rerror;
622
623 _DIAGASSERT(retval != NULL);
624
625 *retval = NULL;
626 rv = _files_start(&_files_state);
627 if (rv != NS_SUCCESS)
628 return rv;
629 rv = _files_pwscan(&rerror, &_files_passwd,
630 _files_passwdbuf, sizeof(_files_passwdbuf),
631 &_files_state, _PW_KEYBYNAME, name, 0);
632 if (!_files_state.stayopen)
633 _files_end(&_files_state);
634 if (rv == NS_SUCCESS)
635 *retval = &_files_passwd;
636 return rv;
637 }
638
639 /*ARGSUSED*/
640 static int
641 _files_getpwnam_r(void *nsrv, void *nscb, va_list ap)
642 {
643 int *retval = va_arg(ap, int *);
644 const char *name = va_arg(ap, const char *);
645 struct passwd *pw = va_arg(ap, struct passwd *);
646 char *buffer = va_arg(ap, char *);
647 size_t buflen = va_arg(ap, size_t);
648 struct passwd **result = va_arg(ap, struct passwd **);
649
650 struct files_state state;
651 int rv;
652
653 _DIAGASSERT(retval != NULL);
654 _DIAGASSERT(pw != NULL);
655 _DIAGASSERT(buffer != NULL);
656 _DIAGASSERT(result != NULL);
657
658 *result = NULL;
659 memset(&state, 0, sizeof(state));
660 rv = _files_pwscan(retval, pw, buffer, buflen, &state,
661 _PW_KEYBYNAME, name, 0);
662 _files_end(&state);
663 if (rv == NS_SUCCESS)
664 *result = pw;
665 return rv;
666 }
667
668 /*ARGSUSED*/
669 static int
670 _files_getpwuid(void *nsrv, void *nscb, va_list ap)
671 {
672 struct passwd **retval = va_arg(ap, struct passwd **);
673 uid_t uid = va_arg(ap, uid_t);
674
675 int rv, rerror;
676
677 _DIAGASSERT(retval != NULL);
678
679 *retval = NULL;
680 rv = _files_start(&_files_state);
681 if (rv != NS_SUCCESS)
682 return rv;
683 rv = _files_pwscan(&rerror, &_files_passwd,
684 _files_passwdbuf, sizeof(_files_passwdbuf),
685 &_files_state, _PW_KEYBYUID, NULL, uid);
686 if (!_files_state.stayopen)
687 _files_end(&_files_state);
688 if (rv == NS_SUCCESS)
689 *retval = &_files_passwd;
690 return rv;
691 }
692
693 /*ARGSUSED*/
694 static int
695 _files_getpwuid_r(void *nsrv, void *nscb, va_list ap)
696 {
697 int *retval = va_arg(ap, int *);
698 uid_t uid = va_arg(ap, uid_t);
699 struct passwd *pw = va_arg(ap, struct passwd *);
700 char *buffer = va_arg(ap, char *);
701 size_t buflen = va_arg(ap, size_t);
702 struct passwd **result = va_arg(ap, struct passwd **);
703
704 struct files_state state;
705 int rv;
706
707 _DIAGASSERT(retval != NULL);
708 _DIAGASSERT(pw != NULL);
709 _DIAGASSERT(buffer != NULL);
710 _DIAGASSERT(result != NULL);
711
712 *result = NULL;
713 memset(&state, 0, sizeof(state));
714 rv = _files_pwscan(retval, pw, buffer, buflen, &state,
715 _PW_KEYBYUID, NULL, uid);
716 _files_end(&state);
717 if (rv == NS_SUCCESS)
718 *result = pw;
719 return rv;
720 }
721
722
723 #ifdef HESIOD
724 /*
725 * dns methods
726 */
727
728 /* state shared between dns methods */
729 struct dns_state {
730 int stayopen; /* see getpassent(3) */
731 void *context; /* Hesiod context */
732 int num; /* passwd index, -1 if no more */
733 };
734
735 static struct dns_state _dns_state;
736 /* storage for non _r functions */
737 static struct passwd _dns_passwd;
738 static char _dns_passwdbuf[_GETPW_R_SIZE_MAX];
739
740 static int
741 _dns_start(struct dns_state *state)
742 {
743
744 _DIAGASSERT(state != NULL);
745
746 state->num = 0;
747 if (state->context == NULL) { /* setup Hesiod */
748 if (hesiod_init(&state->context) == -1)
749 return NS_UNAVAIL;
750 }
751
752 return NS_SUCCESS;
753 }
754
755 static int
756 _dns_end(struct dns_state *state)
757 {
758
759 _DIAGASSERT(state != NULL);
760
761 state->num = 0;
762 if (state->context) {
763 hesiod_end(state->context);
764 state->context = NULL;
765 }
766 return NS_SUCCESS;
767 }
768
769 /*
770 * _dns_pwscan
771 * Look for the Hesiod name provided in buffer in the NULL-terminated
772 * list of zones,
773 * and decode into pw/buffer/buflen.
774 */
775 static int
776 _dns_pwscan(int *retval, struct passwd *pw, char *buffer, size_t buflen,
777 struct dns_state *state, const char **zones)
778 {
779 const char **curzone;
780 char **hp, *ep;
781 int rv;
782
783 _DIAGASSERT(retval != NULL);
784 _DIAGASSERT(pw != NULL);
785 _DIAGASSERT(buffer != NULL);
786 _DIAGASSERT(state != NULL);
787 _DIAGASSERT(zones != NULL);
788
789 *retval = 0;
790
791 if (state->context == NULL) { /* only start if Hesiod not setup */
792 rv = _dns_start(state);
793 if (rv != NS_SUCCESS)
794 return rv;
795 }
796
797 hp = NULL;
798 rv = NS_NOTFOUND;
799
800 for (curzone = zones; *curzone; curzone++) { /* search zones */
801 hp = hesiod_resolve(state->context, buffer, *curzone);
802 if (hp != NULL)
803 break;
804 if (errno != ENOENT) {
805 rv = NS_UNAVAIL;
806 goto dnspwscan_out;
807 }
808 }
809 if (*curzone == NULL)
810 goto dnspwscan_out;
811
812 if ((ep = strchr(hp[0], '\n')) != NULL)
813 *ep = '\0'; /* clear trailing \n */
814 if (_pw_parse(hp[0], pw, buffer, buflen, 1)) /* validate line */
815 rv = NS_SUCCESS;
816 else
817 rv = NS_UNAVAIL;
818
819 dnspwscan_out:
820 if (rv != NS_SUCCESS && rv != NS_NOTFOUND)
821 *retval = errno;
822 if (hp)
823 hesiod_free_list(state->context, hp);
824 return rv;
825 }
826
827 /*ARGSUSED*/
828 static int
829 _dns_setpwent(void *nsrv, void *nscb, va_list ap)
830 {
831
832 _dns_state.stayopen = 0;
833 return _dns_start(&_dns_state);
834 }
835
836 /*ARGSUSED*/
837 static int
838 _dns_setpassent(void *nsrv, void *nscb, va_list ap)
839 {
840 int *retval = va_arg(ap, int *);
841 int stayopen = va_arg(ap, int);
842
843 int rv;
844
845 _dns_state.stayopen = stayopen;
846 rv = _dns_start(&_dns_state);
847 *retval = (rv == NS_SUCCESS);
848 return rv;
849 }
850
851 /*ARGSUSED*/
852 static int
853 _dns_endpwent(void *nsrv, void *nscb, va_list ap)
854 {
855
856 _dns_state.stayopen = 0;
857 return _dns_end(&_dns_state);
858 }
859
860 /*ARGSUSED*/
861 static int
862 _dns_getpwent(void *nsrv, void *nscb, va_list ap)
863 {
864 struct passwd **retval = va_arg(ap, struct passwd **);
865
866 char **hp, *ep;
867 int rv;
868
869 _DIAGASSERT(retval != NULL);
870
871 *retval = NULL;
872
873 if (_dns_state.num == -1) /* exhausted search */
874 return NS_NOTFOUND;
875
876 if (_dns_state.context == NULL) {
877 /* only start if Hesiod not setup */
878 rv = _dns_start(&_dns_state);
879 if (rv != NS_SUCCESS)
880 return rv;
881 }
882
883 next_dns_entry:
884 hp = NULL;
885 rv = NS_NOTFOUND;
886
887 /* find passwd-NNN */
888 snprintf(_dns_passwdbuf, sizeof(_dns_passwdbuf),
889 "passwd-%u", _dns_state.num);
890 _dns_state.num++;
891
892 hp = hesiod_resolve(_dns_state.context, _dns_passwdbuf, "passwd");
893 if (hp == NULL) {
894 if (errno == ENOENT)
895 _dns_state.num = -1;
896 else
897 rv = NS_UNAVAIL;
898 } else {
899 if ((ep = strchr(hp[0], '\n')) != NULL)
