xref: /netbsd-src/lib/libc/gen/getpwent.c (revision 20e85ad185ab16980f1219a557c42e057edb42ea)
1 /*	$NetBSD: getpwent.c,v 1.67 2005/04/02 04:53:53 christos Exp $	*/
2 
3 /*-
4  * Copyright (c) 1997-2000, 2004-2005 The NetBSD Foundation, Inc.
5  * All rights reserved.
6  *
7  * This code is derived from software contributed to The NetBSD Foundation
8  * by Luke Mewburn.
9  *
10  * Redistribution and use in source and binary forms, with or without
11  * modification, are permitted provided that the following conditions
12  * are met:
13  * 1. Redistributions of source code must retain the above copyright
14  *    notice, this list of conditions and the following disclaimer.
15  * 2. Redistributions in binary form must reproduce the above copyright
16  *    notice, this list of conditions and the following disclaimer in the
17  *    documentation and/or other materials provided with the distribution.
18  * 3. All advertising materials mentioning features or use of this software
19  *    must display the following acknowledgement:
20  *	This product includes software developed by the NetBSD
21  *	Foundation, Inc. and its contributors.
22  * 4. Neither the name of The NetBSD Foundation nor the names of its
23  *    contributors may be used to endorse or promote products derived
24  *    from this software without specific prior written permission.
25  *
26  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
27  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
28  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
29  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
30  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
31  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
32  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
33  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
34  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
35  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
36  * POSSIBILITY OF SUCH DAMAGE.
37  */
38 
39 /*
40  * Copyright (c) 1988, 1993
41  *	The Regents of the University of California.  All rights reserved.
42  *
43  * Redistribution and use in source and binary forms, with or without
44  * modification, are permitted provided that the following conditions
45  * are met:
46  * 1. Redistributions of source code must retain the above copyright
47  *    notice, this list of conditions and the following disclaimer.
48  * 2. Redistributions in binary form must reproduce the above copyright
49  *    notice, this list of conditions and the following disclaimer in the
50  *    documentation and/or other materials provided with the distribution.
51  * 3. Neither the name of the University nor the names of its contributors
52  *    may be used to endorse or promote products derived from this software
53  *    without specific prior written permission.
54  *
55  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
56  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
57  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
58  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
59  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
60  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
61  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
62  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
63  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
64  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
65  * SUCH DAMAGE.
66  */
67 
68 /*
69  * Portions Copyright (c) 1994, 1995, Jason Downs.  All rights reserved.
70  *
71  * Redistribution and use in source and binary forms, with or without
72  * modification, are permitted provided that the following conditions
73  * are met:
74  * 1. Redistributions of source code must retain the above copyright
75  *    notice, this list of conditions and the following disclaimer.
76  * 2. Redistributions in binary form must reproduce the above copyright
77  *    notice, this list of conditions and the following disclaimer in the
78  *    documentation and/or other materials provided with the distribution.
79  *
80  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR(S) ``AS IS'' AND ANY EXPRESS
81  * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
82  * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
83  * DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR(S) BE LIABLE FOR ANY DIRECT,
84  * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
85  * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
86  * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
87  * CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
88  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
89  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
90  * SUCH DAMAGE.
