1ee8287f8SJoerg Sonnenberger /*-
2ee8287f8SJoerg Sonnenberger * Copyright (c) 1990, 1993, 1994
3ee8287f8SJoerg Sonnenberger * The Regents of the University of California. All rights reserved.
4ee8287f8SJoerg Sonnenberger * Copyright (c) 2002 Networks Associates Technology, Inc.
5ee8287f8SJoerg Sonnenberger * All rights reserved.
6ee8287f8SJoerg Sonnenberger *
7ee8287f8SJoerg Sonnenberger * Portions of this software were developed for the FreeBSD Project by
8ee8287f8SJoerg Sonnenberger * ThinkSec AS and NAI Labs, the Security Research Division of Network
9ee8287f8SJoerg Sonnenberger * Associates, Inc. under DARPA/SPAWAR contract N66001-01-C-8035
10ee8287f8SJoerg Sonnenberger * ("CBOSS"), as part of the DARPA CHATS research program.
11ee8287f8SJoerg Sonnenberger *
12ee8287f8SJoerg Sonnenberger * Redistribution and use in source and binary forms, with or without
13ee8287f8SJoerg Sonnenberger * modification, are permitted provided that the following conditions
14ee8287f8SJoerg Sonnenberger * are met:
15ee8287f8SJoerg Sonnenberger * 1. Redistributions of source code must retain the above copyright
16ee8287f8SJoerg Sonnenberger * notice, this list of conditions and the following disclaimer.
17ee8287f8SJoerg Sonnenberger * 2. Redistributions in binary form must reproduce the above copyright
18ee8287f8SJoerg Sonnenberger * notice, this list of conditions and the following disclaimer in the
19ee8287f8SJoerg Sonnenberger * documentation and/or other materials provided with the distribution.
20dc71b7abSJustin C. Sherrill * 3. Neither the name of the University nor the names of its contributors
21ee8287f8SJoerg Sonnenberger * may be used to endorse or promote products derived from this software
22ee8287f8SJoerg Sonnenberger * without specific prior written permission.
23ee8287f8SJoerg Sonnenberger *
24ee8287f8SJoerg Sonnenberger * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
25ee8287f8SJoerg Sonnenberger * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
26ee8287f8SJoerg Sonnenberger * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
27ee8287f8SJoerg Sonnenberger * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
28ee8287f8SJoerg Sonnenberger * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
29ee8287f8SJoerg Sonnenberger * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
30ee8287f8SJoerg Sonnenberger * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
31ee8287f8SJoerg Sonnenberger * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
32ee8287f8SJoerg Sonnenberger * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
33ee8287f8SJoerg Sonnenberger * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
34ee8287f8SJoerg Sonnenberger * SUCH DAMAGE.
35ee8287f8SJoerg Sonnenberger *
36feed9a49SPeter Avalos * @(#)pw_util.c 8.3 (Berkeley) 4/2/94
37d316f7c9SJohn Marino * $FreeBSD: head/lib/libutil/pw_util.c 244744 2012-12-27 20:24:44Z bapt $
38ee8287f8SJoerg Sonnenberger */
39ee8287f8SJoerg Sonnenberger
40ee8287f8SJoerg Sonnenberger /*
41ee8287f8SJoerg Sonnenberger * This file is used by all the "password" programs; vipw(8), chpass(1),
42ee8287f8SJoerg Sonnenberger * and passwd(1).
43ee8287f8SJoerg Sonnenberger */
44ee8287f8SJoerg Sonnenberger
45ee8287f8SJoerg Sonnenberger #include <sys/param.h>
46ee8287f8SJoerg Sonnenberger #include <sys/errno.h>
47ee8287f8SJoerg Sonnenberger #include <sys/time.h>
48ee8287f8SJoerg Sonnenberger #include <sys/resource.h>
49ee8287f8SJoerg Sonnenberger #include <sys/stat.h>
50ee8287f8SJoerg Sonnenberger #include <sys/wait.h>
51ee8287f8SJoerg Sonnenberger
52ee8287f8SJoerg Sonnenberger #include <ctype.h>
53ee8287f8SJoerg Sonnenberger #include <err.h>
54ee8287f8SJoerg Sonnenberger #include <fcntl.h>
55ee8287f8SJoerg Sonnenberger #include <inttypes.h>
56ee8287f8SJoerg Sonnenberger #include <libgen.h>
57ee8287f8SJoerg Sonnenberger #include <paths.h>
58ee8287f8SJoerg Sonnenberger #include <pwd.h>
59ee8287f8SJoerg Sonnenberger #include <signal.h>
60ee8287f8SJoerg Sonnenberger #include <stdio.h>
61ee8287f8SJoerg Sonnenberger #include <stdlib.h>
62ee8287f8SJoerg Sonnenberger #include <string.h>
63ee8287f8SJoerg Sonnenberger #include <unistd.h>
64ee8287f8SJoerg Sonnenberger #include <libutil.h>
65ee8287f8SJoerg Sonnenberger
66ee8287f8SJoerg Sonnenberger static pid_t editpid = -1;
67ee8287f8SJoerg Sonnenberger static int lockfd = -1;
68ee8287f8SJoerg Sonnenberger static char masterpasswd[PATH_MAX];
69ee8287f8SJoerg Sonnenberger static char passwd_dir[PATH_MAX];
70ee8287f8SJoerg Sonnenberger static char tempname[PATH_MAX];
71ee8287f8SJoerg Sonnenberger static int initialized;
72ee8287f8SJoerg Sonnenberger
73ee8287f8SJoerg Sonnenberger #if 0
74ee8287f8SJoerg Sonnenberger void
75ee8287f8SJoerg Sonnenberger pw_cont(int sig)
76ee8287f8SJoerg Sonnenberger {
77ee8287f8SJoerg Sonnenberger
78ee8287f8SJoerg Sonnenberger if (editpid != -1)
79ee8287f8SJoerg Sonnenberger kill(editpid, sig);
80ee8287f8SJoerg Sonnenberger }
81ee8287f8SJoerg Sonnenberger #endif
82ee8287f8SJoerg Sonnenberger
83ee8287f8SJoerg Sonnenberger /*
84ee8287f8SJoerg Sonnenberger * Initialize statics and set limits, signals & umask to try to avoid
85ee8287f8SJoerg Sonnenberger * interruptions, crashes etc. that might expose passord data.
