1 /* $NetBSD: getpwent.c,v 1.81 2012/09/08 15:15:06 dholland Exp $ */
2
3 /*-
4 * Copyright (c) 1997-2000, 2004-2005 The NetBSD Foundation, Inc.
5 * All rights reserved.
6 *
7 * This code is derived from software contributed to The NetBSD Foundation
8 * by Luke Mewburn.
9 *
10 * Redistribution and use in source and binary forms, with or without
11 * modification, are permitted provided that the following conditions
12 * are met:
13 * 1. Redistributions of source code must retain the above copyright
14 * notice, this list of conditions and the following disclaimer.
15 * 2. Redistributions in binary form must reproduce the above copyright
16 * notice, this list of conditions and the following disclaimer in the
17 * documentation and/or other materials provided with the distribution.
18 *
19 * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
20 * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
21 * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
22 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
23 * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
24 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
25 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
26 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
27 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
28 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
29 * POSSIBILITY OF SUCH DAMAGE.
30 */
31
32 /*
33 * Copyright (c) 1988, 1993
34 * The Regents of the University of California. All rights reserved.
35 *
36 * Redistribution and use in source and binary forms, with or without
37 * modification, are permitted provided that the following conditions
38 * are met:
39 * 1. Redistributions of source code must retain the above copyright
40 * notice, this list of conditions and the following disclaimer.
41 * 2. Redistributions in binary form must reproduce the above copyright
42 * notice, this list of conditions and the following disclaimer in the
43 * documentation and/or other materials provided with the distribution.
44 * 3. Neither the name of the University nor the names of its contributors
45 * may be used to endorse or promote products derived from this software
46 * without specific prior written permission.
47 *
48 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
49 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
50 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
51 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
52 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
53 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
54 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
55 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
56 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
57 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
58 * SUCH DAMAGE.
59 */
60
61 /*
62 * Portions Copyright (c) 1994, 1995, Jason Downs. All rights reserved.
63 *
64 * Redistribution and use in source and binary forms, with or without
65 * modification, are permitted provided that the following conditions
66 * are met:
67 * 1. Redistributions of source code must retain the above copyright
68 * notice, this list of conditions and the following disclaimer.
69 * 2. Redistributions in binary form must reproduce the above copyright
70 * notice, this list of conditions and the following disclaimer in the
71 * documentation and/or other materials provided with the distribution.
72 *
73 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR(S) ``AS IS'' AND ANY EXPRESS
74 * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
75 * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
76 * DISCLAIMED. IN NO EVENT SHALL THE AUTHOR(S) BE LIABLE FOR ANY DIRECT,
77 * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
78 * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
79 * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
80 * CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
81 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
82 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
83 * SUCH DAMAGE.
84 */
85
86 #include <sys/cdefs.h>
87 #if defined(LIBC_SCCS) && !defined(lint)
88 #if 0
89 static char sccsid[] = "@(#)getpwent.c 8.2 (Berkeley) 4/27/95";
90 #else
91 __RCSID("$NetBSD: getpwent.c,v 1.81 2012/09/08 15:15:06 dholland Exp $");
92 #endif
93 #endif /* LIBC_SCCS and not lint */
94
95 #include "namespace.h"
96 #include "reentrant.h"
97
98 #include <sys/param.h>
99
100 #include <assert.h>
101 #include <db.h>
102 #include <errno.h>
103 #include <fcntl.h>
104 #include <limits.h>
105 #include <netgroup.h>
106 #include <nsswitch.h>
107 #include <pwd.h>
108 #include <stdarg.h>
109 #include <stdio.h>
110 #include <stdlib.h>
111 #include <string.h>
112 #include <syslog.h>
113 #include <unistd.h>
114
115 #ifdef HESIOD
116 #include <hesiod.h>
117 #endif
118
119 #ifdef YP
120 #include <machine/param.h>
121 #include <rpc/rpc.h>
122 #include <rpcsvc/yp_prot.h>
123 #include <rpcsvc/ypclnt.h>
124 #endif
125
126 #include "pw_private.h"
127
128 #define _PASSWD_COMPAT /* "passwd" defaults to compat, so always provide it */
129
130 #ifdef __weak_alias
131 __weak_alias(endpwent,_endpwent)
132 __weak_alias(setpassent,_setpassent)
133 __weak_alias(setpwent,_setpwent)
134 #endif
135
136 #ifdef _REENTRANT
137 static mutex_t _pwmutex = MUTEX_INITIALIZER;
138 #endif
139
140 const char __yp_token[] = "__YP!"; /* Let pwd_mkdb pull this in. */
141
142
143 /*
144 * The pwd.db lookup techniques and data extraction code here must be kept
145 * in sync with that in `pwd_mkdb'.
146 */
147
148 #if defined(YP) || defined(HESIOD)
149 /*
150 * _pw_parse
151 * Parses entry using pw_scan(3) (without the trailing \n)
152 * after copying to buf, and fills in pw with corresponding values.
153 * If old is non-zero, entry is in _PASSWORD_OLDFMT.
154 * Returns 1 if parsed successfully, 0 on parse failure.
155 */
156 static int
_pw_parse(const char * entry,struct passwd * pw,char * buf,size_t buflen,int old)157 _pw_parse(const char *entry, struct passwd *pw, char *buf, size_t buflen,
158 int old)
159 {
160 int flags;
161
162 _DIAGASSERT(entry != NULL);
163 _DIAGASSERT(pw != NULL);
164 _DIAGASSERT(buf != NULL);
165
166 if (strlcpy(buf, entry, buflen) >= buflen)
167 return 0;
168 flags = _PASSWORD_NOWARN;
169 if (old)
170 flags |= _PASSWORD_OLDFMT;
171 return __pw_scan(buf, pw, &flags);
172 }
173 #endif /* YP || HESIOD */
174
175 /*
176 * _pw_opendb
177 * if *db is NULL, dbopen(3) /etc/spwd.db or /etc/pwd.db (depending
178 * upon permissions, etc)
179 */
180 static int
_pw_opendb(DB ** db,int * version)181 _pw_opendb(DB **db, int *version)
182 {
183 static int warned;
184 DBT key;
185 DBT value;
186
187 const char *dbfile = NULL;
188
189 _DIAGASSERT(db != NULL);
190 _DIAGASSERT(version != NULL);
191 if (*db != NULL) /* open *db */
192 return NS_SUCCESS;
193
194 if (geteuid() == 0) {
195 dbfile = _PATH_SMP_DB;
196 *db = dbopen(dbfile, O_RDONLY, 0, DB_HASH, NULL);
197 }
198 if (*db == NULL) {
199 dbfile = _PATH_MP_DB;
200 *db = dbopen(dbfile, O_RDONLY, 0, DB_HASH, NULL);
201 }
202 if (*db == NULL) {
203 if (!warned) {
204 int serrno = errno;
205 syslog(LOG_ERR, "%s: %m", dbfile);
206 errno = serrno;
207 }
208 warned = 1;
209 return NS_UNAVAIL;
210 }
211 key.data = __UNCONST("VERSION");
212 key.size = strlen((char *)key.data) + 1;
213 switch ((*(*db)->get)(*db, &key, &value, 0)) {
214 case 0:
215 if (sizeof(*version) != value.size)
216 return NS_UNAVAIL;
217 (void)memcpy(version, value.data, value.size);
218 break; /* found */
219 case 1:
220 *version = 0; /* not found */
221 break;
222 case -1:
223 return NS_UNAVAIL; /* error in db routines */
224 default:
225 abort();
226 }
227 return NS_SUCCESS;
228 }
229
230 /*
231 * _pw_getkey
232 * Lookup key in *db, filling in pw
233 * with the result, allocating memory from buffer (size buflen).
234 * (The caller may point key.data to buffer on entry; the contents
235 * of key.data will be invalid on exit.)
236 */
237 static int
_pw_getkey(DB * db,DBT * key,struct passwd * pw,char * buffer,size_t buflen,int * pwflags,int version)238 _pw_getkey(DB *db, DBT *key,
239 struct passwd *pw, char *buffer, size_t buflen, int *pwflags,
240 int version)
241 {
242 char *p, *t;
243 DBT data;
244
245 _DIAGASSERT(db != NULL);
246 _DIAGASSERT(key != NULL);
247 _DIAGASSERT(pw != NULL);
248 _DIAGASSERT(buffer != NULL);
249 /* pwflags may be NULL (if we don't care about them */
250
251 if (db == NULL) /* this shouldn't happen */
252 return NS_UNAVAIL;
253
254 switch ((db->get)(db, key, &data, 0)) {
255 case 0:
256 break; /* found */
257 case 1:
258 return NS_NOTFOUND; /* not found */
259 case -1:
260 return NS_UNAVAIL; /* error in db routines */
261 default:
262 abort();
263 }
264
265 p = (char *)data.data;
266 if (data.size > buflen) {
267 errno = ERANGE;
268 return NS_UNAVAIL;
269 }
270
271 /*
272 * THE DECODING BELOW MUST MATCH THAT IN pwd_mkdb.
273 */
274 t = buffer;
275 #define MACRO(a) do { a } while (/*CONSTCOND*/0)
276 #define EXPAND(e) MACRO(e = t; while ((*t++ = *p++));)
277 #define SCALAR(v) MACRO(memmove(&(v), p, sizeof v); p += sizeof v;)
278 EXPAND(pw->pw_name);
279 EXPAND(pw->pw_passwd);
280 SCALAR(pw->pw_uid);
281 SCALAR(pw->pw_gid);
282 if (version == 0) {
283 int32_t tmp;
284 SCALAR(tmp);
285 pw->pw_change = tmp;
286 } else
287 SCALAR(pw->pw_change);
288 EXPAND(pw->pw_class);
289 EXPAND(pw->pw_gecos);
290 EXPAND(pw->pw_dir);
291 EXPAND(pw->pw_shell);
292 if (version == 0) {
293 int32_t tmp;
294 SCALAR(tmp);
295 pw->pw_expire = tmp;
296 } else
297 SCALAR(pw->pw_expire);
298 if (pwflags) {
299 /* See if there's any data left. If so, read in flags. */
300 if (data.size > (size_t) (p - (char *)data.data)) {
301 SCALAR(*pwflags);
302 } else { /* default */
303 *pwflags = _PASSWORD_NOUID|_PASSWORD_NOGID;
304 }
305 }
306
307 return NS_SUCCESS;
308 }
309
310 /*
311 * _pw_memfrombuf
312 * Obtain want bytes from buffer (of size buflen) and return a pointer
313 * to the available memory after adjusting buffer/buflen.
314 * Returns NULL if there is insufficient space.
315 */
316 static char *
_pw_memfrombuf(size_t want,char ** buffer,size_t * buflen)317 _pw_memfrombuf(size_t want, char **buffer, size_t *buflen)
318 {
319 char *rv;
320
321 if (want > *buflen) {
322 errno = ERANGE;
323 return NULL;
324 }
325 rv = *buffer;
326 *buffer += want;
327 *buflen -= want;
328 return rv;
329 }
330
331 /*
332 * _pw_copy
333 * Copy the contents of frompw to pw; memory for strings
334 * and arrays will be allocated from buf (of size buflen).
335 * If proto != NULL, use various fields in proto in preference to frompw.
336 * Returns 1 if copied successfully, 0 on copy failure.
337 * NOTE: frompw must not use buf for its own pointers.