91  */
92 
93 #include <sys/cdefs.h>
94 #if defined(LIBC_SCCS) && !defined(lint)
95 #if 0
96 static char sccsid[] = "@(#)getpwent.c	8.2 (Berkeley) 4/27/95";
97 #else
98 __RCSID("$NetBSD: getpwent.c,v 1.67 2005/04/02 04:53:53 christos Exp $");
99 #endif
100 #endif /* LIBC_SCCS and not lint */
101 
102 #include "namespace.h"
103 #include "reentrant.h"
104 
105 #include <sys/param.h>
106 
107 #include <assert.h>
108 #include <db.h>
109 #include <errno.h>
110 #include <fcntl.h>
111 #include <limits.h>
112 #include <netgroup.h>
113 #include <nsswitch.h>
114 #include <pwd.h>
115 #include <stdarg.h>
116 #include <stdio.h>
117 #include <stdlib.h>
118 #include <string.h>
119 #include <syslog.h>
120 #include <unistd.h>
121 
122 #ifdef HESIOD
123 #include <hesiod.h>
124 #endif
125 
126 #ifdef YP
127 #include <machine/param.h>
128 #include <rpc/rpc.h>
129 #include <rpcsvc/yp_prot.h>
130 #include <rpcsvc/ypclnt.h>
131 #endif
132 
133 #include "pw_private.h"
134 
135 #define	_PASSWD_COMPAT	/* "passwd" defaults to compat, so always provide it */
136 
137 #ifdef __weak_alias
138 __weak_alias(endpwent,_endpwent)
139 __weak_alias(getpwent,_getpwent)
140 __weak_alias(getpwent_r,_getpwent_r)
141 __weak_alias(getpwnam,_getpwnam)
142 __weak_alias(getpwnam_r,_getpwnam_r)
143 __weak_alias(getpwuid,_getpwuid)
144 __weak_alias(getpwuid_r,_getpwuid_r)
145 __weak_alias(setpassent,_setpassent)
146 __weak_alias(setpwent,_setpwent)
147 #endif
148 
149 #ifdef _REENTRANT
150 static 	mutex_t			_pwmutex = MUTEX_INITIALIZER;
151 #endif
152 
153 const char __yp_token[] = "__YP!";	/* Let pwd_mkdb pull this in. */
154 
155 
156 /*
157  * The pwd.db lookup techniques and data extraction code here must be kept
158  * in sync with that in `pwd_mkdb'.
159  */
160 
161 #if defined(YP) || defined(HESIOD)
162 /*
163  * _pw_parse
164  *	Parses entry using pw_scan(3) (without the trailing \n)
165  *	after copying to buf, and fills in pw with corresponding values.
166  *	If old is non-zero, entry is in _PASSWORD_OLDFMT.
167  *	Returns 1 if parsed successfully, 0 on parse failure.
168  */
169 static int
170 _pw_parse(const char *entry, struct passwd *pw, char *buf, size_t buflen,
171 	int old)
172 {
173 	int	flags;
174 
175 	_DIAGASSERT(entry != NULL);
176 	_DIAGASSERT(pw != NULL);
177 	_DIAGASSERT(buf != NULL);
178 
179 	if (strlcpy(buf, entry, buflen) >= buflen)
180 		return 0;
181 	flags = _PASSWORD_NOWARN;
182 	if (old)
183 		flags |= _PASSWORD_OLDFMT;
184 	return __pw_scan(buf, pw, &flags);
185 }
186 #endif /* YP || HESIOD */
187 
188 /*
189  * _pw_opendb
190  *	if *db is NULL, dbopen(3) /etc/spwd.db or /etc/pwd.db (depending
191  *	upon permissions, etc)
192  */
193 static int
194 _pw_opendb(DB **db)
195 {
196 	static int	warned;
197 
198 	const char	*dbfile;
199 
200 	_DIAGASSERT(db != NULL);
201 	if (*db != NULL)					/* open *db */
202 		return NS_SUCCESS;
203 
204 	if (geteuid() == 0) {
205 		dbfile = _PATH_SMP_DB;
206 		*db = dbopen(dbfile, O_RDONLY, 0, DB_HASH, NULL);
207 	}
208 	if (*db == NULL) {
209 		dbfile = _PATH_MP_DB;
210 		*db = dbopen(dbfile, O_RDONLY, 0, DB_HASH, NULL);
211 	}
212 	if (*db == NULL) {
213 		if (!warned) {
214 			int	serrno = errno;
215 			syslog(LOG_ERR, "%s: %m", dbfile);
216 			errno = serrno;
217 		}
218 		warned = 1;
219 		return NS_UNAVAIL;
220 	}
221 	return NS_SUCCESS;
222 }
223 
224 /*
225  * _pw_getkey
226  *	Lookup key in *db, filling in pw
227  *	with the result, allocating memory from buffer (size buflen).
228  *	(The caller may point key.data to buffer on entry; the contents
229  *	of key.data will be invalid on exit.)