900 *ep = '\0'; /* clear trailing \n */
901 /* validate line */
902 if (_pw_parse(hp[0], &_dns_passwd,
903 _dns_passwdbuf, sizeof(_dns_passwdbuf), 1))
904 rv = NS_SUCCESS;
905 else { /* dodgy entry, try again */
906 hesiod_free_list(_dns_state.context, hp);
907 goto next_dns_entry;
908 }
909 }
910
911 if (hp)
912 hesiod_free_list(_dns_state.context, hp);
913 if (rv == NS_SUCCESS)
914 *retval = &_dns_passwd;
915 return rv;
916 }
917
918 /*ARGSUSED*/
919 static int
920 _dns_getpwent_r(void *nsrv, void *nscb, va_list ap)
921 {
922 int *retval = va_arg(ap, int *);
923 struct passwd *pw = va_arg(ap, struct passwd *);
924 char *buffer = va_arg(ap, char *);
925 size_t buflen = va_arg(ap, size_t);
926 struct passwd **result = va_arg(ap, struct passwd **);
927
928 char **hp, *ep;
929 int rv;
930
931 _DIAGASSERT(retval != NULL);
932 _DIAGASSERT(pw != NULL);
933 _DIAGASSERT(buffer != NULL);
934 _DIAGASSERT(result != NULL);
935
936 *retval = 0;
937
938 if (_dns_state.num == -1) /* exhausted search */
939 return NS_NOTFOUND;
940
941 if (_dns_state.context == NULL) {
942 /* only start if Hesiod not setup */
943 rv = _dns_start(&_dns_state);
944 if (rv != NS_SUCCESS)
945 return rv;
946 }
947
948 next_dns_entry:
949 hp = NULL;
950 rv = NS_NOTFOUND;
951
952 /* find passwd-NNN */
953 snprintf(buffer, buflen, "passwd-%u", _dns_state.num);
954 _dns_state.num++;
955
956 hp = hesiod_resolve(_dns_state.context, buffer, "passwd");
957 if (hp == NULL) {
958 if (errno == ENOENT)
959 _dns_state.num = -1;
960 else
961 rv = NS_UNAVAIL;
962 } else {
963 if ((ep = strchr(hp[0], '\n')) != NULL)
964 *ep = '\0'; /* clear trailing \n */
965 /* validate line */
966 if (_pw_parse(hp[0], pw, buffer, buflen, 1))
967 rv = NS_SUCCESS;
968 else { /* dodgy entry, try again */
969 hesiod_free_list(_dns_state.context, hp);
970 goto next_dns_entry;
971 }
972 }
973
974 if (hp)
975 hesiod_free_list(_dns_state.context, hp);
976 if (rv == NS_SUCCESS)
977 *result = pw;
978 else
979 *result = NULL;
980 return rv;
981 }
982
983 static const char *_dns_uid_zones[] = {
984 "uid",
985 "passwd",
986 NULL
987 };
988
989 /*ARGSUSED*/
990 static int
991 _dns_getpwuid(void *nsrv, void *nscb, va_list ap)
992 {
993 struct passwd **retval = va_arg(ap, struct passwd **);
994 uid_t uid = va_arg(ap, uid_t);
995
996 int rv, rerror;
997
998 _DIAGASSERT(retval != NULL);
999
1000 *retval = NULL;
1001 rv = _dns_start(&_dns_state);
1002 if (rv != NS_SUCCESS)
1003 return rv;
1004 snprintf(_dns_passwdbuf, sizeof(_dns_passwdbuf),
1005 "%u", (unsigned int)uid);
1006 rv = _dns_pwscan(&rerror, &_dns_passwd,
1007 _dns_passwdbuf, sizeof(_dns_passwdbuf),
1008 &_dns_state, _dns_uid_zones);
1009 if (!_dns_state.stayopen)
1010 _dns_end(&_dns_state);
1011 if (rv == NS_SUCCESS && uid == _dns_passwd.pw_uid)
1012 *retval = &_dns_passwd;
1013 return rv;
1014 }
1015
1016 /*ARGSUSED*/
1017 static int
1018 _dns_getpwuid_r(void *nsrv, void *nscb, va_list ap)
1019 {
1020 int *retval = va_arg(ap, int *);
1021 uid_t uid = va_arg(ap, uid_t);
1022 struct passwd *pw = va_arg(ap, struct passwd *);
1023 char *buffer = va_arg(ap, char *);
1024 size_t buflen = va_arg(ap, size_t);
1025 struct passwd **result = va_arg(ap, struct passwd **);
1026
1027 struct dns_state state;
1028 int rv;
1029
1030 _DIAGASSERT(retval != NULL);
1031 _DIAGASSERT(pw != NULL);
1032 _DIAGASSERT(buffer != NULL);
1033 _DIAGASSERT(result != NULL);
1034
1035 *result = NULL;
1036 memset(&state, 0, sizeof(state));
1037 snprintf(buffer, buflen, "%u", (unsigned int)uid);
1038 rv = _dns_pwscan(retval, pw, buffer, buflen, &state, _dns_uid_zones);
1039 _dns_end(&state);
1040 if (rv != NS_SUCCESS)
1041 return rv;
1042 if (uid == pw->pw_uid) {
1043 *result = pw;
1044 return NS_SUCCESS;
1045 } else
1046 return NS_NOTFOUND;
1047 }
1048
1049 static const char *_dns_nam_zones[] = {
1050 "passwd",
1051 NULL
1052 };
1053
1054 /*ARGSUSED*/
1055 static int
1056 _dns_getpwnam(void *nsrv, void *nscb, va_list ap)
1057 {
1058 struct passwd **retval = va_arg(ap, struct passwd **);
1059 const char *name = va_arg(ap, const char *);
1060
1061 int rv, rerror;
1062
1063 _DIAGASSERT(retval != NULL);
1064
1065 *retval = NULL;
1066 rv = _dns_start(&_dns_state);
1067 if (rv != NS_SUCCESS)
1068 return rv;
1069 snprintf(_dns_passwdbuf, sizeof(_dns_passwdbuf), "%s", name);
1070 rv = _dns_pwscan(&rerror, &_dns_passwd,
1071 _dns_passwdbuf, sizeof(_dns_passwdbuf),
1072 &_dns_state, _dns_nam_zones);
1073 if (!_dns_state.stayopen)
1074 _dns_end(&_dns_state);
1075 if (rv == NS_SUCCESS && strcmp(name, _dns_passwd.pw_name) == 0)
1076 *retval = &_dns_passwd;
1077 return rv;
1078 }
1079
1080 /*ARGSUSED*/
1081 static int
1082 _dns_getpwnam_r(void *nsrv, void *nscb, va_list ap)
1083 {
1084 int *retval = va_arg(ap, int *);
1085 const char *name = va_arg(ap, const char *);
1086 struct passwd *pw = va_arg(ap, struct passwd *);
1087 char *buffer = va_arg(ap, char *);
1088 size_t buflen = va_arg(ap, size_t);
1089 struct passwd **result = va_arg(ap, struct passwd **);
1090
1091 struct dns_state state;
1092 int rv;
1093
1094 _DIAGASSERT(retval != NULL);
1095 _DIAGASSERT(pw != NULL);
1096 _DIAGASSERT(buffer != NULL);
1097 _DIAGASSERT(result != NULL);
1098
1099 *result = NULL;
1100 memset(&state, 0, sizeof(state));
1101 snprintf(buffer, buflen, "%s", name);
1102 rv = _dns_pwscan(retval, pw, buffer, buflen, &state, _dns_nam_zones);
1103 _dns_end(&state);
1104 if (rv != NS_SUCCESS)
1105 return rv;
1106 if (strcmp(name, pw->pw_name) == 0) {
1107 *result = pw;
1108 return NS_SUCCESS;
1109 } else
1110 return NS_NOTFOUND;
1111 }
1112
1113 #endif /* HESIOD */
1114
1115
1116 #ifdef YP
1117 /*
1118 * nis methods
1119 */
1120 /* state shared between nis methods */
1121 struct nis_state {
1122 int stayopen; /* see getpassent(3) */
1123 char *domain; /* NIS domain */
1124 int done; /* non-zero if search exhausted */
1125 char *current; /* current first/next match */
1126 int currentlen; /* length of _nis_current */
1127 enum { /* shadow map type */
1128 NISMAP_UNKNOWN = 0, /* unknown ... */
1129 NISMAP_NONE, /* none: use "passwd.by*" */
1130 NISMAP_ADJUNCT, /* pw_passwd from "passwd.adjunct.*" */
1131 NISMAP_MASTER /* all from "master.passwd.by*" */
1132 } maptype;
1133 };
1134
1135 static struct nis_state _nis_state;
1136 /* storage for non _r functions */
1137 static struct passwd _nis_passwd;
1138 static char _nis_passwdbuf[_GETPW_R_SIZE_MAX];
1139
1140 static const char __nis_pw_n_1[] = "master.passwd.byname";
1141 static const char __nis_pw_n_2[] = "passwd.byname";
1142 static const char __nis_pw_u_1[] = "master.passwd.byuid";
