Home | History | Annotate | Line # | Download | only in pwd_mkdb
pwd_mkdb.c revision 1.56
      1 /*	$NetBSD: pwd_mkdb.c,v 1.56 2012/11/26 20:13:54 pooka Exp $	*/
      2 
      3 /*
      4  * Copyright (c) 2000, 2009 The NetBSD Foundation, Inc.
      5  * All rights reserved.
      6  *
      7  * Redistribution and use in source and binary forms, with or without
      8  * modification, are permitted provided that the following conditions
      9  * are met:
     10  * 1. Redistributions of source code must retain the above copyright
     11  *    notice, this list of conditions and the following disclaimer.
     12  * 2. Redistributions in binary form must reproduce the above copyright
     13  *    notice, this list of conditions and the following disclaimer in the
     14  *    documentation and/or other materials provided with the distribution.
     15  *
     16  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
     17  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
     18  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
     19  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
     20  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
     21  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
     22  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
     23  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
     24  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
     25  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
     26  * POSSIBILITY OF SUCH DAMAGE.
     27  */
     28 
     29 /*
     30  * Copyright (c) 1991, 1993, 1994
     31  *	The Regents of the University of California.  All rights reserved.
     32  *
     33  * Redistribution and use in source and binary forms, with or without
     34  * modification, are permitted provided that the following conditions
     35  * are met:
     36  * 1. Redistributions of source code must retain the above copyright
     37  *    notice, this list of conditions and the following disclaimer.
     38  * 2. Redistributions in binary form must reproduce the above copyright
     39  *    notice, this list of conditions and the following disclaimer in the
     40  *    documentation and/or other materials provided with the distribution.
     41  * 3. Neither the name of the University nor the names of its contributors
     42  *    may be used to endorse or promote products derived from this software
     43  *    without specific prior written permission.
     44  *
     45  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
     46  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
     47  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
     48  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
     49  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
     50  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
     51  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
     52  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
     53  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
     54  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
     55  * SUCH DAMAGE.
     56  */
     57 
     58 /*
     59  * Portions Copyright(C) 1994, Jason Downs.  All rights reserved.
     60  *
     61  * Redistribution and use in source and binary forms, with or without
     62  * modification, are permitted provided that the following conditions
     63  * are met:
     64  * 1. Redistributions of source code must retain the above copyright
     65  *    notice, this list of conditions and the following disclaimer.
     66  * 2. Redistributions in binary form must reproduce the above copyright
     67  *    notice, this list of conditions and the following disclaimer in the
     68  *    documentation and/or other materials provided with the distribution.
     69  *
     70  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR(S) ``AS IS'' AND ANY EXPRESS
     71  * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
     72  * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
     73  * DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR(S) BE LIABLE FOR ANY DIRECT,
     74  * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
     75  * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
     76  * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
     77  * CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
     78  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
     79  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
     80  * SUCH DAMAGE.
     81  */
     82 
     83 #if HAVE_NBTOOL_CONFIG_H
     84 #include "nbtool_config.h"
     85 #endif
     86 
     87 #include <sys/cdefs.h>
     88 #if !defined(lint)
     89 __COPYRIGHT("@(#) Copyright (c) 2000, 2009\
     90  The NetBSD Foundation, Inc.  All rights reserved.\
     91   Copyright (c) 1991, 1993, 1994\
     92  The Regents of the University of California.  All rights reserved.");
     93 __RCSID("$NetBSD: pwd_mkdb.c,v 1.56 2012/11/26 20:13:54 pooka Exp $");
     94 #endif /* not lint */
     95 
