Home | History | Annotate | Line # | Download | only in user
user.c revision 1.9
      1  1.9     agc /* $NetBSD: user.c,v 1.9 1999/12/24 09:08:50 agc Exp $ */
      2  1.1     agc 
      3  1.1     agc /*
      4  1.4   lukem  * Copyright (c) 1999 Alistair G. Crooks.  All rights reserved.
      5  1.1     agc  *
      6  1.1     agc  * Redistribution and use in source and binary forms, with or without
      7  1.1     agc  * modification, are permitted provided that the following conditions
      8  1.1     agc  * are met:
      9  1.1     agc  * 1. Redistributions of source code must retain the above copyright
     10  1.1     agc  *    notice, this list of conditions and the following disclaimer.
     11  1.1     agc  * 2. Redistributions in binary form must reproduce the above copyright
     12  1.1     agc  *    notice, this list of conditions and the following disclaimer in the
     13  1.1     agc  *    documentation and/or other materials provided with the distribution.
     14  1.1     agc  * 3. All advertising materials mentioning features or use of this software
     15  1.1     agc  *    must display the following acknowledgement:
     16  1.1     agc  *	This product includes software developed by Alistair G. Crooks.
     17  1.1     agc  * 4. The name of the author may not be used to endorse or promote
     18  1.1     agc  *    products derived from this software without specific prior written
     19  1.1     agc  *    permission.
     20  1.1     agc  *
     21  1.1     agc  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS
     22  1.1     agc  * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
     23  1.1     agc  * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
     24  1.1     agc  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY
     25  1.1     agc  * DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
     26  1.1     agc  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE
     27  1.1     agc  * GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
     28  1.1     agc  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
     29  1.1     agc  * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
     30  1.1     agc  * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
     31  1.1     agc  * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
     32  1.1     agc  */
     33  1.1     agc #include <sys/types.h>
     34  1.1     agc #include <sys/param.h>
     35  1.1     agc #include <sys/stat.h>
     36  1.1     agc 
     37  1.5   lukem #include <ctype.h>
     38  1.5   lukem #include <dirent.h>
     39  1.5   lukem #include <err.h>
     40  1.5   lukem #include <fcntl.h>
     41  1.5   lukem #include <grp.h>
     42  1.5   lukem #include <pwd.h>
     43  1.5   lukem #include <stdarg.h>
     44  1.1     agc #include <stdio.h>
     45  1.1     agc #include <stdlib.h>
     46  1.1     agc #include <string.h>
     47  1.1     agc #include <time.h>
     48  1.5   lukem #include <unistd.h>
     49  1.1     agc #include <util.h>
     50  1.1     agc 
     51  1.1     agc #include "defs.h"
     52  1.1     agc #include "usermgmt.h"
     53  1.1     agc 
     54  1.9     agc /* this struct describes a uid range */
     55  1.9     agc typedef struct range_t {
     56  1.9     agc 	int	r_from;		/* low uid */
     57  1.9     agc 	int	r_to;		/* high uid */
     58  1.9     agc } range_t;
     59  1.9     agc 
     60  1.9     agc /* this struct encapsulates the user information */
     61  1.9     agc typedef struct user_t {
     62  1.9     agc 	int		u_uid;			/* uid of user */
     63  1.9     agc 	char		*u_password;		/* encrypted password */
     64  1.9     agc 	char		*u_comment;		/* comment field */
     65  1.9     agc 	int		u_homeset;		/* home dir has been set */
     66  1.9     agc 	char		*u_home;		/* home directory */
     67  1.9     agc 	char		*u_primgrp;		/* primary group */
     68  1.9     agc 	int		u_groupc;		/* # of secondary groups */
     69  1.9     agc 	char		*u_groupv[NGROUPS_MAX];	/* secondary groups */
     70  1.9     agc 	char		*u_shell;		/* user's shell */
     71  1.9     agc 	char		*u_basedir;		/* base directory for home */
     72  1.9     agc 	char		*u_expire;		/* when password will expire */
     73  1.9     agc 	int		u_inactive;		/* inactive */
     74  1.9     agc 	int		u_mkdir;		/* make the home directory */
     75  1.9     agc 	int		u_dupuid;		/* duplicate uids are allowed */
     76  1.9     agc 	char		*u_skeldir;		/* directory for startup files */
     77  1.9     agc 	unsigned	u_rsize;		/* size of range array */
     78  1.9     agc 	unsigned	u_rc;			/* # of ranges */
     79  1.9     agc 	range_t		*u_rv;			/* the ranges */
     80  1.9     agc 	unsigned	u_defrc;		/* # of ranges in defaults */
     81  1.9     agc 	int		u_preserve;		/* preserve uids on deletion */
     82  1.9     agc } user_t;
     83  1.9     agc 
     84  1.9     agc #define CONFFILE	"/etc/usermgmt.conf"
     85  1.9     agc 
     86  1.9     agc #ifndef DEF_GROUP
     87  1.9     agc #define DEF_GROUP	"users"
     88  1.9     agc #endif
     89  1.9     agc 
     90  1.9     agc #ifndef DEF_BASEDIR
     91  1.9     agc #define DEF_BASEDIR	"/home"
     92  1.9     agc #endif
     93  1.9     agc 
     94  1.9     agc #ifndef DEF_SKELDIR
     95  1.9     agc #define DEF_SKELDIR	"/etc/skel"
     96  1.9     agc #endif
     97  1.9     agc 
     98  1.9     agc #ifndef DEF_SHELL
     99  1.9     agc #define DEF_SHELL	"/bin/csh"
    100  1.9     agc #endif
    101  1.9     agc 
    102  1.9     agc #ifndef DEF_COMMENT
    103  1.9     agc #define DEF_COMMENT	""
    104  1.9     agc #endif
    105  1.9     agc 
    106  1.9     agc #ifndef DEF_LOWUID
    107  1.9     agc #define DEF_LOWUID	1000
    108  1.9     agc #endif
    109  1.9     agc 
    110  1.9     agc #ifndef DEF_HIGHUID
    111  1.9     agc #define DEF_HIGHUID	60000
    112  1.9     agc #endif
    113  1.9     agc 
    114  1.9     agc #ifndef DEF_INACTIVE
    115  1.9     agc #define DEF_INACTIVE	0
    116  1.9     agc #endif
    117  1.9     agc 
    118  1.9     agc #ifndef DEF_EXPIRE
    119  1.9     agc #define DEF_EXPIRE	(char *) NULL
    120  1.9     agc #endif
    121  1.9     agc 
    122  1.9     agc #ifndef MASTER
    123  1.9     agc #define MASTER		"/etc/master.passwd"
    124  1.9     agc #endif
    125  1.9     agc 
    126  1.9     agc #ifndef ETCGROUP
    127  1.9     agc #define ETCGROUP	"/etc/group"
    128  1.9     agc #endif
    129  1.9     agc 
    130  1.9     agc #ifndef WAITSECS
    131  1.9     agc #define WAITSECS	10
    132  1.9     agc #endif
    133  1.9     agc 
    134  1.9     agc #ifndef NOBODY_UID
    135  1.9     agc #define NOBODY_UID	32767
    136  1.9     agc #endif
    137  1.9     agc 
    138  1.9     agc /* some useful constants */
    139  1.9     agc enum {
    140  1.9     agc 	MaxShellNameLen = 256,
    141  1.9     agc 	MaxFileNameLen = MAXPATHLEN,
    142  1.9     agc 	MaxUserNameLen = 32,
    143  1.9     agc 	MaxFieldNameLen = 32,
    144  1.9     agc 	MaxCommandLen = 2048,
    145  1.9     agc 	MaxEntryLen = 2048,
    146  1.9     agc 	PasswordLength = 13,
    147  1.9     agc 
    148  1.9     agc 	LowGid = DEF_LOWUID,
    149  1.9     agc 	HighGid = DEF_HIGHUID
    150  1.9     agc };
    151  1.9     agc 
    152  1.9     agc /* Full paths of programs used here */
    153  1.9     agc #define CHOWN		"/usr/sbin/chown"
    154  1.9     agc #define CP		"/bin/cp"
    155  1.9     agc #define FALSE_PROG	"/usr/bin/false"
    156  1.9     agc #define MKDIR		"/bin/mkdir"
    157  1.9     agc #define MV		"/bin/mv"
    158  1.9     agc #define RM		"/bin/rm"
    159  1.9     agc 
    160  1.9     agc #define UNSET_EXPIRY	"Null (unset)"
    161  1.9     agc 
    162  1.1     agc static int	verbose;
    163  1.1     agc 
    164  1.1     agc /* if *cpp is non-null, free it, then assign `n' chars of `s' to it */
    165  1.1     agc static void
    166  1.1     agc memsave(char **cpp, char *s, size_t n)
    167  1.1     agc {
    168  1.1     agc 	if (*cpp != (char *) NULL) {
    169  1.1     agc 		FREE(*cpp);
    170  1.1     agc 	}
    171  1.1     agc 	NEWARRAY(char, *cpp, n + 1, exit(1));
    172  1.1     agc 	(void) memcpy(*cpp, s, n);
    173  1.1     agc 	(*cpp)[n] = 0;
    174  1.1     agc }
    175  1.1     agc 
    176  1.1     agc /* a replacement for system(3) */
    177  1.1     agc static int
    178  1.1     agc asystem(char *fmt, ...)
    179  1.1     agc {
    180  1.1     agc 	va_list	vp;
    181  1.1     agc 	char	buf[MaxCommandLen];
    182  1.1     agc 	int	ret;
    183  1.1     agc 
    184  1.1     agc 	va_start(vp, fmt);
    185  1.1     agc 	(void) vsnprintf(buf, sizeof(buf), fmt, vp);
    186  1.1     agc 	va_end(vp);
    187  1.1     agc 	if (verbose) {
    188  1.1     agc 		(void) printf("Command: %s\n", buf);
    189  1.1     agc 	}
    190  1.1     agc 	if ((ret = system(buf)) != 0) {
    191  1.1     agc 		warnx("[Warning] can't system `%s'", buf);
    192  1.1     agc 	}
    193  1.1     agc 	return ret;
    194  1.1     agc }
    195  1.1     agc 
    196  1.9     agc #define NetBSD_1_4_K	104110000
    197  1.9     agc 
    198  1.9     agc #if defined(__NetBSD_Version__) && (__NetBSD_Version__ < NetBSD_1_4_K)
    199  1.9     agc /* bounds checking strncpy */
    200  1.9     agc static int
    201  1.9     agc strlcpy(char *to, char *from, size_t tosize)
    202  1.9     agc {
    203  1.9     agc 	size_t	n;
    204  1.9     agc 	int	fromsize;
    205  1.9     agc 
    206  1.9     agc 	fromsize = strlen(from);
    207  1.9     agc 	n = MIN(tosize - 1, fromsize);
    208  1.9     agc 	(void) memcpy(to, from, n);
    209  1.9     agc 	to[n] = 0;
    210  1.9     agc 	return fromsize;
    211  1.9     agc }
    212  1.9     agc #endif
    213  1.9     agc 
    214  1.9     agc #ifdef EXTENSIONS
    215  1.9     agc /* return 1 if all of `s' is numeric */
    216  1.9     agc static int
    217  1.9     agc is_number(char *s)
    218  1.9     agc {
    219  1.9     agc 	for ( ; *s ; s++) {
    220  1.9     agc 		if (!isdigit(*s)) {
    221  1.9     agc 			return 0;
    222  1.9     agc 		}
    223  1.9     agc 	}
    224  1.9     agc 	return 1;
    225  1.9     agc }
    226  1.9     agc #endif
    227  1.9     agc 
    228  1.9     agc /*
    229  1.9     agc  * check that the effective uid is 0 - called from funcs which will
    230  1.9     agc  * modify data and config files.
