passwd.c revision 1.27 1 1.27 christos /* $NetBSD: passwd.c,v 1.27 2008/01/25 19:36:27 christos Exp $ */
2 1.8 thorpej
3 1.1 cgd /*
4 1.10 tls * Copyright (c) 1988, 1993, 1994
5 1.10 tls * The Regents of the University of California. All rights reserved.
6 1.1 cgd *
7 1.1 cgd * Redistribution and use in source and binary forms, with or without
8 1.1 cgd * modification, are permitted provided that the following conditions
9 1.1 cgd * are met:
10 1.1 cgd * 1. Redistributions of source code must retain the above copyright
11 1.1 cgd * notice, this list of conditions and the following disclaimer.
12 1.1 cgd * 2. Redistributions in binary form must reproduce the above copyright
13 1.1 cgd * notice, this list of conditions and the following disclaimer in the
14 1.1 cgd * documentation and/or other materials provided with the distribution.
15 1.23 agc * 3. Neither the name of the University nor the names of its contributors
16 1.1 cgd * may be used to endorse or promote products derived from this software
17 1.1 cgd * without specific prior written permission.
18 1.1 cgd *
19 1.1 cgd * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
20 1.1 cgd * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
21 1.1 cgd * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
22 1.1 cgd * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
23 1.1 cgd * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
24 1.1 cgd * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
25 1.1 cgd * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
26 1.1 cgd * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
27 1.1 cgd * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
28 1.1 cgd * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
29 1.1 cgd * SUCH DAMAGE.
30 1.1 cgd */
31 1.1 cgd
32 1.12 lukem #include <sys/cdefs.h>
33 1.1 cgd #ifndef lint
34 1.12 lukem __COPYRIGHT("@(#) Copyright (c) 1988, 1993, 1994\n\
35 1.12 lukem The Regents of the University of California. All rights reserved.\n");
36 1.1 cgd #endif /* not lint */
37 1.1 cgd
38 1.1 cgd #ifndef lint
39 1.8 thorpej #if 0
40 1.10 tls static char sccsid[] = "from: @(#)passwd.c 8.3 (Berkeley) 4/2/94";
41 1.8 thorpej #else
42 1.27 christos __RCSID("$NetBSD: passwd.c,v 1.27 2008/01/25 19:36:27 christos Exp $");
43 1.8 thorpej #endif
44 1.1 cgd #endif /* not lint */
45 1.1 cgd
46 1.25 thorpej #include <assert.h>
47 1.8 thorpej #include <err.h>
48 1.1 cgd #include <stdio.h>
49 1.19 matt #include <stdlib.h>
50 1.7 phil #include <string.h>
51 1.1 cgd #include <unistd.h>
52 1.20 ad #include <pwd.h>
53 1.1 cgd
54 1.10 tls #include "extern.h"
55 1.16 aidan
56 1.25 thorpej #ifdef USE_PAM
57 1.25 thorpej
58 1.25 thorpej static void global_usage(const char *);
59 1.25 thorpej
60 1.25 thorpej static const struct pw_module_s {
61 1.25 thorpej const char *argv0;
62 1.25 thorpej const char *dbname;
63 1.25 thorpej char compat_opt;
64 1.25 thorpej void (*pw_usage)(const char *);
65 1.25 thorpej void (*pw_process)(const char *, int, char **);
66 1.25 thorpej } pw_modules[] = {
67 1.25 thorpej /* "files" -- local password database */
68 1.25 thorpej { NULL, "files", 'l', pwlocal_usage, pwlocal_process },
69 1.25 thorpej #ifdef YP
70 1.25 thorpej /* "nis" -- YP/NIS password database */
71 1.25 thorpej { NULL, "nis", 'y', pwyp_usage, pwyp_process },