338 */
339 static int
_pw_copy(const struct passwd * frompw,struct passwd * pw,char * buf,size_t buflen,const struct passwd * protopw,int protoflags)340 _pw_copy(const struct passwd *frompw, struct passwd *pw,
341 char *buf, size_t buflen, const struct passwd *protopw, int protoflags)
342 {
343 size_t count;
344 int useproto;
345
346 _DIAGASSERT(frompw != NULL);
347 _DIAGASSERT(pw != NULL);
348 _DIAGASSERT(buf != NULL);
349 /* protopw may be NULL */
350
351 useproto = protopw && protopw->pw_name;
352
353 #define COPYSTR(to, from) \
354 do { \
355 count = strlen((from)); \
356 (to) = _pw_memfrombuf(count+1, &buf, &buflen); \
357 if ((to) == NULL) \
358 return 0; \
359 memmove((to), (from), count); \
360 to[count] = '\0'; \
361 } while (0) /* LINTED */
362
363 #define COPYFIELD(field) COPYSTR(pw->field, frompw->field)
364
365 #define COPYPROTOFIELD(field) COPYSTR(pw->field, \
366 (useproto && *protopw->field ? protopw->field : frompw->field))
367
368 COPYFIELD(pw_name);
369
370 #ifdef PW_OVERRIDE_PASSWD
371 COPYPROTOFIELD(pw_passwd);
372 #else
373 COPYFIELD(pw_passwd);
374 #endif
375
376 if (useproto && !(protoflags & _PASSWORD_NOUID))
377 pw->pw_uid = protopw->pw_uid;
378 else
379 pw->pw_uid = frompw->pw_uid;
380
381 if (useproto && !(protoflags & _PASSWORD_NOGID))
382 pw->pw_gid = protopw->pw_gid;
383 else
384 pw->pw_gid = frompw->pw_gid;
385
386 pw->pw_change = frompw->pw_change;
387 COPYFIELD(pw_class);
388 COPYPROTOFIELD(pw_gecos);
389 COPYPROTOFIELD(pw_dir);
390 COPYPROTOFIELD(pw_shell);
391
392 #undef COPYSTR
393 #undef COPYFIELD
394 #undef COPYPROTOFIELD
395
396 return 1;
397 }
398
399
400 /*
401 * files methods
402 */
403
404 /* state shared between files methods */
405 struct files_state {
406 int stayopen; /* see getpassent(3) */
407 DB *db; /* passwd file handle */
408 int keynum; /* key counter, -1 if no more */
409 int version;
410 };
411
412 static struct files_state _files_state;
413 /* storage for non _r functions */
414 static struct passwd _files_passwd;
415 static char _files_passwdbuf[_GETPW_R_SIZE_MAX];
416
417 static int
_files_start(struct files_state * state)418 _files_start(struct files_state *state)
419 {
420 int rv;
421
422 _DIAGASSERT(state != NULL);
423
424 state->keynum = 0;
425 rv = _pw_opendb(&state->db, &state->version);
426 if (rv != NS_SUCCESS)
427 return rv;
428 return NS_SUCCESS;
429 }
430
431 static int
_files_end(struct files_state * state)432 _files_end(struct files_state *state)
433 {
434
435 _DIAGASSERT(state != NULL);
436
437 state->keynum = 0;
438 if (state->db) {
439 (void)(state->db->close)(state->db);
440 state->db = NULL;
441 }
442 return NS_SUCCESS;
443 }
444
445 /*
446 * _files_pwscan
447 * Search state->db for the next desired entry.
448 * If search is _PW_KEYBYNUM, look for state->keynum.
449 * If search is _PW_KEYBYNAME, look for name.
450 * If search is _PW_KEYBYUID, look for uid.
451 * Sets *retval to the errno if the result is not NS_SUCCESS
452 * or NS_NOTFOUND.
453 */
454 static int
_files_pwscan(int * retval,struct passwd * pw,char * buffer,size_t buflen,struct files_state * state,int search,const char * name,uid_t uid)455 _files_pwscan(int *retval, struct passwd *pw, char *buffer, size_t buflen,
456 struct files_state *state, int search, const char *name, uid_t uid)
457 {
458 const void *from;
459 size_t fromlen;
460 DBT key;
461 int rv;
462
463 _DIAGASSERT(retval != NULL);
464 _DIAGASSERT(pw != NULL);
465 _DIAGASSERT(buffer != NULL);
466 _DIAGASSERT(state != NULL);
467 /* name is NULL to indicate searching for uid */
468
469 *retval = 0;
470
471 if (state->db == NULL) { /* only start if file not open yet */
472 rv = _files_start(state);
473 if (rv != NS_SUCCESS)
474 goto filespwscan_out;
475 }
476
477 for (;;) { /* search for a match */
478 switch (search) {
479 case _PW_KEYBYNUM:
480 if (state->keynum == -1)
481 return NS_NOTFOUND; /* no more records */
482 state->keynum++;
483 from = &state->keynum;
484 fromlen = sizeof(state->keynum);
485 break;
486 case _PW_KEYBYNAME:
487 from = name;
488 fromlen = strlen(name);
489 break;
490 case _PW_KEYBYUID:
491 from = &uid;
492 fromlen = sizeof(uid);
493 break;
494 default:
495 abort();
496 }
497
498 if (buflen <= fromlen) { /* buffer too small */
499 *retval = ERANGE;
500 return NS_UNAVAIL;
501 }
502 buffer[0] = search; /* setup key */
503 memmove(buffer + 1, from, fromlen);
504 key.size = fromlen + 1;
505 key.data = (u_char *)buffer;
506
507 /* search for key */
508 rv = _pw_getkey(state->db, &key, pw, buffer, buflen, NULL,
509 state->version);
510 if (rv != NS_SUCCESS) /* no match */
511 break;
512 if (pw->pw_name[0] == '+' || pw->pw_name[0] == '-') {
513 /* if a compat line */
514 if (search == _PW_KEYBYNUM)
515 continue; /* read next if pwent */
516 rv = NS_NOTFOUND; /* don't match if pw{nam,uid} */
517 break;
518 }
519 break;
520 }
521
522 if (rv == NS_NOTFOUND && search == _PW_KEYBYNUM)
523 state->keynum = -1; /* flag `no more records' */
524
525 if (rv == NS_SUCCESS) {
526 if ((search == _PW_KEYBYUID && pw->pw_uid != uid) ||
527 (search == _PW_KEYBYNAME && strcmp(pw->pw_name, name) != 0))
528 rv = NS_NOTFOUND;
529 }
530
531 filespwscan_out:
532 if (rv != NS_SUCCESS && rv != NS_NOTFOUND)
533 *retval = errno;
534 return rv;
535 }
536
537 /*ARGSUSED*/
538 static int
_files_setpwent(void * nsrv,void * nscb,va_list ap)539 _files_setpwent(void *nsrv, void *nscb, va_list ap)
540 {
541
542 _files_state.stayopen = 0;
543 return _files_start(&_files_state);
544 }
545
546 /*ARGSUSED*/
547 static int
_files_setpassent(void * nsrv,void * nscb,va_list ap)548 _files_setpassent(void *nsrv, void *nscb, va_list ap)
549 {
550 int *retval = va_arg(ap, int *);
551 int stayopen = va_arg(ap, int);
552
553 int rv;
554
555 _files_state.stayopen = stayopen;
556 rv = _files_start(&_files_state);
557 *retval = (rv == NS_SUCCESS);
558 return rv;
559 }
560
561 /*ARGSUSED*/
562 static int
_files_endpwent(void * nsrv,void * nscb,va_list ap)563 _files_endpwent(void *nsrv, void *nscb, va_list ap)
564 {
565
566 _files_state.stayopen = 0;
567 return _files_end(&_files_state);
568 }
569
570 /*ARGSUSED*/
571 static int
_files_getpwent(void * nsrv,void * nscb,va_list ap)572 _files_getpwent(void *nsrv, void *nscb, va_list ap)
573 {
574 struct passwd **retval = va_arg(ap, struct passwd **);
575
576 int rv, rerror;
577
578 _DIAGASSERT(retval != NULL);
579
580 *retval = NULL;
581 rv = _files_pwscan(&rerror, &_files_passwd,
582 _files_passwdbuf, sizeof(_files_passwdbuf),
583 &_files_state, _PW_KEYBYNUM, NULL, 0);
584 if (rv == NS_SUCCESS)
585 *retval = &_files_passwd;
586 return rv;
587 }
588
589 /*ARGSUSED*/
590 static int
_files_getpwent_r(void * nsrv,void * nscb,va_list ap)591 _files_getpwent_r(void *nsrv, void *nscb, va_list ap)
592 {
593 int *retval = va_arg(ap, int *);
594 struct passwd *pw = va_arg(ap, struct passwd *);
595 char *buffer = va_arg(ap, char *);
596 size_t buflen = va_arg(ap, size_t);
597 struct passwd **result = va_arg(ap, struct passwd **);
598
599 int rv;
600
601 _DIAGASSERT(retval != NULL);
602 _DIAGASSERT(pw != NULL);
603 _DIAGASSERT(buffer != NULL);
604 _DIAGASSERT(result != NULL);
605
606 rv = _files_pwscan(retval, pw, buffer, buflen, &_files_state,
607 _PW_KEYBYNUM, NULL, 0);
608 if (rv == NS_SUCCESS)
609 *result = pw;
610 else
611 *result = NULL;
612 return rv;
613 }
614
615 /*ARGSUSED*/
616 static int
_files_getpwnam(void * nsrv,void * nscb,va_list ap)617 _files_getpwnam(void *nsrv, void *nscb, va_list ap)
618 {
619 struct passwd **retval = va_arg(ap, struct passwd **);
620 const char *name = va_arg(ap, const char *);
621
622 int rv, rerror;
623
624 _DIAGASSERT(retval != NULL);
625
626 *retval = NULL;
627 rv = _files_start(&_files_state);
628 if (rv != NS_SUCCESS)
629 return rv;
630 rv = _files_pwscan(&rerror, &_files_passwd,
631 _files_passwdbuf, sizeof(_files_passwdbuf),
632 &_files_state, _PW_KEYBYNAME, name, 0);
633 if (!_files_state.stayopen)
634 _files_end(&_files_state);
635 if (rv == NS_SUCCESS)
636 *retval = &_files_passwd;
637 return rv;
638 }
639
640 /*ARGSUSED*/
641 static int
_files_getpwnam_r(void * nsrv,void * nscb,va_list ap)642 _files_getpwnam_r(void *nsrv, void *nscb, va_list ap)
643 {
644 int *retval = va_arg(ap, int *);
645 const char *name = va_arg(ap, const char *);
646 struct passwd *pw = va_arg(ap, struct passwd *);
647 char *buffer = va_arg(ap, char *);
648 size_t buflen = va_arg(ap, size_t);
649 struct passwd **result = va_arg(ap, struct passwd **);
650
651 struct files_state state;
652 int rv;
653
654 _DIAGASSERT(retval != NULL);
655 _DIAGASSERT(pw != NULL);
656 _DIAGASSERT(buffer != NULL);
657 _DIAGASSERT(result != NULL);
658
659 *result = NULL;
660 memset(&state, 0, sizeof(state));
661 rv = _files_pwscan(retval, pw, buffer, buflen, &state,
662 _PW_KEYBYNAME, name, 0);
663 _files_end(&state);
664 if (rv == NS_SUCCESS)
665 *result = pw;
666 return rv;
667 }
668
669 /*ARGSUSED*/
670 static int
_files_getpwuid(void * nsrv,void * nscb,va_list ap)671 _files_getpwuid(void *nsrv, void *nscb, va_list ap)
672 {
673 struct passwd **retval = va_arg(ap, struct passwd **);
674 uid_t uid = va_arg(ap, uid_t);
675
676 int rv, rerror;
677
678 _DIAGASSERT(retval != NULL);
679
680 *retval = NULL;
681 rv = _files_start(&_files_state);
682 if (rv != NS_SUCCESS)
683 return rv;
684 rv = _files_pwscan(&rerror, &_files_passwd,
685 _files_passwdbuf, sizeof(_files_passwdbuf),
686 &_files_state, _PW_KEYBYUID, NULL, uid);
687 if (!_files_state.stayopen)
688 _files_end(&_files_state);
689 if (rv == NS_SUCCESS)
690 *retval = &_files_passwd;
691 return rv;
692 }
693
694 /*ARGSUSED*/
695 static int
_files_getpwuid_r(void * nsrv,void * nscb,va_list ap)696 _files_getpwuid_r(void *nsrv, void *nscb, va_list ap)
697 {
698 int *retval = va_arg(ap, int *);
699 uid_t uid = va_arg(ap, uid_t);
700 struct passwd *pw = va_arg(ap, struct passwd *);
701 char *buffer = va_arg(ap, char *);
702 size_t buflen = va_arg(ap, size_t);
703 struct passwd **result = va_arg(ap, struct passwd **);
704
705 struct files_state state;
706 int rv;
707
708 _DIAGASSERT(retval != NULL);
709 _DIAGASSERT(pw != NULL);
710 _DIAGASSERT(buffer != NULL);
711 _DIAGASSERT(result != NULL);
712
713 *result = NULL;
714 memset(&state, 0, sizeof(state));
715 rv = _files_pwscan(retval, pw, buffer, buflen, &state,
716 _PW_KEYBYUID, NULL, uid);
717 _files_end(&state);
718 if (rv == NS_SUCCESS)
719 *result = pw;
720 return rv;
721 }
722
723
724 #ifdef HESIOD
725 /*
726 * dns methods
727 */
728
729 /* state shared between dns methods */
730 struct dns_state {
731 int stayopen; /* see getpassent(3) */
732 void *context; /* Hesiod context */
733 int num; /* passwd index, -1 if no more */
734 };
735
736 static struct dns_state _dns_state;
737 /* storage for non _r functions */
738 static struct passwd _dns_passwd;
739 static char _dns_passwdbuf[_GETPW_R_SIZE_MAX];
740
741 static int
_dns_start(struct dns_state * state)742 _dns_start(struct dns_state *state)
743 {
744
745 _DIAGASSERT(state != NULL);
746
747 state->num = 0;
748 if (state->context == NULL) { /* setup Hesiod */
749 if (hesiod_init(&state->context) == -1)
750 return NS_UNAVAIL;
751 }
752
753 return NS_SUCCESS;
754 }
755
756 static int
_dns_end(struct dns_state * state)757 _dns_end(struct dns_state *state)
758 {
759
760 _DIAGASSERT(state != NULL);
761
762 state->num = 0;
763 if (state->context) {
764 hesiod_end(state->context);
765 state->context = NULL;
766 }
767 return NS_SUCCESS;
768 }
769
770 /*
771 * _dns_pwscan
772 * Look for the Hesiod name provided in buffer in the NULL-terminated
773 * list of zones,
774 * and decode into pw/buffer/buflen.