1143 static const char __nis_pw_u_2[] = "passwd.byuid";
1144
1145 static const char * const __nis_pw_n_map[4] = { __nis_pw_n_2, __nis_pw_n_2, __nis_pw_n_2, __nis_pw_n_1 };
1146 static const char * const __nis_pw_u_map[4] = { __nis_pw_u_2, __nis_pw_u_2, __nis_pw_u_2, __nis_pw_u_1 };
1147
1148 /* macros for deciding which NIS maps to use. */
1149 #define PASSWD_BYNAME(x) ((x)->maptype == NISMAP_MASTER ? __nis_pw_n_1 : __nis_pw_n_2)
1150 #define PASSWD_BYUID(x) ((x)->maptype == NISMAP_MASTER ? __nis_pw_u_1 : __nis_pw_u_2)
1151
1152 static int
1153 _nis_start(struct nis_state *state)
1154 {
1155
1156 _DIAGASSERT(state != NULL);
1157
1158 state->done = 0;
1159 if (state->current) {
1160 free(state->current);
1161 state->current = NULL;
1162 }
1163 if (state->domain == NULL) { /* setup NIS */
1164 switch (yp_get_default_domain(&state->domain)) {
1165 case 0:
1166 break;
1167 case YPERR_RESRC:
1168 return NS_TRYAGAIN;
1169 default:
1170 return NS_UNAVAIL;
1171 }
1172 }
1173
1174 /* determine where to get pw_passwd from */
1175 if (state->maptype == NISMAP_UNKNOWN) {
1176 int r, order;
1177
1178 state->maptype = NISMAP_NONE; /* default to no adjunct */
1179 if (geteuid() != 0) /* non-root can't use adjunct */
1180 return NS_SUCCESS;
1181
1182 /* look for "master.passwd.*" */
1183 r = yp_order(state->domain, "master.passwd.byname", &order);
1184 if (r == 0) {
1185 state->maptype = NISMAP_MASTER;
1186 return NS_SUCCESS;
1187 }
1188
1189 /* master.passwd doesn't exist, try passwd.adjunct */
1190 if (r == YPERR_MAP) {
1191 r = yp_order(state->domain, "passwd.adjunct.byname",
1192 &order);
1193 if (r == 0)
1194 state->maptype = NISMAP_ADJUNCT;
1195 }
1196 }
1197 return NS_SUCCESS;
1198 }
1199
1200 static int
1201 _nis_end(struct nis_state *state)
1202 {
1203
1204 _DIAGASSERT(state != NULL);
1205
1206 if (state->domain)
1207 state->domain = NULL;
1208 state->done = 0;
1209 if (state->current)
1210 free(state->current);
1211 state->current = NULL;
1212 state->maptype = NISMAP_UNKNOWN;
1213 return NS_SUCCESS;
1214 }
1215
1216 /*
1217 * nis_parse
1218 * wrapper to _pw_parse that obtains the real password from the
1219 * "passwd.adjunct.byname" NIS map if the maptype is NISMAP_ADJUNCT.
1220 */
1221 static int
1222 _nis_parse(const char *entry, struct passwd *pw, char *buf, size_t buflen,
1223 struct nis_state *state)
1224 {
1225 size_t elen;
1226
1227 _DIAGASSERT(entry != NULL);
1228 _DIAGASSERT(pw != NULL);
1229 _DIAGASSERT(buf != NULL);
1230 _DIAGASSERT(state != NULL);
1231
1232 elen = strlen(entry) + 1;
1233 if (elen >= buflen)
1234 return 0;
1235 if (! _pw_parse(entry, pw, buf, buflen,
1236 !(state->maptype == NISMAP_MASTER)))
1237 return 0;
1238
1239 if ((state->maptype == NISMAP_ADJUNCT) &&
1240 (strstr(pw->pw_passwd, "##") != NULL)) {
1241 char *data;
1242 int datalen;
1243
1244 if (yp_match(state->domain, "passwd.adjunct.byname",
1245 pw->pw_name, (int)strlen(pw->pw_name),
1246 &data, &datalen) == 0) {
1247 char *bp, *ep;
1248 /* skip name to get password */
1249 ep = data;
1250 if (strsep(&ep, ":") != NULL &&
1251 (bp = strsep(&ep, ":")) != NULL) {
1252 /* store new pw_passwd after entry */
1253 if (strlcpy(buf + elen, bp, buflen - elen) >=
1254 buflen - elen) {
1255 free(data);
1256 return 0;
1257 }
1258 pw->pw_passwd = &buf[elen];
1259 }
1260 free(data);
1261 }
1262 }
1263
1264 return 1;
1265 }
1266
1267
1268 /*
1269 * _nis_pwscan
1270 * Look for the yp key provided in buffer from map,
1271 * and decode into pw/buffer/buflen.
1272 */
1273 static int
1274 _nis_pwscan(int *retval, struct passwd *pw, char *buffer, size_t buflen,
1275 struct nis_state *state, const char * const *map_arr, size_t nmaps)
1276 {
1277 char *data;
1278 int nisr, rv, datalen;
1279
1280 _DIAGASSERT(retval != NULL);
1281 _DIAGASSERT(pw != NULL);
1282 _DIAGASSERT(buffer != NULL);
1283 _DIAGASSERT(state != NULL);
1284 _DIAGASSERT(map_arr != NULL);
1285
1286 *retval = 0;
1287
1288 if (state->domain == NULL) { /* only start if NIS not setup */
1289 rv = _nis_start(state);
1290 if (rv != NS_SUCCESS)
1291 return rv;
1292 }
1293
1294 data = NULL;
1295 rv = NS_NOTFOUND;
1296 _DIAGASSERT(state->maptype != NISMAP_UNKNOWN &&
1297 (unsigned)state->maptype < nmaps);
1298
1299 /* search map */
1300 nisr = yp_match(state->domain, map_arr[state->maptype], buffer, (int)strlen(buffer),
1301 &data, &datalen);
1302 switch (nisr) {
1303 case 0:
1304 data[datalen] = '\0'; /* clear trailing \n */
1305 if (_nis_parse(data, pw, buffer, buflen, state))
1306 rv = NS_SUCCESS; /* validate line */
1307 else
1308 rv = NS_UNAVAIL;
1309 break;
1310 case YPERR_KEY:
1311 break;
1312 default:
1313 rv = NS_UNAVAIL;
1314 break;
1315 }
1316
1317 if (rv != NS_SUCCESS && rv != NS_NOTFOUND)
1318 *retval = errno;
1319 if (data)
1320 free(data);
1321 return rv;
1322 }
1323
1324 /*ARGSUSED*/
1325 static int
1326 _nis_setpwent(void *nsrv, void *nscb, va_list ap)
1327 {
1328
1329 _nis_state.stayopen = 0;
1330 return _nis_start(&_nis_state);
1331 }
1332
1333 /*ARGSUSED*/
1334 static int
1335 _nis_setpassent(void *nsrv, void *nscb, va_list ap)
1336 {
1337 int *retval = va_arg(ap, int *);
1338 int stayopen = va_arg(ap, int);
1339
1340 int rv;
1341
1342 _nis_state.stayopen = stayopen;
1343 rv = _nis_start(&_nis_state);
1344 *retval = (rv == NS_SUCCESS);
1345 return rv;
1346 }
1347
1348 /*ARGSUSED*/
1349 static int
1350 _nis_endpwent(void *nsrv, void *nscb, va_list ap)
1351 {
1352
1353 return _nis_end(&_nis_state);
1354 }
1355
1356
1357 /*ARGSUSED*/
1358 static int
1359 _nis_getpwent(void *nsrv, void *nscb, va_list ap)
1360 {
1361 struct passwd **retval = va_arg(ap, struct passwd **);
1362
1363 char *key, *data;
1364 int keylen, datalen, rv, nisr;
1365
1366 _DIAGASSERT(retval != NULL);
1367
1368 *retval = NULL;
1369
1370 if (_nis_state.done) /* exhausted search */
1371 return NS_NOTFOUND;
1372 if (_nis_state.domain == NULL) {
1373 /* only start if NIS not setup */
1374 rv = _nis_start(&_nis_state);
1375 if (rv != NS_SUCCESS)
1376 return rv;
1377 }
1378
1379 next_nis_entry:
1380 key = NULL;
1381 data = NULL;
1382 rv = NS_NOTFOUND;
1383
1384 if (_nis_state.current) { /* already searching */
1385 nisr = yp_next(_nis_state.domain, PASSWD_BYNAME(&_nis_state),
1386 _nis_state.current, _nis_state.currentlen,
1387 &key, &keylen, &data, &datalen);
1388 free(_nis_state.current);
1389 _nis_state.current = NULL;
1390 switch (nisr) {
1391 case 0:
1392 _nis_state.current = key;
1393 _nis_state.currentlen = keylen;
1394 key = NULL;
1395 break;
1396 case YPERR_NOMORE:
1397 _nis_state.done = 1;
1398 goto nisent_out;
1399 default:
1400 rv = NS_UNAVAIL;
1401 goto nisent_out;
1402 }
1403 } else { /* new search */