230  */
231 static int
232 _pw_getkey(DB *db, DBT *key,
233 	struct passwd *pw, char *buffer, size_t buflen, int *pwflags)
234 {
235 	char		*p, *t;
236 	DBT		data;
237 
238 	_DIAGASSERT(db != NULL);
239 	_DIAGASSERT(key != NULL);
240 	_DIAGASSERT(pw != NULL);
241 	_DIAGASSERT(buffer != NULL);
242 	/* pwflags may be NULL (if we don't care about them */
243 
244 	if (db == NULL)			/* this shouldn't happen */
245 		return NS_UNAVAIL;
246 
247 	switch ((db->get)(db, key, &data, 0)) {
248 	case 0:
249 		break;			/* found */
250 	case 1:
251 		return NS_NOTFOUND;
252 	case -1:
253 		return NS_UNAVAIL;	/* error in db routines */
254 	default:
255 		abort();
256 	}
257 
258 	p = (char *)data.data;
259 	if (data.size > buflen) {
260 		errno = ERANGE;
261 		return NS_UNAVAIL;
262 	}
263 
264 			/*
265 			 * THE DECODING BELOW MUST MATCH THAT IN pwd_mkdb.
266 			 */
267 	t = buffer;
268 #define	EXPAND(e)	e = t; while ((*t++ = *p++));
269 #define	SCALAR(v)	memmove(&(v), p, sizeof v); p += sizeof v
270 	EXPAND(pw->pw_name);
271 	EXPAND(pw->pw_passwd);
272 	SCALAR(pw->pw_uid);
273 	SCALAR(pw->pw_gid);
274 	SCALAR(pw->pw_change);
275 	EXPAND(pw->pw_class);
276 	EXPAND(pw->pw_gecos);
277 	EXPAND(pw->pw_dir);
278 	EXPAND(pw->pw_shell);
279 	SCALAR(pw->pw_expire);
280 	if (pwflags) {
281 		/* See if there's any data left.  If so, read in flags. */
282 		if (data.size > (size_t) (p - (char *)data.data)) {
283 			SCALAR(*pwflags);
284 		} else {				/* default */
285 			*pwflags = _PASSWORD_NOUID|_PASSWORD_NOGID;
286 		}
287 	}
288 
289 	return NS_SUCCESS;
290 }
291 
292 /*
293  * _pw_memfrombuf
294  *	Obtain want bytes from buffer (of size buflen) and return a pointer
295  *	to the available memory after adjusting buffer/buflen.
296  *	Returns NULL if there is insufficient space.
297  */
298 static char *
299 _pw_memfrombuf(size_t want, char **buffer, size_t *buflen)
300 {
301 	char	*rv;
302 
303 	if (want > *buflen) {
304 		errno = ERANGE;
305 		return NULL;
306 	}
307 	rv = *buffer;
308 	*buffer += want;
309 	*buflen -= want;
310 	return rv;
311 }
312 
313 /*
314  * _pw_copy
315  *	Copy the contents of frompw to pw; memory for strings
316  *	and arrays will be allocated from buf (of size buflen).
317  *	If proto != NULL, use various fields in proto in preference to frompw.
318  *	Returns 1 if copied successfully, 0 on copy failure.
319  *	NOTE: frompw must not use buf for its own pointers.