775 */
776 static int
_dns_pwscan(int * retval,struct passwd * pw,char * buffer,size_t buflen,struct dns_state * state,const char ** zones)777 _dns_pwscan(int *retval, struct passwd *pw, char *buffer, size_t buflen,
778 struct dns_state *state, const char **zones)
779 {
780 const char **curzone;
781 char **hp, *ep;
782 int rv;
783
784 _DIAGASSERT(retval != NULL);
785 _DIAGASSERT(pw != NULL);
786 _DIAGASSERT(buffer != NULL);
787 _DIAGASSERT(state != NULL);
788 _DIAGASSERT(zones != NULL);
789
790 *retval = 0;
791
792 if (state->context == NULL) { /* only start if Hesiod not setup */
793 rv = _dns_start(state);
794 if (rv != NS_SUCCESS)
795 return rv;
796 }
797
798 hp = NULL;
799 rv = NS_NOTFOUND;
800
801 for (curzone = zones; *curzone; curzone++) { /* search zones */
802 hp = hesiod_resolve(state->context, buffer, *curzone);
803 if (hp != NULL)
804 break;
805 if (errno != ENOENT) {
806 rv = NS_UNAVAIL;
807 goto dnspwscan_out;
808 }
809 }
810 if (*curzone == NULL)
811 goto dnspwscan_out;
812
813 if ((ep = strchr(hp[0], '\n')) != NULL)
814 *ep = '\0'; /* clear trailing \n */
815 if (_pw_parse(hp[0], pw, buffer, buflen, 1)) /* validate line */
816 rv = NS_SUCCESS;
817 else
818 rv = NS_UNAVAIL;
819
820 dnspwscan_out:
821 if (rv != NS_SUCCESS && rv != NS_NOTFOUND)
822 *retval = errno;
823 if (hp)
824 hesiod_free_list(state->context, hp);
825 return rv;
826 }
827
828 /*ARGSUSED*/
829 static int
_dns_setpwent(void * nsrv,void * nscb,va_list ap)830 _dns_setpwent(void *nsrv, void *nscb, va_list ap)
831 {
832
833 _dns_state.stayopen = 0;
834 return _dns_start(&_dns_state);
835 }
836
837 /*ARGSUSED*/
838 static int
_dns_setpassent(void * nsrv,void * nscb,va_list ap)839 _dns_setpassent(void *nsrv, void *nscb, va_list ap)
840 {
841 int *retval = va_arg(ap, int *);
842 int stayopen = va_arg(ap, int);
843
844 int rv;
845
846 _dns_state.stayopen = stayopen;
847 rv = _dns_start(&_dns_state);
848 *retval = (rv == NS_SUCCESS);
849 return rv;
850 }
851
852 /*ARGSUSED*/
853 static int
_dns_endpwent(void * nsrv,void * nscb,va_list ap)854 _dns_endpwent(void *nsrv, void *nscb, va_list ap)
855 {
856
857 _dns_state.stayopen = 0;
858 return _dns_end(&_dns_state);
859 }
860
861 /*ARGSUSED*/
862 static int
_dns_getpwent(void * nsrv,void * nscb,va_list ap)863 _dns_getpwent(void *nsrv, void *nscb, va_list ap)
864 {
865 struct passwd **retval = va_arg(ap, struct passwd **);
866
867 char **hp, *ep;
868 int rv;
869
870 _DIAGASSERT(retval != NULL);
871
872 *retval = NULL;
873
874 if (_dns_state.num == -1) /* exhausted search */
875 return NS_NOTFOUND;
876
877 if (_dns_state.context == NULL) {
878 /* only start if Hesiod not setup */
879 rv = _dns_start(&_dns_state);
880 if (rv != NS_SUCCESS)
881 return rv;
882 }
883
884 next_dns_entry:
885 hp = NULL;
886 rv = NS_NOTFOUND;
887
888 /* find passwd-NNN */
889 snprintf(_dns_passwdbuf, sizeof(_dns_passwdbuf),
890 "passwd-%u", _dns_state.num);
891 _dns_state.num++;
892
893 hp = hesiod_resolve(_dns_state.context, _dns_passwdbuf, "passwd");
894 if (hp == NULL) {
895 if (errno == ENOENT)
896 _dns_state.num = -1;
897 else
898 rv = NS_UNAVAIL;
899 } else {
900 if ((ep = strchr(hp[0], '\n')) != NULL)
901 *ep = '\0'; /* clear trailing \n */
902 /* validate line */
903 if (_pw_parse(hp[0], &_dns_passwd,
904 _dns_passwdbuf, sizeof(_dns_passwdbuf), 1))
905 rv = NS_SUCCESS;
906 else { /* dodgy entry, try again */
907 hesiod_free_list(_dns_state.context, hp);
908 goto next_dns_entry;
909 }
910 }
911
912 if (hp)
913 hesiod_free_list(_dns_state.context, hp);
914 if (rv == NS_SUCCESS)
915 *retval = &_dns_passwd;
916 return rv;
917 }
918
919 /*ARGSUSED*/
920 static int
_dns_getpwent_r(void * nsrv,void * nscb,va_list ap)921 _dns_getpwent_r(void *nsrv, void *nscb, va_list ap)
922 {
923 int *retval = va_arg(ap, int *);
924 struct passwd *pw = va_arg(ap, struct passwd *);
925 char *buffer = va_arg(ap, char *);
926 size_t buflen = va_arg(ap, size_t);
927 struct passwd **result = va_arg(ap, struct passwd **);
928
929 char **hp, *ep;
930 int rv;
931
932 _DIAGASSERT(retval != NULL);
933 _DIAGASSERT(pw != NULL);
934 _DIAGASSERT(buffer != NULL);
935 _DIAGASSERT(result != NULL);
936
937 *retval = 0;
938
939 if (_dns_state.num == -1) /* exhausted search */
940 return NS_NOTFOUND;
941
942 if (_dns_state.context == NULL) {
943 /* only start if Hesiod not setup */
944 rv = _dns_start(&_dns_state);
945 if (rv != NS_SUCCESS)
946 return rv;
947 }
948
949 next_dns_entry:
950 hp = NULL;
951 rv = NS_NOTFOUND;
952
953 /* find passwd-NNN */
954 snprintf(buffer, buflen, "passwd-%u", _dns_state.num);
955 _dns_state.num++;
956
957 hp = hesiod_resolve(_dns_state.context, buffer, "passwd");
958 if (hp == NULL) {
959 if (errno == ENOENT)
960 _dns_state.num = -1;
961 else
962 rv = NS_UNAVAIL;
963 } else {
964 if ((ep = strchr(hp[0], '\n')) != NULL)
965 *ep = '\0'; /* clear trailing \n */
966 /* validate line */
967 if (_pw_parse(hp[0], pw, buffer, buflen, 1))
968 rv = NS_SUCCESS;
969 else { /* dodgy entry, try again */
970 hesiod_free_list(_dns_state.context, hp);
971 goto next_dns_entry;
972 }
973 }
974
975 if (hp)
976 hesiod_free_list(_dns_state.context, hp);
977 if (rv == NS_SUCCESS)
978 *result = pw;
979 else
980 *result = NULL;
981 return rv;
982 }
983
984 static const char *_dns_uid_zones[] = {
985 "uid",
986 "passwd",
987 NULL
988 };
989
990 /*ARGSUSED*/
991 static int
_dns_getpwuid(void * nsrv,void * nscb,va_list ap)992 _dns_getpwuid(void *nsrv, void *nscb, va_list ap)
993 {
994 struct passwd **retval = va_arg(ap, struct passwd **);
995 uid_t uid = va_arg(ap, uid_t);
996
997 int rv, rerror;
998
999 _DIAGASSERT(retval != NULL);
1000
1001 *retval = NULL;
1002 rv = _dns_start(&_dns_state);
1003 if (rv != NS_SUCCESS)
1004 return rv;
1005 snprintf(_dns_passwdbuf, sizeof(_dns_passwdbuf),
1006 "%u", (unsigned int)uid);
1007 rv = _dns_pwscan(&rerror, &_dns_passwd,
1008 _dns_passwdbuf, sizeof(_dns_passwdbuf),
1009 &_dns_state, _dns_uid_zones);
1010 if (!_dns_state.stayopen)
1011 _dns_end(&_dns_state);
1012 if (rv == NS_SUCCESS && uid == _dns_passwd.pw_uid)
1013 *retval = &_dns_passwd;
1014 return rv;
1015 }
1016
1017 /*ARGSUSED*/
1018 static int
_dns_getpwuid_r(void * nsrv,void * nscb,va_list ap)1019 _dns_getpwuid_r(void *nsrv, void *nscb, va_list ap)
1020 {
1021 int *retval = va_arg(ap, int *);
1022 uid_t uid = va_arg(ap, uid_t);
1023 struct passwd *pw = va_arg(ap, struct passwd *);
1024 char *buffer = va_arg(ap, char *);
1025 size_t buflen = va_arg(ap, size_t);
1026 struct passwd **result = va_arg(ap, struct passwd **);
1027
1028 struct dns_state state;
1029 int rv;
1030
1031 _DIAGASSERT(retval != NULL);
1032 _DIAGASSERT(pw != NULL);
1033 _DIAGASSERT(buffer != NULL);
1034 _DIAGASSERT(result != NULL);
1035
1036 *result = NULL;
1037 memset(&state, 0, sizeof(state));
1038 snprintf(buffer, buflen, "%u", (unsigned int)uid);