1404 if (yp_first(_nis_state.domain, PASSWD_BYNAME(&_nis_state),
1405 &_nis_state.current, &_nis_state.currentlen,
1406 &data, &datalen)) {
1407 rv = NS_UNAVAIL;
1408 goto nisent_out;
1409 }
1410 }
1411
1412 data[datalen] = '\0'; /* clear trailing \n */
1413 /* validate line */
1414 if (_nis_parse(data, &_nis_passwd,
1415 _nis_passwdbuf, sizeof(_nis_passwdbuf), &_nis_state))
1416 rv = NS_SUCCESS;
1417 else { /* dodgy entry, try again */
1418 free(data);
1419 goto next_nis_entry;
1420 }
1421
1422 nisent_out:
1423 if (key)
1424 free(key);
1425 if (data)
1426 free(data);
1427 if (rv == NS_SUCCESS)
1428 *retval = &_nis_passwd;
1429 return rv;
1430 }
1431
1432 /*ARGSUSED*/
1433 static int
1434 _nis_getpwent_r(void *nsrv, void *nscb, va_list ap)
1435 {
1436 int *retval = va_arg(ap, int *);
1437 struct passwd *pw = va_arg(ap, struct passwd *);
1438 char *buffer = va_arg(ap, char *);
1439 size_t buflen = va_arg(ap, size_t);
1440 struct passwd **result = va_arg(ap, struct passwd **);
1441
1442 char *key, *data;
1443 int keylen, datalen, rv, nisr;
1444
1445 _DIAGASSERT(retval != NULL);
1446 _DIAGASSERT(pw != NULL);
1447 _DIAGASSERT(buffer != NULL);
1448 _DIAGASSERT(result != NULL);
1449
1450 *retval = 0;
1451
1452 if (_nis_state.done) /* exhausted search */
1453 return NS_NOTFOUND;
1454 if (_nis_state.domain == NULL) {
1455 /* only start if NIS not setup */
1456 rv = _nis_start(&_nis_state);
1457 if (rv != NS_SUCCESS)
1458 return rv;
1459 }
1460
1461 next_nis_entry:
1462 key = NULL;
1463 data = NULL;
1464 rv = NS_NOTFOUND;
1465
1466 if (_nis_state.current) { /* already searching */
1467 nisr = yp_next(_nis_state.domain, PASSWD_BYNAME(&_nis_state),
1468 _nis_state.current, _nis_state.currentlen,
1469 &key, &keylen, &data, &datalen);
1470 free(_nis_state.current);
1471 _nis_state.current = NULL;
1472 switch (nisr) {
1473 case 0:
1474 _nis_state.current = key;
1475 _nis_state.currentlen = keylen;
1476 key = NULL;
1477 break;
1478 case YPERR_NOMORE:
1479 _nis_state.done = 1;
1480 goto nisent_out;
1481 default:
1482 rv = NS_UNAVAIL;
1483 goto nisent_out;
1484 }
1485 } else { /* new search */
1486 if (yp_first(_nis_state.domain, PASSWD_BYNAME(&_nis_state),
1487 &_nis_state.current, &_nis_state.currentlen,
1488 &data, &datalen)) {
1489 rv = NS_UNAVAIL;
1490 goto nisent_out;
1491 }
1492 }
1493
1494 data[datalen] = '\0'; /* clear trailing \n */
1495 /* validate line */
1496 if (_nis_parse(data, pw, buffer, buflen, &_nis_state))
1497 rv = NS_SUCCESS;
1498 else { /* dodgy entry, try again */
1499 if (key)
1500 free(key);
1501 free(data);
1502 goto next_nis_entry;
1503 }
1504
1505 nisent_out:
1506 if (key)
1507 free(key);
1508 if (data)
1509 free(data);
1510 if (rv == NS_SUCCESS)
1511 *result = pw;
1512 else
1513 *result = NULL;
1514 return rv;
1515 }
1516
1517 /*ARGSUSED*/
1518 static int
1519 _nis_getpwuid(void *nsrv, void *nscb, va_list ap)
1520 {
1521 struct passwd **retval = va_arg(ap, struct passwd **);
1522 uid_t uid = va_arg(ap, uid_t);
1523
1524 int rv, rerror;
1525
1526 _DIAGASSERT(retval != NULL);
1527
1528 *retval = NULL;
1529 rv = _nis_start(&_nis_state);
1530 if (rv != NS_SUCCESS)
1531 return rv;
1532 snprintf(_nis_passwdbuf, sizeof(_nis_passwdbuf), "%u", (unsigned int)uid);
1533 rv = _nis_pwscan(&rerror, &_nis_passwd,
1534 _nis_passwdbuf, sizeof(_nis_passwdbuf),
1535 &_nis_state, __nis_pw_u_map, __arraycount(__nis_pw_u_map));
1536 if (!_nis_state.stayopen)
1537 _nis_end(&_nis_state);
1538 if (rv == NS_SUCCESS && uid == _nis_passwd.pw_uid)
1539 *retval = &_nis_passwd;
1540 return rv;
1541 }
1542
1543 /*ARGSUSED*/
1544 static int
1545 _nis_getpwuid_r(void *nsrv, void *nscb, va_list ap)
1546 {
1547 int *retval = va_arg(ap, int *);
1548 uid_t uid = va_arg(ap, uid_t);
1549 struct passwd *pw = va_arg(ap, struct passwd *);
1550 char *buffer = va_arg(ap, char *);
1551 size_t buflen = va_arg(ap, size_t);
1552 struct passwd **result = va_arg(ap, struct passwd **);
1553
1554 struct nis_state state;
1555 int rv;
1556
1557 _DIAGASSERT(retval != NULL);
1558 _DIAGASSERT(pw != NULL);
1559 _DIAGASSERT(buffer != NULL);
1560 _DIAGASSERT(result != NULL);
1561
1562 *result = NULL;
1563 snprintf(buffer, buflen, "%u", (unsigned int)uid);
1564 /* remark: we run under a global mutex inside of this module ... */
1565 if (_nis_state.stayopen)
1566 { /* use global state only if stayopen is set - otherwise we would blow up getpwent_r() ... */
1567 rv = _nis_pwscan(retval, pw, buffer, buflen,
1568 &_nis_state, __nis_pw_u_map, __arraycount(__nis_pw_u_map));
1569 }
1570 else
1571 { /* keep old semantic if no stayopen set - no need to call _nis_start() here - _nis_pwscan() will do it for us ... */
1572 /* use same way as in getgrent.c ... */
1573 memset(&state, 0, sizeof(state));
1574 rv = _nis_pwscan(retval, pw, buffer, buflen,
1575 &state, __nis_pw_u_map, __arraycount(__nis_pw_u_map));
1576 _nis_end(&state);
1577 }
1578 if (rv != NS_SUCCESS)
1579 return rv;
1580 if (uid == pw->pw_uid) {
1581 *result = pw;
1582 return NS_SUCCESS;
1583 } else
1584 return NS_NOTFOUND;
1585 }
1586
1587 /*ARGSUSED*/
1588 static int
1589 _nis_getpwnam(void *nsrv, void *nscb, va_list ap)
1590 {
1591 struct passwd **retval = va_arg(ap, struct passwd **);
1592 const char *name = va_arg(ap, const char *);
1593
1594 int rv, rerror;
1595
1596 _DIAGASSERT(retval != NULL);
1597
1598 *retval = NULL;
1599 rv = _nis_start(&_nis_state);
1600 if (rv != NS_SUCCESS)
1601 return rv;
1602 snprintf(_nis_passwdbuf, sizeof(_nis_passwdbuf), "%s", name);
1603 rv = _nis_pwscan(&rerror, &_nis_passwd,
1604 _nis_passwdbuf, sizeof(_nis_passwdbuf),
1605 &_nis_state, __nis_pw_n_map, __arraycount(__nis_pw_n_map));
1606 if (!_nis_state.stayopen)
1607 _nis_end(&_nis_state);
1608 if (rv == NS_SUCCESS && strcmp(name, _nis_passwd.pw_name) == 0)
1609 *retval = &_nis_passwd;
1610 return rv;
1611 }
1612
1613 /*ARGSUSED*/
1614 static int
1615 _nis_getpwnam_r(void *nsrv, void *nscb, va_list ap)
1616 {
1617 int *retval = va_arg(ap, int *);
1618 const char *name = va_arg(ap, const char *);
1619 struct passwd *pw = va_arg(ap, struct passwd *);
1620 char *buffer = va_arg(ap, char *);
1621 size_t buflen = va_arg(ap, size_t);
1622 struct passwd **result = va_arg(ap, struct passwd **);
1623
1624 struct nis_state state;
1625 int rv;
1626
1627 _DIAGASSERT(retval != NULL);
1628 _DIAGASSERT(pw != NULL);
1629 _DIAGASSERT(buffer != NULL);
1630 _DIAGASSERT(result != NULL);
1631
1632 *result = NULL;
1633 snprintf(buffer, buflen, "%s", name);
1634 /* remark: we run under a global mutex inside of this module ... */
1635 if (_nis_state.stayopen)