    231  1.9     agc  */
    232  1.9     agc static void
    233  1.9     agc checkeuid(void)
    234  1.9     agc {
    235  1.9     agc 	if (geteuid() != 0) {
    236  1.9     agc 		errx(EXIT_FAILURE, "Program must be run as root");
    237  1.9     agc 	}
    238  1.9     agc }
    239  1.9     agc 
    240  1.1     agc /* copy any dot files into the user's home directory */
    241  1.1     agc static int
    242  1.1     agc copydotfiles(char *skeldir, int uid, int gid, char *dir)
    243  1.1     agc {
    244  1.1     agc 	struct dirent	*dp;
    245  1.1     agc 	DIR		*dirp;
    246  1.1     agc 	int		n;
    247  1.1     agc 
    248  1.1     agc 	if ((dirp = opendir(skeldir)) == (DIR *) NULL) {
    249  1.1     agc 		warn("can't open source . files dir `%s'", skeldir);
    250  1.1     agc 		return 0;
    251  1.1     agc 	}
    252  1.1     agc 	for (n = 0; (dp = readdir(dirp)) != (struct dirent *) NULL && n == 0 ; ) {
    253  1.1     agc 		if (strcmp(dp->d_name, ".") == 0 ||
    254  1.1     agc 		    strcmp(dp->d_name, "..") == 0) {
    255  1.1     agc 			continue;
    256  1.1     agc 		}
    257  1.1     agc 		if (dp->d_name[0] == '.' && isalnum(dp->d_name[1])) {
    258  1.1     agc 			n = 1;
    259  1.1     agc 		}
    260  1.1     agc 	}
    261  1.1     agc 	(void) closedir(dirp);
    262  1.1     agc 	if (n == 0) {
    263  1.1     agc 		warnx("No \"dot\" initialisation files found");
    264  1.1     agc 	} else {
    265  1.1     agc 		(void) asystem("%s -p -R %s/.[A-z]* %s", CP, skeldir, dir);
    266  1.1     agc 	}
    267  1.1     agc 	(void) asystem("%s -R %d:%d %s", CHOWN, uid, gid, dir);
    268  1.1     agc 	return n;
    269  1.1     agc }
    270  1.1     agc 
    271  1.1     agc /* create a group entry with gid `gid' */
    272  1.1     agc static int
    273  1.1     agc creategid(char *group, int gid, char *name)
    274  1.1     agc {
    275  1.1     agc 	struct stat	st;
    276  1.1     agc 	FILE		*from;
    277  1.1     agc 	FILE		*to;
    278  1.1     agc 	char		buf[MaxEntryLen];
    279  1.1     agc 	char		f[MaxFileNameLen];
    280  1.1     agc 	int		fd;
    281  1.1     agc 	int		cc;
    282  1.1     agc 
    283  1.1     agc 	if ((from = fopen(ETCGROUP, "r")) == (FILE *) NULL) {
    284  1.1     agc 		warn("can't create gid for %s: can't open %s", name, ETCGROUP);
    285  1.1     agc 		return 0;
    286  1.1     agc 	}
    287  1.1     agc 	if (flock(fileno(from), LOCK_EX | LOCK_NB) < 0) {
    288  1.1     agc 		warn("can't lock `%s'", ETCGROUP);
    289  1.1     agc 	}
    290  1.1     agc 	(void) fstat(fileno(from), &st);
    291  1.1     agc 	(void) snprintf(f, sizeof(f), "%s.XXXXXX", ETCGROUP);
    292  1.1     agc 	if ((fd = mkstemp(f)) < 0) {
    293  1.1     agc 		(void) fclose(from);
    294  1.1     agc 		warn("can't create gid: mkstemp failed");
    295  1.1     agc 		return 0;
    296  1.1     agc 	}
    297  1.1     agc 	if ((to = fdopen(fd, "w")) == (FILE *) NULL) {
    298  1.1     agc 		(void) fclose(from);
    299  1.1     agc 		(void) close(fd);
    300  1.1     agc 		(void) unlink(f);
    301  1.1     agc 		warn("can't create gid: fdopen `%s' failed", f);
    302  1.1     agc 		return 0;
    303  1.1     agc 	}
    304  1.1     agc 	while ((cc = fread(buf, sizeof(char), sizeof(buf), from)) > 0) {
    305  1.1     agc 		if (fwrite(buf, sizeof(char), (unsigned) cc, to) != cc) {
    306  1.1     agc 			(void) fclose(from);
    307  1.1     agc 			(void) close(fd);
    308  1.1     agc 			(void) unlink(f);
    309  1.1     agc 			warn("can't create gid: short write to `%s'", f);
    310  1.1     agc 			return 0;
    311  1.1     agc 		}
    312  1.1     agc 	}
    313  1.1     agc 	(void) fprintf(to, "%s:*:%d:%s\n", group, gid, name);
    314  1.1     agc 	(void) fclose(from);
    315  1.1     agc 	(void) fclose(to);
    316  1.1     agc 	if (rename(f, ETCGROUP) < 0) {
    317  1.1     agc 		warn("can't create gid: can't rename `%s' to `%s'", f, ETCGROUP);
    318  1.1     agc 		return 0;
    319  1.1     agc 	}
    320  1.1     agc 	(void) chmod(ETCGROUP, st.st_mode & 07777);
    321  1.1     agc 	return 1;
    322  1.1     agc }
    323  1.1     agc 
    324  1.1     agc /* modify the group entry with name `group' to be newent */
    325  1.1     agc static int
    326  1.1     agc modify_gid(char *group, char *newent)
    327  1.1     agc {
    328  1.1     agc 	struct stat	st;
    329  1.1     agc 	FILE		*from;
    330  1.1     agc 	FILE		*to;
    331  1.1     agc 	char		buf[MaxEntryLen];
    332  1.1     agc 	char		f[MaxFileNameLen];
    333  1.1     agc 	char		*colon;
    334  1.1     agc 	int		groupc;
    335  1.1     agc 	int		entc;
    336  1.1     agc 	int		fd;
    337  1.1     agc 	int		cc;
    338  1.1     agc 
    339  1.1     agc 	if ((from = fopen(ETCGROUP, "r")) == (FILE *) NULL) {
    340  1.1     agc 		warn("can't create gid for %s: can't open %s", group, ETCGROUP);
    341  1.1     agc 		return 0;
    342  1.1     agc 	}
    343  1.1     agc 	if (flock(fileno(from), LOCK_EX | LOCK_NB) < 0) {
    344  1.1     agc 		warn("can't lock `%s'", ETCGROUP);
    345  1.1     agc 	}
    346  1.1     agc 	(void) fstat(fileno(from), &st);
    347  1.1     agc 	(void) snprintf(f, sizeof(f), "%s.XXXXXX", ETCGROUP);
    348  1.1     agc 	if ((fd = mkstemp(f)) < 0) {
    349  1.1     agc 		(void) fclose(from);
    350  1.1     agc 		warn("can't create gid: mkstemp failed");
    351  1.1     agc 		return 0;
    352  1.1     agc 	}
    353  1.1     agc 	if ((to = fdopen(fd, "w")) == (FILE *) NULL) {
    354  1.1     agc 		(void) fclose(from);
    355  1.1     agc 		(void) close(fd);
    356  1.1     agc 		(void) unlink(f);
    357  1.1     agc 		warn("can't create gid: fdopen `%s' failed", f);
    358  1.1     agc 		return 0;
    359  1.1     agc 	}
    360  1.1     agc 	groupc = strlen(group);
    361  1.1     agc 	while ((cc = fread(buf, sizeof(char), sizeof(buf), from)) > 0) {
    362  1.1     agc 		if ((colon = strchr(buf, ':')) == (char *) NULL) {
    363  1.1     agc 			warn("badly formed entry `%s'", buf);
    364  1.1     agc 			continue;
    365  1.1     agc 		}
    366  1.1     agc 		entc = (int)(colon - buf);
    367  1.1     agc 		if (entc == groupc && strncmp(group, buf, (unsigned) entc) == 0) {
    368  1.1     agc 			if (newent == (char *) NULL) {
    369  1.1     agc 				continue;
    370  1.1     agc 			} else {
    371  1.1     agc 				cc = strlen(newent);
    372  1.5   lukem 				(void) strlcpy(buf, newent, sizeof(buf));
    373  1.1     agc 			}
    374  1.1     agc 		}
    375  1.1     agc 		if (fwrite(buf, sizeof(char), (unsigned) cc, to) != cc) {
    376  1.1     agc 			(void) fclose(from);
    377  1.1     agc 			(void) close(fd);
    378  1.1     agc 			(void) unlink(f);
    379  1.1     agc 			warn("can't create gid: short write to `%s'", f);
    380  1.1     agc 			return 0;
    381  1.1     agc 		}
    382  1.1     agc 	}
    383  1.1     agc 	(void) fclose(from);
    384  1.1     agc 	(void) fclose(to);
    385  1.1     agc 	if (rename(f, ETCGROUP) < 0) {
    386  1.1     agc 		warn("can't create gid: can't rename `%s' to `%s'", f, ETCGROUP);
    387  1.1     agc 		return 0;
    388  1.1     agc 	}
    389  1.1     agc 	(void) chmod(ETCGROUP, st.st_mode & 07777);
    390  1.1     agc 	return 1;
    391  1.1     agc }
    392  1.1     agc 
    393  1.1     agc /* return 1 if `login' is a valid login name */
    394  1.1     agc static int
    395  1.1     agc valid_login(char *login)
    396  1.1     agc {
    397  1.1     agc 	char	*cp;
    398  1.1     agc 
    399  1.1     agc 	for (cp = login ; *cp ; cp++) {
    400  1.1     agc 		if (!isalnum(*cp) && *cp != '.' && *cp != '_' && *cp != '-') {
    401  1.1     agc 			return 0;
    402  1.1     agc 		}
    403  1.1     agc 	}
    404  1.1     agc 	return 1;
    405  1.1     agc }
    406  1.1     agc 
    407  1.1     agc /* return 1 if `group' is a valid group name */
    408  1.1     agc static int
    409  1.1     agc valid_group(char *group)
    410  1.1     agc {
    411  1.1     agc 	char	*cp;
    412  1.1     agc 
    413  1.1     agc 	for (cp = group ; *cp ; cp++) {
    414  1.1     agc 		if (!isalnum(*cp)) {
    415  1.1     agc 			return 0;
    416  1.1     agc 		}
    417  1.1     agc 	}
    418  1.1     agc 	return 1;
    419  1.1     agc }
    420  1.1     agc 
    421  1.1     agc /* find the next gid in the range lo .. hi */