     96 #if HAVE_NBTOOL_CONFIG_H
     97 #include "compat_pwd.h"
     98 #else
     99 #include <pwd.h>
    100 #endif
    101 
    102 #include <sys/param.h>
    103 #include <sys/stat.h>
    104 #include <sys/types.h>
    105 
    106 #ifndef HAVE_NBTOOL_CONFIG_H
    107 #include <machine/bswap.h>
    108 #endif
    109 
    110 #include <db.h>
    111 #include <err.h>
    112 #include <errno.h>
    113 #include <fcntl.h>
    114 #include <syslog.h>
    115 #include <limits.h>
    116 #include <signal.h>
    117 #include <stdio.h>
    118 #include <stdlib.h>
    119 #include <stdarg.h>
    120 #include <string.h>
    121 #include <unistd.h>
    122 
    123 #ifndef HAVE_NBTOOL_CONFIG_H
    124 #include <util.h>
    125 #endif
    126 
    127 #define	MAX_CACHESIZE	8*1024*1024
    128 #define	MIN_CACHESIZE	2*1024*1024
    129 
    130 #define	PERM_INSECURE	(S_IRUSR | S_IWUSR | S_IRGRP | S_IROTH)
    131 #define	PERM_SECURE	(S_IRUSR | S_IWUSR)
    132 
    133 #if HAVE_NBTOOL_CONFIG_H
    134 static const char __yp_token[] = "__YP!";
    135 #else
    136 /* Pull this out of the C library. */
    137 extern const char __yp_token[];
    138 #endif
    139 
    140 static HASHINFO openinfo = {
    141 	4096,		/* bsize */
    142 	32,		/* ffactor */
    143 	256,		/* nelem */
    144 	0,		/* cachesize */
    145 	NULL,		/* hash() */
    146 	0		/* lorder */
    147 };
    148 
    149 #define	FILE_INSECURE	0x01
    150 #define	FILE_SECURE	0x02
    151 #define	FILE_ORIG	0x04
    152 
    153 
    154 struct pwddb {
    155 	DB *db;
    156 	char dbname[MAX(MAXPATHLEN, LINE_MAX * 2)];
    157 	const char *fname;
    158 	uint32_t rversion;
    159 	uint32_t wversion;
    160 };
    161 
    162 static char	*pname;				/* password file name */
    163 static char	prefix[MAXPATHLEN];
    164 static char	oldpwdfile[MAX(MAXPATHLEN, LINE_MAX * 2)];
    165 static int 	lorder = BYTE_ORDER;
    166 static int	logsyslog;
    167 static int	clean;
    168 static int	verbose;
    169 static int	warning;
    170 static struct pwddb sdb, idb;
    171 
    172 
    173 void	bailout(void) __dead;
    174 void	cp(const char *, const char *, mode_t);
    175 void	deldbent(struct pwddb *, int, void *);
    176 void	mkpw_error(const char *, ...) __dead;
    177 void	mkpw_warning(const char *, ...);
    178 int	getdbent(struct pwddb *, int, void *, struct passwd **);
    179 void	inconsistency(void) __dead;
    180 void	install(const char *, const char *);
    181 int	main(int, char **);
    182 void	putdbents(struct pwddb *, struct passwd *, const char *, int, int,
    183     u_int, u_int);
    184 void	putyptoken(struct pwddb *);
    185 void	rm(const char *);
    186 int	scan(FILE *, struct passwd *, int *, int *);
    187 void	usage(void) __dead;
    188 void	wr_error(const char *) __dead;
    189 uint32_t getversion(const char *);
    190 void	setversion(struct pwddb *);
    191 
    192 #ifndef __lint__
    193 #define SWAP(sw) \
    194     ((sizeof(sw) == 2 ? (typeof(sw))bswap16((uint16_t)sw) : \
    195     (sizeof(sw) == 4 ? (typeof(sw))bswap32((uint32_t)sw) : \
    196     (sizeof(sw) == 8 ? (typeof(sw))bswap64((uint64_t)sw) : (abort(), 0)))))
    197 #else
    198 #define SWAP(sw) sw
    199 #endif
    200 
    201 static void
    202 closedb(struct pwddb *db)
    203 {
    204     if ((*db->db->close)(db->db) < 0)
    205 	    wr_error(db->dbname);
    206 }
    207 
    208 static void
    209 opendb(struct pwddb *db, const char *dbname, const char *username,
    210     uint32_t req_version, int flags, mode_t perm)
    211 {
    212 	char buf[MAXPATHLEN];
    213 
    214 	(void)snprintf(db->dbname, sizeof(db->dbname), "%s%s.tmp", prefix,
    215 	    dbname);
    216 
    217 	if (username != NULL) {
    218 		(void)snprintf(buf, sizeof(buf), "%s%s", prefix, dbname);
    219 		cp(buf, db->dbname, perm);
    220 	}
    221 
    222 	db->db = dbopen(db->dbname, flags, perm, DB_HASH, &openinfo);
    223 	if (db->db == NULL)
    224 		mkpw_error("Cannot open `%s'", db->dbname);
    225 
    226 	db->fname = dbname;
    227 	db->rversion = getversion(dbname);
    228 	if (req_version == ~0U)
    229 		db->wversion = db->rversion;
    230 	else
    231 		db->wversion = req_version;
    232 
    233 	if (warning && db->rversion == 0 && db->wversion == 0) {
    234 		mkpw_warning("Database %s is a version %u database.",
    235 		    db->fname, db->rversion);
    236 		mkpw_warning("Use %s -V 1 to upgrade once you've recompiled "
    237 		    "all your binaries.", getprogname());
    238 	}
    239 	if (db->wversion != db->rversion) {
    240 		if (username != NULL) {
    241 			mkpw_warning("You cannot change a single "
    242 			    "record from version %u to version %u\n",
    243 			    db->rversion, db->wversion);
    244 			bailout();
    245 		} else if (verbose) {
    246 		    mkpw_warning("Changing %s from version %u to version %u",
    247 			db->fname, db->rversion, db->wversion);
    248 		}
    249 	} else {
    250 		if (verbose)
    251 			mkpw_warning("File `%s' version %u requested %u",
    252 			    db->fname, db->rversion, db->wversion);