1636 { /* use global state only if stayopen is set - otherwise we would blow up getpwent_r() ... */
1637 rv = _nis_pwscan(retval, pw, buffer, buflen,
1638 &_nis_state, __nis_pw_n_map, __arraycount(__nis_pw_n_map));
1639 }
1640 else
1641 { /* keep old semantic if no stayopen set - no need to call _nis_start() here - _nis_pwscan() will do it for us ... */
1642 /* use same way as in getgrent.c ... */
1643 memset(&state, 0, sizeof(state));
1644 rv = _nis_pwscan(retval, pw, buffer, buflen,
1645 &state, __nis_pw_n_map, __arraycount(__nis_pw_n_map));
1646 _nis_end(&state);
1647 }
1648 if (rv != NS_SUCCESS)
1649 return rv;
1650 if (strcmp(name, pw->pw_name) == 0) {
1651 *result = pw;
1652 return NS_SUCCESS;
1653 } else
1654 return NS_NOTFOUND;
1655 }
1656
1657 #endif /* YP */
1658
1659
1660 #ifdef _PASSWD_COMPAT
1661 /*
1662 * compat methods
1663 */
1664
1665 /* state shared between compat methods */
1666
1667 struct compat_state {
1668 int stayopen; /* see getpassent(3) */
1669 DB *db; /* passwd DB */
1670 int keynum; /* key counter, -1 if no more */
1671 enum { /* current compat mode */
1672 COMPAT_NOTOKEN = 0, /* no compat token present */
1673 COMPAT_NONE, /* parsing normal pwd.db line */
1674 COMPAT_FULL, /* parsing `+' entries */
1675 COMPAT_USER, /* parsing `+name' entries */
1676 COMPAT_NETGROUP /* parsing `+@netgroup' entries */
1677 } mode;
1678 char *user; /* COMPAT_USER "+name" */
1679 DB *exclude; /* compat exclude DB */
1680 struct passwd proto; /* proto passwd entry */
1681 char protobuf[_GETPW_R_SIZE_MAX];
1682 /* buffer for proto ptrs */
1683 int protoflags; /* proto passwd flags */
1684 int version;
1685 };
1686
1687 static struct compat_state _compat_state;
1688 /* storage for non _r functions */
1689 static struct passwd _compat_passwd;
1690 static char _compat_passwdbuf[_GETPW_R_SIZE_MAX];
1691
1692 static int
1693 _compat_start(struct compat_state *state)
1694 {
1695 int rv;
1696
1697 _DIAGASSERT(state != NULL);
1698
1699 state->keynum = 0;
1700 if (state->db == NULL) { /* not open yet */
1701 DBT key, data;
1702 DBT pkey, pdata;
1703 char bf[MAXLOGNAME];
1704
1705 rv = _pw_opendb(&state->db, &state->version);
1706 if (rv != NS_SUCCESS)
1707 return rv;
1708
1709 state->mode = COMPAT_NOTOKEN;
1710
1711 /*
1712 * Determine if the "compat" token is present in pwd.db;
1713 * either "__YP!" or PW_KEYBYNAME+"+".
1714 * Only works if pwd_mkdb installs the token.
1715 */
1716 key.data = (u_char *)__UNCONST(__yp_token);
1717 key.size = strlen(__yp_token);
1718
1719 bf[0] = _PW_KEYBYNAME; /* Pre-token database support. */
1720 bf[1] = '+';
1721 pkey.data = (u_char *)bf;
1722 pkey.size = 2;
1723
1724 if ((state->db->get)(state->db, &key, &data, 0) == 0
1725 || (state->db->get)(state->db, &pkey, &pdata, 0) == 0)
1726 state->mode = COMPAT_NONE;
1727 }
1728 return NS_SUCCESS;
1729 }
1730
1731 static int
1732 _compat_end(struct compat_state *state)
1733 {
1734
1735 _DIAGASSERT(state != NULL);
1736
1737 state->keynum = 0;
1738 if (state->db) {
1739 (void)(state->db->close)(state->db);
1740 state->db = NULL;
1741 }
1742 state->mode = COMPAT_NOTOKEN;
1743 if (state->user)
1744 free(state->user);
1745 state->user = NULL;
1746 if (state->exclude != NULL)
1747 (void)(state->exclude->close)(state->exclude);
1748 state->exclude = NULL;
1749 state->proto.pw_name = NULL;
1750 state->protoflags = 0;
1751 return NS_SUCCESS;
1752 }
1753
1754 /*
1755 * _compat_add_exclude
1756 * add the name to the exclude list in state->exclude.
1757 */
1758 static int
1759 _compat_add_exclude(struct compat_state *state, const char *name)
1760 {
1761 DBT key, data;
1762
1763 _DIAGASSERT(state != NULL);
1764 _DIAGASSERT(name != NULL);
1765
1766 /* initialize the exclusion table if needed */
1767 if (state->exclude == NULL) {
1768 state->exclude = dbopen(NULL, O_RDWR, 600, DB_HASH, NULL);
1769 if (state->exclude == NULL)
1770 return 0;
1771 }
1772
1773 key.size = strlen(name); /* set up the key */
1774 key.data = (u_char *)__UNCONST(name);
1775
1776 data.data = NULL; /* data is nothing */
1777 data.size = 0;
1778
1779 /* store it */
1780 if ((state->exclude->put)(state->exclude, &key, &data, 0) == -1)
1781 return 0;
1782
1783 return 1;
1784 }
1785
1786 /*
1787 * _compat_is_excluded
1788 * test if a name is on the compat mode exclude list
1789 */
1790 static int
1791 _compat_is_excluded(struct compat_state *state, const char *name)
1792 {
1793 DBT key, data;
1794
1795 _DIAGASSERT(state != NULL);
1796 _DIAGASSERT(name != NULL);
1797
1798 if (state->exclude == NULL)
1799 return 0; /* nothing excluded */
1800
1801 key.size = strlen(name); /* set up the key */
1802 key.data = (u_char *)__UNCONST(name);
1803
1804 if ((state->exclude->get)(state->exclude, &key, &data, 0) == 0)
1805 return 1; /* is excluded */
1806
1807 return 0;
1808 }
1809
1810
1811 /*
1812 * _passwdcompat_bad
1813 * log an error if "files" or "compat" is specified in
1814 * passwd_compat database
1815 */
1816 /*ARGSUSED*/
1817 static int
1818 _passwdcompat_bad(void *nsrv, void *nscb, va_list ap)
1819 {
1820 static int warned;
1821
1822 _DIAGASSERT(nsrv != NULL);
1823 _DIAGASSERT(nscb != NULL);
1824
1825 if (!warned) {
1826 syslog(LOG_ERR,
1827 "nsswitch.conf passwd_compat database can't use '%s'",
1828 (char *)nscb);
1829 }
1830 warned = 1;
1831 return NS_UNAVAIL;
1832 }
1833
1834 /*
1835 * _passwdcompat_setpassent
1836 * Call setpassent for all passwd_compat sources.
1837 */
1838 static int
1839 _passwdcompat_setpassent(int stayopen)
1840 {
1841 static const ns_dtab dtab[] = {
1842 NS_FILES_CB(_passwdcompat_bad, "files")
1843 NS_DNS_CB(_dns_setpassent, NULL)
1844 NS_NIS_CB(_nis_setpassent, NULL)
1845 NS_COMPAT_CB(_passwdcompat_bad, "compat")
1846 NS_NULL_CB
1847 };
1848
1849 int rv, result;
1850
1851 rv = nsdispatch(NULL, dtab, NSDB_PASSWD_COMPAT, "setpassent",
1852 __nsdefaultnis_forceall, &result, stayopen);
1853 return rv;
1854 }
1855
1856 /*
1857 * _passwdcompat_endpwent
1858 * Call endpwent for all passwd_compat sources.
1859 */
1860 static int
1861 _passwdcompat_endpwent(void)
1862 {
1863 static const ns_dtab dtab[] = {
1864 NS_FILES_CB(_passwdcompat_bad, "files")
1865 NS_DNS_CB(_dns_endpwent, NULL)
1866 NS_NIS_CB(_nis_endpwent, NULL)
1867 NS_COMPAT_CB(_passwdcompat_bad, "compat")
1868 NS_NULL_CB
1869 };
1870
1871 return nsdispatch(NULL, dtab, NSDB_PASSWD_COMPAT, "endpwent",
1872 __nsdefaultnis_forceall);
1873 }
1874
1875 /*
1876 * _passwdcompat_pwscan
1877 * When a name lookup in compat mode is required (e.g., `+name', or a
1878 * name in `+@netgroup'), look it up in the 'passwd_compat' nsswitch
1879 * database.
1880 * Fail if passwd_compat contains files or compat.