320  */
321 static int
322 _pw_copy(const struct passwd *frompw, struct passwd *pw,
323 	char *buf, size_t buflen, const struct passwd *protopw, int protoflags)
324 {
325 	size_t	count;
326 	int	useproto;
327 
328 	_DIAGASSERT(frompw != NULL);
329 	_DIAGASSERT(pw != NULL);
330 	_DIAGASSERT(buf != NULL);
331 	/* protopw may be NULL */
332 
333 	useproto = protopw && protopw->pw_name;
334 
335 #define	COPYSTR(to, from) \
336 	do { \
337 		count = strlen((from)); \
338 		(to) = _pw_memfrombuf(count+1, &buf, &buflen); \
339 		if ((to) == NULL) \
340 			return 0; \
341 		memmove((to), (from), count); \
342 		to[count] = '\0'; \
343 	} while (0)	/* LINTED */
344 
345 #define	COPYFIELD(field)	COPYSTR(pw->field, frompw->field)
346 
347 #define	COPYPROTOFIELD(field)	COPYSTR(pw->field, \
348 		(useproto && *protopw->field ? protopw->field : frompw->field))
349 
350 	COPYFIELD(pw_name);
351 
352 #ifdef PW_OVERRIDE_PASSWD
353 	COPYPROTOFIELD(pw_passwd);
354 #else
355 	COPYFIELD(pw_passwd);
356 #endif
357 
358 	if (useproto && !(protoflags & _PASSWORD_NOUID))
359 		pw->pw_uid = protopw->pw_uid;
360 	else
361 		pw->pw_uid = frompw->pw_uid;
362 
363 	if (useproto && !(protoflags & _PASSWORD_NOGID))
364 		pw->pw_gid = protopw->pw_gid;
365 	else
366 		pw->pw_gid = frompw->pw_gid;
367 
368 	pw->pw_change = frompw->pw_change;
369 	COPYFIELD(pw_class);
370 	COPYPROTOFIELD(pw_gecos);
371 	COPYPROTOFIELD(pw_dir);
372 	COPYPROTOFIELD(pw_shell);
373 
374 #undef COPYSTR
375 #undef COPYFIELD
376 #undef COPYPROTOFIELD
377 
378 	return 1;
379 }
380 
381 
382 		/*
383 		 *	files methods
384 		 */
385 
386 	/* state shared between files methods */
387 struct files_state {
388 	int	 stayopen;		/* see getpassent(3) */
389 	DB	*db;			/* passwd file handle */
390 	int	 keynum;		/* key counter, -1 if no more */
391 };
392 
393 static struct files_state	_files_state;
394 					/* storage for non _r functions */
395 static struct passwd		_files_passwd;
396 static char			_files_passwdbuf[_GETPW_R_SIZE_MAX];
397 
398 static int
399 _files_start(struct files_state *state)
400 {
401 	int	rv;
402 
403 	_DIAGASSERT(state != NULL);
404 
405 	state->keynum = 0;
406 	rv = _pw_opendb(&state->db);
407 	if (rv != NS_SUCCESS)
408 		return rv;
409 	return NS_SUCCESS;
410 }
411 
412 static int
413 _files_end(struct files_state *state)
414 {
415 
416 	_DIAGASSERT(state != NULL);
417 
418 	state->keynum = 0;
419 	if (state->db) {
420 		(void)(state->db->close)(state->db);
421 		state->db = NULL;
422 	}
423 	return NS_SUCCESS;
424 }
425 
426 /*
427  * _files_pwscan
428  *	Search state->db for the next desired entry.
429  *	If search is _PW_KEYBYNUM, look for state->keynum.
430  *	If search is _PW_KEYBYNAME, look for name.
431  *	If search is _PW_KEYBYUID, look for uid.
432  *	Sets *retval to the errno if the result is not NS_SUCCESS.
433  */
434 static int
435 _files_pwscan(int *retval, struct passwd *pw, char *buffer, size_t buflen,
436 	struct files_state *state, int search, const char *name, uid_t uid)
437 {
438 	const void	*from;
439 	size_t		 fromlen;
440 	DBT		 key;
441 	int		 rv;
442 
443 	_DIAGASSERT(retval != NULL);