86ee8287f8SJoerg Sonnenberger */
87ee8287f8SJoerg Sonnenberger int
pw_init(const char * dir,const char * master)88ee8287f8SJoerg Sonnenberger pw_init(const char *dir, const char *master)
89ee8287f8SJoerg Sonnenberger {
90ee8287f8SJoerg Sonnenberger #if 0
91ee8287f8SJoerg Sonnenberger struct rlimit rlim;
92ee8287f8SJoerg Sonnenberger #endif
93ee8287f8SJoerg Sonnenberger
94ee8287f8SJoerg Sonnenberger if (dir == NULL) {
95ee8287f8SJoerg Sonnenberger strcpy(passwd_dir, _PATH_ETC);
96ee8287f8SJoerg Sonnenberger } else {
97ee8287f8SJoerg Sonnenberger if (strlen(dir) >= sizeof(passwd_dir)) {
98ee8287f8SJoerg Sonnenberger errno = ENAMETOOLONG;
99ee8287f8SJoerg Sonnenberger return (-1);
100ee8287f8SJoerg Sonnenberger }
101ee8287f8SJoerg Sonnenberger strcpy(passwd_dir, dir);
102ee8287f8SJoerg Sonnenberger }
103ee8287f8SJoerg Sonnenberger
104ee8287f8SJoerg Sonnenberger if (master == NULL) {
105ee8287f8SJoerg Sonnenberger if (dir == NULL) {
106ee8287f8SJoerg Sonnenberger strcpy(masterpasswd, _PATH_MASTERPASSWD);
107ee8287f8SJoerg Sonnenberger } else if (snprintf(masterpasswd, sizeof(masterpasswd), "%s/%s",
108ee8287f8SJoerg Sonnenberger passwd_dir, _MASTERPASSWD) > (int)sizeof(masterpasswd)) {
109ee8287f8SJoerg Sonnenberger errno = ENAMETOOLONG;
110ee8287f8SJoerg Sonnenberger return (-1);
111ee8287f8SJoerg Sonnenberger }
112ee8287f8SJoerg Sonnenberger } else {
113ee8287f8SJoerg Sonnenberger if (strlen(master) >= sizeof(masterpasswd)) {
114ee8287f8SJoerg Sonnenberger errno = ENAMETOOLONG;
115ee8287f8SJoerg Sonnenberger return (-1);
116ee8287f8SJoerg Sonnenberger }
117ee8287f8SJoerg Sonnenberger strcpy(masterpasswd, master);
118ee8287f8SJoerg Sonnenberger }
119ee8287f8SJoerg Sonnenberger
120ee8287f8SJoerg Sonnenberger /*
121ee8287f8SJoerg Sonnenberger * The code that follows is extremely disruptive to the calling
122ee8287f8SJoerg Sonnenberger * process, and is therefore disabled until someone can conceive
123ee8287f8SJoerg Sonnenberger * of a realistic scenario where it would fend off a compromise.
124ee8287f8SJoerg Sonnenberger * Race conditions concerning the temporary files can be guarded
125ee8287f8SJoerg Sonnenberger * against in other ways than masking signals (by checking stat(2)
126ee8287f8SJoerg Sonnenberger * results after creation).
127ee8287f8SJoerg Sonnenberger */
128ee8287f8SJoerg Sonnenberger #if 0
129ee8287f8SJoerg Sonnenberger /* Unlimited resource limits. */
130ee8287f8SJoerg Sonnenberger rlim.rlim_cur = rlim.rlim_max = RLIM_INFINITY;
131ee8287f8SJoerg Sonnenberger (void)setrlimit(RLIMIT_CPU, &rlim);
132ee8287f8SJoerg Sonnenberger (void)setrlimit(RLIMIT_FSIZE, &rlim);
133ee8287f8SJoerg Sonnenberger (void)setrlimit(RLIMIT_STACK, &rlim);
134ee8287f8SJoerg Sonnenberger (void)setrlimit(RLIMIT_DATA, &rlim);
135ee8287f8SJoerg Sonnenberger (void)setrlimit(RLIMIT_RSS, &rlim);
136ee8287f8SJoerg Sonnenberger
137ee8287f8SJoerg Sonnenberger /* Don't drop core (not really necessary, but GP's). */
138ee8287f8SJoerg Sonnenberger rlim.rlim_cur = rlim.rlim_max = 0;
139ee8287f8SJoerg Sonnenberger (void)setrlimit(RLIMIT_CORE, &rlim);
140ee8287f8SJoerg Sonnenberger
141ee8287f8SJoerg Sonnenberger /* Turn off signals. */
142ee8287f8SJoerg Sonnenberger (void)signal(SIGALRM, SIG_IGN);
143ee8287f8SJoerg Sonnenberger (void)signal(SIGHUP, SIG_IGN);
144ee8287f8SJoerg Sonnenberger (void)signal(SIGINT, SIG_IGN);
145ee8287f8SJoerg Sonnenberger (void)signal(SIGPIPE, SIG_IGN);
146ee8287f8SJoerg Sonnenberger (void)signal(SIGQUIT, SIG_IGN);
147ee8287f8SJoerg Sonnenberger (void)signal(SIGTERM, SIG_IGN);
148ee8287f8SJoerg Sonnenberger (void)signal(SIGCONT, pw_cont);
149ee8287f8SJoerg Sonnenberger
150ee8287f8SJoerg Sonnenberger /* Create with exact permissions. */
151ee8287f8SJoerg Sonnenberger (void)umask(0);
152ee8287f8SJoerg Sonnenberger #endif
153ee8287f8SJoerg Sonnenberger initialized = 1;
154ee8287f8SJoerg Sonnenberger return (0);
155ee8287f8SJoerg Sonnenberger }
156ee8287f8SJoerg Sonnenberger
157ee8287f8SJoerg Sonnenberger /*
158ee8287f8SJoerg Sonnenberger * Lock the master password file.