    422  1.1     agc static int
    423  1.1     agc getnextgid(int *gidp, int lo, int hi)
    424  1.1     agc {
    425  1.1     agc 	for (*gidp = lo ; *gidp < hi ; *gidp += 1) {
    426  1.1     agc 		if (getgrgid((gid_t)*gidp) == (struct group *) NULL) {
    427  1.1     agc 			return 1;
    428  1.1     agc 		}
    429  1.1     agc 	}
    430  1.1     agc 	return 0;
    431  1.1     agc }
    432  1.1     agc 
    433  1.1     agc #ifdef EXTENSIONS
    434  1.1     agc /* save a range of uids */
    435  1.1     agc static int
    436  1.1     agc save_range(user_t *up, char *cp)
    437  1.1     agc {
    438  1.1     agc 	int	from;
    439  1.1     agc 	int	to;
    440  1.1     agc 	int	i;
    441  1.1     agc 
    442  1.1     agc 	if (up->u_rsize == 0) {
    443  1.1     agc 		up->u_rsize = 32;
    444  1.1     agc 		NEWARRAY(range_t, up->u_rv, up->u_rsize, return(0));
    445  1.1     agc 	} else if (up->u_rc == up->u_rsize) {
    446  1.1     agc 		up->u_rsize *= 2;
    447  1.1     agc 		RENEW(range_t, up->u_rv, up->u_rsize, return(0));
    448  1.1     agc 	}
    449  1.1     agc 	if (up->u_rv && sscanf(cp, "%d..%d", &from, &to) == 2) {
    450  1.1     agc 		for (i = 0 ; i < up->u_rc ; i++) {
    451  1.1     agc 			if (up->u_rv[i].r_from == from && up->u_rv[i].r_to == to) {
    452  1.1     agc 				break;
    453  1.1     agc 			}
    454  1.1     agc 		}
    455  1.1     agc 		if (i == up->u_rc) {
    456  1.1     agc 			up->u_rv[up->u_rc].r_from = from;
    457  1.1     agc 			up->u_rv[up->u_rc].r_to = to;
    458  1.1     agc 			up->u_rc += 1;
    459  1.1     agc 		}
    460  1.1     agc 	} else {
    461  1.1     agc 		warnx("Bad range `%s'", cp);
    462  1.1     agc 		return 0;
    463  1.1     agc 	}
    464  1.1     agc 	return 1;
    465  1.1     agc }
    466  1.1     agc #endif
    467  1.1     agc 
    468  1.1     agc /* set the defaults in the defaults file */
    469  1.1     agc static int
    470  1.1     agc setdefaults(user_t *up)
    471  1.1     agc {
    472  1.1     agc 	char	template[MaxFileNameLen];
    473  1.1     agc 	FILE	*fp;
    474  1.1     agc 	int	ret;
    475  1.1     agc 	int	fd;
    476  1.1     agc 	int	i;
    477  1.1     agc 
    478  1.1     agc 	(void) snprintf(template, sizeof(template), "%s.XXXXXX", CONFFILE);
    479  1.1     agc 	if ((fd = mkstemp(template)) < 0) {
    480  1.1     agc 		warnx("can't mkstemp `%s' for writing", CONFFILE);
    481  1.1     agc 		return 0;
    482  1.1     agc 	}
    483  1.1     agc 	if ((fp = fdopen(fd, "w")) == (FILE *) NULL) {
    484  1.1     agc 		warn("can't fdopen `%s' for writing", CONFFILE);
    485  1.1     agc 		return 0;
    486  1.1     agc 	}
    487  1.1     agc 	ret = 1;
    488  1.1     agc 	if (fprintf(fp, "group\t\t%s\n", up->u_primgrp) <= 0 ||
    489  1.1     agc 	    fprintf(fp, "base_dir\t%s\n", up->u_basedir) <= 0 ||
    490  1.1     agc 	    fprintf(fp, "skel_dir\t%s\n", up->u_skeldir) <= 0 ||
    491  1.1     agc 	    fprintf(fp, "shell\t\t%s\n", up->u_shell) <= 0 ||
    492  1.1     agc 	    fprintf(fp, "inactive\t%d\n", up->u_inactive) <= 0 ||
    493  1.1     agc 	    fprintf(fp, "expire\t\t%s\n", (up->u_expire == (char *) NULL) ? UNSET_EXPIRY : up->u_expire) <= 0) {
    494  1.1     agc 		warn("can't write to `%s'", CONFFILE);
    495  1.1     agc 		ret = 0;
    496  1.1     agc 	}
    497  1.1     agc #ifdef EXTENSIONS
    498  1.9     agc 	for (i = (up->u_defrc != up->u_rc) ? up->u_defrc : 0 ; i < up->u_rc ; i++) {
    499  1.1     agc 		if (fprintf(fp, "range\t\t%d..%d\n", up->u_rv[i].r_from, up->u_rv[i].r_to) <= 0) {
    500  1.1     agc 			warn("can't write to `%s'", CONFFILE);
    501  1.1     agc 			ret = 0;
    502  1.1     agc 		}
    503  1.1     agc 	}
    504  1.1     agc #endif
    505  1.1     agc 	(void) fclose(fp);
    506  1.1     agc 	if (ret) {
    507  1.1     agc 		ret = ((rename(template, CONFFILE) == 0) && (chmod(CONFFILE, 0644) == 0));
    508  1.1     agc 	}
    509  1.1     agc 	return ret;
    510  1.1     agc }
    511  1.1     agc 
    512  1.1     agc /* read the defaults file */
    513  1.1     agc static void
    514  1.1     agc read_defaults(user_t *up)
    515  1.1     agc {
    516  1.1     agc 	struct stat	st;
    517  1.1     agc 	size_t		lineno;
    518  1.1     agc 	size_t		len;
    519  1.1     agc 	FILE		*fp;
    520  1.1     agc 	char		*cp;
    521  1.1     agc 	char		*s;
    522  1.1     agc 
    523  1.1     agc 	memsave(&up->u_primgrp, DEF_GROUP, strlen(DEF_GROUP));
    524  1.1     agc 	memsave(&up->u_basedir, DEF_BASEDIR, strlen(DEF_BASEDIR));
    525  1.1     agc 	memsave(&up->u_skeldir, DEF_SKELDIR, strlen(DEF_SKELDIR));
    526  1.1     agc 	memsave(&up->u_shell, DEF_SHELL, strlen(DEF_SHELL));
    527  1.1     agc 	memsave(&up->u_comment, DEF_COMMENT, strlen(DEF_COMMENT));
    528  1.1     agc 	up->u_rsize = 16;
    529  1.1     agc 	NEWARRAY(range_t, up->u_rv, up->u_rsize, exit(1));
    530  1.9     agc 	up->u_inactive = DEF_INACTIVE;
    531  1.1     agc 	up->u_expire = DEF_EXPIRE;
    532  1.1     agc 	if ((fp = fopen(CONFFILE, "r")) == (FILE *) NULL) {
    533  1.1     agc 		if (stat(CONFFILE, &st) < 0 && !setdefaults(up)) {
    534  1.1     agc 			warn("can't create `%s' defaults file", CONFFILE);
    535  1.1     agc 		}
    536  1.1     agc 		fp = fopen(CONFFILE, "r");
    537  1.1     agc 	}
    538  1.1     agc 	if (fp != (FILE *) NULL) {
    539  1.1     agc 		while ((s = fparseln(fp, &len, &lineno, NULL, 0)) != (char *) NULL) {
    540  1.1     agc 			if (strncmp(s, "group", 5) == 0) {
    541  1.1     agc 				for (cp = s + 5 ; *cp && isspace(*cp) ; cp++) {
    542  1.1     agc 				}
    543  1.1     agc 				memsave(&up->u_primgrp, cp, strlen(cp));
    544  1.1     agc 			} else if (strncmp(s, "base_dir", 8) == 0) {
    545  1.1     agc 				for (cp = s + 8 ; *cp && isspace(*cp) ; cp++) {
    546  1.1     agc 				}
    547  1.1     agc 				memsave(&up->u_basedir, cp, strlen(cp));
    548  1.1     agc 			} else if (strncmp(s, "skel_dir", 8) == 0) {
    549  1.1     agc 				for (cp = s + 8 ; *cp && isspace(*cp) ; cp++) {
    550  1.1     agc 				}
    551  1.1     agc 				memsave(&up->u_skeldir, cp, strlen(cp));
    552  1.1     agc 			} else if (strncmp(s, "shell", 5) == 0) {
    553  1.1     agc 				for (cp = s + 5 ; *cp && isspace(*cp) ; cp++) {
    554  1.1     agc 				}
    555  1.1     agc 				memsave(&up->u_shell, cp, strlen(cp));
    556  1.1     agc 			} else if (strncmp(s, "inactive", 8) == 0) {
    557  1.1     agc 				for (cp = s + 8 ; *cp && isspace(*cp) ; cp++) {
    558  1.1     agc 				}
    559  1.1     agc 				up->u_inactive = atoi(cp);
    560  1.1     agc #ifdef EXTENSIONS
    561  1.1     agc 			} else if (strncmp(s, "range", 5) == 0) {
    562  1.1     agc 				for (cp = s + 5 ; *cp && isspace(*cp) ; cp++) {
    563  1.1     agc 				}
    564  1.1     agc 				(void) save_range(up, cp);
    565  1.1     agc #endif
    566  1.1     agc #ifdef EXTENSIONS
    567  1.1     agc 			} else if (strncmp(s, "preserve", 8) == 0) {
    568  1.1     agc 				for (cp = s + 8 ; *cp && isspace(*cp) ; cp++) {
    569  1.1     agc 				}
    570  1.1     agc 				up->u_preserve = (strncmp(cp, "true", 4) == 0) ? 1 :
    571  1.1     agc 						  (strncmp(cp, "yes", 3) == 0) ? 1 :
    572  1.1     agc 						   atoi(cp);
    573  1.1     agc #endif
    574  1.1     agc 			} else if (strncmp(s, "expire", 6) == 0) {
    575  1.1     agc 				for (cp = s + 6 ; *cp && isspace(*cp) ; cp++) {
    576  1.1     agc 				}
    577  1.1     agc 				if (strcmp(cp, UNSET_EXPIRY) == 0) {
    578  1.1     agc 					if (up->u_expire) {
    579  1.1     agc 						FREE(up->u_expire);
    580  1.1     agc 					}
    581  1.1     agc 					up->u_expire = (char *) NULL;
    582  1.1     agc 				} else {
    583  1.1     agc 					memsave(&up->u_expire, cp, strlen(cp));
    584  1.1     agc 				}
    585  1.1     agc 			}
    586  1.1     agc 			(void) free(s);
    587  1.1     agc 		}
    588  1.1     agc 		(void) fclose(fp);
    589  1.1     agc 	}
    590  1.9     agc 	if (up->u_rc == 0) {
    591  1.9     agc 		up->u_rv[up->u_rc].r_from = DEF_LOWUID;
    592  1.9     agc 		up->u_rv[up->u_rc].r_to = DEF_HIGHUID;
    593  1.9     agc 		up->u_rc += 1;
    594  1.9     agc 	}
    595  1.9     agc 	up->u_defrc = up->u_rc;
    596  1.1     agc }
    597  1.1     agc 
    598  1.1     agc /* return the next valid unused uid */