1039 rv = _dns_pwscan(retval, pw, buffer, buflen, &state, _dns_uid_zones);
1040 _dns_end(&state);
1041 if (rv != NS_SUCCESS)
1042 return rv;
1043 if (uid == pw->pw_uid) {
1044 *result = pw;
1045 return NS_SUCCESS;
1046 } else
1047 return NS_NOTFOUND;
1048 }
1049
1050 static const char *_dns_nam_zones[] = {
1051 "passwd",
1052 NULL
1053 };
1054
1055 /*ARGSUSED*/
1056 static int
_dns_getpwnam(void * nsrv,void * nscb,va_list ap)1057 _dns_getpwnam(void *nsrv, void *nscb, va_list ap)
1058 {
1059 struct passwd **retval = va_arg(ap, struct passwd **);
1060 const char *name = va_arg(ap, const char *);
1061
1062 int rv, rerror;
1063
1064 _DIAGASSERT(retval != NULL);
1065
1066 *retval = NULL;
1067 rv = _dns_start(&_dns_state);
1068 if (rv != NS_SUCCESS)
1069 return rv;
1070 snprintf(_dns_passwdbuf, sizeof(_dns_passwdbuf), "%s", name);
1071 rv = _dns_pwscan(&rerror, &_dns_passwd,
1072 _dns_passwdbuf, sizeof(_dns_passwdbuf),
1073 &_dns_state, _dns_nam_zones);
1074 if (!_dns_state.stayopen)
1075 _dns_end(&_dns_state);
1076 if (rv == NS_SUCCESS && strcmp(name, _dns_passwd.pw_name) == 0)
1077 *retval = &_dns_passwd;
1078 return rv;
1079 }
1080
1081 /*ARGSUSED*/
1082 static int
_dns_getpwnam_r(void * nsrv,void * nscb,va_list ap)1083 _dns_getpwnam_r(void *nsrv, void *nscb, va_list ap)
1084 {
1085 int *retval = va_arg(ap, int *);
1086 const char *name = va_arg(ap, const char *);
1087 struct passwd *pw = va_arg(ap, struct passwd *);
1088 char *buffer = va_arg(ap, char *);
1089 size_t buflen = va_arg(ap, size_t);
1090 struct passwd **result = va_arg(ap, struct passwd **);
1091
1092 struct dns_state state;
1093 int rv;
1094
1095 _DIAGASSERT(retval != NULL);
1096 _DIAGASSERT(pw != NULL);
1097 _DIAGASSERT(buffer != NULL);
1098 _DIAGASSERT(result != NULL);
1099
1100 *result = NULL;
1101 memset(&state, 0, sizeof(state));
1102 snprintf(buffer, buflen, "%s", name);
1103 rv = _dns_pwscan(retval, pw, buffer, buflen, &state, _dns_nam_zones);
1104 _dns_end(&state);
1105 if (rv != NS_SUCCESS)
1106 return rv;
1107 if (strcmp(name, pw->pw_name) == 0) {
1108 *result = pw;
1109 return NS_SUCCESS;
1110 } else
1111 return NS_NOTFOUND;
1112 }
1113
1114 #endif /* HESIOD */
1115
1116
1117 #ifdef YP
1118 /*
1119 * nis methods
1120 */
1121 /* state shared between nis methods */
1122 struct nis_state {
1123 int stayopen; /* see getpassent(3) */
1124 char *domain; /* NIS domain */
1125 int done; /* non-zero if search exhausted */
1126 char *current; /* current first/next match */
1127 int currentlen; /* length of _nis_current */
1128 enum { /* shadow map type */
1129 NISMAP_UNKNOWN = 0, /* unknown ... */
1130 NISMAP_NONE, /* none: use "passwd.by*" */
1131 NISMAP_ADJUNCT, /* pw_passwd from "passwd.adjunct.*" */
1132 NISMAP_MASTER /* all from "master.passwd.by*" */
1133 } maptype;
1134 };
1135
1136 static struct nis_state _nis_state;
1137 /* storage for non _r functions */
1138 static struct passwd _nis_passwd;
1139 static char _nis_passwdbuf[_GETPW_R_SIZE_MAX];
1140
1141 static const char __nis_pw_n_1[] = "master.passwd.byname";
1142 static const char __nis_pw_n_2[] = "passwd.byname";
1143 static const char __nis_pw_u_1[] = "master.passwd.byuid";
1144 static const char __nis_pw_u_2[] = "passwd.byuid";
1145
1146 static const char * const __nis_pw_n_map[4] = { __nis_pw_n_2, __nis_pw_n_2, __nis_pw_n_2, __nis_pw_n_1 };
1147 static const char * const __nis_pw_u_map[4] = { __nis_pw_u_2, __nis_pw_u_2, __nis_pw_u_2, __nis_pw_u_1 };
1148
1149 /* macros for deciding which NIS maps to use. */
1150 #define PASSWD_BYNAME(x) ((x)->maptype == NISMAP_MASTER ? __nis_pw_n_1 : __nis_pw_n_2)
1151 #define PASSWD_BYUID(x) ((x)->maptype == NISMAP_MASTER ? __nis_pw_u_1 : __nis_pw_u_2)
1152
1153 static int
_nis_start(struct nis_state * state)1154 _nis_start(struct nis_state *state)
1155 {
1156
1157 _DIAGASSERT(state != NULL);
1158
1159 state->done = 0;
1160 if (state->current) {
1161 free(state->current);
1162 state->current = NULL;
1163 }
1164 if (state->domain == NULL) { /* setup NIS */
1165 switch (yp_get_default_domain(&state->domain)) {
1166 case 0:
1167 break;
1168 case YPERR_RESRC:
1169 return NS_TRYAGAIN;
1170 default:
1171 return NS_UNAVAIL;
1172 }
1173 }
1174
1175 /* determine where to get pw_passwd from */
1176 if (state->maptype == NISMAP_UNKNOWN) {
1177 int r, order;
1178
1179 state->maptype = NISMAP_NONE; /* default to no adjunct */
1180 if (geteuid() != 0) /* non-root can't use adjunct */
1181 return NS_SUCCESS;
1182
1183 /* look for "master.passwd.*" */
1184 r = yp_order(state->domain, "master.passwd.byname", &order);
1185 if (r == 0) {
1186 state->maptype = NISMAP_MASTER;
1187 return NS_SUCCESS;
1188 }
1189
1190 /* master.passwd doesn't exist, try passwd.adjunct */
1191 if (r == YPERR_MAP) {
1192 r = yp_order(state->domain, "passwd.adjunct.byname",
1193 &order);
1194 if (r == 0)
1195 state->maptype = NISMAP_ADJUNCT;
1196 }
1197 }
1198 return NS_SUCCESS;
1199 }
1200
1201 static int
_nis_end(struct nis_state * state)1202 _nis_end(struct nis_state *state)
1203 {
1204
1205 _DIAGASSERT(state != NULL);
1206
1207 if (state->domain)
1208 state->domain = NULL;
1209 state->done = 0;
1210 if (state->current)
1211 free(state->current);
1212 state->current = NULL;
1213 state->maptype = NISMAP_UNKNOWN;
1214 return NS_SUCCESS;
1215 }
1216
1217 /*
1218 * nis_parse
1219 * wrapper to _pw_parse that obtains the real password from the
1220 * "passwd.adjunct.byname" NIS map if the maptype is NISMAP_ADJUNCT.
1221 */
1222 static int
_nis_parse(const char * entry,struct passwd * pw,char * buf,size_t buflen,struct nis_state * state)1223 _nis_parse(const char *entry, struct passwd *pw, char *buf, size_t buflen,
1224 struct nis_state *state)
1225 {
1226 size_t elen;
1227
1228 _DIAGASSERT(entry != NULL);
1229 _DIAGASSERT(pw != NULL);
1230 _DIAGASSERT(buf != NULL);
1231 _DIAGASSERT(state != NULL);
1232
1233 elen = strlen(entry) + 1;
1234 if (elen >= buflen)
1235 return 0;
1236 if (! _pw_parse(entry, pw, buf, buflen,
1237 !(state->maptype == NISMAP_MASTER)))
1238 return 0;
1239
1240 if ((state->maptype == NISMAP_ADJUNCT) &&
1241 (strstr(pw->pw_passwd, "##") != NULL)) {
1242 char *data;
1243 int datalen;
1244
1245 if (yp_match(state->domain, "passwd.adjunct.byname",
1246 pw->pw_name, (int)strlen(pw->pw_name),
1247 &data, &datalen) == 0) {
1248 char *bp, *ep;
1249 /* skip name to get password */
1250 ep = data;
1251 if (strsep(&ep, ":") != NULL &&
1252 (bp = strsep(&ep, ":")) != NULL) {
1253 /* store new pw_passwd after entry */
1254 if (strlcpy(buf + elen, bp, buflen - elen) >=
1255 buflen - elen) {
1256 free(data);
1257 return 0;
1258 }
1259 pw->pw_passwd = &buf[elen];
1260 }
1261 free(data);
1262 }
1263 }
1264
1265 return 1;
1266 }
1267
1268
1269 /*
1270 * _nis_pwscan
1271 * Look for the yp key provided in buffer from map,
1272 * and decode into pw/buffer/buflen.