    253 	}
    254 
    255 	setversion(db);
    256 }
    257 
    258 int
    259 main(int argc, char *argv[])
    260 {
    261 	int ch, makeold, tfd, lineno, found, rv, hasyp, secureonly;
    262 	struct passwd pwd, *tpwd;
    263 	char *username;
    264 	FILE *fp, *oldfp;
    265 	sigset_t set;
    266 	u_int dbflg, uid_dbflg;
    267 	int newuser, olduid, flags;
    268 	struct stat st;
    269 	u_int cachesize;
    270 	uint32_t req_version;
    271 
    272 	prefix[0] = '\0';
    273 	makeold = 0;
    274 	oldfp = NULL;
    275 	username = NULL;
    276 	hasyp = 0;
    277 	secureonly = 0;
    278 	found = 0;
    279 	newuser = 0;
    280 	cachesize = 0;
    281 	verbose = 0;
    282 	warning = 0;
    283 	logsyslog = 0;
    284 	req_version = ~0U;
    285 
    286 	while ((ch = getopt(argc, argv, "BLc:d:lpsu:V:vw")) != -1)
    287 		switch (ch) {
    288 		case 'B':			/* big-endian output */
    289 			lorder = BIG_ENDIAN;
    290 			break;
    291 		case 'L':			/* little-endian output */
    292 			lorder = LITTLE_ENDIAN;
    293 			break;
    294 		case 'c':
    295 			cachesize = atoi(optarg) * 1024 * 1024;
    296 			break;
    297 		case 'd':			/* set prefix */
    298 			(void)strlcpy(prefix, optarg, sizeof(prefix));
    299 			break;
    300 		case 'l':
    301 			openlog(getprogname(), LOG_PID, LOG_AUTH);
    302 			logsyslog = 1;
    303 			break;
    304 		case 'p':			/* create V7 "file.orig" */
    305 			makeold = 1;
    306 			break;
    307 		case 's':			/* modify secure db only */
    308 			secureonly = 1;
    309 			break;
    310 		case 'u':			/* modify one user only */
    311 			username = optarg;
    312 			break;
    313 		case 'V':
    314 			req_version = (uint32_t)atoi(optarg);
    315 			if (req_version > 1) {
    316 				mkpw_warning("Unknown version %u", req_version);
    317 				return EXIT_FAILURE;
    318 			}
    319 			break;
    320 		case 'v':
    321 			verbose++;
    322 			break;
    323 		case 'w':
    324 			warning++;
    325 			break;
    326 		case '?':
    327 		default:
    328 			usage();
    329 		}
    330 	argc -= optind;
    331 	argv += optind;
    332 
    333 	if (argc != 1)
    334 		usage();
    335 	if (username != NULL)
    336 		if (username[0] == '+' || username[0] == '-')
    337 			usage();
    338 	if (secureonly)
    339 		makeold = 0;
    340 
    341 	/*
    342 	 * This could be changed to allow the user to interrupt.
    343 	 * Probably not worth the effort.
    344 	 */
    345 	(void)sigemptyset(&set);
    346 	(void)sigaddset(&set, SIGTSTP);
    347 	(void)sigaddset(&set, SIGHUP);
    348 	(void)sigaddset(&set, SIGINT);
    349 	(void)sigaddset(&set, SIGQUIT);
    350 	(void)sigaddset(&set, SIGTERM);
    351 	(void)sigprocmask(SIG_BLOCK, &set, NULL);
    352 
    353 	/* We don't care what the user wants. */
    354 	(void)umask(0);
    355 
    356 	if (username == NULL)
    357 		flags = O_RDWR | O_CREAT | O_EXCL;
    358 	else
    359 		flags = O_RDWR;
    360 
    361 	pname = *argv;
    362 	/* Open the original password file */
    363 	if ((fp = fopen(pname, "r")) == NULL)
    364 		mkpw_error("Cannot open `%s'", pname);
    365 
    366 	openinfo.lorder = lorder;
    367 
    368 	if (fstat(fileno(fp), &st) == -1)
    369 		mkpw_error("Cannot stat `%s'", pname);
    370 
    371 	if (cachesize) {
    372 		openinfo.cachesize = cachesize;
    373 	} else {
    374 		/* Tweak openinfo values for large passwd files. */
    375 		cachesize = (u_int)(st.st_size * 20);
    376 		if (cachesize > MAX_CACHESIZE)
    377 			cachesize = MAX_CACHESIZE;
    378 		else if (cachesize < MIN_CACHESIZE)
    379 			cachesize = MIN_CACHESIZE;
    380 		openinfo.cachesize = cachesize;
    381 	}
    382 
    383 	/* Open the temporary insecure password database. */
    384 	if (!secureonly) {
    385 		opendb(&idb, _PATH_MP_DB, username, req_version,
    386 		    flags, PERM_INSECURE);
    387 		clean |= FILE_INSECURE;
    388 	}
    389 
    390 
    391 	/* Open the temporary encrypted password database. */
    392 	opendb(&sdb, _PATH_SMP_DB, username, req_version, flags, PERM_SECURE);
    393 	clean |= FILE_SECURE;
    394 
    395 	/*
    396 	 * Open file for old password file.  Minor trickiness -- don't want to
    397 	 * chance the file already existing, since someone (stupidly) might
    398 	 * still be using this for permission checking.  So, open it first and
    399 	 * fdopen the resulting fd.  The resulting file should be readable by
    400 	 * everyone.
    401 	 */
    402 	if (makeold) {
    403 		(void)snprintf(oldpwdfile, sizeof(oldpwdfile), "%s.orig",
    404 		    pname);
    405 		if ((tfd = open(oldpwdfile, O_WRONLY | O_CREAT | O_EXCL,
    406 		    PERM_INSECURE)) < 0)
    407 			mkpw_error("Cannot create `%s'", oldpwdfile);
    408 		clean |= FILE_ORIG;
    409 		if ((oldfp = fdopen(tfd, "w")) == NULL)
    410 			mkpw_error("Cannot fdopen `%s'", oldpwdfile);
    411 	}
    412 
    413 	if (username != NULL) {
    414 		uid_dbflg = 0;
    415 		dbflg = 0;
    416 
    417 		/*
    418 		 * Determine if this is a new entry.