    599  1.1     agc static int
    600  1.1     agc getnextuid(int sync_uid_gid, int *uid, int low_uid, int high_uid)
    601  1.1     agc {
    602  1.1     agc 	for (*uid = low_uid ; *uid <= high_uid ; (*uid)++) {
    603  1.1     agc 		if (getpwuid((uid_t)(*uid)) == (struct passwd *) NULL && *uid != NOBODY_UID) {
    604  1.1     agc 			if (sync_uid_gid) {
    605  1.1     agc 				if (getgrgid((gid_t)(*uid)) == (struct group *) NULL) {
    606  1.1     agc 					return 1;
    607  1.1     agc 				}
    608  1.1     agc 			} else {
    609  1.1     agc 				return 1;
    610  1.1     agc 			}
    611  1.1     agc 		}
    612  1.1     agc 	}
    613  1.1     agc 	return 0;
    614  1.1     agc }
    615  1.1     agc 
    616  1.1     agc /* add a user */
    617  1.1     agc static int
    618  1.1     agc adduser(char *login, user_t *up)
    619  1.1     agc {
    620  1.1     agc 	struct group	*grp;
    621  1.1     agc 	struct stat	st;
    622  1.1     agc 	struct tm	tm;
    623  1.1     agc 	time_t		expire;
    624  1.1     agc 	char		password[PasswordLength + 1];
    625  1.1     agc 	char		home[MaxFileNameLen];
    626  1.1     agc 	char		buf[MaxFileNameLen];
    627  1.1     agc 	int		sync_uid_gid;
    628  1.1     agc 	int		masterfd;
    629  1.1     agc 	int		ptmpfd;
    630  1.1     agc 	int		gid;
    631  1.1     agc 	int		cc;
    632  1.1     agc 	int		i;
    633  1.1     agc 
    634  1.1     agc 	if (!valid_login(login)) {
    635  1.1     agc 		errx(EXIT_FAILURE, "`%s' is not a valid login name", login);
    636  1.1     agc 	}
    637  1.1     agc 	if ((masterfd = open(MASTER, O_RDONLY)) < 0) {
    638  1.1     agc 		err(EXIT_FAILURE, "can't open `%s'", MASTER);
    639  1.1     agc 	}
    640  1.1     agc 	if (flock(masterfd, LOCK_EX | LOCK_NB) < 0) {
    641  1.1     agc 		err(EXIT_FAILURE, "can't lock `%s'", MASTER);
    642  1.1     agc 	}
    643  1.1     agc 	pw_init();
    644  1.1     agc 	if ((ptmpfd = pw_lock(WAITSECS)) < 0) {
    645  1.1     agc 		(void) close(masterfd);
    646  1.1     agc 		err(EXIT_FAILURE, "can't obtain pw_lock");
    647  1.1     agc 	}
    648  1.1     agc 	while ((cc = read(masterfd, buf, sizeof(buf))) > 0) {
    649  1.1     agc 		if (write(ptmpfd, buf, (size_t)(cc)) != cc) {
    650  1.1     agc 			(void) close(masterfd);
    651  1.1     agc 			(void) close(ptmpfd);
    652  1.1     agc 			(void) pw_abort();
    653  1.1     agc 			err(EXIT_FAILURE, "short write to /etc/ptmp (not %d chars)", cc);
    654  1.1     agc 		}
    655  1.1     agc 	}
    656  1.1     agc 	/* if no uid was specified, get next one in [low_uid..high_uid] range */
    657  1.1     agc 	sync_uid_gid = (strcmp(up->u_primgrp, "=uid") == 0);
    658  1.1     agc 	if (up->u_uid == -1) {
    659  1.1     agc 		for (i = 0 ; i < up->u_rc ; i++) {
    660  1.1     agc 			if (getnextuid(sync_uid_gid, &up->u_uid, up->u_rv[i].r_from, up->u_rv[i].r_to)) {
    661  1.1     agc 				break;
    662  1.1     agc 			}
    663  1.1     agc 		}
    664  1.1     agc 		if (i == up->u_rc) {
    665  1.1     agc 			(void) close(ptmpfd);
    666  1.1     agc 			(void) pw_abort();
    667  1.1     agc 			errx(EXIT_FAILURE, "can't get next uid for %d", up->u_uid);
    668  1.1     agc 		}
    669  1.1     agc 	}
    670  1.1     agc 	/* check uid isn't already allocated */
    671  1.1     agc 	if (!up->u_dupuid && getpwuid((uid_t)(up->u_uid)) != (struct passwd *) NULL) {
    672  1.1     agc 		(void) close(ptmpfd);
    673  1.1     agc 		(void) pw_abort();
    674  1.1     agc 		errx(EXIT_FAILURE, "uid %d is already in use", up->u_uid);
    675  1.1     agc 	}
    676  1.1     agc 	/* if -g=uid was specified, check gid is unused */
    677  1.1     agc 	if (sync_uid_gid) {
    678  1.1     agc 		if (getgrgid((gid_t)(up->u_uid)) != (struct group *) NULL) {
    679  1.1     agc 			(void) close(ptmpfd);
    680  1.1     agc 			(void) pw_abort();
    681  1.1     agc 			errx(EXIT_FAILURE, "gid %d is already in use", up->u_uid);
    682  1.1     agc 		}
    683  1.1     agc 		gid = up->u_uid;
    684  1.1     agc 	} else if ((grp = getgrnam(up->u_primgrp)) != (struct group *) NULL) {
    685  1.1     agc 		gid = grp->gr_gid;
    686  1.9     agc 	} else if (is_number(up->u_primgrp) &&
    687  1.9     agc 		   (grp = getgrgid((gid_t)atoi(up->u_primgrp))) != (struct group *) NULL) {
    688  1.1     agc 		gid = grp->gr_gid;
    689  1.1     agc 	} else {
    690  1.1     agc 		(void) close(ptmpfd);
    691  1.1     agc 		(void) pw_abort();
    692  1.1     agc 		errx(EXIT_FAILURE, "group %s not found", up->u_primgrp);
    693  1.1     agc 	}
    694  1.1     agc 	/* check name isn't already in use */
    695  1.1     agc 	if (!up->u_dupuid && getpwnam(login) != (struct passwd *) NULL) {
    696  1.1     agc 		(void) close(ptmpfd);
    697  1.1     agc 		(void) pw_abort();
    698  1.1     agc 		errx(EXIT_FAILURE, "already a `%s' user", login);
    699  1.1     agc 	}
    700  1.1     agc 	/* if home directory hasn't been given, make it up */
    701  1.1     agc 	if (!up->u_homeset) {
    702  1.1     agc 		(void) snprintf(home, sizeof(home), "%s/%s", up->u_basedir, login);
    703  1.1     agc 	}
    704  1.1     agc 	expire = 0;
    705  1.1     agc 	if (up->u_expire != (char *) NULL) {
    706  1.1     agc 		(void) memset(&tm, 0, sizeof(tm));
    707  1.1     agc 		if (strptime(up->u_expire, "%c", &tm) == (char *) NULL) {
    708  1.1     agc 			warnx("invalid time format `%s'", optarg);
    709  1.1     agc 		} else {
    710  1.1     agc 			expire = mktime(&tm);
    711  1.1     agc 		}
    712  1.1     agc 	}
    713  1.1     agc 	password[PasswordLength] = 0;
    714  1.1     agc 	if (up->u_password != (char *) NULL &&
    715  1.1     agc 	    strlen(up->u_password) == PasswordLength) {
    716  1.1     agc 		(void) memcpy(password, up->u_password, PasswordLength);
    717  1.1     agc 	} else {
    718  1.1     agc 		(void) memset(password, '*', PasswordLength);
    719  1.1     agc 		if (up->u_password != (char *) NULL) {
    720  1.2  simonb 			warnx("Password `%s' is invalid: setting it to `%s'",
    721  1.9     agc 				up->u_password, password);
    722  1.1     agc 		}
    723  1.1     agc 	}
    724  1.2  simonb 	cc = snprintf(buf, sizeof(buf), "%s:%s:%d:%d::%d:%ld:%s:%s:%s\n",
    725  1.1     agc 			login,
    726  1.1     agc 			password,
    727  1.1     agc 			up->u_uid,
    728  1.1     agc 			gid,
    729  1.1     agc 			up->u_inactive,
    730  1.9     agc 			(long) expire,
    731  1.1     agc 			up->u_comment,
    732  1.1     agc 			home,
    733  1.1     agc 			up->u_shell);
    734  1.1     agc 	if (write(ptmpfd, buf, (size_t) cc) != cc) {
    735  1.1     agc 		(void) close(ptmpfd);
    736  1.1     agc 		(void) pw_abort();
    737  1.1     agc 		err(EXIT_FAILURE, "can't add `%s'", buf);
    738  1.1     agc 	}
    739  1.1     agc 	if (up->u_mkdir) {
    740  1.1     agc 		if (lstat(home, &st) < 0 && asystem("%s -p %s", MKDIR, home) != 0) {
    741  1.1     agc 			(void) close(ptmpfd);
    742  1.1     agc 			(void) pw_abort();
    743  1.1     agc 			err(EXIT_FAILURE, "can't mkdir `%s'", home);
    744  1.1     agc 		}
    745  1.1     agc 		(void) copydotfiles(up->u_skeldir, up->u_uid, gid, home);
    746  1.1     agc 	}
    747  1.1     agc 	if (strcmp(up->u_primgrp, "=uid") == 0 &&
    748  1.1     agc 	    getgrnam(login) == (struct group *) NULL &&
    749  1.1     agc 	    !creategid(login, gid, login)) {
    750  1.1     agc 		(void) close(ptmpfd);
    751  1.1     agc 		(void) pw_abort();
    752  1.1     agc 		err(EXIT_FAILURE, "can't create gid %d for login name %s", gid, login);
    753  1.1     agc 	}
    754  1.1     agc 	(void) close(ptmpfd);
    755  1.1     agc 	if (pw_mkdb() < 0) {
    756  1.1     agc 		err(EXIT_FAILURE, "pw_mkdb failed");
    757  1.1     agc 	}
    758  1.1     agc 	return 1;
    759  1.1     agc }
    760  1.1     agc 
    761  1.1     agc /* modify a user */
    762  1.1     agc static int
    763  1.1     agc moduser(char *login, char *newlogin, user_t *up)
    764  1.1     agc {
    765  1.1     agc 	struct passwd	*pwp;
    766  1.1     agc 	struct group	*grp;
    767  1.1     agc 	struct tm	tm;
    768  1.1     agc 	time_t		expire;
    769  1.1     agc 	size_t		loginc;
    770  1.1     agc 	size_t		colonc;
    771  1.1     agc 	FILE		*master;
    772  1.1     agc 	char		password[PasswordLength + 1];