1273 */
1274 static int
_nis_pwscan(int * retval,struct passwd * pw,char * buffer,size_t buflen,struct nis_state * state,const char * const * map_arr,size_t nmaps)1275 _nis_pwscan(int *retval, struct passwd *pw, char *buffer, size_t buflen,
1276 struct nis_state *state, const char * const *map_arr, size_t nmaps)
1277 {
1278 char *data;
1279 int nisr, rv, datalen;
1280
1281 _DIAGASSERT(retval != NULL);
1282 _DIAGASSERT(pw != NULL);
1283 _DIAGASSERT(buffer != NULL);
1284 _DIAGASSERT(state != NULL);
1285 _DIAGASSERT(map_arr != NULL);
1286
1287 *retval = 0;
1288
1289 if (state->domain == NULL) { /* only start if NIS not setup */
1290 rv = _nis_start(state);
1291 if (rv != NS_SUCCESS)
1292 return rv;
1293 }
1294
1295 data = NULL;
1296 rv = NS_NOTFOUND;
1297 _DIAGASSERT(state->maptype != NISMAP_UNKNOWN &&
1298 (unsigned)state->maptype < nmaps);
1299
1300 /* search map */
1301 nisr = yp_match(state->domain, map_arr[state->maptype], buffer, (int)strlen(buffer),
1302 &data, &datalen);
1303 switch (nisr) {
1304 case 0:
1305 data[datalen] = '\0'; /* clear trailing \n */
1306 if (_nis_parse(data, pw, buffer, buflen, state))
1307 rv = NS_SUCCESS; /* validate line */
1308 else
1309 rv = NS_UNAVAIL;
1310 break;
1311 case YPERR_KEY:
1312 break;
1313 default:
1314 rv = NS_UNAVAIL;
1315 break;
1316 }
1317
1318 if (rv != NS_SUCCESS && rv != NS_NOTFOUND)
1319 *retval = errno;
1320 if (data)
1321 free(data);
1322 return rv;
1323 }
1324
1325 /*ARGSUSED*/
1326 static int
_nis_setpwent(void * nsrv,void * nscb,va_list ap)1327 _nis_setpwent(void *nsrv, void *nscb, va_list ap)
1328 {
1329
1330 _nis_state.stayopen = 0;
1331 return _nis_start(&_nis_state);
1332 }
1333
1334 /*ARGSUSED*/
1335 static int
_nis_setpassent(void * nsrv,void * nscb,va_list ap)1336 _nis_setpassent(void *nsrv, void *nscb, va_list ap)
1337 {
1338 int *retval = va_arg(ap, int *);
1339 int stayopen = va_arg(ap, int);
1340
1341 int rv;
1342
1343 _nis_state.stayopen = stayopen;
1344 rv = _nis_start(&_nis_state);
1345 *retval = (rv == NS_SUCCESS);
1346 return rv;
1347 }
1348
1349 /*ARGSUSED*/
1350 static int
_nis_endpwent(void * nsrv,void * nscb,va_list ap)1351 _nis_endpwent(void *nsrv, void *nscb, va_list ap)
1352 {
1353
1354 return _nis_end(&_nis_state);
1355 }
1356
1357
1358 /*ARGSUSED*/
1359 static int
_nis_getpwent(void * nsrv,void * nscb,va_list ap)1360 _nis_getpwent(void *nsrv, void *nscb, va_list ap)
1361 {
1362 struct passwd **retval = va_arg(ap, struct passwd **);
1363
1364 char *key, *data;
1365 int keylen, datalen, rv, nisr;
1366
1367 _DIAGASSERT(retval != NULL);
1368
1369 *retval = NULL;
1370
1371 if (_nis_state.done) /* exhausted search */
1372 return NS_NOTFOUND;
1373 if (_nis_state.domain == NULL) {
1374 /* only start if NIS not setup */
1375 rv = _nis_start(&_nis_state);
1376 if (rv != NS_SUCCESS)
1377 return rv;
1378 }
1379
1380 next_nis_entry:
1381 key = NULL;
1382 data = NULL;
1383 rv = NS_NOTFOUND;
1384
1385 if (_nis_state.current) { /* already searching */
1386 nisr = yp_next(_nis_state.domain, PASSWD_BYNAME(&_nis_state),
1387 _nis_state.current, _nis_state.currentlen,
1388 &key, &keylen, &data, &datalen);
1389 free(_nis_state.current);
1390 _nis_state.current = NULL;
1391 switch (nisr) {
1392 case 0:
1393 _nis_state.current = key;
1394 _nis_state.currentlen = keylen;
1395 key = NULL;
1396 break;
1397 case YPERR_NOMORE:
1398 _nis_state.done = 1;
1399 goto nisent_out;
1400 default:
1401 rv = NS_UNAVAIL;
1402 goto nisent_out;
1403 }
1404 } else { /* new search */
1405 if (yp_first(_nis_state.domain, PASSWD_BYNAME(&_nis_state),
1406 &_nis_state.current, &_nis_state.currentlen,
1407 &data, &datalen)) {
1408 rv = NS_UNAVAIL;
1409 goto nisent_out;
1410 }
1411 }
1412
1413 data[datalen] = '\0'; /* clear trailing \n */
1414 /* validate line */
1415 if (_nis_parse(data, &_nis_passwd,
1416 _nis_passwdbuf, sizeof(_nis_passwdbuf), &_nis_state))
1417 rv = NS_SUCCESS;
1418 else { /* dodgy entry, try again */
1419 free(data);
1420 goto next_nis_entry;
1421 }
1422
1423 nisent_out:
1424 if (key)
1425 free(key);
1426 if (data)
1427 free(data);
1428 if (rv == NS_SUCCESS)
1429 *retval = &_nis_passwd;
1430 return rv;
1431 }
1432
1433 /*ARGSUSED*/
1434 static int
_nis_getpwent_r(void * nsrv,void * nscb,va_list ap)1435 _nis_getpwent_r(void *nsrv, void *nscb, va_list ap)
1436 {
1437 int *retval = va_arg(ap, int *);
1438 struct passwd *pw = va_arg(ap, struct passwd *);
1439 char *buffer = va_arg(ap, char *);
1440 size_t buflen = va_arg(ap, size_t);
1441 struct passwd **result = va_arg(ap, struct passwd **);
1442
1443 char *key, *data;
1444 int keylen, datalen, rv, nisr;
1445
1446 _DIAGASSERT(retval != NULL);
1447 _DIAGASSERT(pw != NULL);
1448 _DIAGASSERT(buffer != NULL);
1449 _DIAGASSERT(result != NULL);
1450
1451 *retval = 0;
1452
1453 if (_nis_state.done) /* exhausted search */
1454 return NS_NOTFOUND;
1455 if (_nis_state.domain == NULL) {
1456 /* only start if NIS not setup */
1457 rv = _nis_start(&_nis_state);
1458 if (rv != NS_SUCCESS)
1459 return rv;
1460 }
1461
1462 next_nis_entry:
1463 key = NULL;
1464 data = NULL;
1465 rv = NS_NOTFOUND;
1466
1467 if (_nis_state.current) { /* already searching */
1468 nisr = yp_next(_nis_state.domain, PASSWD_BYNAME(&_nis_state),
1469 _nis_state.current, _nis_state.currentlen,
1470 &key, &keylen, &data, &datalen);
1471 free(_nis_state.current);
1472 _nis_state.current = NULL;
1473 switch (nisr) {
1474 case 0:
1475 _nis_state.current = key;
1476 _nis_state.currentlen = keylen;
1477 key = NULL;
1478 break;
1479 case YPERR_NOMORE:
1480 _nis_state.done = 1;
1481 goto nisent_out;
1482 default:
1483 rv = NS_UNAVAIL;
1484 goto nisent_out;
1485 }
1486 } else { /* new search */
1487 if (yp_first(_nis_state.domain, PASSWD_BYNAME(&_nis_state),
1488 &_nis_state.current, &_nis_state.currentlen,
1489 &data, &datalen)) {
1490 rv = NS_UNAVAIL;
1491 goto nisent_out;
1492 }
1493 }
1494
1495 data[datalen] = '\0'; /* clear trailing \n */
1496 /* validate line */
1497 if (_nis_parse(data, pw, buffer, buflen, &_nis_state))
1498 rv = NS_SUCCESS;
1499 else { /* dodgy entry, try again */
1500 if (key)
1501 free(key);
1502 free(data);
1503 goto next_nis_entry;
1504 }
1505
1506 nisent_out:
1507 if (key)
1508 free(key);
1509 if (data)
1510 free(data);
1511 if (rv == NS_SUCCESS)
1512 *result = pw;
1513 else
1514 *result = NULL;
1515 return rv;
1516 }
1517
1518 /*ARGSUSED*/
1519 static int
_nis_getpwuid(void * nsrv,void * nscb,va_list ap)1520 _nis_getpwuid(void *nsrv, void *nscb, va_list ap)
1521 {
1522 struct passwd **retval = va_arg(ap, struct passwd **);
1523 uid_t uid = va_arg(ap, uid_t);
1524
1525 int rv, rerror;
1526
1527 _DIAGASSERT(retval != NULL);
1528
1529 *retval = NULL;
1530 rv = _nis_start(&_nis_state);
1531 if (rv != NS_SUCCESS)
1532 return rv;
1533 snprintf(_nis_passwdbuf, sizeof(_nis_passwdbuf), "%u", (unsigned int)uid);
1534 rv = _nis_pwscan(&rerror, &_nis_passwd,
1535 _nis_passwdbuf, sizeof(_nis_passwdbuf),
1536 &_nis_state, __nis_pw_u_map, __arraycount(__nis_pw_u_map));
1537 if (!_nis_state.stayopen)
1538 _nis_end(&_nis_state);
1539 if (rv == NS_SUCCESS && uid == _nis_passwd.pw_uid)
1540 *retval = &_nis_passwd;
1541 return rv;
1542 }
1543
1544 /*ARGSUSED*/
1545 static int
_nis_getpwuid_r(void * nsrv,void * nscb,va_list ap)1546 _nis_getpwuid_r(void *nsrv, void *nscb, va_list ap)
1547 {
1548 int *retval = va_arg(ap, int *);
1549 uid_t uid = va_arg(ap, uid_t);
1550 struct passwd *pw = va_arg(ap, struct passwd *);
1551 char *buffer = va_arg(ap, char *);
1552 size_t buflen = va_arg(ap, size_t);
1553 struct passwd **result = va_arg(ap, struct passwd **);
1554
1555 struct nis_state state;
1556 int rv;
1557
1558 _DIAGASSERT(retval != NULL);
1559 _DIAGASSERT(pw != NULL);
1560 _DIAGASSERT(buffer != NULL);
1561 _DIAGASSERT(result != NULL);
1562
1563 *result = NULL;
1564 snprintf(buffer, buflen, "%u", (unsigned int)uid);
1565 /* remark: we run under a global mutex inside of this module ... */
1566 if (_nis_state.stayopen)
1567 { /* use global state only if stayopen is set - otherwise we would blow up getpwent_r() ... */
1568 rv = _nis_pwscan(retval, pw, buffer, buflen,
1569 &_nis_state, __nis_pw_u_map, __arraycount(__nis_pw_u_map));
1570 }
1571 else
1572 { /* keep old semantic if no stayopen set - no need to call _nis_start() here - _nis_pwscan() will do it for us ... */
1573 /* use same way as in getgrent.c ... */
1574 memset(&state, 0, sizeof(state));
1575 rv = _nis_pwscan(retval, pw, buffer, buflen,
1576 &state, __nis_pw_u_map, __arraycount(__nis_pw_u_map));
1577 _nis_end(&state);
1578 }
1579 if (rv != NS_SUCCESS)
1580 return rv;
1581 if (uid == pw->pw_uid) {
1582 *result = pw;
1583 return NS_SUCCESS;
1584 } else
1585 return NS_NOTFOUND;
1586 }
1587
1588 /*ARGSUSED*/
1589 static int
_nis_getpwnam(void * nsrv,void * nscb,va_list ap)1590 _nis_getpwnam(void *nsrv, void *nscb, va_list ap)
1591 {
1592 struct passwd **retval = va_arg(ap, struct passwd **);
1593 const char *name = va_arg(ap, const char *);
1594
1595 int rv, rerror;
1596
1597 _DIAGASSERT(retval != NULL);
1598
1599 *retval = NULL;
1600 rv = _nis_start(&_nis_state);
1601 if (rv != NS_SUCCESS)
1602 return rv;
1603 snprintf(_nis_passwdbuf, sizeof(_nis_passwdbuf), "%s", name);
1604 rv = _nis_pwscan(&rerror, &_nis_passwd,
1605 _nis_passwdbuf, sizeof(_nis_passwdbuf),
1606 &_nis_state, __nis_pw_n_map, __arraycount(__nis_pw_n_map));
1607 if (!_nis_state.stayopen)
1608 _nis_end(&_nis_state);
1609 if (rv == NS_SUCCESS && strcmp(name, _nis_passwd.pw_name) == 0)
1610 *retval = &_nis_passwd;
1611 return rv;
1612 }
1613
1614 /*ARGSUSED*/
1615 static int
_nis_getpwnam_r(void * nsrv,void * nscb,va_list ap)1616 _nis_getpwnam_r(void *nsrv, void *nscb, va_list ap)
1617 {
1618 int *retval = va_arg(ap, int *);
1619 const char *name = va_arg(ap, const char *);
1620 struct passwd *pw = va_arg(ap, struct passwd *);
1621 char *buffer = va_arg(ap, char *);
1622 size_t buflen = va_arg(ap, size_t);
1623 struct passwd **result = va_arg(ap, struct passwd **);
1624
1625 struct nis_state state;
1626 int rv;
1627
1628 _DIAGASSERT(retval != NULL);
1629 _DIAGASSERT(pw != NULL);
1630 _DIAGASSERT(buffer != NULL);
1631 _DIAGASSERT(result != NULL);
1632
1633 *result = NULL;
1634 snprintf(buffer, buflen, "%s", name);
1635 /* remark: we run under a global mutex inside of this module ... */
1636 if (_nis_state.stayopen)
1637 { /* use global state only if stayopen is set - otherwise we would blow up getpwent_r() ... */
1638 rv = _nis_pwscan(retval, pw, buffer, buflen,
1639 &_nis_state, __nis_pw_n_map, __arraycount(__nis_pw_n_map));
1640 }
1641 else
1642 { /* keep old semantic if no stayopen set - no need to call _nis_start() here - _nis_pwscan() will do it for us ... */
1643 /* use same way as in getgrent.c ... */
1644 memset(&state, 0, sizeof(state));
1645 rv = _nis_pwscan(retval, pw, buffer, buflen,
1646 &state, __nis_pw_n_map, __arraycount(__nis_pw_n_map));
1647 _nis_end(&state);
1648 }
1649 if (rv != NS_SUCCESS)
1650 return rv;
1651 if (strcmp(name, pw->pw_name) == 0) {
1652 *result = pw;
1653 return NS_SUCCESS;
1654 } else
1655 return NS_NOTFOUND;
1656 }
1657
1658 #endif /* YP */
1659
1660
1661 #ifdef _PASSWD_COMPAT
1662 /*
1663 * compat methods
1664 */
1665
1666 /* state shared between compat methods */
1667
1668 struct compat_state {
1669 int stayopen; /* see getpassent(3) */
1670 DB *db; /* passwd DB */
1671 int keynum; /* key counter, -1 if no more */
1672 enum { /* current compat mode */
1673 COMPAT_NOTOKEN = 0, /* no compat token present */
1674 COMPAT_NONE, /* parsing normal pwd.db line */
1675 COMPAT_FULL, /* parsing `+' entries */
1676 COMPAT_USER, /* parsing `+name' entries */
1677 COMPAT_NETGROUP /* parsing `+@netgroup' entries */
1678 } mode;
1679 char *user; /* COMPAT_USER "+name" */
1680 DB *exclude; /* compat exclude DB */
1681 struct passwd proto; /* proto passwd entry */
1682 char protobuf[_GETPW_R_SIZE_MAX];
1683 /* buffer for proto ptrs */
1684 int protoflags; /* proto passwd flags */
1685 int version;
1686 };
1687
1688 static struct compat_state _compat_state;
1689 /* storage for non _r functions */
1690 static struct passwd _compat_passwd;
1691 static char _compat_passwdbuf[_GETPW_R_SIZE_MAX];
1692
1693 static int
_compat_start(struct compat_state * state)1694 _compat_start(struct compat_state *state)
1695 {
1696 int rv;
1697
1698 _DIAGASSERT(state != NULL);
1699
1700 state->keynum = 0;
1701 if (state->db == NULL) { /* not open yet */
1702 DBT key, data;
1703 DBT pkey, pdata;
1704 char bf[MAXLOGNAME];
1705
1706 rv = _pw_opendb(&state->db, &state->version);
1707 if (rv != NS_SUCCESS)
1708 return rv;
1709
1710 state->mode = COMPAT_NOTOKEN;
1711
1712 /*
1713 * Determine if the "compat" token is present in pwd.db;
1714 * either "__YP!" or PW_KEYBYNAME+"+".