159ee8287f8SJoerg Sonnenberger */
160ee8287f8SJoerg Sonnenberger int
pw_lock(void)161ee8287f8SJoerg Sonnenberger pw_lock(void)
162ee8287f8SJoerg Sonnenberger {
163ee8287f8SJoerg Sonnenberger
164ee8287f8SJoerg Sonnenberger if (*masterpasswd == '\0')
165ee8287f8SJoerg Sonnenberger return (-1);
166ee8287f8SJoerg Sonnenberger
167ee8287f8SJoerg Sonnenberger /*
168ee8287f8SJoerg Sonnenberger * If the master password file doesn't exist, the system is hosed.
169ee8287f8SJoerg Sonnenberger * Might as well try to build one. Set the close-on-exec bit so
170ee8287f8SJoerg Sonnenberger * that users can't get at the encrypted passwords while editing.
171ee8287f8SJoerg Sonnenberger * Open should allow flock'ing the file; see 4.4BSD. XXX
172ee8287f8SJoerg Sonnenberger */
173ee8287f8SJoerg Sonnenberger for (;;) {
174ee8287f8SJoerg Sonnenberger struct stat st;
175ee8287f8SJoerg Sonnenberger
176d316f7c9SJohn Marino lockfd = flopen(masterpasswd, O_RDONLY|O_NONBLOCK|O_CLOEXEC, 0);
177d316f7c9SJohn Marino if (lockfd == -1) {
178ee8287f8SJoerg Sonnenberger if (errno == EWOULDBLOCK) {
179ee8287f8SJoerg Sonnenberger errx(1, "the password db file is busy");
180ee8287f8SJoerg Sonnenberger } else {
181ee8287f8SJoerg Sonnenberger err(1, "could not lock the passwd file: ");
182ee8287f8SJoerg Sonnenberger }
183ee8287f8SJoerg Sonnenberger }
184ee8287f8SJoerg Sonnenberger
185ee8287f8SJoerg Sonnenberger /*
186ee8287f8SJoerg Sonnenberger * If the password file was replaced while we were trying to
187ee8287f8SJoerg Sonnenberger * get the lock, our hardlink count will be 0 and we have to
188ee8287f8SJoerg Sonnenberger * close and retry.
189ee8287f8SJoerg Sonnenberger */
190ee8287f8SJoerg Sonnenberger if (fstat(lockfd, &st) == -1)
191ee8287f8SJoerg Sonnenberger err(1, "fstat() failed: ");
192ee8287f8SJoerg Sonnenberger if (st.st_nlink != 0)
193ee8287f8SJoerg Sonnenberger break;
194ee8287f8SJoerg Sonnenberger close(lockfd);
195ee8287f8SJoerg Sonnenberger lockfd = -1;
196ee8287f8SJoerg Sonnenberger }
197ee8287f8SJoerg Sonnenberger return (lockfd);
198ee8287f8SJoerg Sonnenberger }
199ee8287f8SJoerg Sonnenberger
200ee8287f8SJoerg Sonnenberger /*
201ee8287f8SJoerg Sonnenberger * Create and open a presumably safe temp file for editing the password
202ee8287f8SJoerg Sonnenberger * data, and copy the master password file into it.
203ee8287f8SJoerg Sonnenberger */
204ee8287f8SJoerg Sonnenberger int
pw_tmp(int mfd)205ee8287f8SJoerg Sonnenberger pw_tmp(int mfd)
206ee8287f8SJoerg Sonnenberger {
207ee8287f8SJoerg Sonnenberger char buf[8192];
208ee8287f8SJoerg Sonnenberger ssize_t nr;
209ee8287f8SJoerg Sonnenberger const char *p;
210ee8287f8SJoerg Sonnenberger int tfd;
211ee8287f8SJoerg Sonnenberger
212ee8287f8SJoerg Sonnenberger if (*masterpasswd == '\0')
213ee8287f8SJoerg Sonnenberger return (-1);
214ee8287f8SJoerg Sonnenberger if ((p = strrchr(masterpasswd, '/')))
215ee8287f8SJoerg Sonnenberger ++p;
216ee8287f8SJoerg Sonnenberger else
217ee8287f8SJoerg Sonnenberger p = masterpasswd;
218ee8287f8SJoerg Sonnenberger if (snprintf(tempname, sizeof(tempname), "%.*spw.XXXXXX",
219ee8287f8SJoerg Sonnenberger (int)(p - masterpasswd), masterpasswd) >= (int)sizeof(tempname)) {
220ee8287f8SJoerg Sonnenberger errno = ENAMETOOLONG;
221ee8287f8SJoerg Sonnenberger return (-1);
222ee8287f8SJoerg Sonnenberger }
223ee8287f8SJoerg Sonnenberger if ((tfd = mkstemp(tempname)) == -1)
224ee8287f8SJoerg Sonnenberger return (-1);
225ee8287f8SJoerg Sonnenberger if (mfd != -1) {
226ee8287f8SJoerg Sonnenberger while ((nr = read(mfd, buf, sizeof(buf))) > 0)
227ee8287f8SJoerg Sonnenberger if (write(tfd, buf, (size_t)nr) != nr)
228ee8287f8SJoerg Sonnenberger break;
229ee8287f8SJoerg Sonnenberger if (nr != 0) {
230ee8287f8SJoerg Sonnenberger unlink(tempname);
231ee8287f8SJoerg Sonnenberger *tempname = '\0';
232ee8287f8SJoerg Sonnenberger close(tfd);
233ee8287f8SJoerg Sonnenberger return (-1);
234ee8287f8SJoerg Sonnenberger }
235ee8287f8SJoerg Sonnenberger }
236ee8287f8SJoerg Sonnenberger return (tfd);
237ee8287f8SJoerg Sonnenberger }
238ee8287f8SJoerg Sonnenberger
239ee8287f8SJoerg Sonnenberger /*
240ee8287f8SJoerg Sonnenberger * Regenerate the password database.