    773  1.1     agc 	char		oldhome[MaxFileNameLen];
    774  1.1     agc 	char		home[MaxFileNameLen];
    775  1.1     agc 	char		buf[MaxFileNameLen];
    776  1.1     agc 	char		*colon;
    777  1.1     agc 	int		masterfd;
    778  1.1     agc 	int		ptmpfd;
    779  1.1     agc 	int		gid;
    780  1.1     agc 	int		cc;
    781  1.1     agc 
    782  1.1     agc 	if (!valid_login(newlogin)) {
    783  1.1     agc 		errx(EXIT_FAILURE, "`%s' is not a valid login name", login);
    784  1.1     agc 	}
    785  1.1     agc 	if ((pwp = getpwnam(login)) == (struct passwd *) NULL) {
    786  1.1     agc 		err(EXIT_FAILURE, "No such user `%s'", login);
    787  1.1     agc 	}
    788  1.1     agc 	if ((masterfd = open(MASTER, O_RDONLY)) < 0) {
    789  1.1     agc 		err(EXIT_FAILURE, "can't open `%s'", MASTER);
    790  1.1     agc 	}
    791  1.1     agc 	if (flock(masterfd, LOCK_EX | LOCK_NB) < 0) {
    792  1.1     agc 		err(EXIT_FAILURE, "can't lock `%s'", MASTER);
    793  1.1     agc 	}
    794  1.1     agc 	pw_init();
    795  1.1     agc 	if ((ptmpfd = pw_lock(WAITSECS)) < 0) {
    796  1.1     agc 		(void) close(masterfd);
    797  1.1     agc 		err(EXIT_FAILURE, "can't obtain pw_lock");
    798  1.1     agc 	}
    799  1.1     agc 	if ((master = fdopen(masterfd, "r")) == (FILE *) NULL) {
    800  1.1     agc 		(void) close(masterfd);
    801  1.1     agc 		(void) close(ptmpfd);
    802  1.1     agc 		(void) pw_abort();
    803  1.1     agc 		err(EXIT_FAILURE, "can't fdopen fd for %s", MASTER);
    804  1.1     agc 	}
    805  1.1     agc 	if (up != (user_t *) NULL) {
    806  1.1     agc 		if (up->u_mkdir) {
    807  1.1     agc 			(void) strcpy(oldhome, pwp->pw_dir);
    808  1.1     agc 		}
    809  1.1     agc 		if (up->u_uid == -1) {
    810  1.1     agc 			up->u_uid = pwp->pw_uid;
    811  1.1     agc 		}
    812  1.1     agc 		/* if -g=uid was specified, check gid is unused */
    813  1.1     agc 		if (strcmp(up->u_primgrp, "=uid") == 0) {
    814  1.1     agc 			if (getgrgid((gid_t)(up->u_uid)) != (struct group *) NULL) {
    815  1.1     agc 				(void) close(ptmpfd);
    816  1.1     agc 				(void) pw_abort();
    817  1.1     agc 				errx(EXIT_FAILURE, "gid %d is already in use", up->u_uid);
    818  1.1     agc 			}
    819  1.1     agc 			gid = up->u_uid;
    820  1.1     agc 		} else if ((grp = getgrnam(up->u_primgrp)) != (struct group *) NULL) {
    821  1.1     agc 			gid = grp->gr_gid;
    822  1.9     agc 		} else if (is_number(up->u_primgrp) &&
    823  1.9     agc 			   (grp = getgrgid((gid_t)atoi(up->u_primgrp))) != (struct group *) NULL) {
    824  1.1     agc 			gid = grp->gr_gid;
    825  1.1     agc 		} else {
    826  1.1     agc 			(void) close(ptmpfd);
    827  1.1     agc 			(void) pw_abort();
    828  1.1     agc 			errx(EXIT_FAILURE, "group %s not found", up->u_primgrp);
    829  1.1     agc 		}
    830  1.1     agc 		/* if changing name, check new name isn't already in use */
    831  1.1     agc 		if (strcmp(login, newlogin) != 0 && getpwnam(newlogin) != (struct passwd *) NULL) {
    832  1.1     agc 			(void) close(ptmpfd);
    833  1.1     agc 			(void) pw_abort();
    834  1.1     agc 			errx(EXIT_FAILURE, "already a `%s' user", newlogin);
    835  1.1     agc 		}
    836  1.1     agc 		/* if home directory hasn't been given, use the old one */
    837  1.1     agc 		if (!up->u_homeset) {
    838  1.1     agc 			(void) strcpy(home, pwp->pw_dir);
    839  1.1     agc 		}
    840  1.1     agc 		expire = 0;
    841  1.1     agc 		if (up->u_expire != (char *) NULL) {
    842  1.1     agc 			(void) memset(&tm, 0, sizeof(tm));
    843  1.1     agc 			if (strptime(up->u_expire, "%c", &tm) == (char *) NULL) {
    844  1.1     agc 				warnx("invalid time format `%s'", optarg);
    845  1.1     agc 			} else {
    846  1.1     agc 				expire = mktime(&tm);
    847  1.1     agc 			}
    848  1.1     agc 		}
    849  1.1     agc 		password[PasswordLength] = 0;
    850  1.1     agc 		if (up->u_password != (char *) NULL &&
    851  1.1     agc 		    strlen(up->u_password) == PasswordLength) {
    852  1.1     agc 			(void) memcpy(password, up->u_password, PasswordLength);
    853  1.1     agc 		} else {
    854  1.1     agc 			(void) memcpy(password, pwp->pw_passwd, PasswordLength);
    855  1.1     agc 		}
    856  1.1     agc 		if (strcmp(up->u_comment, DEF_COMMENT) == 0) {
    857  1.1     agc 			memsave(&up->u_comment, pwp->pw_gecos, strlen(pwp->pw_gecos));
    858  1.1     agc 		}
    859  1.1     agc 		if (strcmp(up->u_shell, DEF_SHELL) == 0 && strcmp(pwp->pw_shell, DEF_SHELL) != 0) {
    860  1.1     agc 			memsave(&up->u_comment, pwp->pw_shell, strlen(pwp->pw_shell));
    861  1.1     agc 		}
    862  1.1     agc 	}
    863  1.1     agc 	loginc = strlen(login);
    864  1.1     agc 	while (fgets(buf, sizeof(buf), master) != (char *) NULL) {
    865  1.1     agc 		cc = strlen(buf);
    866  1.1     agc 		if ((colon = strchr(buf, ':')) == (char *) NULL) {
    867  1.1     agc 			warnx("Malformed entry `%s'. Skipping", buf);
    868  1.1     agc 			continue;
    869  1.1     agc 		}
    870  1.1     agc 		colonc = (size_t)(colon - buf);
    871  1.1     agc 		if (strncmp(login, buf, loginc) == 0 && loginc == colonc) {
    872  1.1     agc 			if (up != (user_t *) NULL) {
    873  1.2  simonb 				cc = snprintf(buf, sizeof(buf), "%s:%s:%d:%d::%d:%ld:%s:%s:%s\n",
    874  1.1     agc 					newlogin,
    875  1.1     agc 					password,
    876  1.1     agc 					up->u_uid,
    877  1.1     agc 					gid,
    878  1.1     agc 					up->u_inactive,
    879  1.9     agc 					(long) expire,
    880  1.1     agc 					up->u_comment,
    881  1.1     agc 					home,
    882  1.1     agc 					up->u_shell);
    883  1.1     agc 				if (write(ptmpfd, buf, (size_t) cc) != cc) {
    884  1.1     agc 					(void) close(ptmpfd);
    885  1.1     agc 					(void) pw_abort();
    886  1.1     agc 					err(EXIT_FAILURE, "can't add `%s'", buf);
    887  1.1     agc 				}
    888  1.1     agc 			}
    889  1.1     agc 		} else if (write(ptmpfd, buf, (size_t)(cc)) != cc) {
    890  1.1     agc 			(void) close(masterfd);
    891  1.1     agc 			(void) close(ptmpfd);
    892  1.1     agc 			(void) pw_abort();
    893  1.1     agc 			err(EXIT_FAILURE, "short write to /etc/ptmp (not %d chars)", cc);
    894  1.1     agc 		}
    895  1.1     agc 	}
    896  1.1     agc 	if (up != (user_t *) NULL &&
    897  1.1     agc 	    up->u_mkdir &&
    898  1.1     agc 	    asystem("%s %s %s", MV, oldhome, home) != 0) {
    899  1.1     agc 		(void) close(ptmpfd);
    900  1.1     agc 		(void) pw_abort();
    901  1.1     agc 		err(EXIT_FAILURE, "can't move `%s' to `%s'", oldhome, home);
    902  1.1     agc 	}
    903  1.1     agc 	(void) close(ptmpfd);
    904  1.1     agc 	if (pw_mkdb() < 0) {
    905  1.1     agc 		err(EXIT_FAILURE, "pw_mkdb failed");
    906  1.1     agc 	}
    907  1.1     agc 	return 1;
    908  1.1     agc }
    909  1.1     agc 
    910  1.9     agc 
    911  1.9     agc #ifdef EXTENSIONS
    912  1.9     agc /* see if we can find out the user struct */
    913  1.9     agc static struct passwd *
    914  1.9     agc find_user_info(char *name)
    915  1.9     agc {
    916  1.9     agc 	struct passwd	*pwp;
    917  1.9     agc 
    918  1.9     agc 	if ((pwp = getpwnam(name)) != (struct passwd *) NULL) {
    919  1.9     agc 		return pwp;
    920  1.9     agc 	}
    921  1.9     agc 	if (is_number(name) && (pwp = getpwuid((uid_t)atoi(name))) != (struct passwd *) NULL) {
    922  1.9     agc 		return pwp;
    923  1.9     agc 	}
    924  1.9     agc 	return (struct passwd *) NULL;
    925  1.9     agc }
    926  1.9     agc #endif
    927  1.9     agc 
    928  1.9     agc #ifdef EXTENSIONS
    929  1.9     agc /* see if we can find out the group struct */
    930  1.9     agc static struct group *
    931  1.9     agc find_group_info(char *name)
    932  1.9     agc {
    933  1.9     agc 	struct group	*grp;
    934  1.9     agc 
    935  1.9     agc 	if ((grp = getgrnam(name)) != (struct group *) NULL) {
    936  1.9     agc 		return grp;
    937  1.9     agc 	}
    938  1.9     agc 	if (is_number(name) && (grp = getgrgid((gid_t)atoi(name))) != (struct group *) NULL) {
    939  1.9     agc 		return grp;
    940  1.9     agc 	}
    941  1.9     agc 	return (struct group *) NULL;
    942  1.9     agc }
    943  1.9     agc #endif
    944  1.9     agc 