1881 */
1882 static int
1883 _passwdcompat_pwscan(struct passwd *pw, char *buffer, size_t buflen,
1884 int search, const char *name, uid_t uid)
1885 {
1886 static const ns_dtab compatentdtab[] = {
1887 NS_FILES_CB(_passwdcompat_bad, "files")
1888 NS_DNS_CB(_dns_getpwent_r, NULL)
1889 NS_NIS_CB(_nis_getpwent_r, NULL)
1890 NS_COMPAT_CB(_passwdcompat_bad, "compat")
1891 NS_NULL_CB
1892 };
1893 static const ns_dtab compatuiddtab[] = {
1894 NS_FILES_CB(_passwdcompat_bad, "files")
1895 NS_DNS_CB(_dns_getpwuid_r, NULL)
1896 NS_NIS_CB(_nis_getpwuid_r, NULL)
1897 NS_COMPAT_CB(_passwdcompat_bad, "compat")
1898 NS_NULL_CB
1899 };
1900 static const ns_dtab compatnamdtab[] = {
1901 NS_FILES_CB(_passwdcompat_bad, "files")
1902 NS_DNS_CB(_dns_getpwnam_r, NULL)
1903 NS_NIS_CB(_nis_getpwnam_r, NULL)
1904 NS_COMPAT_CB(_passwdcompat_bad, "compat")
1905 NS_NULL_CB
1906 };
1907
1908 int rv, crv;
1909 struct passwd *cpw;
1910
1911 switch (search) {
1912 case _PW_KEYBYNUM:
1913 rv = nsdispatch(NULL, compatentdtab,
1914 NSDB_PASSWD_COMPAT, "getpwent_r", __nsdefaultnis,
1915 &crv, pw, buffer, buflen, &cpw);
1916 break;
1917 case _PW_KEYBYNAME:
1918 _DIAGASSERT(name != NULL);
1919 rv = nsdispatch(NULL, compatnamdtab,
1920 NSDB_PASSWD_COMPAT, "getpwnam_r", __nsdefaultnis,
1921 &crv, name, pw, buffer, buflen, &cpw);
1922 break;
1923 case _PW_KEYBYUID:
1924 rv = nsdispatch(NULL, compatuiddtab,
1925 NSDB_PASSWD_COMPAT, "getpwuid_r", __nsdefaultnis,
1926 &crv, uid, pw, buffer, buflen, &cpw);
1927 break;
1928 default:
1929 abort();
1930 /*NOTREACHED*/
1931 }
1932 return rv;
1933 }
1934
1935 /*
1936 * _compat_pwscan
1937 * Search state->db for the next desired entry.
1938 * If search is _PW_KEYBYNUM, look for state->keynum.
1939 * If search is _PW_KEYBYNAME, look for name.
1940 * If search is _PW_KEYBYUID, look for uid.
1941 * Sets *retval to the errno if the result is not NS_SUCCESS
1942 * or NS_NOTFOUND.
1943 */
1944 static int
1945 _compat_pwscan(int *retval, struct passwd *pw, char *buffer, size_t buflen,
1946 struct compat_state *state, int search, const char *name, uid_t uid)
1947 {
1948 DBT key;
1949 int rv, r, pwflags;
1950 const char *user, *host, *dom;
1951 const void *from;
1952 size_t fromlen;
1953
1954 _DIAGASSERT(retval != NULL);
1955 _DIAGASSERT(pw != NULL);
1956 _DIAGASSERT(buffer != NULL);
1957 _DIAGASSERT(state != NULL);
1958 /* name may be NULL */
1959
1960 *retval = 0;
1961
1962 if (state->db == NULL) {
1963 rv = _compat_start(state);
1964 if (rv != NS_SUCCESS)
1965 return rv;
1966 }
1967 if (buflen <= 1) { /* buffer too small */
1968 *retval = ERANGE;
1969 return NS_UNAVAIL;
1970 }
1971
1972 for (;;) { /* loop over pwd.db */
1973 rv = NS_NOTFOUND;
1974 if (state->mode != COMPAT_NOTOKEN &&
1975 state->mode != COMPAT_NONE) {
1976 /* doing a compat lookup */
1977 struct passwd cpw;
1978 char cbuf[_GETPW_R_SIZE_MAX];
1979
1980 switch (state->mode) {
1981
1982 case COMPAT_FULL:
1983 /* get next user or lookup by key */
1984 rv = _passwdcompat_pwscan(&cpw,
1985 cbuf, sizeof(cbuf), search, name, uid);
1986 if (rv != NS_SUCCESS)
1987 state->mode = COMPAT_NONE;
1988 break;
1989
1990 case COMPAT_NETGROUP:
1991 /* XXXREENTRANT: getnetgrent is not thread safe */
1992 /* get next user from netgroup */
1993 r = getnetgrent(&host, &user, &dom);
1994 if (r == 0) { /* end of group */
1995 endnetgrent();
1996 state->mode = COMPAT_NONE;
1997 break;
1998 }
1999 if (!user || !*user)
2000 break;
2001 rv = _passwdcompat_pwscan(&cpw,
2002 cbuf, sizeof(cbuf),
2003 _PW_KEYBYNAME, user, 0);
2004 break;
2005
2006 case COMPAT_USER:
2007 /* get specific user */
2008 if (state->user == NULL) {
2009 state->mode = COMPAT_NONE;
2010 break;
2011 }
2012 rv = _passwdcompat_pwscan(&cpw,
2013 cbuf, sizeof(cbuf),
2014 _PW_KEYBYNAME, state->user, 0);
2015 free(state->user);
2016 state->user = NULL;
2017 state->mode = COMPAT_NONE;
2018 break;
2019
2020 case COMPAT_NOTOKEN:
2021 case COMPAT_NONE:
2022 abort();
2023
2024 }
2025 if (rv != NS_SUCCESS) /* if not matched, next loop */
2026 continue;
2027
2028 /* copy cpw to pw, applying prototype */
2029 if (! _pw_copy(&cpw, pw, buffer, buflen,
2030 &state->proto, state->protoflags)) {
2031 rv = NS_UNAVAIL;
2032 break;
2033 }
2034
2035 if (_compat_is_excluded(state, pw->pw_name))
2036 continue; /* excluded; next loop */
2037
2038 if ((search == _PW_KEYBYNAME
2039 && strcmp(pw->pw_name, name) != 0)
2040 || (search == _PW_KEYBYUID && pw->pw_uid != uid)) {
2041 continue; /* not specific; next loop */
2042 }
2043
2044 break; /* exit loop if found */
2045 } else { /* not a compat line */
2046 state->proto.pw_name = NULL;
2047 /* clear prototype */
2048 }
2049
2050 if (state->mode == COMPAT_NOTOKEN) {
2051 /* no compat token; do direct lookup */
2052 switch (search) {
2053 case _PW_KEYBYNUM:
2054 if (state->keynum == -1) /* no more records */
2055 return NS_NOTFOUND;
2056 state->keynum++;
2057 from = &state->keynum;
2058 fromlen = sizeof(state->keynum);
2059 break;
2060 case _PW_KEYBYNAME:
2061 from = name;
2062 fromlen = strlen(name);
2063 break;
2064 case _PW_KEYBYUID:
2065 from = &uid;
2066 fromlen = sizeof(uid);
2067 break;
2068 default:
2069 abort();
2070 }
2071 buffer[0] = search;
2072 } else {
2073 /* compat token; do line by line */
2074 if (state->keynum == -1) /* no more records */
2075 return NS_NOTFOUND;
2076 state->keynum++;
2077 from = &state->keynum;
2078 fromlen = sizeof(state->keynum);
2079 buffer[0] = _PW_KEYBYNUM;
2080 }
2081
2082 if (buflen <= fromlen) { /* buffer too small */
2083 *retval = ERANGE;
2084 return NS_UNAVAIL;
2085 }
2086 memmove(buffer + 1, from, fromlen); /* setup key */
2087 key.size = fromlen + 1;
2088 key.data = (u_char *)buffer;
2089
2090 rv = _pw_getkey(state->db, &key, pw, buffer, buflen, &pwflags,
2091 state->version);
2092 if (rv != NS_SUCCESS) /* stop on error */
2093 break;
2094
2095 if (state->mode == COMPAT_NOTOKEN)
2096 break; /* stop if no compat token */
2097
2098 if (pw->pw_name[0] == '+') {
2099 /* compat inclusion */
2100 switch(pw->pw_name[1]) {
2101 case '\0': /* `+' */
2102 state->mode = COMPAT_FULL;
2103 /* reset passwd_compat search */
2104 /* XXXREENTRANT: setpassent is not thread safe ? */
2105 (void) _passwdcompat_setpassent(_compat_state.stayopen);
2106 break;
2107 case '@': /* `+@netgroup' */
2108 state->mode = COMPAT_NETGROUP;
2109 /* reset netgroup search */
2110 /* XXXREENTRANT: setnetgrent is not thread safe */
2111 setnetgrent(pw->pw_name + 2);