444 	_DIAGASSERT(pw != NULL);
445 	_DIAGASSERT(buffer != NULL);
446 	_DIAGASSERT(state != NULL);
447 	/* name is NULL to indicate searching for uid */
448 
449 	*retval = 0;
450 
451 	if (state->db == NULL) {	/* only start if file not open yet */
452 		rv = _files_start(state);
453 		if (rv != NS_SUCCESS)
454 			goto filespwscan_out;
455 	}
456 
457 	for (;;) {				/* search for a match */
458 		switch (search) {
459 		case _PW_KEYBYNUM:
460 			if (state->keynum == -1)
461 				return NS_NOTFOUND;	/* no more records */
462 			state->keynum++;
463 			from = &state->keynum;
464 			fromlen = sizeof(state->keynum);
465 			break;
466 		case _PW_KEYBYNAME:
467 			from = name;
468 			fromlen = strlen(name);
469 			break;
470 		case _PW_KEYBYUID:
471 			from = &uid;
472 			fromlen = sizeof(uid);
473 			break;
474 		default:
475 			abort();
476 		}
477 
478 		if (buflen <= fromlen) {		/* buffer too small */
479 			*retval = ERANGE;
480 			return NS_UNAVAIL;
481 		}
482 		buffer[0] = search;			/* setup key */
483 		memmove(buffer + 1, from, fromlen);
484 		key.size = fromlen + 1;
485 		key.data = (u_char *)buffer;
486 
487 							/* search for key */
488 		rv = _pw_getkey(state->db, &key, pw, buffer, buflen, NULL);
489 		if (rv != NS_SUCCESS)			/* no match */
490 			break;
491 		if (pw->pw_name[0] == '+' || pw->pw_name[0] == '-') {
492 						/* if a compat line */
493 			if (search == _PW_KEYBYNUM)
494 				continue;	/* read next if pwent */
495 			rv = NS_NOTFOUND;	/* don't match if pw{nam,uid} */
496 			break;
497 		}
498 		break;
499 	}
500 
501 	if (rv == NS_NOTFOUND && search == _PW_KEYBYNUM)
502 		state->keynum = -1;		/* flag `no more records' */
503 
504 	if (rv == NS_SUCCESS) {
505 		if ((search == _PW_KEYBYUID && pw->pw_uid != uid) ||
506 		    (search == _PW_KEYBYNAME && strcmp(pw->pw_name, name) != 0))
507 			rv = NS_NOTFOUND;
508 	}
509 
510  filespwscan_out:
511 	if (rv != NS_SUCCESS)
512 		*retval = errno;
513 	return rv;
514 }
515 
516 /*ARGSUSED*/
517 static int
518 _files_setpwent(void *nsrv, void *nscb, va_list ap)
519 {
520 
521 	_files_state.stayopen = 0;
522 	return _files_start(&_files_state);
523 }
524 
525 /*ARGSUSED*/
526 static int
527 _files_setpassent(void *nsrv, void *nscb, va_list ap)
528 {
529 	int	*retval		= va_arg(ap, int *);
530 	int	 stayopen	= va_arg(ap, int);
531 
532 	int	rv;
533 
534 	_files_state.stayopen = stayopen;
535 	rv = _files_start(&_files_state);
536 	*retval = (rv == NS_SUCCESS);
537 	return rv;
538 }
539 
540 /*ARGSUSED*/
541 static int
542 _files_endpwent(void *nsrv, void *nscb, va_list ap)
543 {
544 
545 	_files_state.stayopen = 0;
546 	return _files_end(&_files_state);
547 }
548 
549 /*ARGSUSED*/
550 static int
551 _files_getpwent(void *nsrv, void *nscb, va_list ap)
552 {
553 	struct passwd	**retval = va_arg(ap, struct passwd **);
554 
555 	int	rv, rerror;
556 
557 	_DIAGASSERT(retval != NULL);
558 
559 	*retval = NULL;
560 	rv = _files_pwscan(&rerror, &_files_passwd,
561 	    _files_passwdbuf, sizeof(_files_passwdbuf),
562 	    &_files_state, _PW_KEYBYNUM, NULL, 0);
563 	if (rv == NS_SUCCESS)
564 		*retval = &_files_passwd;
565 	return rv;
566 }
567 