241ee8287f8SJoerg Sonnenberger */
242ee8287f8SJoerg Sonnenberger int
pw_mkdb(const char * user)243ee8287f8SJoerg Sonnenberger pw_mkdb(const char *user)
244ee8287f8SJoerg Sonnenberger {
245ee8287f8SJoerg Sonnenberger int pstat;
246ee8287f8SJoerg Sonnenberger pid_t pid;
247ee8287f8SJoerg Sonnenberger
248ee8287f8SJoerg Sonnenberger (void)fflush(stderr);
249ee8287f8SJoerg Sonnenberger switch ((pid = fork())) {
250ee8287f8SJoerg Sonnenberger case -1:
251ee8287f8SJoerg Sonnenberger return (-1);
252ee8287f8SJoerg Sonnenberger case 0:
253ee8287f8SJoerg Sonnenberger /* child */
254ee8287f8SJoerg Sonnenberger if (user == NULL)
255ee8287f8SJoerg Sonnenberger execl(_PATH_PWD_MKDB, "pwd_mkdb", "-p",
25679ac1d4aSSascha Wildner "-d", passwd_dir, tempname, NULL);
257ee8287f8SJoerg Sonnenberger else
258ee8287f8SJoerg Sonnenberger execl(_PATH_PWD_MKDB, "pwd_mkdb", "-p",
259ee8287f8SJoerg Sonnenberger "-d", passwd_dir, "-u", user, tempname,
26079ac1d4aSSascha Wildner NULL);
261ee8287f8SJoerg Sonnenberger _exit(1);
262ee8287f8SJoerg Sonnenberger /* NOTREACHED */
263ee8287f8SJoerg Sonnenberger default:
264ee8287f8SJoerg Sonnenberger /* parent */
265ee8287f8SJoerg Sonnenberger break;
266ee8287f8SJoerg Sonnenberger }
267ee8287f8SJoerg Sonnenberger if (waitpid(pid, &pstat, 0) == -1)
268ee8287f8SJoerg Sonnenberger return (-1);
269ee8287f8SJoerg Sonnenberger if (WIFEXITED(pstat) && WEXITSTATUS(pstat) == 0)
270ee8287f8SJoerg Sonnenberger return (0);
271ee8287f8SJoerg Sonnenberger errno = 0;
272ee8287f8SJoerg Sonnenberger return (-1);
273ee8287f8SJoerg Sonnenberger }
274ee8287f8SJoerg Sonnenberger
275ee8287f8SJoerg Sonnenberger /*
276ee8287f8SJoerg Sonnenberger * Edit the temp file. Return -1 on error, >0 if the file was modified, 0
277ee8287f8SJoerg Sonnenberger * if it was not.
278ee8287f8SJoerg Sonnenberger */
279ee8287f8SJoerg Sonnenberger int
pw_edit(int notsetuid)280ee8287f8SJoerg Sonnenberger pw_edit(int notsetuid)
281ee8287f8SJoerg Sonnenberger {
282ee8287f8SJoerg Sonnenberger struct sigaction sa, sa_int, sa_quit;
283d316f7c9SJohn Marino sigset_t oldsigset, nsigset;
284ee8287f8SJoerg Sonnenberger struct stat st1, st2;
285ee8287f8SJoerg Sonnenberger const char *editor;
286ee8287f8SJoerg Sonnenberger int pstat;
287ee8287f8SJoerg Sonnenberger
288ee8287f8SJoerg Sonnenberger if ((editor = getenv("EDITOR")) == NULL)
289ee8287f8SJoerg Sonnenberger editor = _PATH_VI;
290ee8287f8SJoerg Sonnenberger if (stat(tempname, &st1) == -1)
291ee8287f8SJoerg Sonnenberger return (-1);
292ee8287f8SJoerg Sonnenberger sa.sa_handler = SIG_IGN;
293ee8287f8SJoerg Sonnenberger sigemptyset(&sa.sa_mask);
294ee8287f8SJoerg Sonnenberger sa.sa_flags = 0;
295ee8287f8SJoerg Sonnenberger sigaction(SIGINT, &sa, &sa_int);
296ee8287f8SJoerg Sonnenberger sigaction(SIGQUIT, &sa, &sa_quit);
297d316f7c9SJohn Marino sigemptyset(&nsigset);
298d316f7c9SJohn Marino sigaddset(&nsigset, SIGCHLD);
299d316f7c9SJohn Marino sigprocmask(SIG_BLOCK, &nsigset, &oldsigset);
300ee8287f8SJoerg Sonnenberger switch ((editpid = fork())) {
301ee8287f8SJoerg Sonnenberger case -1:
302ee8287f8SJoerg Sonnenberger return (-1);
303ee8287f8SJoerg Sonnenberger case 0:
304ee8287f8SJoerg Sonnenberger sigaction(SIGINT, &sa_int, NULL);
305ee8287f8SJoerg Sonnenberger sigaction(SIGQUIT, &sa_quit, NULL);
306ee8287f8SJoerg Sonnenberger sigprocmask(SIG_SETMASK, &oldsigset, NULL);
307ee8287f8SJoerg Sonnenberger if (notsetuid) {
308d316f7c9SJohn Marino (void)setgid(getgid());
309d316f7c9SJohn Marino (void)setuid(getuid());
310ee8287f8SJoerg Sonnenberger }
311ee8287f8SJoerg Sonnenberger errno = 0;
312*207ba670SMatthew Dillon execlp(editor, basename(strdup(editor)), tempname, NULL);
313ee8287f8SJoerg Sonnenberger _exit(errno);
314ee8287f8SJoerg Sonnenberger default:
315ee8287f8SJoerg Sonnenberger /* parent */
316ee8287f8SJoerg Sonnenberger break;