72 1.25 thorpej { "yppasswd", NULL, 0, pwyp_argv0_usage, pwyp_process },
73 1.25 thorpej #endif
74 1.25 thorpej #ifdef KERBEROS5
75 1.25 thorpej /* "krb5" -- Kerberos 5 password database */
76 1.25 thorpej { NULL, "krb5", 'k', pwkrb5_usage, pwkrb5_process },
77 1.25 thorpej { "kpasswd", NULL, 0, pwkrb5_argv0_usage, pwkrb5_process },
78 1.25 thorpej #endif
79 1.25 thorpej /* default -- use whatever PAM decides */
80 1.25 thorpej { NULL, NULL, 0, NULL, pwpam_process },
81 1.25 thorpej
82 1.25 thorpej { 0 }
83 1.25 thorpej };
84 1.25 thorpej
85 1.25 thorpej static const struct pw_module_s *personality;
86 1.25 thorpej
87 1.25 thorpej static void
88 1.25 thorpej global_usage(const char *prefix)
89 1.25 thorpej {
90 1.25 thorpej const struct pw_module_s *pwm;
91 1.25 thorpej
92 1.25 thorpej (void) fprintf(stderr, "%s %s [user]\n", prefix, getprogname());
93 1.25 thorpej for (pwm = pw_modules; pwm->pw_process != NULL; pwm++) {
94 1.25 thorpej if (pwm->argv0 == NULL && pwm->pw_usage != NULL)
95 1.25 thorpej (*pwm->pw_usage)(" ");
96 1.25 thorpej }
97 1.25 thorpej }
98 1.25 thorpej
99 1.25 thorpej void
100 1.25 thorpej usage(void)
101 1.25 thorpej {
102 1.25 thorpej
103 1.25 thorpej if (personality != NULL && personality->pw_usage != NULL)
104 1.25 thorpej (*personality->pw_usage)("usage:");
105 1.25 thorpej else
106 1.25 thorpej global_usage("usage:");
107 1.25 thorpej exit(1);
108 1.25 thorpej }
109 1.25 thorpej
110 1.25 thorpej int
111 1.25 thorpej main(int argc, char **argv)
112 1.25 thorpej {
113 1.25 thorpej const struct pw_module_s *pwm;
114 1.25 thorpej const char *username;
115 1.25 thorpej int ch, i;
116 1.25 thorpej char opts[16];
117 1.25 thorpej
118 1.25 thorpej /* Build opts string from module compat_opts */
119 1.25 thorpej i = 0;
120 1.25 thorpej opts[i++] = 'd';
121 1.25 thorpej opts[i++] = ':';
122 1.25 thorpej for (pwm = pw_modules; pwm->pw_process != NULL; pwm++) {
123 1.25 thorpej if (pwm->compat_opt != 0)
124 1.25 thorpej opts[i++] = pwm->compat_opt;
125 1.25 thorpej }
126 1.25 thorpej opts[i++] = '\0';
127 1.25 thorpej
128 1.25 thorpej /* First, look for personality based on argv[0]. */
129 1.25 thorpej for (pwm = pw_modules; pwm->pw_process != NULL; pwm++) {
130 1.25 thorpej if (pwm->argv0 != NULL &&
131 1.25 thorpej strcmp(pwm->argv0, getprogname()) == 0)
132 1.25 thorpej goto got_personality;
133 1.25 thorpej }
134 1.25 thorpej
135 1.25 thorpej /* Try based on compat_opt or -d. */
136 1.25 thorpej for (ch = 0, pwm = pw_modules; pwm->pw_process != NULL; pwm++) {
137 1.25 thorpej if (pwm->argv0 == NULL && pwm->dbname == NULL &&
138 1.25 thorpej pwm->compat_opt == 0) {
139 1.25 thorpej /*
140 1.25 thorpej * We have reached the default personality case.
141 1.25 thorpej * Make sure the user didn't provide a bogus
142 1.25 thorpej * personality name.
143 1.25 thorpej */
144 1.25 thorpej if (ch == 'd')
145 1.25 thorpej usage();
146 1.25 thorpej break;
147 1.25 thorpej }
148 1.25 thorpej
149 1.25 thorpej ch = getopt(argc, argv, opts);
150 1.25 thorpej if (ch == '?')
151 1.25 thorpej usage();
152 1.25 thorpej
153 1.25 thorpej if (ch == 'd' && pwm->dbname != NULL &&
154 1.25 thorpej strcmp(pwm->dbname, optarg) == 0) {
155 1.25 thorpej /*
156 1.25 thorpej * "passwd -d dbname" matches; this is our
157 1.25 thorpej * chosen personality.