1715 * Only works if pwd_mkdb installs the token.
1716 */
1717 key.data = (u_char *)__UNCONST(__yp_token);
1718 key.size = strlen(__yp_token);
1719
1720 bf[0] = _PW_KEYBYNAME; /* Pre-token database support. */
1721 bf[1] = '+';
1722 pkey.data = (u_char *)bf;
1723 pkey.size = 2;
1724
1725 if ((state->db->get)(state->db, &key, &data, 0) == 0
1726 || (state->db->get)(state->db, &pkey, &pdata, 0) == 0)
1727 state->mode = COMPAT_NONE;
1728 }
1729 return NS_SUCCESS;
1730 }
1731
1732 static int
_compat_end(struct compat_state * state)1733 _compat_end(struct compat_state *state)
1734 {
1735
1736 _DIAGASSERT(state != NULL);
1737
1738 state->keynum = 0;
1739 if (state->db) {
1740 (void)(state->db->close)(state->db);
1741 state->db = NULL;
1742 }
1743 state->mode = COMPAT_NOTOKEN;
1744 if (state->user)
1745 free(state->user);
1746 state->user = NULL;
1747 if (state->exclude != NULL)
1748 (void)(state->exclude->close)(state->exclude);
1749 state->exclude = NULL;
1750 state->proto.pw_name = NULL;
1751 state->protoflags = 0;
1752 return NS_SUCCESS;
1753 }
1754
1755 /*
1756 * _compat_add_exclude
1757 * add the name to the exclude list in state->exclude.
1758 */
1759 static int
_compat_add_exclude(struct compat_state * state,const char * name)1760 _compat_add_exclude(struct compat_state *state, const char *name)
1761 {
1762 DBT key, data;
1763
1764 _DIAGASSERT(state != NULL);
1765 _DIAGASSERT(name != NULL);
1766
1767 /* initialize the exclusion table if needed */
1768 if (state->exclude == NULL) {
1769 state->exclude = dbopen(NULL, O_RDWR, 600, DB_HASH, NULL);
1770 if (state->exclude == NULL)
1771 return 0;
1772 }
1773
1774 key.size = strlen(name); /* set up the key */
1775 key.data = (u_char *)__UNCONST(name);
1776
1777 data.data = NULL; /* data is nothing */
1778 data.size = 0;
1779
1780 /* store it */
1781 if ((state->exclude->put)(state->exclude, &key, &data, 0) == -1)
1782 return 0;
1783
1784 return 1;
1785 }
1786
1787 /*
1788 * _compat_is_excluded
1789 * test if a name is on the compat mode exclude list
1790 */
1791 static int
_compat_is_excluded(struct compat_state * state,const char * name)1792 _compat_is_excluded(struct compat_state *state, const char *name)
1793 {
1794 DBT key, data;
1795
1796 _DIAGASSERT(state != NULL);
1797 _DIAGASSERT(name != NULL);
1798
1799 if (state->exclude == NULL)
1800 return 0; /* nothing excluded */
1801
1802 key.size = strlen(name); /* set up the key */
1803 key.data = (u_char *)__UNCONST(name);
1804
1805 if ((state->exclude->get)(state->exclude, &key, &data, 0) == 0)
1806 return 1; /* is excluded */
1807
1808 return 0;
1809 }
1810
1811
1812 /*
1813 * _passwdcompat_bad
1814 * log an error if "files" or "compat" is specified in
1815 * passwd_compat database
1816 */
1817 /*ARGSUSED*/
1818 static int
_passwdcompat_bad(void * nsrv,void * nscb,va_list ap)1819 _passwdcompat_bad(void *nsrv, void *nscb, va_list ap)
1820 {
1821 static int warned;
1822
1823 _DIAGASSERT(nsrv != NULL);
1824 _DIAGASSERT(nscb != NULL);
1825
1826 if (!warned) {
1827 syslog(LOG_ERR,
1828 "nsswitch.conf passwd_compat database can't use '%s'",
1829 (char *)nscb);
1830 }
1831 warned = 1;
1832 return NS_UNAVAIL;
1833 }
1834
1835 /*
1836 * _passwdcompat_setpassent
1837 * Call setpassent for all passwd_compat sources.
1838 */
1839 static int
_passwdcompat_setpassent(int stayopen)1840 _passwdcompat_setpassent(int stayopen)
1841 {
1842 static const ns_dtab dtab[] = {
1843 NS_FILES_CB(_passwdcompat_bad, "files")
1844 NS_DNS_CB(_dns_setpassent, NULL)
1845 NS_NIS_CB(_nis_setpassent, NULL)
1846 NS_COMPAT_CB(_passwdcompat_bad, "compat")
1847 NS_NULL_CB
1848 };
1849
1850 int rv, result;
1851
1852 rv = nsdispatch(NULL, dtab, NSDB_PASSWD_COMPAT, "setpassent",
1853 __nsdefaultnis_forceall, &result, stayopen);
1854 return rv;
1855 }
1856
1857 /*
1858 * _passwdcompat_endpwent
1859 * Call endpwent for all passwd_compat sources.
1860 */
1861 static int
_passwdcompat_endpwent(void)1862 _passwdcompat_endpwent(void)
1863 {
1864 static const ns_dtab dtab[] = {
1865 NS_FILES_CB(_passwdcompat_bad, "files")
1866 NS_DNS_CB(_dns_endpwent, NULL)
1867 NS_NIS_CB(_nis_endpwent, NULL)
1868 NS_COMPAT_CB(_passwdcompat_bad, "compat")
1869 NS_NULL_CB
1870 };
1871
1872 return nsdispatch(NULL, dtab, NSDB_PASSWD_COMPAT, "endpwent",
1873 __nsdefaultnis_forceall);
1874 }
1875
1876 /*
1877 * _passwdcompat_pwscan
1878 * When a name lookup in compat mode is required (e.g., `+name', or a
1879 * name in `+@netgroup'), look it up in the 'passwd_compat' nsswitch
1880 * database.
1881 * Fail if passwd_compat contains files or compat.
1882 */
1883 static int
_passwdcompat_pwscan(struct passwd * pw,char * buffer,size_t buflen,int search,const char * name,uid_t uid)1884 _passwdcompat_pwscan(struct passwd *pw, char *buffer, size_t buflen,
1885 int search, const char *name, uid_t uid)
1886 {
1887 static const ns_dtab compatentdtab[] = {
1888 NS_FILES_CB(_passwdcompat_bad, "files")
1889 NS_DNS_CB(_dns_getpwent_r, NULL)
1890 NS_NIS_CB(_nis_getpwent_r, NULL)
1891 NS_COMPAT_CB(_passwdcompat_bad, "compat")
1892 NS_NULL_CB
1893 };
1894 static const ns_dtab compatuiddtab[] = {
1895 NS_FILES_CB(_passwdcompat_bad, "files")
1896 NS_DNS_CB(_dns_getpwuid_r, NULL)
1897 NS_NIS_CB(_nis_getpwuid_r, NULL)
1898 NS_COMPAT_CB(_passwdcompat_bad, "compat")
1899 NS_NULL_CB
1900 };
1901 static const ns_dtab compatnamdtab[] = {
1902 NS_FILES_CB(_passwdcompat_bad, "files")
1903 NS_DNS_CB(_dns_getpwnam_r, NULL)
1904 NS_NIS_CB(_nis_getpwnam_r, NULL)
1905 NS_COMPAT_CB(_passwdcompat_bad, "compat")
1906 NS_NULL_CB
1907 };
1908
1909 int rv, crv;
1910 struct passwd *cpw;
1911
1912 switch (search) {
1913 case _PW_KEYBYNUM:
1914 rv = nsdispatch(NULL, compatentdtab,
1915 NSDB_PASSWD_COMPAT, "getpwent_r", __nsdefaultnis,
1916 &crv, pw, buffer, buflen, &cpw);
1917 break;
1918 case _PW_KEYBYNAME:
1919 _DIAGASSERT(name != NULL);
1920 rv = nsdispatch(NULL, compatnamdtab,
1921 NSDB_PASSWD_COMPAT, "getpwnam_r", __nsdefaultnis,
1922 &crv, name, pw, buffer, buflen, &cpw);
1923 break;
1924 case _PW_KEYBYUID:
1925 rv = nsdispatch(NULL, compatuiddtab,
1926 NSDB_PASSWD_COMPAT, "getpwuid_r", __nsdefaultnis,
1927 &crv, uid, pw, buffer, buflen, &cpw);
1928 break;
1929 default:
1930 abort();
1931 /*NOTREACHED*/
1932 }
1933 return rv;
1934 }
1935
1936 /*
1937 * _compat_pwscan
1938 * Search state->db for the next desired entry.
1939 * If search is _PW_KEYBYNUM, look for state->keynum.
1940 * If search is _PW_KEYBYNAME, look for name.
1941 * If search is _PW_KEYBYUID, look for uid.
1942 * Sets *retval to the errno if the result is not NS_SUCCESS
1943 * or NS_NOTFOUND.