    419 		 */
    420 		if (getdbent(&sdb, _PW_KEYBYNAME, username, &tpwd))
    421 			newuser = 1;
    422 		else {
    423 			newuser = 0;
    424 			olduid = tpwd->pw_uid;
    425 		}
    426 
    427 	} else {
    428 		uid_dbflg = R_NOOVERWRITE;
    429 		dbflg = R_NOOVERWRITE;
    430 	}
    431 
    432 	/*
    433 	 * If we see something go by that looks like YP, we save a special
    434 	 * pointer record, which if YP is enabled in the C lib, will speed
    435 	 * things up.
    436 	 */
    437 	for (lineno = 0; scan(fp, &pwd, &flags, &lineno);) {
    438 		/*
    439 		 * Create original format password file entry.
    440 		 */
    441 		if (makeold) {
    442 			(void)fprintf(oldfp, "%s:*:%d:%d:%s:%s:%s\n",
    443 			    pwd.pw_name, pwd.pw_uid, pwd.pw_gid, pwd.pw_gecos,
    444 			    pwd.pw_dir, pwd.pw_shell);
    445 			if (ferror(oldfp))
    446 				wr_error(oldpwdfile);
    447 		}
    448 
    449 		if (username == NULL) {
    450 			/* Look like YP? */
    451 			if (pwd.pw_name[0] == '+' || pwd.pw_name[0] == '-')
    452 				hasyp++;
    453 
    454 			/* Warn about potentially unsafe uid/gid overrides. */
    455 			if (pwd.pw_name[0] == '+') {
    456 				if ((flags & _PASSWORD_NOUID) == 0 &&
    457 				    pwd.pw_uid == 0)
    458 					mkpw_warning("line %d: superuser "
    459 					    "override in YP inclusion", lineno);
    460 				if ((flags & _PASSWORD_NOGID) == 0 &&
    461 				    pwd.pw_gid == 0)
    462 					mkpw_warning("line %d: wheel override "
    463 					    "in YP inclusion", lineno);
    464 			}
    465 
    466 			/* Write the database entry out. */
    467 			if (!secureonly)
    468 				putdbents(&idb, &pwd, "*", flags, lineno, dbflg,
    469 				    uid_dbflg);
    470 			continue;
    471 		} else if (strcmp(username, pwd.pw_name) != 0)
    472 			continue;
    473 
    474 		if (found) {
    475 			mkpw_warning("user `%s' listed twice in password file",
    476 			    username);
    477 			bailout();
    478 		}
    479 
    480 		/*
    481 		 * Ensure that the text file and database agree on
    482 		 * which line the record is from.
    483 		 */
    484 		rv = getdbent(&sdb, _PW_KEYBYNUM, &lineno, &tpwd);
    485 		if (newuser) {
    486 			if (rv == 0)
    487 				inconsistency();
    488 		} else if (rv == 1 || strcmp(username, tpwd->pw_name) != 0)
    489 			inconsistency();
    490 		else if ((uid_t)olduid != pwd.pw_uid) {
    491 			/*
    492 			 * If we're changing UID, remove the BYUID
    493 			 * record for the old UID only if it has the
    494 			 * same username.
    495 			 */
    496 			if (!getdbent(&sdb, _PW_KEYBYUID, &olduid, &tpwd)) {
    497 				if (strcmp(username, tpwd->pw_name) == 0) {
    498 					if (!secureonly)
    499 						deldbent(&idb, _PW_KEYBYUID,
    500 						    &olduid);
    501 					deldbent(&sdb, _PW_KEYBYUID, &olduid);
    502 				}
    503 			} else
    504 				inconsistency();
    505 		}
    506 
    507 		/*
    508 		 * If there's an existing BYUID record for the new UID and
    509 		 * the username doesn't match then be sure not to overwrite
    510 		 * it.
    511 		 */
    512 		if (!getdbent(&sdb, _PW_KEYBYUID, &pwd.pw_uid, &tpwd))
    513 			if (strcmp(username, tpwd->pw_name) != 0)
    514 				uid_dbflg = R_NOOVERWRITE;
    515 
    516 		/* Write the database entries out */
    517 		if (!secureonly)
    518 			putdbents(&idb, &pwd, "*", flags, lineno, dbflg,
    519 			    uid_dbflg);
    520 		putdbents(&sdb, &pwd, pwd.pw_passwd, flags, lineno, dbflg,
    521 		    uid_dbflg);
    522 
    523 		found = 1;
    524 		if (!makeold)
    525 			break;
    526 	}
    527 
    528 	if (!secureonly) {
    529 		/* Store YP token if needed. */
    530 		if (hasyp)
    531 			putyptoken(&idb);
    532 
    533 		/* Close the insecure database. */
    534 		closedb(&idb);
    535 	}
    536 
    537 	/*
    538 	 * If rebuilding the databases, we re-parse the text file and write
    539 	 * the secure entries out in a separate pass.