568 /*ARGSUSED*/
569 static int
570 _files_getpwent_r(void *nsrv, void *nscb, va_list ap)
571 {
572 	int		*retval	= va_arg(ap, int *);
573 	struct passwd	*pw	= va_arg(ap, struct passwd *);
574 	char		*buffer	= va_arg(ap, char *);
575 	size_t		 buflen	= va_arg(ap, size_t);
576 	struct passwd  **result	= va_arg(ap, struct passwd **);
577 
578 	int	rv;
579 
580 	_DIAGASSERT(retval != NULL);
581 	_DIAGASSERT(pw != NULL);
582 	_DIAGASSERT(buffer != NULL);
583 	_DIAGASSERT(result != NULL);
584 
585 	rv = _files_pwscan(retval, pw, buffer, buflen, &_files_state,
586 	    _PW_KEYBYNUM, NULL, 0);
587 	if (rv == NS_SUCCESS)
588 		*result = pw;
589 	else
590 		*result = NULL;
591 	return rv;
592 }
593 
594 /*ARGSUSED*/
595 static int
596 _files_getpwnam(void *nsrv, void *nscb, va_list ap)
597 {
598 	struct passwd	**retval = va_arg(ap, struct passwd **);
599 	const char	*name	= va_arg(ap, const char *);
600 
601 	int	rv, rerror;
602 
603 	_DIAGASSERT(retval != NULL);
604 
605 	*retval = NULL;
606 	rv = _files_start(&_files_state);
607 	if (rv != NS_SUCCESS)
608 		return rv;
609 	rv = _files_pwscan(&rerror, &_files_passwd,
610 	    _files_passwdbuf, sizeof(_files_passwdbuf),
611 	    &_files_state, _PW_KEYBYNAME, name, 0);
612 	if (!_files_state.stayopen)
613 		_files_end(&_files_state);
614 	if (rv == NS_SUCCESS)
615 		*retval = &_files_passwd;
616 	return rv;
617 }
618 
619 /*ARGSUSED*/
620 static int
621 _files_getpwnam_r(void *nsrv, void *nscb, va_list ap)
622 {
623 	int		*retval	= va_arg(ap, int *);
624 	const char	*name	= va_arg(ap, const char *);
625 	struct passwd	*pw	= va_arg(ap, struct passwd *);
626 	char		*buffer	= va_arg(ap, char *);
627 	size_t		 buflen	= va_arg(ap, size_t);
628 	struct passwd  **result	= va_arg(ap, struct passwd **);
629 
630 	struct files_state state;
631 	int	rv;
632 
633 	_DIAGASSERT(retval != NULL);
634 	_DIAGASSERT(pw != NULL);
635 	_DIAGASSERT(buffer != NULL);
636 	_DIAGASSERT(result != NULL);
637 
638 	*result = NULL;
639 	memset(&state, 0, sizeof(state));
640 	rv = _files_pwscan(retval, pw, buffer, buflen, &state,
641 	    _PW_KEYBYNAME, name, 0);
642 	_files_end(&state);
643 	if (rv == NS_SUCCESS)
644 		*result = pw;
645 	return rv;
646 }
647 
648 /*ARGSUSED*/
649 static int
650 _files_getpwuid(void *nsrv, void *nscb, va_list ap)
651 {
652 	struct passwd	**retval = va_arg(ap, struct passwd **);
653 	uid_t		 uid	= va_arg(ap, uid_t);
654 
655 	int	rv, rerror;
656 
657 	_DIAGASSERT(retval != NULL);
658 
659 	*retval = NULL;
660 	rv = _files_start(&_files_state);
661 	if (rv != NS_SUCCESS)
662 		return rv;
663 	rv = _files_pwscan(&rerror, &_files_passwd,
664 	    _files_passwdbuf, sizeof(_files_passwdbuf),
665 	    &_files_state, _PW_KEYBYUID, NULL, uid);
666 	if (!_files_state.stayopen)
667 		_files_end(&_files_state);
668 	if (rv == NS_SUCCESS)
669 		*retval = &_files_passwd;
670 	return rv;
671 }
672 
673 /*ARGSUSED*/
674 static int
675 _files_getpwuid_r(void *nsrv, void *nscb, va_list ap)
676 {
677 	int		*retval	= va_arg(ap, int *);
678 	uid_t		 uid	= va_arg(ap, uid_t);
679 	struct passwd	*pw	= va_arg(ap, struct passwd *);
680 	char		*buffer	= va_arg(ap, char *);