158 1.25 thorpej */
159 1.25 thorpej break;
160 1.25 thorpej }
161 1.25 thorpej
162 1.25 thorpej if (pwm->compat_opt != 0 && ch == pwm->compat_opt) {
163 1.25 thorpej /*
164 1.25 thorpej * Legacy "passwd -l" or similar matches; this
165 1.25 thorpej * is our chosen personality.
166 1.25 thorpej */
167 1.25 thorpej break;
168 1.25 thorpej }
169 1.25 thorpej
170 1.25 thorpej /* Reset getopt() and go around again. */
171 1.25 thorpej optind = 1;
172 1.25 thorpej optreset = 1;
173 1.25 thorpej }
174 1.25 thorpej
175 1.25 thorpej got_personality:
176 1.25 thorpej personality = pwm;
177 1.25 thorpej
178 1.25 thorpej /*
179 1.25 thorpej * At this point, optind should be either 1 ("passwd"),
180 1.25 thorpej * 2 ("passwd -l"), or 3 ("passwd -d files"). Consume
181 1.25 thorpej * these arguments and reset getopt() for the modules to use.
182 1.25 thorpej */
183 1.25 thorpej assert(optind >= 1 && optind <= 3);
184 1.25 thorpej argc -= optind;
185 1.25 thorpej argv += optind;
186 1.25 thorpej optind = 0;
187 1.25 thorpej optreset = 1;
188 1.25 thorpej
189 1.25 thorpej username = getlogin();
190 1.25 thorpej if (username == NULL)
191 1.25 thorpej errx(1, "who are you ??");
192 1.25 thorpej
193 1.25 thorpej (*personality->pw_process)(username, argc, argv);
194 1.27 christos return 0;
195 1.25 thorpej }
196 1.25 thorpej
197 1.25 thorpej #else /* ! USE_PAM */
198 1.25 thorpej
199 1.16 aidan static struct pw_module_s {
200 1.16 aidan const char *argv0;
201 1.16 aidan const char *args;
202 1.16 aidan const char *usage;
203 1.16 aidan int (*pw_init) __P((const char *));
204 1.16 aidan int (*pw_arg) __P((char, const char *));
205 1.16 aidan int (*pw_arg_end) __P((void));
206 1.16 aidan void (*pw_end) __P((void));
207 1.16 aidan
208 1.16 aidan int (*pw_chpw) __P((const char*));
209 1.16 aidan int invalid;
210 1.16 aidan #define INIT_INVALID 1
211 1.16 aidan #define ARG_INVALID 2
212 1.16 aidan int use_class;
213 1.16 aidan } pw_modules[] = {
214 1.16 aidan #ifdef KERBEROS5
215 1.16 aidan { NULL, "5ku:", "[-5] [-k] [-u principal]",
216 1.16 aidan krb5_init, krb5_arg, krb5_arg_end, krb5_end, krb5_chpw, 0, 0 },
217 1.16 aidan { "kpasswd", "5ku:", "[-5] [-k] [-u principal]",
218 1.16 aidan krb5_init, krb5_arg, krb5_arg_end, krb5_end, krb5_chpw, 0, 0 },
219 1.16 aidan #endif
220 1.16 aidan #ifdef YP
221 1.16 aidan { NULL, "y", "[-y]",
222 1.16 aidan yp_init, yp_arg, yp_arg_end, yp_end, yp_chpw, 0, 0 },
223 1.16 aidan { "yppasswd", "", "[-y]",
224 1.16 aidan yp_init, yp_arg, yp_arg_end, yp_end, yp_chpw, 0, 0 },
225 1.16 aidan #endif
226 1.16 aidan /* local */
227 1.16 aidan { NULL, "l", "[-l]",
228 1.16 aidan local_init, local_arg, local_arg_end, local_end, local_chpw, 0, 0 },
229 1.16 aidan
230 1.16 aidan /* terminator */
231 1.16 aidan { 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 }
232 1.16 aidan };
233 1.10 tls
234 1.25 thorpej static void
235 1.25 thorpej usage(void)
236 1.25 thorpej {
237 1.25 thorpej int i;
238 1.10 tls
239 1.25 thorpej fprintf(stderr, "usage:\n");
240 1.25 thorpej for (i = 0; pw_modules[i].pw_init != NULL; i++)
241 1.25 thorpej if (! (pw_modules[i].invalid & INIT_INVALID))
242 1.25 thorpej fprintf(stderr, "\t%s %s [user]\n", getprogname(),
243 1.25 thorpej pw_modules[i].usage);
244 1.25 thorpej exit(1);
245 1.25 thorpej }
246 1.12 lukem
247 1.12 lukem int
248 1.25 thorpej main(int argc, char **argv)