    945  1.1     agc /* print out usage message, and then exit */
    946  1.9     agc void
    947  1.9     agc usermgmt_usage(char *prog)
    948  1.1     agc {
    949  1.1     agc 	if (strcmp(prog, "useradd") == 0) {
    950  1.9     agc 		(void) fprintf(stderr, "Usage: %s -D [-b basedir] [-e expiry] [-f inactive] [-g group] [-r range] [-s shell]\n", prog);
    951  1.9     agc 		(void) fprintf(stderr, "Usage: %s [-G group] [-b basedir] [-c comment] [-d homedir] [-e expiry] [-f inactive]\n\t[-g group] [-k skeletondir] [-m] [-o] [-p password] [-r range] [-s shell]\n\t[-u uid] [-v] user\n", prog);
    952  1.9     agc 	} else if (strcmp(prog, "usermod") == 0) {
    953  1.9     agc 		(void) fprintf(stderr, "Usage: %s [-G group] [-c comment] [-d homedir] [-e expire] [-f inactive] [-g group] [-l newname] [-m] [-o] [-p password] [-s shell] [-u uid] [-v] user\n", prog);
    954  1.7   lukem 	} else if (strcmp(prog, "userdel") == 0) {
    955  1.9     agc 		(void) fprintf(stderr, "Usage: %s -D [-p preserve]\n", prog);
    956  1.9     agc 		(void) fprintf(stderr, "Usage: %s [-p preserve] [-r] [-v] user\n", prog);
    957  1.9     agc #ifdef EXTENSIONS
    958  1.9     agc 	} else if (strcmp(prog, "userinfo") == 0) {
    959  1.9     agc 		(void) fprintf(stderr, "Usage: %s [-e] [-v] user\n", prog);
    960  1.9     agc #endif
    961  1.1     agc 	} else if (strcmp(prog, "groupadd") == 0) {
    962  1.9     agc 		(void) fprintf(stderr, "Usage: %s [-g gid] [-o] [-v] group\n", prog);
    963  1.1     agc 	} else if (strcmp(prog, "groupdel") == 0) {
    964  1.9     agc 		(void) fprintf(stderr, "Usage: %s [-v] group\n", prog);
    965  1.1     agc 	} else if (strcmp(prog, "groupmod") == 0) {
    966  1.9     agc 		(void) fprintf(stderr, "Usage: %s [-g gid] [-o] [-n newname] [-v] group\n", prog);
    967  1.9     agc 	} else if (strcmp(prog, "user") == 0 || strcmp(prog, "group") == 0) {
    968  1.9     agc 		(void) fprintf(stderr, "Usage: %s ( add | del | mod ) ...\n", prog);
    969  1.9     agc #ifdef EXTENSIONS
    970  1.9     agc 	} else if (strcmp(prog, "groupinfo") == 0) {
    971  1.9     agc 		(void) fprintf(stderr, "Usage: %s [-e] [-v] group\n", prog);
    972  1.9     agc #endif
    973  1.1     agc 	}
    974  1.1     agc 	exit(EXIT_FAILURE);
    975  1.1     agc 	/* NOTREACHED */
    976  1.1     agc }
    977  1.1     agc 
    978  1.1     agc extern int	optind;
    979  1.1     agc extern char	*optarg;
    980  1.1     agc 
    981  1.1     agc #ifdef EXTENSIONS
    982  1.1     agc #define ADD_OPT_EXTENSIONS	"p:r:v"
    983  1.1     agc #else
    984  1.1     agc #define ADD_OPT_EXTENSIONS
    985  1.1     agc #endif
    986  1.1     agc 
    987  1.9     agc int
    988  1.1     agc useradd(int argc, char **argv)
    989  1.1     agc {
    990  1.1     agc 	user_t	u;
    991  1.1     agc 	int	defaultfield;
    992  1.1     agc 	int	bigD;
    993  1.1     agc 	int	c;
    994  1.1     agc 	int	i;
    995  1.1     agc 
    996  1.1     agc 	(void) memset(&u, 0, sizeof(u));
    997  1.1     agc 	read_defaults(&u);
    998  1.1     agc 	u.u_uid = -1;
    999  1.1     agc 	defaultfield = bigD = 0;
   1000  1.1     agc 	while ((c = getopt(argc, argv, "DG:b:c:d:e:f:g:k:mou:s:" ADD_OPT_EXTENSIONS)) != -1) {
   1001  1.1     agc 		switch(c) {
   1002  1.1     agc 		case 'D':
   1003  1.1     agc 			bigD = 1;
   1004  1.1     agc 			break;
   1005  1.1     agc 		case 'G':
   1006  1.1     agc 			memsave(&u.u_groupv[u.u_groupc++], optarg, strlen(optarg));
   1007  1.1     agc 			break;
   1008  1.1     agc 		case 'b':
   1009  1.1     agc 			defaultfield = 1;
   1010  1.1     agc 			memsave(&u.u_basedir, optarg, strlen(optarg));
   1011  1.1     agc 			break;
   1012  1.1     agc 		case 'c':
   1013  1.1     agc 			memsave(&u.u_comment, optarg, strlen(optarg));
   1014  1.1     agc 			break;
   1015  1.1     agc 		case 'd':
   1016  1.1     agc 			u.u_homeset = 1;
   1017  1.1     agc 			memsave(&u.u_home, optarg, strlen(optarg));
   1018  1.1     agc 			break;
   1019  1.1     agc 		case 'e':
   1020  1.1     agc 			defaultfield = 1;
   1021  1.1     agc 			memsave(&u.u_expire, optarg, strlen(optarg));
   1022  1.1     agc 			break;
   1023  1.1     agc 		case 'f':
   1024  1.1     agc 			defaultfield = 1;
   1025  1.1     agc 			u.u_inactive = atoi(optarg);
   1026  1.1     agc 			break;
   1027  1.1     agc 		case 'g':
   1028  1.1     agc 			defaultfield = 1;
   1029  1.1     agc 			memsave(&u.u_primgrp, optarg, strlen(optarg));
   1030  1.1     agc 			break;
   1031  1.1     agc 		case 'k':
   1032  1.1     agc 			memsave(&u.u_skeldir, optarg, strlen(optarg));
   1033  1.1     agc 			break;
   1034  1.1     agc 		case 'm':
   1035  1.1     agc 			u.u_mkdir = 1;
   1036  1.1     agc 			break;
   1037  1.1     agc 		case 'o':
   1038  1.1     agc 			u.u_dupuid = 1;
   1039  1.1     agc 			break;
   1040  1.1     agc #ifdef EXTENSIONS
   1041  1.1     agc 		case 'p':
   1042  1.1     agc 			memsave(&u.u_password, optarg, strlen(optarg));
   1043  1.1     agc 			break;
   1044  1.1     agc #endif
   1045  1.1     agc #ifdef EXTENSIONS
   1046  1.1     agc 		case 'r':
   1047  1.1     agc 			defaultfield = 1;
   1048  1.1     agc 			(void) save_range(&u, optarg);
   1049  1.1     agc 			break;
   1050  1.1     agc #endif
   1051  1.1     agc 		case 's':
   1052  1.1     agc 			defaultfield = 1;
   1053  1.1     agc 			memsave(&u.u_shell, optarg, strlen(optarg));
   1054  1.1     agc 			break;
   1055  1.1     agc 		case 'u':
   1056  1.9     agc 			if (!is_number(optarg)) {
   1057  1.9     agc 				errx(EXIT_FAILURE, "When using [-u uid], the uid must be numeric");
   1058  1.9     agc 			}
   1059  1.1     agc 			u.u_uid = atoi(optarg);
   1060  1.1     agc 			break;
   1061  1.1     agc #ifdef EXTENSIONS
   1062  1.1     agc 		case 'v':
   1063  1.1     agc 			verbose = 1;
   1064  1.1     agc 			break;
   1065  1.1     agc #endif
   1066  1.1     agc 		}
   1067  1.1     agc 	}
   1068  1.1     agc 	if (bigD) {
   1069  1.1     agc 		if (defaultfield) {
   1070  1.9     agc 			checkeuid();
   1071  1.1     agc 			return setdefaults(&u) ? EXIT_SUCCESS : EXIT_FAILURE;
   1072  1.1     agc 		}
   1073  1.1     agc 		(void) printf("group\t\t%s\n", u.u_primgrp);
   1074  1.1     agc 		(void) printf("base_dir\t%s\n", u.u_basedir);
   1075  1.1     agc 		(void) printf("skel_dir\t%s\n", u.u_skeldir);
   1076  1.1     agc 		(void) printf("shell\t\t%s\n", u.u_shell);
   1077  1.1     agc 		(void) printf("inactive\t%d\n", u.u_inactive);
   1078  1.1     agc 		(void) printf("expire\t\t%s\n", (u.u_expire == (char *) NULL) ? UNSET_EXPIRY : u.u_expire);
   1079  1.1     agc #ifdef EXTENSIONS
   1080  1.1     agc 		for (i = 0 ; i < u.u_rc ; i++) {
   1081  1.1     agc 			(void) printf("range\t\t%d..%d\n", u.u_rv[i].r_from, u.u_rv[i].r_to);
   1082  1.1     agc 		}
   1083  1.1     agc #endif
   1084  1.1     agc 		return EXIT_SUCCESS;
   1085  1.1     agc 	}
   1086  1.1     agc 	if (argc == optind) {
   1087  1.9     agc 		usermgmt_usage("useradd");
   1088  1.1     agc 	}
   1089  1.9     agc 	checkeuid();
   1090  1.1     agc 	return adduser(argv[optind], &u) ? EXIT_SUCCESS : EXIT_FAILURE;
   1091  1.1     agc }
   1092  1.1     agc 
   1093  1.1     agc #ifdef EXTENSIONS
   1094  1.1     agc #define MOD_OPT_EXTENSIONS	"p:v"
   1095  1.1     agc #else
   1096  1.1     agc #define MOD_OPT_EXTENSIONS
   1097  1.1     agc #endif
   1098  1.1     agc 
   1099  1.9     agc int
   1100  1.1     agc usermod(int argc, char **argv)
   1101  1.1     agc {
   1102  1.1     agc 	user_t	u;
   1103  1.1     agc 	char	newuser[MaxUserNameLen + 1];
   1104  1.1     agc 	int	have_new_user;
   1105  1.1     agc 	int	c;
   1106  1.1     agc 
   1107  1.9     agc 	checkeuid();
   1108  1.1     agc 	(void) memset(&u, 0, sizeof(u));
   1109  1.1     agc 	(void) memset(newuser, 0, sizeof(newuser));
   1110  1.1     agc 	read_defaults(&u);
   1111  1.1     agc 	u.u_uid = -1;
   1112  1.1     agc 	have_new_user = 0;
   1113  1.1     agc 	while ((c = getopt(argc, argv, "G:c:d:e:f:g:l:mos:u:" MOD_OPT_EXTENSIONS)) != -1) {
   1114  1.1     agc 		switch(c) {
   1115  1.1     agc 		case 'G':
   1116  1.1     agc 			memsave(&u.u_groupv[u.u_groupc++], optarg, strlen(optarg));
   1117  1.1     agc 			break;
   1118  1.1     agc 		case 'c':
   1119  1.1     agc 			memsave(&u.u_comment, optarg, strlen(optarg));