    540 	 */
    541 	if (username == NULL) {
    542 		rewind(fp);
    543 		for (lineno = 0; scan(fp, &pwd, &flags, &lineno);)
    544 			putdbents(&sdb, &pwd, pwd.pw_passwd, flags,
    545 			    lineno, dbflg, uid_dbflg);
    546 
    547 		/* Store YP token if needed. */
    548 		if (hasyp)
    549 			putyptoken(&sdb);
    550 	} else if (!found) {
    551 		mkpw_warning("user `%s' not found in password file", username);
    552 		bailout();
    553 	}
    554 
    555 	/* Close the secure database. */
    556 	closedb(&sdb);
    557 
    558 	/* Install as the real password files. */
    559 	if (!secureonly)
    560 		install(idb.dbname, idb.fname);
    561 	install(sdb.dbname, sdb.fname);
    562 
    563 	/* Install the V7 password file. */
    564 	if (makeold) {
    565 		if (fflush(oldfp) == EOF)
    566 			wr_error(oldpwdfile);
    567 		if (fclose(oldfp) == EOF)
    568 			wr_error(oldpwdfile);
    569 		install(oldpwdfile, _PATH_PASSWD);
    570 	}
    571 
    572 	/* Set master.passwd permissions, in case caller forgot. */
    573 	(void)fchmod(fileno(fp), S_IRUSR|S_IWUSR);
    574 	if (fclose(fp) == EOF)
    575 		wr_error(pname);
    576 
    577 	/*
    578 	 * Move the temporary master password file LAST -- chpass(1),
    579 	 * passwd(1), vipw(8) and friends all use its existence to block
    580 	 * other incarnations of themselves.  The rename means that
    581 	 * everything is unlocked, as the original file can no longer be
    582 	 * accessed.
    583 	 */
    584 	install(pname, _PATH_MASTERPASSWD);
    585 	exit(EXIT_SUCCESS);
    586 	/* NOTREACHED */
    587 }
    588 
    589 int
    590 scan(FILE *fp, struct passwd *pw, int *flags, int *lineno)
    591 {
    592 	static char line[LINE_MAX];
    593 	char *p;
    594 	int oflags;
    595 
    596 	if (fgets(line, (int)sizeof(line), fp) == NULL)
    597 		return (0);
    598 	(*lineno)++;
    599 
    600 	/*
    601 	 * ``... if I swallow anything evil, put your fingers down my
    602 	 * throat...''
    603 	 *	-- The Who
    604 	 */
    605 	if ((p = strchr(line, '\n')) == NULL) {
    606 		errno = EFTYPE;	/* XXX */
    607 		mkpw_error("%s, %d: line too long", pname, *lineno);
    608 	}
    609 	*p = '\0';
    610 	if (strcmp(line, "+") == 0) {
    611 		/* pw_scan() can't handle "+" */
    612 		(void)strcpy(line, "+:::::::::");
    613 	}
    614 	oflags = 0;
    615 	if (!pw_scan(line, pw, &oflags)) {
    616 		errno = EFTYPE;	/* XXX */
    617 		mkpw_error("%s, %d: Syntax mkpw_error", pname, *lineno);
    618 	}
    619 	*flags = oflags;
    620 
    621 	return (1);
    622 }
    623 
    624 void
    625 install(const char *from, const char *to)
    626 {
    627 	char buf[MAXPATHLEN];
    628 
    629 	(void)snprintf(buf, sizeof(buf), "%s%s", prefix, to);
    630 	if (rename(from, buf))
    631 		mkpw_error("Cannot rename `%s' to `%s'", from, buf);
    632 }
    633 
    634 void
    635 rm(const char *victim)
    636 {
    637 
    638 	if (unlink(victim) < 0)
    639 		warn("unlink(%s)", victim);
    640 }
    641 
    642 void
    643 cp(const char *from, const char *to, mode_t mode)
    644 {
    645 	static char buf[MAXBSIZE];
    646 	int from_fd, to_fd;
    647 	ssize_t rcount, wcount;
    648 
    649 	if ((from_fd = open(from, O_RDONLY, 0)) < 0)
    650 		mkpw_error("Cannot open `%s'", from);
    651 	if ((to_fd = open(to, O_WRONLY | O_CREAT | O_EXCL, mode)) < 0) {
    652 		(void)close(from_fd);
    653 		mkpw_error("Cannot open `%s'", to);
    654 	}
    655 	while ((rcount = read(from_fd, buf, MAXBSIZE)) > 0) {
    656 		wcount = write(to_fd, buf, (size_t)rcount);
    657 		if (rcount != wcount || wcount == -1) {
    658 			(void)close(from_fd);
    659 			(void)close(to_fd);
    660 			goto on_error;
    661 		}
    662 	}
    663 
    664 	close(from_fd);
    665 	if (close(to_fd))
    666 		goto on_error;
    667 	if (rcount < 0)
    668 		goto on_error;
    669 	return;
    670 
    671 on_error:
    672 	mkpw_error("Cannot copy `%s' to `%s'", from, to);
    673 }
    674 
    675 void
    676 wr_error(const char *str)
    677 {
    678 	mkpw_error("Cannot write `%s'", str);
    679 }
    680 
    681 void
    682 mkpw_error(const char *fmt, ...)