1944 */
1945 static int
_compat_pwscan(int * retval,struct passwd * pw,char * buffer,size_t buflen,struct compat_state * state,int search,const char * name,uid_t uid)1946 _compat_pwscan(int *retval, struct passwd *pw, char *buffer, size_t buflen,
1947 struct compat_state *state, int search, const char *name, uid_t uid)
1948 {
1949 DBT key;
1950 int rv, r, pwflags;
1951 const char *user, *host, *dom;
1952 const void *from;
1953 size_t fromlen;
1954
1955 _DIAGASSERT(retval != NULL);
1956 _DIAGASSERT(pw != NULL);
1957 _DIAGASSERT(buffer != NULL);
1958 _DIAGASSERT(state != NULL);
1959 /* name may be NULL */
1960
1961 *retval = 0;
1962
1963 if (state->db == NULL) {
1964 rv = _compat_start(state);
1965 if (rv != NS_SUCCESS)
1966 return rv;
1967 }
1968 if (buflen <= 1) { /* buffer too small */
1969 *retval = ERANGE;
1970 return NS_UNAVAIL;
1971 }
1972
1973 for (;;) { /* loop over pwd.db */
1974 rv = NS_NOTFOUND;
1975 if (state->mode != COMPAT_NOTOKEN &&
1976 state->mode != COMPAT_NONE) {
1977 /* doing a compat lookup */
1978 struct passwd cpw;
1979 char cbuf[_GETPW_R_SIZE_MAX];
1980
1981 switch (state->mode) {
1982
1983 case COMPAT_FULL:
1984 /* get next user or lookup by key */
1985 rv = _passwdcompat_pwscan(&cpw,
1986 cbuf, sizeof(cbuf), search, name, uid);
1987 if (rv != NS_SUCCESS)
1988 state->mode = COMPAT_NONE;
1989 break;
1990
1991 case COMPAT_NETGROUP:
1992 /* XXXREENTRANT: getnetgrent is not thread safe */
1993 /* get next user from netgroup */
1994 r = getnetgrent(&host, &user, &dom);
1995 if (r == 0) { /* end of group */
1996 endnetgrent();
1997 state->mode = COMPAT_NONE;
1998 break;
1999 }
2000 if (!user || !*user)
2001 break;
2002 rv = _passwdcompat_pwscan(&cpw,
2003 cbuf, sizeof(cbuf),
2004 _PW_KEYBYNAME, user, 0);
2005 break;
2006
2007 case COMPAT_USER:
2008 /* get specific user */
2009 if (state->user == NULL) {
2010 state->mode = COMPAT_NONE;
2011 break;
2012 }
2013 rv = _passwdcompat_pwscan(&cpw,
2014 cbuf, sizeof(cbuf),
2015 _PW_KEYBYNAME, state->user, 0);
2016 free(state->user);
2017 state->user = NULL;
2018 state->mode = COMPAT_NONE;
2019 break;
2020
2021 case COMPAT_NOTOKEN:
2022 case COMPAT_NONE:
2023 abort();
2024
2025 }
2026 if (rv != NS_SUCCESS) /* if not matched, next loop */
2027 continue;
2028
2029 /* copy cpw to pw, applying prototype */
2030 if (! _pw_copy(&cpw, pw, buffer, buflen,
2031 &state->proto, state->protoflags)) {
2032 rv = NS_UNAVAIL;
2033 break;
2034 }
2035
2036 if (_compat_is_excluded(state, pw->pw_name))
2037 continue; /* excluded; next loop */
2038
2039 if ((search == _PW_KEYBYNAME
2040 && strcmp(pw->pw_name, name) != 0)
2041 || (search == _PW_KEYBYUID && pw->pw_uid != uid)) {
2042 continue; /* not specific; next loop */
2043 }
2044
2045 break; /* exit loop if found */
2046 } else { /* not a compat line */
2047 state->proto.pw_name = NULL;
2048 /* clear prototype */
2049 }
2050
2051 if (state->mode == COMPAT_NOTOKEN) {
2052 /* no compat token; do direct lookup */
2053 switch (search) {
2054 case _PW_KEYBYNUM:
2055 if (state->keynum == -1) /* no more records */
2056 return NS_NOTFOUND;
2057 state->keynum++;
2058 from = &state->keynum;
2059 fromlen = sizeof(state->keynum);
2060 break;
2061 case _PW_KEYBYNAME:
2062 from = name;
2063 fromlen = strlen(name);
2064 break;
2065 case _PW_KEYBYUID:
2066 from = &uid;
2067 fromlen = sizeof(uid);
2068 break;
2069 default:
2070 abort();
2071 }
2072 buffer[0] = search;
2073 } else {
2074 /* compat token; do line by line */
2075 if (state->keynum == -1) /* no more records */
2076 return NS_NOTFOUND;
2077 state->keynum++;
2078 from = &state->keynum;
2079 fromlen = sizeof(state->keynum);
2080 buffer[0] = _PW_KEYBYNUM;
2081 }
2082
2083 if (buflen <= fromlen) { /* buffer too small */
2084 *retval = ERANGE;
2085 return NS_UNAVAIL;
2086 }
2087 memmove(buffer + 1, from, fromlen); /* setup key */
2088 key.size = fromlen + 1;
2089 key.data = (u_char *)buffer;
2090
2091 rv = _pw_getkey(state->db, &key, pw, buffer, buflen, &pwflags,
2092 state->version);
2093 if (rv != NS_SUCCESS) /* stop on error */
2094 break;
2095
2096 if (state->mode == COMPAT_NOTOKEN)
2097 break; /* stop if no compat token */
2098
2099 if (pw->pw_name[0] == '+') {
2100 /* compat inclusion */
2101 switch(pw->pw_name[1]) {
2102 case '\0': /* `+' */
2103 state->mode = COMPAT_FULL;
2104 /* reset passwd_compat search */
2105 /* XXXREENTRANT: setpassent is not thread safe ? */
2106 (void) _passwdcompat_setpassent(_compat_state.stayopen);
2107 break;
2108 case '@': /* `+@netgroup' */
2109 state->mode = COMPAT_NETGROUP;
2110 /* reset netgroup search */
2111 /* XXXREENTRANT: setnetgrent is not thread safe */
2112 setnetgrent(pw->pw_name + 2);
2113 break;
2114 default: /* `+name' */
2115 state->mode = COMPAT_USER;
2116 if (state->user)
2117 free(state->user);
2118 state->user = strdup(pw->pw_name + 1);
2119 break;
2120 }
2121 /* save the prototype */
2122 state->protoflags = pwflags;
2123 if (! _pw_copy(pw, &state->proto, state->protobuf,
2124 sizeof(state->protobuf), NULL, 0)) {
2125 rv = NS_UNAVAIL;
2126 break;
2127 }
2128 continue; /* loop again after inclusion */
2129 } else if (pw->pw_name[0] == '-') {
2130 /* compat exclusion */
2131 rv = NS_SUCCESS;
2132 switch(pw->pw_name[1]) {
2133 case '\0': /* `-' */
2134 break;
2135 case '@': /* `-@netgroup' */
2136 /* XXXREENTRANT: {set,get,end}netgrent is not thread safe */
2137 setnetgrent(pw->pw_name + 2);
2138 while (getnetgrent(&host, &user, &dom)) {
2139 if (!user || !*user)
2140 continue;
2141 if (! _compat_add_exclude(state,user)) {
2142 rv = NS_UNAVAIL;
2143 break;
2144 }
2145 }
2146 endnetgrent();
2147 break;
2148 default: /* `-name' */
2149 if (! _compat_add_exclude(state,
2150 pw->pw_name + 1)) {
2151 rv = NS_UNAVAIL;
2152 }
2153 break;
2154 }
2155 if (rv != NS_SUCCESS) /* exclusion failure */
2156 break;
2157 continue; /* loop again after exclusion */
2158 }
2159 if (search == _PW_KEYBYNUM ||
2160 (search == _PW_KEYBYUID && pw->pw_uid == uid) ||
2161 (search == _PW_KEYBYNAME && strcmp(pw->pw_name, name) == 0))
2162 break; /* token mode match found */
2163 }
2164
2165 if (rv == NS_NOTFOUND &&
2166 (search == _PW_KEYBYNUM || state->mode != COMPAT_NOTOKEN))
2167 state->keynum = -1; /* flag `no more records' */
2168
2169 if (rv == NS_SUCCESS) {
2170 if ((search == _PW_KEYBYNAME && strcmp(pw->pw_name, name) != 0)
2171 || (search == _PW_KEYBYUID && pw->pw_uid != uid))
2172 rv = NS_NOTFOUND;
2173 }
2174
2175 if (rv != NS_SUCCESS && rv != NS_NOTFOUND)
2176 *retval = errno;
2177 return rv;
2178 }
2179
2180 /*ARGSUSED*/
2181 static int
_compat_setpwent(void * nsrv,void * nscb,va_list ap)2182 _compat_setpwent(void *nsrv, void *nscb, va_list ap)
2183 {
2184
2185 /* force passwd_compat setpwent() */
2186 (void) _passwdcompat_setpassent(0);
2187
2188 /* reset state, keep db open */
2189 _compat_state.stayopen = 0;
2190 return _compat_start(&_compat_state);
2191 }
2192
2193 /*ARGSUSED*/
2194 static int
_compat_setpassent(void * nsrv,void * nscb,va_list ap)2195 _compat_setpassent(void *nsrv, void *nscb, va_list ap)
2196 {
2197 int *retval = va_arg(ap, int *);
2198 int stayopen = va_arg(ap, int);
2199
2200 int rv;
2201
2202 /* force passwd_compat setpassent() */
2203 (void) _passwdcompat_setpassent(stayopen);
2204
2205 _compat_state.stayopen = stayopen;
2206 rv = _compat_start(&_compat_state);
2207 *retval = (rv == NS_SUCCESS);
2208 return rv;
2209 }
2210
2211 /*ARGSUSED*/
2212 static int
_compat_endpwent(void * nsrv,void * nscb,va_list ap)2213 _compat_endpwent(void *nsrv, void *nscb, va_list ap)
2214 {
2215
2216 /* force passwd_compat endpwent() */
2217 (void) _passwdcompat_endpwent();
2218
2219 /* reset state, close db */
2220 _compat_state.stayopen = 0;
2221 return _compat_end(&_compat_state);
2222 }
2223
2224
2225 /*ARGSUSED*/
2226 static int
_compat_getpwent(void * nsrv,void * nscb,va_list ap)2227 _compat_getpwent(void *nsrv, void *nscb, va_list ap)
2228 {
2229 struct passwd **retval = va_arg(ap, struct passwd **);
2230
2231 int rv, rerror;
2232
2233 _DIAGASSERT(retval != NULL);
2234
2235 *retval = NULL;
2236 rv = _compat_pwscan(&rerror, &_compat_passwd,
2237 _compat_passwdbuf, sizeof(_compat_passwdbuf),
2238 &_compat_state, _PW_KEYBYNUM, NULL, 0);
2239 if (rv == NS_SUCCESS)
2240 *retval = &_compat_passwd;
2241 return rv;
2242 }
2243
2244 /*ARGSUSED*/
2245 static int
_compat_getpwent_r(void * nsrv,void * nscb,va_list ap)2246 _compat_getpwent_r(void *nsrv, void *nscb, va_list ap)
2247 {
2248 int *retval = va_arg(ap, int *);
2249 struct passwd *pw = va_arg(ap, struct passwd *);
2250 char *buffer = va_arg(ap, char *);
2251 size_t buflen = va_arg(ap, size_t);
2252 struct passwd **result = va_arg(ap, struct passwd **);
2253
2254 int rv;
2255
2256 _DIAGASSERT(retval != NULL);
2257 _DIAGASSERT(pw != NULL);
2258 _DIAGASSERT(buffer != NULL);
2259 _DIAGASSERT(result != NULL);
2260
2261 rv = _compat_pwscan(retval, pw, buffer, buflen, &_compat_state,
2262 _PW_KEYBYNUM, NULL, 0);
2263 if (rv == NS_SUCCESS)
2264 *result = pw;
2265 else
2266 *result = NULL;
2267 return rv;
2268 }
2269
2270
2271 /*ARGSUSED*/
2272 static int
_compat_getpwnam(void * nsrv,void * nscb,va_list ap)2273 _compat_getpwnam(void *nsrv, void *nscb, va_list ap)
2274 {