   1120  1.1     agc 			break;
   1121  1.1     agc 		case 'd':
   1122  1.1     agc 			u.u_homeset = 1;
   1123  1.1     agc 			memsave(&u.u_home, optarg, strlen(optarg));
   1124  1.1     agc 			break;
   1125  1.1     agc 		case 'e':
   1126  1.1     agc 			memsave(&u.u_expire, optarg, strlen(optarg));
   1127  1.1     agc 			break;
   1128  1.1     agc 		case 'f':
   1129  1.1     agc 			u.u_inactive = atoi(optarg);
   1130  1.1     agc 			break;
   1131  1.1     agc 		case 'g':
   1132  1.1     agc 			memsave(&u.u_primgrp, optarg, strlen(optarg));
   1133  1.1     agc 			break;
   1134  1.1     agc 		case 'l':
   1135  1.1     agc 			have_new_user = 1;
   1136  1.5   lukem 			(void) strlcpy(newuser, optarg, sizeof(newuser));
   1137  1.1     agc 			break;
   1138  1.1     agc 		case 'm':
   1139  1.1     agc 			u.u_mkdir = 1;
   1140  1.1     agc 			break;
   1141  1.1     agc 		case 'o':
   1142  1.1     agc 			u.u_dupuid = 1;
   1143  1.1     agc 			break;
   1144  1.1     agc #ifdef EXTENSIONS
   1145  1.1     agc 		case 'p':
   1146  1.1     agc 			memsave(&u.u_password, optarg, strlen(optarg));
   1147  1.1     agc 			break;
   1148  1.1     agc #endif
   1149  1.1     agc 		case 's':
   1150  1.1     agc 			memsave(&u.u_shell, optarg, strlen(optarg));
   1151  1.1     agc 			break;
   1152  1.1     agc 		case 'u':
   1153  1.9     agc 			if (!is_number(optarg)) {
   1154  1.9     agc 				errx(EXIT_FAILURE, "When using [-u uid], the uid must be numeric");
   1155  1.9     agc 			}
   1156  1.1     agc 			u.u_uid = atoi(optarg);
   1157  1.1     agc 			break;
   1158  1.1     agc #ifdef EXTENSIONS
   1159  1.1     agc 		case 'v':
   1160  1.1     agc 			verbose = 1;
   1161  1.1     agc 			break;
   1162  1.1     agc #endif
   1163  1.1     agc 		}
   1164  1.1     agc 	}
   1165  1.1     agc 	if (argc == optind) {
   1166  1.9     agc 		usermgmt_usage("usermod");
   1167  1.1     agc 	}
   1168  1.1     agc 	return moduser(argv[optind], (have_new_user) ? newuser : argv[optind], &u) ? EXIT_SUCCESS : EXIT_FAILURE;
   1169  1.1     agc }
   1170  1.1     agc 
   1171  1.1     agc #ifdef EXTENSIONS
   1172  1.1     agc #define DEL_OPT_EXTENSIONS	"Dp:v"
   1173  1.1     agc #else
   1174  1.1     agc #define DEL_OPT_EXTENSIONS
   1175  1.1     agc #endif
   1176  1.1     agc 
   1177  1.9     agc int
   1178  1.1     agc userdel(int argc, char **argv)
   1179  1.1     agc {
   1180  1.1     agc 	struct passwd	*pwp;
   1181  1.1     agc 	struct stat	st;
   1182  1.1     agc 	user_t		u;
   1183  1.1     agc 	char		password[PasswordLength + 1];
   1184  1.1     agc 	int		defaultfield;
   1185  1.1     agc 	int		rmhome;
   1186  1.1     agc 	int		bigD;
   1187  1.1     agc 	int		c;
   1188  1.1     agc 
   1189  1.9     agc 	if (geteuid() != 0) {
   1190  1.9     agc 		errx(EXIT_FAILURE, "Program must be run as root");
   1191  1.9     agc 	}
   1192  1.1     agc 	(void) memset(&u, 0, sizeof(u));
   1193  1.1     agc 	read_defaults(&u);
   1194  1.1     agc 	defaultfield = bigD = rmhome = 0;
   1195  1.1     agc 	while ((c = getopt(argc, argv, "r" DEL_OPT_EXTENSIONS)) != -1) {
   1196  1.1     agc 		switch(c) {
   1197  1.1     agc #ifdef EXTENSIONS
   1198  1.1     agc 		case 'D':
   1199  1.1     agc 			bigD = 1;
   1200  1.1     agc 			break;
   1201  1.1     agc #endif
   1202  1.1     agc #ifdef EXTENSIONS
   1203  1.1     agc 		case 'p':
   1204  1.1     agc 			defaultfield = 1;
   1205  1.1     agc 			u.u_preserve = (strcmp(optarg, "true") == 0) ? 1 :
   1206  1.1     agc 					(strcmp(optarg, "yes") == 0) ? 1 :
   1207  1.1     agc 					 atoi(optarg);
   1208  1.1     agc 			break;
   1209  1.1     agc #endif
   1210  1.1     agc 		case 'r':
   1211  1.1     agc 			rmhome = 1;
   1212  1.1     agc 			break;
   1213  1.1     agc #ifdef EXTENSIONS
   1214  1.1     agc 		case 'v':
   1215  1.1     agc 			verbose = 1;
   1216  1.1     agc 			break;
   1217  1.1     agc #endif
   1218  1.1     agc 		}
   1219  1.1     agc 	}
   1220  1.1     agc #ifdef EXTENSIONS
   1221  1.1     agc 	if (bigD) {
   1222  1.1     agc 		if (defaultfield) {
   1223  1.9     agc 			checkeuid();
   1224  1.1     agc 			return setdefaults(&u) ? EXIT_SUCCESS : EXIT_FAILURE;
   1225  1.1     agc 		}
   1226  1.1     agc 		(void) printf("preserve\t%s\n", (u.u_preserve) ? "true" : "false");
   1227  1.1     agc 		return EXIT_SUCCESS;
   1228  1.1     agc 	}
   1229  1.1     agc #endif
   1230  1.1     agc 	if (argc == optind) {
   1231  1.9     agc 		usermgmt_usage("userdel");
   1232  1.1     agc 	}
   1233  1.9     agc 	checkeuid();
   1234  1.1     agc 	if ((pwp = getpwnam(argv[optind])) == (struct passwd *) NULL) {
   1235  1.1     agc 		warn("No such user `%s'", argv[optind]);
   1236  1.1     agc 		return EXIT_FAILURE;
   1237  1.1     agc 	}
   1238  1.1     agc 	if (rmhome) {
   1239  1.1     agc 		if (stat(pwp->pw_dir, &st) < 0) {
   1240  1.1     agc 			warn("Home directory `%s' does not exist", pwp->pw_dir);
   1241  1.1     agc 			return EXIT_FAILURE;
   1242  1.1     agc 		}
   1243  1.1     agc 		(void) asystem("%s -rf %s", RM, pwp->pw_dir);
   1244  1.1     agc 	}
   1245  1.1     agc 	if (u.u_preserve) {
   1246  1.1     agc 		memsave(&u.u_shell, FALSE_PROG, strlen(FALSE_PROG));
   1247  1.1     agc 		(void) memset(password, '*', PasswordLength);
   1248  1.1     agc 		password[PasswordLength] = 0;
   1249  1.1     agc 		memsave(&u.u_password, password, PasswordLength);
   1250  1.1     agc 		return moduser(argv[optind], argv[optind], &u) ? EXIT_SUCCESS : EXIT_FAILURE;
   1251  1.1     agc 	}
   1252  1.1     agc 	return moduser(argv[optind], argv[optind], (user_t *) NULL) ? EXIT_SUCCESS : EXIT_FAILURE;
   1253  1.1     agc }
   1254  1.1     agc 
   1255  1.1     agc #ifdef EXTENSIONS
   1256  1.1     agc #define GROUP_ADD_OPT_EXTENSIONS	"v"
   1257  1.1     agc #else
   1258  1.1     agc #define GROUP_ADD_OPT_EXTENSIONS
   1259  1.1     agc #endif
   1260  1.1     agc 
   1261  1.1     agc /* add a group */
   1262  1.1     agc int
   1263  1.1     agc groupadd(int argc, char **argv)
   1264  1.1     agc {
   1265  1.1     agc 	int	dupgid;
   1266  1.1     agc 	int	gid;
   1267  1.1     agc 	int	c;
   1268  1.1     agc 
   1269  1.9     agc 	checkeuid();
   1270  1.1     agc 	gid = -1;
   1271  1.1     agc 	dupgid = 0;
   1272  1.1     agc 	while ((c = getopt(argc, argv, "g:o" GROUP_ADD_OPT_EXTENSIONS)) != -1) {
   1273  1.1     agc 		switch(c) {
   1274  1.1     agc 		case 'g':
   1275  1.9     agc 			if (!is_number(optarg)) {
   1276  1.9     agc 				errx(EXIT_FAILURE, "When using [-g gid], the gid must be numeric");
   1277  1.9     agc 			}
   1278  1.1     agc 			gid = atoi(optarg);
   1279  1.1     agc 			break;
   1280  1.1     agc 		case 'o':
   1281  1.1     agc 			dupgid = 1;
   1282  1.1     agc 			break;
   1283  1.1     agc #ifdef EXTENSIONS
   1284  1.1     agc 		case 'v':
   1285  1.1     agc 			verbose = 1;
   1286  1.1     agc 			break;
   1287  1.1     agc #endif
   1288  1.1     agc 		}
   1289  1.1     agc 	}
   1290  1.1     agc 	if (argc == optind) {
   1291  1.9     agc 		usermgmt_usage("groupadd");
   1292  1.1     agc 	}
   1293  1.1     agc 	if (gid < 0 && !getnextgid(&gid, LowGid, HighGid)) {
   1294  1.1     agc 		err(EXIT_FAILURE, "can't add group: can't get next gid");
   1295  1.1     agc 	}
   1296  1.1     agc 	if (!dupgid && getgrgid((gid_t) gid) != (struct group *) NULL) {
   1297  1.9     agc 		errx(EXIT_FAILURE, "can't add group: gid %d is a duplicate", gid);
   1298  1.1     agc 	}
   1299  1.1     agc 	if (!valid_group(argv[optind])) {
   1300  1.9     agc 		warnx("warning - invalid group name `%s'", argv[optind]);
   1301  1.1     agc 	}
   1302  1.1     agc 	if (!creategid(argv[optind], gid, "")) {
   1303  1.1     agc 		err(EXIT_FAILURE, "can't add group: problems with %s file", ETCGROUP);
   1304  1.1     agc 	}
   1305  1.1     agc 	return EXIT_SUCCESS;
   1306  1.1     agc }
   1307  1.1     agc 
   1308  1.1     agc #ifdef EXTENSIONS
   1309  1.1     agc #define GROUP_DEL_OPT_EXTENSIONS	"v"
   1310  1.1     agc #else
   1311  1.1     agc #define GROUP_DEL_OPT_EXTENSIONS
   1312  1.1     agc #endif
   1313  1.1     agc 
   1314  1.1     agc /* remove a group */
   1315  1.1     agc int
   1316  1.1     agc groupdel(int argc, char **argv)
   1317  1.1     agc {
   1318  1.1     agc 	int	c;
   1319  1.1     agc 
   1320  1.9     agc 	checkeuid();