    683 {
    684 	va_list ap;
    685 	va_start(ap, fmt);
    686 	if (logsyslog) {
    687 		int sverrno = errno;
    688 		char efmt[BUFSIZ];
    689 		snprintf(efmt, sizeof(efmt), "%s (%%m)", fmt);
    690 		errno = sverrno;
    691 		vsyslog(LOG_ERR, efmt, ap);
    692 	} else
    693 		vwarn(fmt, ap);
    694 	va_end(ap);
    695 	bailout();
    696 }
    697 
    698 void
    699 mkpw_warning(const char *fmt, ...)
    700 {
    701 	va_list ap;
    702 	va_start(ap, fmt);
    703 	if (logsyslog)
    704 		vsyslog(LOG_WARNING, fmt, ap);
    705 	else
    706 		vwarnx(fmt, ap);
    707 	va_end(ap);
    708 }
    709 
    710 void
    711 inconsistency(void)
    712 {
    713 
    714 	mkpw_warning("text files and databases are inconsistent");
    715 	mkpw_warning("re-build the databases without -u");
    716 	bailout();
    717 }
    718 
    719 void
    720 bailout(void)
    721 {
    722 
    723 	if ((clean & FILE_ORIG) != 0)
    724 		rm(oldpwdfile);
    725 	if ((clean & FILE_SECURE) != 0)
    726 		rm(sdb.dbname);
    727 	if ((clean & FILE_INSECURE) != 0)
    728 		rm(idb.dbname);
    729 
    730 	exit(EXIT_FAILURE);
    731 }
    732 
    733 uint32_t
    734 getversion(const char *fname)
    735 {
    736 	DBT data, key;
    737 	int ret;
    738 	uint32_t version = 0;
    739 	DB *db;
    740 
    741 	db = dbopen(fname, O_RDONLY, PERM_INSECURE, DB_HASH, NULL);
    742 	if (db == NULL) {
    743 		/* If we are building on a separate root, assume version 1 */
    744 		if ((errno == EACCES || errno == ENOENT) && prefix[0])
    745 			return 1;
    746 		mkpw_warning("Cannot open database `%s'", fname);
    747 		bailout();
    748 	}
    749 	key.data = __UNCONST("VERSION");
    750 	key.size = strlen((const char *)key.data) + 1;
    751 
    752 	switch (ret = (*db->get)(db, &key, &data, 0)) {
    753 	case -1:	/* Error */
    754 		mkpw_warning("Cannot get VERSION record from database `%s'",
    755 		    fname);
    756 		goto out;
    757 	case 0:
    758 		if (data.size != sizeof(version)) {
    759 		    mkpw_warning("Bad VERSION record in database `%s'", fname);
    760 		    goto out;
    761 		}
    762 		(void)memcpy(&version, data.data, sizeof(version));
    763 		/*FALLTHROUGH*/
    764 	case 1:
    765 		if (ret == 1)
    766 			mkpw_warning("Database `%s' has no version info",
    767 			    fname);
    768 		(*db->close)(db);
    769 		return version;
    770 	default:
    771 		mkpw_warning("internal mkpw_error db->get returns %d", ret);
    772 		goto out;
    773 	}
    774 out:
    775 	(*db->close)(db);
    776 	bailout();
    777 	/*NOTREACHED*/
    778 }
    779 
    780 void
    781 setversion(struct pwddb *db)
    782 {
    783 	DBT data, key;
    784 	key.data = __UNCONST("VERSION");
    785 	key.size = strlen((const char *)key.data) + 1;
    786 
    787 	data.data = &db->wversion;
    788 	data.size = sizeof(uint32_t);
    789 
    790 	if ((*db->db->put)(db->db, &key, &data, 0) != 0) {
    791 		mkpw_warning("Can't write VERSION record to `%s'", db->dbname);
    792 		bailout();
    793 	}
    794 }
    795 
    796 
    797 /*
    798  * Write entries to a database for a single user.
    799  *
    800  * The databases actually contain three copies of the original data.  Each
    801  * password file entry is converted into a rough approximation of a ``struct
    802  * passwd'', with the strings placed inline.  This object is then stored as
    803  * the data for three separate keys.  The first key * is the pw_name field
    804  * prepended by the _PW_KEYBYNAME character.  The second key is the pw_uid
    805  * field prepended by the _PW_KEYBYUID character.  The third key is the line
    806  * number in the original file prepended by the _PW_KEYBYNUM character.
    807  * (The special characters are prepended to ensure that the keys do not
    808  * collide.)