681 	size_t		 buflen	= va_arg(ap, size_t);
682 	struct passwd  **result	= va_arg(ap, struct passwd **);
683 
684 	struct files_state state;
685 	int	rv;
686 
687 	_DIAGASSERT(retval != NULL);
688 	_DIAGASSERT(pw != NULL);
689 	_DIAGASSERT(buffer != NULL);
690 	_DIAGASSERT(result != NULL);
691 
692 	*result = NULL;
693 	memset(&state, 0, sizeof(state));
694 	rv = _files_pwscan(retval, pw, buffer, buflen, &state,
695 	    _PW_KEYBYUID, NULL, uid);
696 	_files_end(&state);
697 	if (rv == NS_SUCCESS)
698 		*result = pw;
699 	return rv;
700 }
701 
702 
703 #ifdef HESIOD
704 		/*
705 		 *	dns methods
706 		 */
707 
708 	/* state shared between dns methods */
709 struct dns_state {
710 	int	 stayopen;		/* see getpassent(3) */
711 	void	*context;		/* Hesiod context */
712 	int	 num;			/* passwd index, -1 if no more */
713 };
714 
715 static struct dns_state		_dns_state;
716 					/* storage for non _r functions */
717 static struct passwd		_dns_passwd;
718 static char			_dns_passwdbuf[_GETPW_R_SIZE_MAX];
719 
720 static int
721 _dns_start(struct dns_state *state)
722 {
723 
724 	_DIAGASSERT(state != NULL);
725 
726 	state->num = 0;
727 	if (state->context == NULL) {			/* setup Hesiod */
728 		if (hesiod_init(&state->context) == -1)
729 			return NS_UNAVAIL;
730 	}
731 
732 	return NS_SUCCESS;
733 }
734 
735 static int
736 _dns_end(struct dns_state *state)
737 {
738 
739 	_DIAGASSERT(state != NULL);
740 
741 	state->num = 0;
742 	if (state->context) {
743 		hesiod_end(state->context);
744 		state->context = NULL;
745 	}
746 	return NS_SUCCESS;
747 }
748 
749 /*
750  * _dns_pwscan
751  *	Look for the Hesiod name provided in buffer in the NULL-terminated
752  *	list of zones,
753  *	and decode into pw/buffer/buflen.
754  */
755 static int
756 _dns_pwscan(int *retval, struct passwd *pw, char *buffer, size_t buflen,
757 	struct dns_state *state, const char **zones)
758 {
759 	const char	**curzone;
760 	char		**hp, *ep;
761 	int		rv;
762 
763 	_DIAGASSERT(retval != NULL);
764 	_DIAGASSERT(pw != NULL);
765 	_DIAGASSERT(buffer != NULL);
766 	_DIAGASSERT(state != NULL);
767 	_DIAGASSERT(zones != NULL);
768 
769 	*retval = 0;
770 
771 	if (state->context == NULL) {	/* only start if Hesiod not setup */
772 		rv = _dns_start(state);
773 		if (rv != NS_SUCCESS)
774 			return rv;
775 	}
776 
777 	hp = NULL;
778 	rv = NS_NOTFOUND;
779 
780 	for (curzone = zones; *curzone; curzone++) {	/* search zones */
781 		hp = hesiod_resolve(state->context, buffer, *curzone);
782 		if (hp != NULL)
783 			break;
784 		if (errno != ENOENT) {
785 			rv = NS_UNAVAIL;
786 			goto dnspwscan_out;
787 		}
788 	}
789 	if (*curzone == NULL)
790 		goto dnspwscan_out;
791 
792 	if ((ep = strchr(hp[0], '\n')) != NULL)
793 		*ep = '\0';				/* clear trailing \n */
794 	if (_pw_parse(hp[0], pw, buffer, buflen, 1))	/* validate line */
795 		rv = NS_SUCCESS;
796 	else
797 		rv = NS_UNAVAIL;
798 
799  dnspwscan_out:
800 	if (rv != NS_SUCCESS)
801 		*retval = errno;
802 	if (hp)
803 		hesiod_free_list(state->context, hp);
804 	return rv;
805 }
806 
807 /*ARGSUSED*/
808 static int
809 _dns_setpwent(void *nsrv, void *nscb, va_list ap)