2112 break;
2113 default: /* `+name' */
2114 state->mode = COMPAT_USER;
2115 if (state->user)
2116 free(state->user);
2117 state->user = strdup(pw->pw_name + 1);
2118 break;
2119 }
2120 /* save the prototype */
2121 state->protoflags = pwflags;
2122 if (! _pw_copy(pw, &state->proto, state->protobuf,
2123 sizeof(state->protobuf), NULL, 0)) {
2124 rv = NS_UNAVAIL;
2125 break;
2126 }
2127 continue; /* loop again after inclusion */
2128 } else if (pw->pw_name[0] == '-') {
2129 /* compat exclusion */
2130 rv = NS_SUCCESS;
2131 switch(pw->pw_name[1]) {
2132 case '\0': /* `-' */
2133 break;
2134 case '@': /* `-@netgroup' */
2135 /* XXXREENTRANT: {set,get,end}netgrent is not thread safe */
2136 setnetgrent(pw->pw_name + 2);
2137 while (getnetgrent(&host, &user, &dom)) {
2138 if (!user || !*user)
2139 continue;
2140 if (! _compat_add_exclude(state,user)) {
2141 rv = NS_UNAVAIL;
2142 break;
2143 }
2144 }
2145 endnetgrent();
2146 break;
2147 default: /* `-name' */
2148 if (! _compat_add_exclude(state,
2149 pw->pw_name + 1)) {
2150 rv = NS_UNAVAIL;
2151 }
2152 break;
2153 }
2154 if (rv != NS_SUCCESS) /* exclusion failure */
2155 break;
2156 continue; /* loop again after exclusion */
2157 }
2158 if (search == _PW_KEYBYNUM ||
2159 (search == _PW_KEYBYUID && pw->pw_uid == uid) ||
2160 (search == _PW_KEYBYNAME && strcmp(pw->pw_name, name) == 0))
2161 break; /* token mode match found */
2162 }
2163
2164 if (rv == NS_NOTFOUND &&
2165 (search == _PW_KEYBYNUM || state->mode != COMPAT_NOTOKEN))
2166 state->keynum = -1; /* flag `no more records' */
2167
2168 if (rv == NS_SUCCESS) {
2169 if ((search == _PW_KEYBYNAME && strcmp(pw->pw_name, name) != 0)
2170 || (search == _PW_KEYBYUID && pw->pw_uid != uid))
2171 rv = NS_NOTFOUND;
2172 }
2173
2174 if (rv != NS_SUCCESS && rv != NS_NOTFOUND)
2175 *retval = errno;
2176 return rv;
2177 }
2178
2179 /*ARGSUSED*/
2180 static int
2181 _compat_setpwent(void *nsrv, void *nscb, va_list ap)
2182 {
2183
2184 /* force passwd_compat setpwent() */
2185 (void) _passwdcompat_setpassent(0);
2186
2187 /* reset state, keep db open */
2188 _compat_state.stayopen = 0;
2189 return _compat_start(&_compat_state);
2190 }
2191
2192 /*ARGSUSED*/
2193 static int
2194 _compat_setpassent(void *nsrv, void *nscb, va_list ap)
2195 {
2196 int *retval = va_arg(ap, int *);
2197 int stayopen = va_arg(ap, int);
2198
2199 int rv;
2200
2201 /* force passwd_compat setpassent() */
2202 (void) _passwdcompat_setpassent(stayopen);
2203
2204 _compat_state.stayopen = stayopen;
2205 rv = _compat_start(&_compat_state);
2206 *retval = (rv == NS_SUCCESS);
2207 return rv;
2208 }
2209
2210 /*ARGSUSED*/
2211 static int
2212 _compat_endpwent(void *nsrv, void *nscb, va_list ap)
2213 {
2214
2215 /* force passwd_compat endpwent() */
2216 (void) _passwdcompat_endpwent();
2217
2218 /* reset state, close db */
2219 _compat_state.stayopen = 0;
2220 return _compat_end(&_compat_state);
2221 }
2222
2223
2224 /*ARGSUSED*/
2225 static int
2226 _compat_getpwent(void *nsrv, void *nscb, va_list ap)
2227 {
2228 struct passwd **retval = va_arg(ap, struct passwd **);
2229
2230 int rv, rerror;
2231
2232 _DIAGASSERT(retval != NULL);
2233
2234 *retval = NULL;
2235 rv = _compat_pwscan(&rerror, &_compat_passwd,
2236 _compat_passwdbuf, sizeof(_compat_passwdbuf),
2237 &_compat_state, _PW_KEYBYNUM, NULL, 0);
2238 if (rv == NS_SUCCESS)
2239 *retval = &_compat_passwd;
2240 return rv;
2241 }
2242
2243 /*ARGSUSED*/
2244 static int
2245 _compat_getpwent_r(void *nsrv, void *nscb, va_list ap)
2246 {
2247 int *retval = va_arg(ap, int *);
2248 struct passwd *pw = va_arg(ap, struct passwd *);
2249 char *buffer = va_arg(ap, char *);
2250 size_t buflen = va_arg(ap, size_t);
2251 struct passwd **result = va_arg(ap, struct passwd **);
2252
2253 int rv;
2254
2255 _DIAGASSERT(retval != NULL);
2256 _DIAGASSERT(pw != NULL);
2257 _DIAGASSERT(buffer != NULL);
2258 _DIAGASSERT(result != NULL);
2259
2260 rv = _compat_pwscan(retval, pw, buffer, buflen, &_compat_state,
2261 _PW_KEYBYNUM, NULL, 0);
2262 if (rv == NS_SUCCESS)
2263 *result = pw;
2264 else
2265 *result = NULL;
2266 return rv;
2267 }
2268
2269
2270 /*ARGSUSED*/
2271 static int
2272 _compat_getpwnam(void *nsrv, void *nscb, va_list ap)
2273 {
2274 struct passwd **retval = va_arg(ap, struct passwd **);
2275 const char *name = va_arg(ap, const char *);
2276
2277 int rv, rerror;
2278
2279 _DIAGASSERT(retval != NULL);
2280
2281 *retval = NULL;
2282 rv = _compat_start(&_compat_state);
2283 if (rv != NS_SUCCESS)
2284 return rv;
2285 rv = _compat_pwscan(&rerror, &_compat_passwd,
2286 _compat_passwdbuf, sizeof(_compat_passwdbuf),
2287 &_compat_state, _PW_KEYBYNAME, name, 0);
2288 if (!_compat_state.stayopen)
2289 _compat_end(&_compat_state);
2290 if (rv == NS_SUCCESS)
2291 *retval = &_compat_passwd;
2292 return rv;
2293 }
2294
2295 /*ARGSUSED*/
2296 static int
2297 _compat_getpwnam_r(void *nsrv, void *nscb, va_list ap)
2298 {
2299 int *retval = va_arg(ap, int *);
2300 const char *name = va_arg(ap, const char *);
2301 struct passwd *pw = va_arg(ap, struct passwd *);
2302 char *buffer = va_arg(ap, char *);
2303 size_t buflen = va_arg(ap, size_t);
2304 struct passwd **result = va_arg(ap, struct passwd **);
2305
2306 struct compat_state state;
2307 int rv;
2308
2309 _DIAGASSERT(retval != NULL);
2310 _DIAGASSERT(pw != NULL);
2311 _DIAGASSERT(buffer != NULL);
2312 _DIAGASSERT(result != NULL);
2313
2314 *result = NULL;
2315 memset(&state, 0, sizeof(state));
2316 rv = _compat_pwscan(retval, pw, buffer, buflen, &state,
2317 _PW_KEYBYNAME, name, 0);
2318 _compat_end(&state);
2319 if (rv == NS_SUCCESS)
2320 *result = pw;
2321 return rv;
2322 }
2323
2324 /*ARGSUSED*/
2325 static int
2326 _compat_getpwuid(void *nsrv, void *nscb, va_list ap)
2327 {
2328 struct passwd **retval = va_arg(ap, struct passwd **);
2329 uid_t uid = va_arg(ap, uid_t);
2330
2331 int rv, rerror;
2332
2333 _DIAGASSERT(retval != NULL);
2334
2335 *retval = NULL;
2336 rv = _compat_start(&_compat_state);
2337 if (rv != NS_SUCCESS)
2338 return rv;
2339 rv = _compat_pwscan(&rerror, &_compat_passwd,
2340 _compat_passwdbuf, sizeof(_compat_passwdbuf),
2341 &_compat_state, _PW_KEYBYUID, NULL, uid);
2342 if (!_compat_state.stayopen)
2343 _compat_end(&_compat_state);
2344 if (rv == NS_SUCCESS)
2345 *retval = &_compat_passwd;
2346 return rv;
2347 }
2348
2349 /*ARGSUSED*/
2350 static int
2351 _compat_getpwuid_r(void *nsrv, void *nscb, va_list ap)
2352 {