    809  */
    810 #define	COMPACT(e)	for (t = e; (*p++ = *t++) != '\0';)
    811 
    812 void
    813 putdbents(struct pwddb *db, struct passwd *pw, const char *passwd, int flags,
    814       int lineno, u_int dbflg, u_int uid_dbflg)
    815 {
    816 	struct passwd pwd;
    817 	char buf[MAX(MAXPATHLEN, LINE_MAX * 2)], tbuf[1024], *p;
    818 	DBT data, key;
    819 	const char *t;
    820 	u_int32_t x;
    821 	size_t len;
    822 
    823 	(void)memcpy(&pwd, pw, sizeof(pwd));
    824 	data.data = (u_char *)buf;
    825 	key.data = (u_char *)tbuf;
    826 
    827 	if (lorder != BYTE_ORDER) {
    828 		pwd.pw_uid = SWAP(pwd.pw_uid);
    829 		pwd.pw_gid = SWAP(pwd.pw_gid);
    830 	}
    831 
    832 #define WRITEPWTIMEVAR(pwvar) \
    833 	do { \
    834 		if (db->wversion == 0 && \
    835 		    /*CONSTCOND*/sizeof(pwvar) == sizeof(uint64_t)) { \
    836 			uint32_t tmp = (uint32_t)pwvar; \
    837 			if (lorder != BYTE_ORDER) \
    838 				tmp = SWAP(tmp); \
    839 			(void)memmove(p, &tmp, sizeof(tmp)); \
    840 			p += sizeof(tmp); \
    841 		} else if (db->wversion == 1 && \
    842 		    /*CONSTCOND*/sizeof(pwvar) == sizeof(uint32_t)) { \
    843 			uint64_t tmp = pwvar; \
    844 			if (lorder != BYTE_ORDER) \
    845 				tmp = SWAP(tmp); \
    846 			(void)memmove(p, &tmp, sizeof(tmp)); \
    847 			p += sizeof(tmp); \
    848 		} else { \
    849 			if (lorder != BYTE_ORDER) \
    850 				pwvar = SWAP(pwvar); \
    851 			(void)memmove(p, &pwvar, sizeof(pwvar)); \
    852 			p += sizeof(pwvar); \
    853 		} \
    854 	} while (/*CONSTCOND*/0)
    855 
    856 	/* Create insecure data. */
    857 	p = buf;
    858 	COMPACT(pwd.pw_name);
    859 	COMPACT(passwd);
    860 	(void)memmove(p, &pwd.pw_uid, sizeof(pwd.pw_uid));
    861 	p += sizeof(pwd.pw_uid);
    862 	(void)memmove(p, &pwd.pw_gid, sizeof(pwd.pw_gid));
    863 	p += sizeof(pwd.pw_gid);
    864 	WRITEPWTIMEVAR(pwd.pw_change);
    865 	COMPACT(pwd.pw_class);
    866 	COMPACT(pwd.pw_gecos);
    867 	COMPACT(pwd.pw_dir);
    868 	COMPACT(pwd.pw_shell);
    869 	WRITEPWTIMEVAR(pwd.pw_expire);
    870 	x = flags;
    871 	if (lorder != BYTE_ORDER)
    872 		x = SWAP(x);
    873 	(void)memmove(p, &x, sizeof(x));
    874 	p += sizeof(x);
    875 	data.size = p - buf;
    876 
    877 	/* Store insecure by name. */
    878 	tbuf[0] = _PW_KEYBYNAME;
    879 	len = strlen(pwd.pw_name);
    880 	(void)memmove(tbuf + 1, pwd.pw_name, len);
    881 	key.size = len + 1;
    882 	if ((*db->db->put)(db->db, &key, &data, dbflg) == -1)
    883 		wr_error(db->dbname);
    884 
    885 	/* Store insecure by number. */
    886 	tbuf[0] = _PW_KEYBYNUM;
    887 	x = lineno;
    888 	if (lorder != BYTE_ORDER)
    889 		x = SWAP(x);
    890 	(void)memmove(tbuf + 1, &x, sizeof(x));
    891 	key.size = sizeof(x) + 1;
    892 	if ((*db->db->put)(db->db, &key, &data, dbflg) == -1)
    893 		wr_error(db->dbname);
    894 
    895 	/* Store insecure by uid. */
    896 	tbuf[0] = _PW_KEYBYUID;
    897 	(void)memmove(tbuf + 1, &pwd.pw_uid, sizeof(pwd.pw_uid));
    898 	key.size = sizeof(pwd.pw_uid) + 1;
    899 	if ((*db->db->put)(db->db, &key, &data, uid_dbflg) == -1)
    900 		wr_error(db->dbname);
    901 }
    902 
    903 void
    904 deldbent(struct pwddb *db, int type, void *keyp)
    905 {
    906 	char tbuf[1024];
    907 	DBT key;
    908 	u_int32_t x;
    909 	size_t len;
    910 
    911 	key.data = (u_char *)tbuf;
    912 
    913 	switch (tbuf[0] = type) {
    914 	case _PW_KEYBYNAME:
    915 		len = strlen((char *)keyp);
    916 		(void)memcpy(tbuf + 1, keyp, len);
    917 		key.size = len + 1;
    918 		break;
    919 
    920 	case _PW_KEYBYNUM:
    921 	case _PW_KEYBYUID:
    922 		x = *(int *)keyp;
    923 		if (lorder != BYTE_ORDER)
    924 			x = SWAP(x);
    925 		(void)memmove(tbuf + 1, &x, sizeof(x));
    926 		key.size = sizeof(x) + 1;