   1321  1.1     agc 	while ((c = getopt(argc, argv, "" GROUP_DEL_OPT_EXTENSIONS)) != -1) {
   1322  1.1     agc 		switch(c) {
   1323  1.1     agc #ifdef EXTENSIONS
   1324  1.1     agc 		case 'v':
   1325  1.1     agc 			verbose = 1;
   1326  1.1     agc 			break;
   1327  1.1     agc #endif
   1328  1.1     agc 		}
   1329  1.1     agc 	}
   1330  1.1     agc 	if (argc == optind) {
   1331  1.9     agc 		usermgmt_usage("groupdel");
   1332  1.1     agc 	}
   1333  1.1     agc 	if (!modify_gid(argv[optind], (char *) NULL)) {
   1334  1.1     agc 		err(EXIT_FAILURE, "can't change %s file", ETCGROUP);
   1335  1.1     agc 	}
   1336  1.1     agc 	return EXIT_SUCCESS;
   1337  1.1     agc }
   1338  1.1     agc 
   1339  1.1     agc #ifdef EXTENSIONS
   1340  1.1     agc #define GROUP_MOD_OPT_EXTENSIONS	"v"
   1341  1.1     agc #else
   1342  1.1     agc #define GROUP_MOD_OPT_EXTENSIONS
   1343  1.1     agc #endif
   1344  1.1     agc 
   1345  1.1     agc /* modify a group */
   1346  1.1     agc int
   1347  1.1     agc groupmod(int argc, char **argv)
   1348  1.1     agc {
   1349  1.1     agc 	struct group	*grp;
   1350  1.1     agc 	char		buf[MaxEntryLen];
   1351  1.1     agc 	char		*newname;
   1352  1.1     agc 	char		**cpp;
   1353  1.1     agc 	int		dupgid;
   1354  1.1     agc 	int		gid;
   1355  1.1     agc 	int		cc;
   1356  1.1     agc 	int		c;
   1357  1.1     agc 
   1358  1.9     agc 	checkeuid();
   1359  1.1     agc 	gid = -1;
   1360  1.1     agc 	dupgid = 0;
   1361  1.1     agc 	newname = (char *) NULL;
   1362  1.1     agc 	while ((c = getopt(argc, argv, "g:on:" GROUP_MOD_OPT_EXTENSIONS)) != -1) {
   1363  1.1     agc 		switch(c) {
   1364  1.1     agc 		case 'g':
   1365  1.9     agc 			if (!is_number(optarg)) {
   1366  1.9     agc 				errx(EXIT_FAILURE, "When using [-g gid], the gid must be numeric");
   1367  1.9     agc 			}
   1368  1.1     agc 			gid = atoi(optarg);
   1369  1.1     agc 			break;
   1370  1.1     agc 		case 'o':
   1371  1.1     agc 			dupgid = 1;
   1372  1.1     agc 			break;
   1373  1.1     agc 		case 'n':
   1374  1.1     agc 			memsave(&newname, optarg, strlen(optarg));
   1375  1.1     agc 			break;
   1376  1.1     agc #ifdef EXTENSIONS
   1377  1.1     agc 		case 'v':
   1378  1.1     agc 			verbose = 1;
   1379  1.1     agc 			break;
   1380  1.1     agc #endif
   1381  1.1     agc 		}
   1382  1.1     agc 	}
   1383  1.1     agc 	if (argc == optind) {
   1384  1.9     agc 		usermgmt_usage("groupmod");
   1385  1.1     agc 	}
   1386  1.1     agc 	if (gid < 0 && newname == (char *) NULL) {
   1387  1.1     agc 		err(EXIT_FAILURE, "Nothing to change");
   1388  1.1     agc 	}
   1389  1.1     agc 	if (dupgid && gid < 0) {
   1390  1.1     agc 		err(EXIT_FAILURE, "Duplicate which gid?");
   1391  1.1     agc 	}
   1392  1.1     agc 	if ((grp = getgrnam(argv[optind])) == (struct group *) NULL) {
   1393  1.1     agc 		err(EXIT_FAILURE, "can't find group `%s' to modify", argv[optind]);
   1394  1.1     agc 	}
   1395  1.1     agc 	if (newname != (char *) NULL && !valid_group(newname)) {
   1396  1.1     agc 		warn("warning - invalid group name `%s'", newname);
   1397  1.1     agc 	}
   1398  1.1     agc 	cc = snprintf(buf, sizeof(buf), "%s:%s:%d:",
   1399  1.1     agc 			(newname) ? newname : grp->gr_name,
   1400  1.1     agc 			grp->gr_passwd,
   1401  1.1     agc 			(gid < 0) ? grp->gr_gid : gid);
   1402  1.1     agc 	for (cpp = grp->gr_mem ; *cpp && cc < sizeof(buf) ; cpp++) {
   1403  1.1     agc 		cc += snprintf(&buf[cc], sizeof(buf) - cc, "%s%s", *cpp,
   1404  1.1     agc 			(cpp[1] == (char *) NULL) ? "" : ",");
   1405  1.1     agc 	}
   1406  1.1     agc 	if (!modify_gid(argv[optind], buf)) {
   1407  1.1     agc 		err(EXIT_FAILURE, "can't change %s file", ETCGROUP);
   1408  1.1     agc 	}
   1409  1.1     agc 	return EXIT_SUCCESS;
   1410  1.1     agc }
   1411  1.1     agc 
   1412  1.9     agc #ifdef EXTENSIONS
   1413  1.9     agc /* display user information */
   1414  1.9     agc int
   1415  1.9     agc userinfo(int argc, char **argv)
   1416  1.9     agc {
   1417  1.9     agc 	struct passwd	*pwp;
   1418  1.9     agc 	struct group	*grp;
   1419  1.9     agc 	char		buf[MaxEntryLen];
   1420  1.9     agc 	char		**cpp;
   1421  1.9     agc 	int		exists;
   1422  1.9     agc 	int		cc;
   1423  1.9     agc 	int		i;
   1424  1.1     agc 
   1425  1.9     agc 	exists = 0;
   1426  1.9     agc 	while ((i = getopt(argc, argv, "ev")) != -1) {
   1427  1.9     agc 		switch(i) {
   1428  1.9     agc 		case 'e':
   1429  1.9     agc 			exists = 1;
   1430  1.9     agc 			break;
   1431  1.9     agc 		case 'v':
   1432  1.9     agc 			verbose = 1;
   1433  1.9     agc 			break;
   1434  1.9     agc 		}
   1435  1.9     agc 	}
   1436  1.9     agc 	if (argc == optind) {
   1437  1.9     agc 		usermgmt_usage("userinfo");
   1438  1.9     agc 	}
   1439  1.9     agc 	pwp = find_user_info(argv[optind]);
   1440  1.9     agc 	if (exists) {
   1441  1.9     agc 		exit((pwp) ? EXIT_SUCCESS : EXIT_FAILURE);
   1442  1.9     agc 	}
   1443  1.9     agc 	if (pwp == (struct passwd *) NULL) {
   1444  1.9     agc 		errx(EXIT_FAILURE, "can't find user `%s'", argv[optind]);
   1445  1.9     agc 	}
   1446  1.9     agc 	(void) printf("login\t%s\n", pwp->pw_name);
   1447  1.9     agc 	(void) printf("passwd\t%s\n", pwp->pw_passwd);
   1448  1.9     agc 	(void) printf("uid\t%d\n", pwp->pw_uid);
   1449  1.9     agc 	for (cc = 0 ; (grp = getgrent()) != (struct group *) NULL ; ) {
   1450  1.9     agc 		for (cpp = grp->gr_mem ; *cpp ; cpp++) {
   1451  1.9     agc 			if (strcmp(*cpp, argv[optind]) == 0 && grp->gr_gid != pwp->pw_gid) {
   1452  1.9     agc 				cc += snprintf(&buf[cc], sizeof(buf) - cc, "%s ", grp->gr_name);
   1453  1.9     agc 			}
   1454  1.9     agc 		}
   1455  1.9     agc 	}
   1456  1.9     agc 	if ((grp = getgrgid(pwp->pw_gid)) == (struct group *) NULL) {
   1457  1.9     agc 		(void) printf("groups\t%d %s\n", pwp->pw_gid, buf);
   1458  1.9     agc 	} else {
   1459  1.9     agc 		(void) printf("groups\t%s %s\n", grp->gr_name, buf);
   1460  1.9     agc 	}
   1461  1.9     agc 	(void) printf("change\t%s", ctime(&pwp->pw_change));
   1462  1.9     agc 	(void) printf("class\t%s\n", pwp->pw_class);
   1463  1.9     agc 	(void) printf("gecos\t%s\n", pwp->pw_gecos);
   1464  1.9     agc 	(void) printf("dir\t%s\n", pwp->pw_dir);
   1465  1.9     agc 	(void) printf("shell\t%s\n", pwp->pw_shell);
   1466  1.9     agc 	(void) printf("expire\t%s", ctime(&pwp->pw_expire));
   1467  1.9     agc 	return EXIT_SUCCESS;
   1468  1.9     agc }
   1469  1.9     agc #endif
   1470  1.1     agc 
   1471  1.9     agc #ifdef EXTENSIONS
   1472  1.9     agc /* display user information */
   1473  1.1     agc int
   1474  1.9     agc groupinfo(int argc, char **argv)
   1475  1.1     agc {
   1476  1.9     agc 	struct group	*grp;
   1477  1.9     agc 	char		**cpp;
   1478  1.9     agc 	int		exists;
   1479  1.9     agc 	int		i;
   1480  1.1     agc 
   1481  1.9     agc 	exists = 0;
   1482  1.9     agc 	while ((i = getopt(argc, argv, "ev")) != -1) {
   1483  1.9     agc 		switch(i) {
   1484  1.9     agc 		case 'e':
   1485  1.9     agc 			exists = 1;
   1486  1.9     agc 			break;
   1487  1.9     agc 		case 'v':
   1488  1.9     agc 			verbose = 1;
   1489  1.9     agc 			break;
   1490  1.9     agc 		}
   1491  1.9     agc 	}
   1492  1.9     agc 	if (argc == optind) {
   1493  1.9     agc 		usermgmt_usage("groupinfo");
   1494  1.9     agc 	}
   1495  1.9     agc 	grp = find_group_info(argv[optind]);
   1496  1.9     agc 	if (exists) {
   1497  1.9     agc 		exit((grp) ? EXIT_SUCCESS : EXIT_FAILURE);
   1498  1.9     agc 	}
   1499  1.9     agc 	if (grp == (struct group *) NULL) {
   1500  1.9     agc 		errx(EXIT_FAILURE, "can't find group `%s'", argv[optind]);
   1501  1.9     agc 	}
   1502  1.9     agc 	(void) printf("name\t%s\n", grp->gr_name);
   1503  1.9     agc 	(void) printf("passwd\t%s\n", grp->gr_passwd);
   1504  1.9     agc 	(void) printf("gid\t%d\n", grp->gr_gid);
   1505  1.9     agc 	(void) printf("members\t");
   1506  1.9     agc 	for (cpp = grp->gr_mem ; *cpp ; cpp++) {
   1507  1.9     agc 		(void) printf("%s ", *cpp);
   1508  1.9     agc 	}
   1509  1.9     agc 	(void) fputc('\n', stdout);
   1510  1.9     agc 	return EXIT_SUCCESS;
   1511  1.1     agc }
   1512  1.9     agc #endif
   1513