2275 struct passwd **retval = va_arg(ap, struct passwd **);
2276 const char *name = va_arg(ap, const char *);
2277
2278 int rv, rerror;
2279
2280 _DIAGASSERT(retval != NULL);
2281
2282 *retval = NULL;
2283 rv = _compat_start(&_compat_state);
2284 if (rv != NS_SUCCESS)
2285 return rv;
2286 rv = _compat_pwscan(&rerror, &_compat_passwd,
2287 _compat_passwdbuf, sizeof(_compat_passwdbuf),
2288 &_compat_state, _PW_KEYBYNAME, name, 0);
2289 if (!_compat_state.stayopen)
2290 _compat_end(&_compat_state);
2291 if (rv == NS_SUCCESS)
2292 *retval = &_compat_passwd;
2293 return rv;
2294 }
2295
2296 /*ARGSUSED*/
2297 static int
_compat_getpwnam_r(void * nsrv,void * nscb,va_list ap)2298 _compat_getpwnam_r(void *nsrv, void *nscb, va_list ap)
2299 {
2300 int *retval = va_arg(ap, int *);
2301 const char *name = va_arg(ap, const char *);
2302 struct passwd *pw = va_arg(ap, struct passwd *);
2303 char *buffer = va_arg(ap, char *);
2304 size_t buflen = va_arg(ap, size_t);
2305 struct passwd **result = va_arg(ap, struct passwd **);
2306
2307 struct compat_state state;
2308 int rv;
2309
2310 _DIAGASSERT(retval != NULL);
2311 _DIAGASSERT(pw != NULL);
2312 _DIAGASSERT(buffer != NULL);
2313 _DIAGASSERT(result != NULL);
2314
2315 *result = NULL;
2316 memset(&state, 0, sizeof(state));
2317 rv = _compat_pwscan(retval, pw, buffer, buflen, &state,
2318 _PW_KEYBYNAME, name, 0);
2319 _compat_end(&state);
2320 if (rv == NS_SUCCESS)
2321 *result = pw;
2322 return rv;
2323 }
2324
2325 /*ARGSUSED*/
2326 static int
_compat_getpwuid(void * nsrv,void * nscb,va_list ap)2327 _compat_getpwuid(void *nsrv, void *nscb, va_list ap)
2328 {
2329 struct passwd **retval = va_arg(ap, struct passwd **);
2330 uid_t uid = va_arg(ap, uid_t);
2331
2332 int rv, rerror;
2333
2334 _DIAGASSERT(retval != NULL);
2335
2336 *retval = NULL;
2337 rv = _compat_start(&_compat_state);
2338 if (rv != NS_SUCCESS)
2339 return rv;
2340 rv = _compat_pwscan(&rerror, &_compat_passwd,
2341 _compat_passwdbuf, sizeof(_compat_passwdbuf),
2342 &_compat_state, _PW_KEYBYUID, NULL, uid);
2343 if (!_compat_state.stayopen)
2344 _compat_end(&_compat_state);
2345 if (rv == NS_SUCCESS)
2346 *retval = &_compat_passwd;
2347 return rv;
2348 }
2349
2350 /*ARGSUSED*/
2351 static int
_compat_getpwuid_r(void * nsrv,void * nscb,va_list ap)2352 _compat_getpwuid_r(void *nsrv, void *nscb, va_list ap)
2353 {
2354 int *retval = va_arg(ap, int *);
2355 uid_t uid = va_arg(ap, uid_t);
2356 struct passwd *pw = va_arg(ap, struct passwd *);
2357 char *buffer = va_arg(ap, char *);
2358 size_t buflen = va_arg(ap, size_t);
2359 struct passwd **result = va_arg(ap, struct passwd **);
2360
2361 struct compat_state state;
2362 int rv;
2363
2364 _DIAGASSERT(retval != NULL);
2365 _DIAGASSERT(pw != NULL);
2366 _DIAGASSERT(buffer != NULL);
2367 _DIAGASSERT(result != NULL);
2368
2369 *result = NULL;
2370 memset(&state, 0, sizeof(state));
2371 rv = _compat_pwscan(retval, pw, buffer, buflen, &state,
2372 _PW_KEYBYUID, NULL, uid);
2373 _compat_end(&state);
2374 if (rv == NS_SUCCESS)
2375 *result = pw;
2376 return rv;
2377 }
2378
2379 #endif /* _PASSWD_COMPAT */
2380
2381
2382 /*
2383 * public functions
2384 */
2385
2386 struct passwd *
getpwent(void)2387 getpwent(void)
2388 {
2389 int r;
2390 struct passwd *retval;
2391
2392 static const ns_dtab dtab[] = {
2393 NS_FILES_CB(_files_getpwent, NULL)
2394 NS_DNS_CB(_dns_getpwent, NULL)
2395 NS_NIS_CB(_nis_getpwent, NULL)
2396 NS_COMPAT_CB(_compat_getpwent, NULL)
2397 NS_NULL_CB
2398 };
2399
2400 mutex_lock(&_pwmutex);
2401 r = nsdispatch(NULL, dtab, NSDB_PASSWD, "getpwent", __nsdefaultcompat,
2402 &retval);
2403 mutex_unlock(&_pwmutex);
2404 return (r == NS_SUCCESS) ? retval : NULL;
2405 }
2406
2407 int
getpwent_r(struct passwd * pwd,char * buffer,size_t buflen,struct passwd ** result)2408 getpwent_r(struct passwd *pwd, char *buffer, size_t buflen,
2409 struct passwd **result)
2410 {
2411 int r, retval;
2412
2413 static const ns_dtab dtab[] = {
2414 NS_FILES_CB(_files_getpwent_r, NULL)
2415 NS_DNS_CB(_dns_getpwent_r, NULL)
2416 NS_NIS_CB(_nis_getpwent_r, NULL)
2417 NS_COMPAT_CB(_compat_getpwent_r, NULL)
2418 NS_NULL_CB
2419 };
2420
2421 _DIAGASSERT(pwd != NULL);
2422 _DIAGASSERT(buffer != NULL);
2423 _DIAGASSERT(result != NULL);
2424
2425 *result = NULL;
2426 retval = 0;
2427 mutex_lock(&_pwmutex);
2428 r = nsdispatch(NULL, dtab, NSDB_PASSWD, "getpwent_r", __nsdefaultcompat,
2429 &retval, pwd, buffer, buflen, result);
2430 mutex_unlock(&_pwmutex);
2431 switch (r) {
2432 case NS_SUCCESS:
2433 case NS_NOTFOUND:
2434 return 0;
2435 default:
2436 return retval;
2437 }
2438 }
2439
2440
2441 struct passwd *
getpwnam(const char * name)2442 getpwnam(const char *name)
2443 {
2444 int rv;
2445 struct passwd *retval;
2446
2447 static const ns_dtab dtab[] = {
2448 NS_FILES_CB(_files_getpwnam, NULL)
2449 NS_DNS_CB(_dns_getpwnam, NULL)
2450 NS_NIS_CB(_nis_getpwnam, NULL)
2451 NS_COMPAT_CB(_compat_getpwnam, NULL)
2452 NS_NULL_CB
2453 };
2454
2455 mutex_lock(&_pwmutex);
2456 rv = nsdispatch(NULL, dtab, NSDB_PASSWD, "getpwnam", __nsdefaultcompat,
2457 &retval, name);
2458 mutex_unlock(&_pwmutex);
2459 return (rv == NS_SUCCESS) ? retval : NULL;
2460 }
2461
2462 int
getpwnam_r(const char * name,struct passwd * pwd,char * buffer,size_t buflen,struct passwd ** result)2463 getpwnam_r(const char *name, struct passwd *pwd, char *buffer, size_t buflen,
2464 struct passwd **result)
2465 {
2466 int r, retval;
2467
2468 static const ns_dtab dtab[] = {
2469 NS_FILES_CB(_files_getpwnam_r, NULL)
2470 NS_DNS_CB(_dns_getpwnam_r, NULL)
2471 NS_NIS_CB(_nis_getpwnam_r, NULL)
2472 NS_COMPAT_CB(_compat_getpwnam_r, NULL)
2473 NS_NULL_CB
2474 };
2475
2476 _DIAGASSERT(name != NULL);
2477 _DIAGASSERT(pwd != NULL);
2478 _DIAGASSERT(buffer != NULL);
2479 _DIAGASSERT(result != NULL);
2480
2481 *result = NULL;
2482 retval = 0;
2483 mutex_lock(&_pwmutex);
2484 r = nsdispatch(NULL, dtab, NSDB_PASSWD, "getpwnam_r", __nsdefaultcompat,
2485 &retval, name, pwd, buffer, buflen, result);
2486 mutex_unlock(&_pwmutex);
2487 switch (r) {
2488 case NS_SUCCESS:
2489 case NS_NOTFOUND:
2490 return 0;
2491 default:
2492 return retval;
2493 }
2494 }
2495
2496 struct passwd *
getpwuid(uid_t uid)2497 getpwuid(uid_t uid)
2498 {
2499 int rv;
2500 struct passwd *retval;
2501
2502 static const ns_dtab dtab[] = {
2503 NS_FILES_CB(_files_getpwuid, NULL)
2504 NS_DNS_CB(_dns_getpwuid, NULL)
2505 NS_NIS_CB(_nis_getpwuid, NULL)
2506 NS_COMPAT_CB(_compat_getpwuid, NULL)
2507 NS_NULL_CB
2508 };
2509
2510 mutex_lock(&_pwmutex);
2511 rv = nsdispatch(NULL, dtab, NSDB_PASSWD, "getpwuid", __nsdefaultcompat,
2512 &retval, uid);
2513 mutex_unlock(&_pwmutex);
2514 return (rv == NS_SUCCESS) ? retval : NULL;
2515 }
2516
2517 int
getpwuid_r(uid_t uid,struct passwd * pwd,char * buffer,size_t buflen,struct passwd ** result)2518 getpwuid_r(uid_t uid, struct passwd *pwd, char *buffer, size_t buflen,
2519 struct passwd **result)
2520 {
2521 int r, retval;
2522
2523 static const ns_dtab dtab[] = {
2524 NS_FILES_CB(_files_getpwuid_r, NULL)
2525 NS_DNS_CB(_dns_getpwuid_r, NULL)
2526 NS_NIS_CB(_nis_getpwuid_r, NULL)
2527 NS_COMPAT_CB(_compat_getpwuid_r, NULL)
2528 NS_NULL_CB
2529 };
2530
2531 _DIAGASSERT(pwd != NULL);
2532 _DIAGASSERT(buffer != NULL);
2533 _DIAGASSERT(result != NULL);
2534
2535 *result = NULL;
2536 retval = 0;
2537 mutex_lock(&_pwmutex);
2538 r = nsdispatch(NULL, dtab, NSDB_PASSWD, "getpwuid_r", __nsdefaultcompat,
2539 &retval, uid, pwd, buffer, buflen, result);
2540 mutex_unlock(&_pwmutex);
2541 switch (r) {
2542 case NS_SUCCESS:
2543 case NS_NOTFOUND:
2544 return 0;
2545 default:
2546 return retval;
2547 }
2548 }
2549
2550 void
endpwent(void)2551 endpwent(void)
2552 {
2553 static const ns_dtab dtab[] = {
2554 NS_FILES_CB(_files_endpwent, NULL)
2555 NS_DNS_CB(_dns_endpwent, NULL)
2556 NS_NIS_CB(_nis_endpwent, NULL)
2557 NS_COMPAT_CB(_compat_endpwent, NULL)
2558 NS_NULL_CB
2559 };
2560
2561 mutex_lock(&_pwmutex);
2562 /* force all endpwent() methods */
2563 (void) nsdispatch(NULL, dtab, NSDB_PASSWD, "endpwent",
2564 __nsdefaultcompat_forceall);
2565 mutex_unlock(&_pwmutex);
2566 }
2567
2568 /*ARGSUSED*/
2569 int
setpassent(int stayopen)2570 setpassent(int stayopen)
2571 {
2572 static const ns_dtab dtab[] = {
2573 NS_FILES_CB(_files_setpassent, NULL)
2574 NS_DNS_CB(_dns_setpassent, NULL)
2575 NS_NIS_CB(_nis_setpassent, NULL)
2576 NS_COMPAT_CB(_compat_setpassent, NULL)
2577 NS_NULL_CB
2578 };
2579 int rv, retval;
2580
2581 mutex_lock(&_pwmutex);
2582 /* force all setpassent() methods */
2583 rv = nsdispatch(NULL, dtab, NSDB_PASSWD, "setpassent",
2584 __nsdefaultcompat_forceall, &retval, stayopen);
2585 mutex_unlock(&_pwmutex);
2586 return (rv == NS_SUCCESS) ? retval : 0;
2587 }
2588
2589 void
setpwent(void)2590 setpwent(void)
2591 {
2592 static const ns_dtab dtab[] = {
2593 NS_FILES_CB(_files_setpwent, NULL)
2594 NS_DNS_CB(_dns_setpwent, NULL)
2595 NS_NIS_CB(_nis_setpwent, NULL)
2596 NS_COMPAT_CB(_compat_setpwent, NULL)
2597 NS_NULL_CB
2598 };
2599
2600 mutex_lock(&_pwmutex);
2601 /* force all setpwent() methods */
2602 (void) nsdispatch(NULL, dtab, NSDB_PASSWD, "setpwent",
2603 __nsdefaultcompat_forceall);
2604 mutex_unlock(&_pwmutex);
2605 }
2606