249 1.1 cgd {
250 1.10 tls int ch;
251 1.5 deraadt char *username;
252 1.16 aidan char optstring[64]; /* if we ever get more than 64 args, shoot me. */
253 1.16 aidan const char *curopt, *optopt;
254 1.16 aidan int i, j;
255 1.16 aidan int valid;
256 1.16 aidan int use_always;
257 1.16 aidan
258 1.16 aidan /* allow passwd modules to do argv[0] specific processing */
259 1.16 aidan use_always = 0;
260 1.16 aidan valid = 0;
261 1.16 aidan for (i = 0; pw_modules[i].pw_init != NULL; i++) {
262 1.16 aidan pw_modules[i].invalid = 0;
263 1.16 aidan if (pw_modules[i].argv0) {
264 1.16 aidan /*
265 1.16 aidan * If we have a module that matches this progname, be
266 1.16 aidan * sure that no modules but those that match this
267 1.16 aidan * progname can be used. If we have a module that
268 1.16 aidan * matches against a particular progname, but does NOT
269 1.16 aidan * match this one, don't use that module.
270 1.16 aidan */
271 1.21 cgd if ((strcmp(getprogname(), pw_modules[i].argv0) == 0) &&
272 1.16 aidan use_always == 0) {
273 1.16 aidan for (j = 0; j < i; j++) {
274 1.16 aidan pw_modules[j].invalid |= INIT_INVALID;
275 1.16 aidan (*pw_modules[j].pw_end)();
276 1.16 aidan }
277 1.16 aidan use_always = 1;
278 1.16 aidan } else if (use_always == 0)
279 1.16 aidan pw_modules[i].invalid |= INIT_INVALID;
280 1.16 aidan } else if (use_always)
281 1.16 aidan pw_modules[i].invalid |= INIT_INVALID;
282 1.16 aidan
283 1.16 aidan if (pw_modules[i].invalid)
284 1.16 aidan continue;
285 1.16 aidan
286 1.22 simonb pw_modules[i].invalid |=
287 1.22 simonb (*pw_modules[i].pw_init)(getprogname()) ?
288 1.16 aidan /* zero on success, non-zero on error */
289 1.16 aidan INIT_INVALID : 0;
290 1.16 aidan
291 1.16 aidan if (! pw_modules[i].invalid)
292 1.16 aidan valid = 1;
293 1.16 aidan }
294 1.7 phil
295 1.16 aidan if (valid == 0)
296 1.16 aidan errx(1, "Can't change password.");
297 1.7 phil
298 1.16 aidan /* Build the option string from the individual modules' option
299 1.16 aidan * strings. Note that two modules can share a single option
300 1.16 aidan * letter. */
301 1.16 aidan optstring[0] = '\0';
302 1.16 aidan j = 0;
303 1.16 aidan for (i = 0; pw_modules[i].pw_init != NULL; i++) {
304 1.16 aidan if (pw_modules[i].invalid)
305 1.16 aidan continue;
306 1.16 aidan
307 1.16 aidan curopt = pw_modules[i].args;
308 1.16 aidan while (*curopt != '\0') {
309 1.17 joda if ((optopt = strchr(optstring, *curopt)) == NULL) {
310 1.16 aidan optstring[j++] = *curopt;
311 1.16 aidan if (curopt[1] == ':') {
312 1.16 aidan curopt++;
313 1.16 aidan optstring[j++] = *curopt;
314 1.16 aidan }
315 1.16 aidan optstring[j] = '\0';
316 1.16 aidan } else if ((optopt[1] == ':' && curopt[1] != ':') ||
317 1.16 aidan (optopt[1] != ':' && curopt[1] == ':')) {
318 1.16 aidan errx(1, "NetBSD ERROR! Different password "
319 1.16 aidan "modules have two different ideas about "
320 1.16 aidan "%c argument format.", curopt[0]);
321 1.16 aidan }
322 1.16 aidan curopt++;
323 1.16 aidan }
324 1.7 phil }
325 1.7 phil
326 1.16 aidan while ((ch = getopt(argc, argv, optstring)) != -1)
327 1.16 aidan {
328 1.16 aidan valid = 0;
329 1.16 aidan for (i = 0; pw_modules[i].pw_init != NULL; i++) {
330 1.16 aidan if (pw_modules[i].invalid)
331 1.16 aidan continue;
332 1.17 joda if ((optopt = strchr(pw_modules[i].args, ch)) != NULL) {
333 1.16 aidan j = (optopt[1] == ':') ?