317ee8287f8SJoerg Sonnenberger }
318ee8287f8SJoerg Sonnenberger for (;;) {
319ee8287f8SJoerg Sonnenberger if (waitpid(editpid, &pstat, WUNTRACED) == -1) {
320ee8287f8SJoerg Sonnenberger if (errno == EINTR)
321ee8287f8SJoerg Sonnenberger continue;
322ee8287f8SJoerg Sonnenberger unlink(tempname);
323ee8287f8SJoerg Sonnenberger editpid = -1;
324ee8287f8SJoerg Sonnenberger break;
325ee8287f8SJoerg Sonnenberger } else if (WIFSTOPPED(pstat)) {
326ee8287f8SJoerg Sonnenberger raise(WSTOPSIG(pstat));
327ee8287f8SJoerg Sonnenberger } else if (WIFEXITED(pstat) && WEXITSTATUS(pstat) == 0) {
328ee8287f8SJoerg Sonnenberger editpid = -1;
329ee8287f8SJoerg Sonnenberger break;
330ee8287f8SJoerg Sonnenberger } else {
331ee8287f8SJoerg Sonnenberger unlink(tempname);
332ee8287f8SJoerg Sonnenberger editpid = -1;
333ee8287f8SJoerg Sonnenberger break;
334ee8287f8SJoerg Sonnenberger }
335ee8287f8SJoerg Sonnenberger }
336ee8287f8SJoerg Sonnenberger sigaction(SIGINT, &sa_int, NULL);
337ee8287f8SJoerg Sonnenberger sigaction(SIGQUIT, &sa_quit, NULL);
338ee8287f8SJoerg Sonnenberger sigprocmask(SIG_SETMASK, &oldsigset, NULL);
339ee8287f8SJoerg Sonnenberger if (stat(tempname, &st2) == -1)
340ee8287f8SJoerg Sonnenberger return (-1);
341d316f7c9SJohn Marino return (st1.st_mtim.tv_sec != st2.st_mtim.tv_sec ||
342d316f7c9SJohn Marino st1.st_mtim.tv_nsec != st2.st_mtim.tv_nsec);
343ee8287f8SJoerg Sonnenberger }
344ee8287f8SJoerg Sonnenberger
345ee8287f8SJoerg Sonnenberger /*
346ee8287f8SJoerg Sonnenberger * Clean up. Preserve errno for the caller's convenience.
347ee8287f8SJoerg Sonnenberger */
348ee8287f8SJoerg Sonnenberger void
pw_fini(void)349ee8287f8SJoerg Sonnenberger pw_fini(void)
350ee8287f8SJoerg Sonnenberger {
351ee8287f8SJoerg Sonnenberger int serrno, status;
352ee8287f8SJoerg Sonnenberger
353ee8287f8SJoerg Sonnenberger if (!initialized)
354ee8287f8SJoerg Sonnenberger return;
355ee8287f8SJoerg Sonnenberger initialized = 0;
356ee8287f8SJoerg Sonnenberger serrno = errno;
357ee8287f8SJoerg Sonnenberger if (editpid != -1) {
358ee8287f8SJoerg Sonnenberger kill(editpid, SIGTERM);
359ee8287f8SJoerg Sonnenberger kill(editpid, SIGCONT);
360ee8287f8SJoerg Sonnenberger waitpid(editpid, &status, 0);
361ee8287f8SJoerg Sonnenberger editpid = -1;
362ee8287f8SJoerg Sonnenberger }
363ee8287f8SJoerg Sonnenberger if (*tempname != '\0') {
364ee8287f8SJoerg Sonnenberger unlink(tempname);
365ee8287f8SJoerg Sonnenberger *tempname = '\0';
366ee8287f8SJoerg Sonnenberger }
367ee8287f8SJoerg Sonnenberger if (lockfd != -1)
368ee8287f8SJoerg Sonnenberger close(lockfd);
369ee8287f8SJoerg Sonnenberger errno = serrno;
370ee8287f8SJoerg Sonnenberger }
371ee8287f8SJoerg Sonnenberger
372ee8287f8SJoerg Sonnenberger /*
373ee8287f8SJoerg Sonnenberger * Compares two struct pwds.
374ee8287f8SJoerg Sonnenberger */
375ee8287f8SJoerg Sonnenberger int
pw_equal(const struct passwd * pw1,const struct passwd * pw2)376ee8287f8SJoerg Sonnenberger pw_equal(const struct passwd *pw1, const struct passwd *pw2)
377ee8287f8SJoerg Sonnenberger {
378ee8287f8SJoerg Sonnenberger return (strcmp(pw1->pw_name, pw2->pw_name) == 0 &&
379ee8287f8SJoerg Sonnenberger pw1->pw_uid == pw2->pw_uid &&
380ee8287f8SJoerg Sonnenberger pw1->pw_gid == pw2->pw_gid &&
381ee8287f8SJoerg Sonnenberger strcmp(pw1->pw_class, pw2->pw_class) == 0 &&
382ee8287f8SJoerg Sonnenberger pw1->pw_change == pw2->pw_change &&
383ee8287f8SJoerg Sonnenberger pw1->pw_expire == pw2->pw_expire &&
384ee8287f8SJoerg Sonnenberger strcmp(pw1->pw_gecos, pw2->pw_gecos) == 0 &&
385ee8287f8SJoerg Sonnenberger strcmp(pw1->pw_dir, pw2->pw_dir) == 0 &&
386ee8287f8SJoerg Sonnenberger strcmp(pw1->pw_shell, pw2->pw_shell) == 0);
387ee8287f8SJoerg Sonnenberger }
388ee8287f8SJoerg Sonnenberger
389ee8287f8SJoerg Sonnenberger /*
390ee8287f8SJoerg Sonnenberger * Make a passwd line out of a struct passwd.