2353 int *retval = va_arg(ap, int *);
2354 uid_t uid = va_arg(ap, uid_t);
2355 struct passwd *pw = va_arg(ap, struct passwd *);
2356 char *buffer = va_arg(ap, char *);
2357 size_t buflen = va_arg(ap, size_t);
2358 struct passwd **result = va_arg(ap, struct passwd **);
2359
2360 struct compat_state state;
2361 int rv;
2362
2363 _DIAGASSERT(retval != NULL);
2364 _DIAGASSERT(pw != NULL);
2365 _DIAGASSERT(buffer != NULL);
2366 _DIAGASSERT(result != NULL);
2367
2368 *result = NULL;
2369 memset(&state, 0, sizeof(state));
2370 rv = _compat_pwscan(retval, pw, buffer, buflen, &state,
2371 _PW_KEYBYUID, NULL, uid);
2372 _compat_end(&state);
2373 if (rv == NS_SUCCESS)
2374 *result = pw;
2375 return rv;
2376 }
2377
2378 #endif /* _PASSWD_COMPAT */
2379
2380
2381 /*
2382 * public functions
2383 */
2384
2385 struct passwd *
2386 getpwent(void)
2387 {
2388 int r;
2389 struct passwd *retval;
2390
2391 static const ns_dtab dtab[] = {
2392 NS_FILES_CB(_files_getpwent, NULL)
2393 NS_DNS_CB(_dns_getpwent, NULL)
2394 NS_NIS_CB(_nis_getpwent, NULL)
2395 NS_COMPAT_CB(_compat_getpwent, NULL)
2396 NS_NULL_CB
2397 };
2398
2399 mutex_lock(&_pwmutex);
2400 r = nsdispatch(NULL, dtab, NSDB_PASSWD, "getpwent", __nsdefaultcompat,
2401 &retval);
2402 mutex_unlock(&_pwmutex);
2403 return (r == NS_SUCCESS) ? retval : NULL;
2404 }
2405
2406 int
2407 getpwent_r(struct passwd *pwd, char *buffer, size_t buflen,
2408 struct passwd **result)
2409 {
2410 int r, retval;
2411
2412 static const ns_dtab dtab[] = {
2413 NS_FILES_CB(_files_getpwent_r, NULL)
2414 NS_DNS_CB(_dns_getpwent_r, NULL)
2415 NS_NIS_CB(_nis_getpwent_r, NULL)
2416 NS_COMPAT_CB(_compat_getpwent_r, NULL)
2417 NS_NULL_CB
2418 };
2419
2420 _DIAGASSERT(pwd != NULL);
2421 _DIAGASSERT(buffer != NULL);
2422 _DIAGASSERT(result != NULL);
2423
2424 *result = NULL;
2425 retval = 0;
2426 mutex_lock(&_pwmutex);
2427 r = nsdispatch(NULL, dtab, NSDB_PASSWD, "getpwent_r", __nsdefaultcompat,
2428 &retval, pwd, buffer, buflen, result);
2429 mutex_unlock(&_pwmutex);
2430 switch (r) {
2431 case NS_SUCCESS:
2432 case NS_NOTFOUND:
2433 return 0;
2434 default:
2435 return retval;
2436 }
2437 }
2438
2439
2440 struct passwd *
2441 getpwnam(const char *name)
2442 {
2443 int rv;
2444 struct passwd *retval;
2445
2446 static const ns_dtab dtab[] = {
2447 NS_FILES_CB(_files_getpwnam, NULL)
2448 NS_DNS_CB(_dns_getpwnam, NULL)
2449 NS_NIS_CB(_nis_getpwnam, NULL)
2450 NS_COMPAT_CB(_compat_getpwnam, NULL)
2451 NS_NULL_CB
2452 };
2453
2454 mutex_lock(&_pwmutex);
2455 rv = nsdispatch(NULL, dtab, NSDB_PASSWD, "getpwnam", __nsdefaultcompat,
2456 &retval, name);
2457 mutex_unlock(&_pwmutex);
2458 return (rv == NS_SUCCESS) ? retval : NULL;
2459 }
2460
2461 int
2462 getpwnam_r(const char *name, struct passwd *pwd, char *buffer, size_t buflen,
2463 struct passwd **result)
2464 {
2465 int r, retval;
2466
2467 static const ns_dtab dtab[] = {
2468 NS_FILES_CB(_files_getpwnam_r, NULL)
2469 NS_DNS_CB(_dns_getpwnam_r, NULL)
2470 NS_NIS_CB(_nis_getpwnam_r, NULL)
2471 NS_COMPAT_CB(_compat_getpwnam_r, NULL)
2472 NS_NULL_CB
2473 };
2474
2475 _DIAGASSERT(name != NULL);
2476 _DIAGASSERT(pwd != NULL);
2477 _DIAGASSERT(buffer != NULL);
2478 _DIAGASSERT(result != NULL);
2479
2480 *result = NULL;
2481 retval = 0;
2482 mutex_lock(&_pwmutex);
2483 r = nsdispatch(NULL, dtab, NSDB_PASSWD, "getpwnam_r", __nsdefaultcompat,
2484 &retval, name, pwd, buffer, buflen, result);
2485 mutex_unlock(&_pwmutex);
2486 switch (r) {
2487 case NS_SUCCESS:
2488 case NS_NOTFOUND:
2489 return 0;
2490 default:
2491 return retval;
2492 }
2493 }
2494
2495 struct passwd *
2496 getpwuid(uid_t uid)
2497 {
2498 int rv;
2499 struct passwd *retval;
2500
2501 static const ns_dtab dtab[] = {
2502 NS_FILES_CB(_files_getpwuid, NULL)
2503 NS_DNS_CB(_dns_getpwuid, NULL)
2504 NS_NIS_CB(_nis_getpwuid, NULL)
2505 NS_COMPAT_CB(_compat_getpwuid, NULL)
2506 NS_NULL_CB
2507 };
2508
2509 mutex_lock(&_pwmutex);
2510 rv = nsdispatch(NULL, dtab, NSDB_PASSWD, "getpwuid", __nsdefaultcompat,
2511 &retval, uid);
2512 mutex_unlock(&_pwmutex);
2513 return (rv == NS_SUCCESS) ? retval : NULL;
2514 }
2515
2516 int
2517 getpwuid_r(uid_t uid, struct passwd *pwd, char *buffer, size_t buflen,
2518 struct passwd **result)
2519 {
2520 int r, retval;
2521
2522 static const ns_dtab dtab[] = {
2523 NS_FILES_CB(_files_getpwuid_r, NULL)
2524 NS_DNS_CB(_dns_getpwuid_r, NULL)
2525 NS_NIS_CB(_nis_getpwuid_r, NULL)
2526 NS_COMPAT_CB(_compat_getpwuid_r, NULL)
2527 NS_NULL_CB
2528 };
2529
2530 _DIAGASSERT(pwd != NULL);
2531 _DIAGASSERT(buffer != NULL);
2532 _DIAGASSERT(result != NULL);
2533
2534 *result = NULL;
2535 retval = 0;
2536 mutex_lock(&_pwmutex);
2537 r = nsdispatch(NULL, dtab, NSDB_PASSWD, "getpwuid_r", __nsdefaultcompat,
2538 &retval, uid, pwd, buffer, buflen, result);
2539 mutex_unlock(&_pwmutex);
2540 switch (r) {
2541 case NS_SUCCESS:
2542 case NS_NOTFOUND:
2543 return 0;
2544 default:
2545 return retval;
2546 }
2547 }
2548
2549 void
2550 endpwent(void)
2551 {
2552 static const ns_dtab dtab[] = {
2553 NS_FILES_CB(_files_endpwent, NULL)
2554 NS_DNS_CB(_dns_endpwent, NULL)
2555 NS_NIS_CB(_nis_endpwent, NULL)
2556 NS_COMPAT_CB(_compat_endpwent, NULL)
2557 NS_NULL_CB
2558 };
2559
2560 mutex_lock(&_pwmutex);
2561 /* force all endpwent() methods */
2562 (void) nsdispatch(NULL, dtab, NSDB_PASSWD, "endpwent",
2563 __nsdefaultcompat_forceall);
2564 mutex_unlock(&_pwmutex);
2565 }
2566
2567 /*ARGSUSED*/
2568 int
2569 setpassent(int stayopen)
2570 {
2571 static const ns_dtab dtab[] = {
2572 NS_FILES_CB(_files_setpassent, NULL)
2573 NS_DNS_CB(_dns_setpassent, NULL)
2574 NS_NIS_CB(_nis_setpassent, NULL)
2575 NS_COMPAT_CB(_compat_setpassent, NULL)
2576 NS_NULL_CB
2577 };
2578 int rv, retval;
2579
2580 mutex_lock(&_pwmutex);
2581 /* force all setpassent() methods */
2582 rv = nsdispatch(NULL, dtab, NSDB_PASSWD, "setpassent",
2583 __nsdefaultcompat_forceall, &retval, stayopen);
2584 mutex_unlock(&_pwmutex);
2585 return (rv == NS_SUCCESS) ? retval : 0;
2586 }
2587
2588 void
2589 setpwent(void)
2590 {
2591 static const ns_dtab dtab[] = {
2592 NS_FILES_CB(_files_setpwent, NULL)
2593 NS_DNS_CB(_dns_setpwent, NULL)
2594 NS_NIS_CB(_nis_setpwent, NULL)
2595 NS_COMPAT_CB(_compat_setpwent, NULL)
2596 NS_NULL_CB
2597 };
2598
2599 mutex_lock(&_pwmutex);
2600 /* force all setpwent() methods */
2601 (void) nsdispatch(NULL, dtab, NSDB_PASSWD, "setpwent",
2602 __nsdefaultcompat_forceall);
2603 mutex_unlock(&_pwmutex);
2604 }
2605