334 1.16 aidan ! (*pw_modules[i].pw_arg)(ch, optarg) :
335 1.17 joda ! (*pw_modules[i].pw_arg)(ch, NULL);
336 1.16 aidan if (j != 0)
337 1.16 aidan pw_modules[i].invalid |= ARG_INVALID;
338 1.16 aidan if (pw_modules[i].invalid)
339 1.16 aidan (*pw_modules[i].pw_end)();
340 1.16 aidan } else {
341 1.16 aidan /* arg doesn't match this module */
342 1.16 aidan pw_modules[i].invalid |= ARG_INVALID;
343 1.16 aidan (*pw_modules[i].pw_end)();
344 1.16 aidan }
345 1.16 aidan if (! pw_modules[i].invalid)
346 1.16 aidan valid = 1;
347 1.16 aidan }
348 1.16 aidan if (! valid) {
349 1.1 cgd usage();
350 1.16 aidan exit(1);
351 1.16 aidan }
352 1.16 aidan }
353 1.16 aidan
354 1.16 aidan /* select which module to use to actually change the password. */
355 1.16 aidan use_always = 0;
356 1.16 aidan valid = 0;
357 1.16 aidan for (i = 0; pw_modules[i].pw_init != NULL; i++)
358 1.16 aidan if (! pw_modules[i].invalid) {
359 1.16 aidan pw_modules[i].use_class = (*pw_modules[i].pw_arg_end)();
360 1.16 aidan if (pw_modules[i].use_class != PW_DONT_USE)
361 1.16 aidan valid = 1;
362 1.16 aidan if (pw_modules[i].use_class == PW_USE_FORCE)
363 1.16 aidan use_always = 1;
364 1.1 cgd }
365 1.1 cgd
366 1.16 aidan
367 1.16 aidan if (! valid)
368 1.16 aidan /* hang the DJ */
369 1.16 aidan errx(1, "No valid password module specified.");
370 1.16 aidan
371 1.1 cgd argc -= optind;
372 1.1 cgd argv += optind;
373 1.1 cgd
374 1.5 deraadt username = getlogin();
375 1.8 thorpej if (username == NULL)
376 1.8 thorpej errx(1, "who are you ??");
377 1.5 deraadt
378 1.1 cgd switch(argc) {
379 1.1 cgd case 0:
380 1.1 cgd break;
381 1.1 cgd case 1:
382 1.5 deraadt username = argv[0];
383 1.1 cgd break;
384 1.1 cgd default:
385 1.1 cgd usage();
386 1.1 cgd exit(1);
387 1.1 cgd }
388 1.1 cgd
389 1.16 aidan /* allow for fallback to other chpw() methods. */
390 1.16 aidan for (i = 0; pw_modules[i].pw_init != NULL; i++) {
391 1.16 aidan if (pw_modules[i].invalid)
392 1.16 aidan continue;
393 1.16 aidan if ((use_always && pw_modules[i].use_class == PW_USE_FORCE) ||
394 1.16 aidan (!use_always && pw_modules[i].use_class == PW_USE)) {
395 1.16 aidan valid = (*pw_modules[i].pw_chpw)(username);
396 1.16 aidan (*pw_modules[i].pw_end)();
397 1.16 aidan if (valid >= 0)
398 1.16 aidan exit(valid);
399 1.16 aidan /* return value < 0 indicates continuation. */
400 1.16 aidan }
401 1.16 aidan }
402 1.16 aidan exit(1);
403 1.1 cgd }
404 1.1 cgd
405 1.25 thorpej #endif /* USE_PAM */
406