391ee8287f8SJoerg Sonnenberger */
392ee8287f8SJoerg Sonnenberger char *
pw_make(const struct passwd * pw)393ee8287f8SJoerg Sonnenberger pw_make(const struct passwd *pw)
394ee8287f8SJoerg Sonnenberger {
395ee8287f8SJoerg Sonnenberger char *line;
396ee8287f8SJoerg Sonnenberger
397ee8287f8SJoerg Sonnenberger asprintf(&line, "%s:%s:%ju:%ju:%s:%ju:%ju:%s:%s:%s", pw->pw_name,
398ee8287f8SJoerg Sonnenberger pw->pw_passwd, (uintmax_t)pw->pw_uid, (uintmax_t)pw->pw_gid,
399ee8287f8SJoerg Sonnenberger pw->pw_class, (uintmax_t)pw->pw_change, (uintmax_t)pw->pw_expire,
400ee8287f8SJoerg Sonnenberger pw->pw_gecos, pw->pw_dir, pw->pw_shell);
401d316f7c9SJohn Marino return (line);
402ee8287f8SJoerg Sonnenberger }
403ee8287f8SJoerg Sonnenberger
404ee8287f8SJoerg Sonnenberger /*
405d316f7c9SJohn Marino * Make a passwd line (in v7 format) out of a struct passwd
406d316f7c9SJohn Marino */
407d316f7c9SJohn Marino char *
pw_make_v7(const struct passwd * pw)408d316f7c9SJohn Marino pw_make_v7(const struct passwd *pw)
409d316f7c9SJohn Marino {
410d316f7c9SJohn Marino char *line;
411d316f7c9SJohn Marino
412d316f7c9SJohn Marino asprintf(&line, "%s:*:%ju:%ju:%s:%s:%s", pw->pw_name,
413d316f7c9SJohn Marino (uintmax_t)pw->pw_uid, (uintmax_t)pw->pw_gid,
414d316f7c9SJohn Marino pw->pw_gecos, pw->pw_dir, pw->pw_shell);
415d316f7c9SJohn Marino return (line);
416d316f7c9SJohn Marino }
417d316f7c9SJohn Marino
418d316f7c9SJohn Marino /*
419d316f7c9SJohn Marino * Copy password file from one descriptor to another, replacing, deleting
420d316f7c9SJohn Marino * or adding a single record on the way.
421ee8287f8SJoerg Sonnenberger */
422ee8287f8SJoerg Sonnenberger int
pw_copy(int ffd,int tfd,const struct passwd * pw,struct passwd * old_pw)423ee8287f8SJoerg Sonnenberger pw_copy(int ffd, int tfd, const struct passwd *pw, struct passwd *old_pw)
424ee8287f8SJoerg Sonnenberger {
425ee8287f8SJoerg Sonnenberger char buf[8192], *end, *line, *p, *q, *r, t;
426ee8287f8SJoerg Sonnenberger struct passwd *fpw;
427d316f7c9SJohn Marino const struct passwd *spw;
428ee8287f8SJoerg Sonnenberger size_t len;
429ee8287f8SJoerg Sonnenberger int eof, readlen;
430ee8287f8SJoerg Sonnenberger
431d316f7c9SJohn Marino if (old_pw == NULL && pw == NULL)
432ee8287f8SJoerg Sonnenberger return (-1);
433ee8287f8SJoerg Sonnenberger
434d316f7c9SJohn Marino spw = old_pw;
435d316f7c9SJohn Marino /* deleting a user */
436d316f7c9SJohn Marino if (pw == NULL) {
437d316f7c9SJohn Marino line = NULL;
438d316f7c9SJohn Marino } else {
439d316f7c9SJohn Marino if ((line = pw_make(pw)) == NULL)
440d316f7c9SJohn Marino return (-1);
441d316f7c9SJohn Marino }
442d316f7c9SJohn Marino
443d316f7c9SJohn Marino /* adding a user */
444d316f7c9SJohn Marino if (spw == NULL)
445d316f7c9SJohn Marino spw = pw;
446d316f7c9SJohn Marino
447ee8287f8SJoerg Sonnenberger eof = 0;
448d316f7c9SJohn Marino len = 0;
449d316f7c9SJohn Marino p = q = end = buf;
450ee8287f8SJoerg Sonnenberger for (;;) {
451ee8287f8SJoerg Sonnenberger /* find the end of the current line */
452ee8287f8SJoerg Sonnenberger for (p = q; q < end && *q != '\0'; ++q)
453ee8287f8SJoerg Sonnenberger if (*q == '\n')
454ee8287f8SJoerg Sonnenberger break;
455ee8287f8SJoerg Sonnenberger
456ee8287f8SJoerg Sonnenberger /* if we don't have a complete line, fill up the buffer */
457ee8287f8SJoerg Sonnenberger if (q >= end) {
458ee8287f8SJoerg Sonnenberger if (eof)
459ee8287f8SJoerg Sonnenberger break;
460ee8287f8SJoerg Sonnenberger if ((size_t)(q - p) >= sizeof(buf)) {
461ee8287f8SJoerg Sonnenberger warnx("passwd line too long");
462ee8287f8SJoerg Sonnenberger errno = EINVAL; /* hack */
463ee8287f8SJoerg Sonnenberger goto err;
464ee8287f8SJoerg Sonnenberger }
465ee8287f8SJoerg Sonnenberger if (p < end) {
466ee8287f8SJoerg Sonnenberger q = memmove(buf, p, end - p);
467ee8287f8SJoerg Sonnenberger end -= p - buf;
468ee8287f8SJoerg Sonnenberger } else {
469ee8287f8SJoerg Sonnenberger p = q = end = buf;
470ee8287f8SJoerg Sonnenberger }
471ee8287f8SJoerg Sonnenberger readlen = read(ffd, end, sizeof(buf) - (end - buf));
472ee8287f8SJoerg Sonnenberger if (readlen == -1)
473ee8287f8SJoerg Sonnenberger goto err;
474ee8287f8SJoerg Sonnenberger else
475ee8287f8SJoerg Sonnenberger len = (size_t)readlen;
476ee8287f8SJoerg Sonnenberger if (len == 0 && p == buf)
477ee8287f8SJoerg Sonnenberger break;
478ee8287f8SJoerg Sonnenberger end += len;
479ee8287f8SJoerg Sonnenberger len = end - buf;
480ee8287f8SJoerg Sonnenberger if (len < (ssize_t)sizeof(buf)) {
481ee8287f8SJoerg Sonnenberger eof = 1;
482ee8287f8SJoerg Sonnenberger if (len > 0 && buf[len - 1] != '\n')
483d316f7c9SJohn Marino ++len, *end++ = '\n';
484ee8287f8SJoerg Sonnenberger }
485ee8287f8SJoerg Sonnenberger continue;
486ee8287f8SJoerg Sonnenberger }
487ee8287f8SJoerg Sonnenberger
488ee8287f8SJoerg Sonnenberger /* is it a blank line or a comment? */
489ee8287f8SJoerg Sonnenberger for (r = p; r < q && isspace(*r); ++r)
490ee8287f8SJoerg Sonnenberger /* nothing */ ;
491ee8287f8SJoerg Sonnenberger if (r == q || *r == '#') {
492ee8287f8SJoerg Sonnenberger /* yep */
493ee8287f8SJoerg Sonnenberger if (write(tfd, p, q - p + 1) != q - p + 1)
494ee8287f8SJoerg Sonnenberger goto err;
495ee8287f8SJoerg Sonnenberger ++q;
496ee8287f8SJoerg Sonnenberger continue;
497ee8287f8SJoerg Sonnenberger }
498ee8287f8SJoerg Sonnenberger
499ee8287f8SJoerg Sonnenberger /* is it the one we're looking for? */
500feed9a49SPeter Avalos
501ee8287f8SJoerg Sonnenberger t = *q;
502ee8287f8SJoerg Sonnenberger *q = '\0';
503feed9a49SPeter Avalos
504feed9a49SPeter Avalos fpw = pw_scan(r, PWSCAN_MASTER);
505feed9a49SPeter Avalos
506feed9a49SPeter Avalos /*
507feed9a49SPeter Avalos * fpw is either the struct passwd for the current line,
508feed9a49SPeter Avalos * or NULL if the line is malformed.