    927 		break;
    928 	}
    929 
    930 	if ((*db->db->del)(db->db, &key, 0) == -1)
    931 		wr_error(db->dbname);
    932 }
    933 
    934 int
    935 getdbent(struct pwddb *db, int type, void *keyp, struct passwd **tpwd)
    936 {
    937 	static char buf[MAX(MAXPATHLEN, LINE_MAX * 2)];
    938 	static struct passwd pwd;
    939 	char tbuf[1024], *p;
    940 	DBT key, data;
    941 	u_int32_t x;
    942 	size_t len;
    943 	int rv;
    944 
    945 	data.data = (u_char *)buf;
    946 	data.size = sizeof(buf);
    947 	key.data = (u_char *)tbuf;
    948 
    949 	switch (tbuf[0] = type) {
    950 	case _PW_KEYBYNAME:
    951 		len = strlen((char *)keyp);
    952 		(void)memcpy(tbuf + 1, keyp, len);
    953 		key.size = len + 1;
    954 		break;
    955 
    956 	case _PW_KEYBYNUM:
    957 	case _PW_KEYBYUID:
    958 		x = *(int *)keyp;
    959 		if (lorder != BYTE_ORDER)
    960 			x = SWAP(x);
    961 		(void)memmove(tbuf + 1, &x, sizeof(x));
    962 		key.size = sizeof(x) + 1;
    963 		break;
    964 	}
    965 
    966 	if ((rv = (*db->db->get)(db->db, &key, &data, 0)) == 1)
    967 		return (rv);
    968 	if (rv == -1)
    969 		mkpw_error("Error getting record from `%s'", db->dbname);
    970 
    971 	p = (char *)data.data;
    972 
    973 	pwd.pw_name = p;
    974 	while (*p++ != '\0')
    975 		continue;
    976 	pwd.pw_passwd = p;
    977 	while (*p++ != '\0')
    978 		continue;
    979 
    980 	(void)memcpy(&pwd.pw_uid, p, sizeof(pwd.pw_uid));
    981 	p += sizeof(pwd.pw_uid);
    982 	(void)memcpy(&pwd.pw_gid, p, sizeof(pwd.pw_gid));
    983 	p += sizeof(pwd.pw_gid);
    984 
    985 #define READPWTIMEVAR(pwvar) \
    986 	do { \
    987 		if (db->rversion == 0 && \
    988 		    /*CONSTCOND*/sizeof(pwvar) == sizeof(uint64_t)) { \
    989 			uint32_t tmp; \
    990 			(void)memcpy(&tmp, p, sizeof(tmp)); \
    991 			p += sizeof(tmp); \
    992 			if (lorder != BYTE_ORDER) \
    993 				pwvar = SWAP(tmp); \
    994 			else \
    995 				pwvar = tmp; \
    996 		} else if (db->rversion == 1 && \
    997 		    /*CONSTCOND*/sizeof(pwvar) == sizeof(uint32_t)) { \
    998 			uint64_t tmp; \
    999 			(void)memcpy(&tmp, p, sizeof(tmp)); \
   1000 			p += sizeof(tmp); \
   1001 			if (lorder != BYTE_ORDER) \
   1002 				pwvar = (uint32_t)SWAP(tmp); \
   1003 			else \
   1004 				pwvar = (uint32_t)tmp; \
   1005 		} else { \
   1006 			(void)memcpy(&pwvar, p, sizeof(pwvar)); \
   1007 			p += sizeof(pwvar); \
   1008 			if (lorder != BYTE_ORDER) \
   1009 				pwvar = SWAP(pwvar); \
   1010 		} \
   1011 	} while (/*CONSTCOND*/0)
   1012 
   1013 	READPWTIMEVAR(pwd.pw_change);
   1014 
   1015 	pwd.pw_class = p;
   1016 	while (*p++ != '\0')
   1017 		continue;
   1018 	pwd.pw_gecos = p;
   1019 	while (*p++ != '\0')
   1020 		continue;
   1021 	pwd.pw_dir = p;
   1022 	while (*p++ != '\0')
   1023 		continue;
   1024 	pwd.pw_shell = p;
   1025 	while (*p++ != '\0')
   1026 		continue;
   1027 
   1028 	READPWTIMEVAR(pwd.pw_expire);
   1029 
   1030 	if (lorder != BYTE_ORDER) {
   1031 		pwd.pw_uid = SWAP(pwd.pw_uid);
   1032 		pwd.pw_gid = SWAP(pwd.pw_gid);
   1033 	}
   1034 
   1035 	*tpwd = &pwd;
   1036 	return (0);
   1037 }
   1038 
   1039 void
   1040 putyptoken(struct pwddb *db)
   1041 {
   1042 	DBT data, key;
   1043 
   1044 	key.data = __UNCONST(__yp_token);
   1045 	key.size = strlen(__yp_token);
   1046 	data.data = NULL;
   1047 	data.size = 0;
   1048 
   1049 	if ((*db->db->put)(db->db, &key, &data, R_NOOVERWRITE) == -1)
   1050 		wr_error(db->dbname);
   1051 }
   1052 
   1053 void
   1054 usage(void)
   1055 {
   1056 
   1057 	(void)fprintf(stderr,
   1058 	    "Usage: %s [-BLlpsvw] [-c cachesize] [-d directory] [-u user] "
   1059 	    "[-V version] file\n",
   1060 	    getprogname());
   1061 	exit(EXIT_FAILURE);
   1062 }
   1063