509feed9a49SPeter Avalos */
510feed9a49SPeter Avalos
511ee8287f8SJoerg Sonnenberger *q = t;
512d316f7c9SJohn Marino if (fpw == NULL || strcmp(fpw->pw_name, spw->pw_name) != 0) {
513ee8287f8SJoerg Sonnenberger /* nope */
514feed9a49SPeter Avalos if (fpw != NULL)
515ee8287f8SJoerg Sonnenberger free(fpw);
516ee8287f8SJoerg Sonnenberger if (write(tfd, p, q - p + 1) != q - p + 1)
517ee8287f8SJoerg Sonnenberger goto err;
518ee8287f8SJoerg Sonnenberger ++q;
519ee8287f8SJoerg Sonnenberger continue;
520ee8287f8SJoerg Sonnenberger }
521ee8287f8SJoerg Sonnenberger if (old_pw && !pw_equal(fpw, old_pw)) {
522ee8287f8SJoerg Sonnenberger warnx("entry inconsistent");
523ee8287f8SJoerg Sonnenberger free(fpw);
524ee8287f8SJoerg Sonnenberger errno = EINVAL; /* hack */
525ee8287f8SJoerg Sonnenberger goto err;
526ee8287f8SJoerg Sonnenberger }
527ee8287f8SJoerg Sonnenberger free(fpw);
528ee8287f8SJoerg Sonnenberger
529d316f7c9SJohn Marino /* it is, replace or remove it */
530d316f7c9SJohn Marino if (line != NULL) {
531ee8287f8SJoerg Sonnenberger len = strlen(line);
532ee8287f8SJoerg Sonnenberger if (write(tfd, line, len) != (int)len)
533ee8287f8SJoerg Sonnenberger goto err;
534d316f7c9SJohn Marino } else {
535d316f7c9SJohn Marino /* when removed, avoid the \n */
536d316f7c9SJohn Marino q++;
537d316f7c9SJohn Marino }
538ee8287f8SJoerg Sonnenberger /* we're done, just copy the rest over */
539ee8287f8SJoerg Sonnenberger for (;;) {
540ee8287f8SJoerg Sonnenberger if (write(tfd, q, end - q) != end - q)
541ee8287f8SJoerg Sonnenberger goto err;
542ee8287f8SJoerg Sonnenberger q = buf;
543ee8287f8SJoerg Sonnenberger readlen = read(ffd, buf, sizeof(buf));
544ee8287f8SJoerg Sonnenberger if (readlen == 0)
545ee8287f8SJoerg Sonnenberger break;
546ee8287f8SJoerg Sonnenberger else
547ee8287f8SJoerg Sonnenberger len = (size_t)readlen;
548ee8287f8SJoerg Sonnenberger if (readlen == -1)
549ee8287f8SJoerg Sonnenberger goto err;
550ee8287f8SJoerg Sonnenberger end = buf + len;
551ee8287f8SJoerg Sonnenberger }
552ee8287f8SJoerg Sonnenberger goto done;
553ee8287f8SJoerg Sonnenberger }
554ee8287f8SJoerg Sonnenberger
555d316f7c9SJohn Marino /* if we got here, we didn't find the old entry */
556d316f7c9SJohn Marino if (line == NULL) {
557d316f7c9SJohn Marino errno = ENOENT;
558d316f7c9SJohn Marino goto err;
559d316f7c9SJohn Marino }
560ee8287f8SJoerg Sonnenberger len = strlen(line);
561ee8287f8SJoerg Sonnenberger if ((size_t)write(tfd, line, len) != len ||
562ee8287f8SJoerg Sonnenberger write(tfd, "\n", 1) != 1)
563ee8287f8SJoerg Sonnenberger goto err;
564ee8287f8SJoerg Sonnenberger done:
565d316f7c9SJohn Marino if (line != NULL)
566ee8287f8SJoerg Sonnenberger free(line);
567ee8287f8SJoerg Sonnenberger return (0);
568ee8287f8SJoerg Sonnenberger err:
569d316f7c9SJohn Marino if (line != NULL)
570ee8287f8SJoerg Sonnenberger free(line);
571ee8287f8SJoerg Sonnenberger return (-1);
572ee8287f8SJoerg Sonnenberger }
573ee8287f8SJoerg Sonnenberger
574ee8287f8SJoerg Sonnenberger /*
575ee8287f8SJoerg Sonnenberger * Return the current value of tempname.
576ee8287f8SJoerg Sonnenberger */
577ee8287f8SJoerg Sonnenberger const char *
pw_tempname(void)578ee8287f8SJoerg Sonnenberger pw_tempname(void)
579ee8287f8SJoerg Sonnenberger {
580ee8287f8SJoerg Sonnenberger
581ee8287f8SJoerg Sonnenberger return (tempname);
582ee8287f8SJoerg Sonnenberger }
583ee8287f8SJoerg Sonnenberger
584ee8287f8SJoerg Sonnenberger /*
585ee8287f8SJoerg Sonnenberger * Duplicate a struct passwd.
586ee8287f8SJoerg Sonnenberger */
587ee8287f8SJoerg Sonnenberger struct passwd *
pw_dup(const struct passwd * pw)588ee8287f8SJoerg Sonnenberger pw_dup(const struct passwd *pw)
589ee8287f8SJoerg Sonnenberger {
590d316f7c9SJohn Marino char *dst;
591ee8287f8SJoerg Sonnenberger struct passwd *npw;
592ee8287f8SJoerg Sonnenberger ssize_t len;
593ee8287f8SJoerg Sonnenberger
594d316f7c9SJohn Marino len = sizeof(*npw);
595d316f7c9SJohn Marino if (pw->pw_name != NULL)
596d316f7c9SJohn Marino len += strlen(pw->pw_name) + 1;
597d316f7c9SJohn Marino if (pw->pw_passwd != NULL)
598d316f7c9SJohn Marino len += strlen(pw->pw_passwd) + 1;
599d316f7c9SJohn Marino if (pw->pw_class != NULL)
600d316f7c9SJohn Marino len += strlen(pw->pw_class) + 1;
601d316f7c9SJohn Marino if (pw->pw_gecos != NULL)
602d316f7c9SJohn Marino len += strlen(pw->pw_gecos) + 1;
603d316f7c9SJohn Marino if (pw->pw_dir != NULL)
604d316f7c9SJohn Marino len += strlen(pw->pw_dir) + 1;
605d316f7c9SJohn Marino if (pw->pw_shell != NULL)
606d316f7c9SJohn Marino len += strlen(pw->pw_shell) + 1;
607ee8287f8SJoerg Sonnenberger if ((npw = malloc((size_t)len)) == NULL)
608ee8287f8SJoerg Sonnenberger return (NULL);
609ee8287f8SJoerg Sonnenberger memcpy(npw, pw, sizeof(*npw));
610d316f7c9SJohn Marino dst = (char *)npw + sizeof(*npw);
611d316f7c9SJohn Marino if (pw->pw_name != NULL) {
612d316f7c9SJohn Marino npw->pw_name = dst;
613d316f7c9SJohn Marino dst = stpcpy(npw->pw_name, pw->pw_name) + 1;
614ee8287f8SJoerg Sonnenberger }
615d316f7c9SJohn Marino if (pw->pw_passwd != NULL) {
616d316f7c9SJohn Marino npw->pw_passwd = dst;
617d316f7c9SJohn Marino dst = stpcpy(npw->pw_passwd, pw->pw_passwd) + 1;
618ee8287f8SJoerg Sonnenberger }
619d316f7c9SJohn Marino if (pw->pw_class != NULL) {
620d316f7c9SJohn Marino npw->pw_class = dst;
621d316f7c9SJohn Marino dst = stpcpy(npw->pw_class, pw->pw_class) + 1;
622ee8287f8SJoerg Sonnenberger }
623d316f7c9SJohn Marino if (pw->pw_gecos != NULL) {
624d316f7c9SJohn Marino npw->pw_gecos = dst;
625d316f7c9SJohn Marino dst = stpcpy(npw->pw_gecos, pw->pw_gecos) + 1;
626ee8287f8SJoerg Sonnenberger }
627d316f7c9SJohn Marino if (pw->pw_dir != NULL) {
628d316f7c9SJohn Marino npw->pw_dir = dst;
629d316f7c9SJohn Marino dst = stpcpy(npw->pw_dir, pw->pw_dir) + 1;
630ee8287f8SJoerg Sonnenberger }
631d316f7c9SJohn Marino if (pw->pw_shell != NULL) {
632d316f7c9SJohn Marino npw->pw_shell = dst;
633d316f7c9SJohn Marino dst = stpcpy(npw->pw_shell, pw->pw_shell) + 1;
634ee8287f8SJoerg Sonnenberger }
635ee8287f8SJoerg Sonnenberger return (npw);
636ee8287f8SJoerg Sonnenberger }
637ee8287f8SJoerg Sonnenberger
638feed9a49SPeter Avalos #include "pw_scan.h"
639feed9a49SPeter Avalos
640ee8287f8SJoerg Sonnenberger /*
641ee8287f8SJoerg Sonnenberger * Wrapper around an internal libc function
642ee8287f8SJoerg Sonnenberger */
643ee8287f8SJoerg Sonnenberger struct passwd *
pw_scan(const char * line,int flags)644ee8287f8SJoerg Sonnenberger pw_scan(const char *line, int flags)
645ee8287f8SJoerg Sonnenberger {
646ee8287f8SJoerg Sonnenberger struct passwd pw, *ret;
647ee8287f8SJoerg Sonnenberger char *bp;
648ee8287f8SJoerg Sonnenberger
649ee8287f8SJoerg Sonnenberger if ((bp = strdup(line)) == NULL)
650ee8287f8SJoerg Sonnenberger return (NULL);
651ee8287f8SJoerg Sonnenberger if (!__pw_scan(bp, &pw, flags)) {
652ee8287f8SJoerg Sonnenberger free(bp);
653ee8287f8SJoerg Sonnenberger return (NULL);
654ee8287f8SJoerg Sonnenberger }
655ee8287f8SJoerg Sonnenberger ret = pw_dup(&pw);
656ee8287f8SJoerg Sonnenberger free(bp);
657ee8287f8SJoerg Sonnenberger return (ret);
658ee8287f8SJoerg Sonnenberger }
659