810 {
811 
812 	_dns_state.stayopen = 0;
813 	return _dns_start(&_dns_state);
814 }
815 
816 /*ARGSUSED*/
817 static int
818 _dns_setpassent(void *nsrv, void *nscb, va_list ap)
819 {
820 	int	*retval		= va_arg(ap, int *);
821 	int	 stayopen	= va_arg(ap, int);
822 
823 	int	rv;
824 
825 	_dns_state.stayopen = stayopen;
826 	rv = _dns_start(&_dns_state);
827 	*retval = (rv == NS_SUCCESS);
828 	return rv;
829 }
830 
831 /*ARGSUSED*/
832 static int
833 _dns_endpwent(void *nsrv, void *nscb, va_list ap)
834 {
835 
836 	_dns_state.stayopen = 0;
837 	return _dns_end(&_dns_state);
838 }
839 
840 /*ARGSUSED*/
841 static int
842 _dns_getpwent(void *nsrv, void *nscb, va_list ap)
843 {
844 	struct passwd	**retval = va_arg(ap, struct passwd **);
845 
846 	char	**hp, *ep;
847 	int	  rv;
848 
849 	_DIAGASSERT(retval != NULL);
850 
851 	*retval = NULL;
852 
853 	if (_dns_state.num == -1)			/* exhausted search */
854 		return NS_NOTFOUND;
855 
856 	if (_dns_state.context == NULL) {
857 			/* only start if Hesiod not setup */
858 		rv = _dns_start(&_dns_state);
859 		if (rv != NS_SUCCESS)
860 			return rv;
861 	}
862 
863  next_dns_entry:
864 	hp = NULL;
865 	rv = NS_NOTFOUND;
866 
867 							/* find passwd-NNN */
868 	snprintf(_dns_passwdbuf, sizeof(_dns_passwdbuf),
869 	    "passwd-%u", _dns_state.num);
870 	_dns_state.num++;
871 
872 	hp = hesiod_resolve(_dns_state.context, _dns_passwdbuf, "passwd");
873 	if (hp == NULL) {
874 		if (errno == ENOENT)
875 			_dns_state.num = -1;
876 		else
877 			rv = NS_UNAVAIL;
878 	} else {
879 		if ((ep = strchr(hp[0], '\n')) != NULL)
880 			*ep = '\0';			/* clear trailing \n */
881 							/* validate line */
882 		if (_pw_parse(hp[0], &_dns_passwd,
883 		    _dns_passwdbuf, sizeof(_dns_passwdbuf), 1))
884 			rv = NS_SUCCESS;
885 		else {				/* dodgy entry, try again */
886 			hesiod_free_list(_dns_state.context, hp);
887 			goto next_dns_entry;
888 		}
889 	}
890 
891 	if (hp)
892 		hesiod_free_list(_dns_state.context, hp);
893 	if (rv == NS_SUCCESS)
894 		*retval = &_dns_passwd;
895 	return rv;
896 }
897 
898 /*ARGSUSED*/
899 static int
900 _dns_getpwent_r(void *nsrv, void *nscb, va_list ap)
901 {
902 	int		*retval	= va_arg(ap, int *);
903 	struct passwd	*pw	= va_arg(ap, struct passwd *);
904 	char		*buffer	= va_arg(ap, char *);
905 	size_t		 buflen	= va_arg(ap, size_t);
906 	struct passwd  **result	= va_arg(ap, struct passwd **);
907 
908 	char	**hp, *ep;
909 	int	  rv;
910 
911 	_DIAGASSERT(retval != NULL);
912 	_DIAGASSERT(pw != NULL);
913 	_DIAGASSERT(buffer != NULL);
914 	_DIAGASSERT(result != NULL);
915 
916 	*retval = 0;
917 
918 	if (_dns_state.num == -1)			/* exhausted search */
919 		return NS_NOTFOUND;
920 
921 	if (_dns_state.context == NULL) {
922 			/* only start if Hesiod not setup */
923 		rv = _dns_start(&_dns_state);
924 		if (rv != NS_SUCCESS)
925 			return rv;
926 	}
927 
928  next_dns_entry:
929 	hp = NULL;
930 	rv = NS_NOTFOUND;
931 
932 							/* find passwd-NNN */
933 	snprintf(buffer, buflen, "passwd-%u", _dns_state.num);
934 	_dns_state.num++;
935 
936 	hp = hesiod_resolve(_dns_state.context, buffer, "passwd");
937 	if (hp == NULL) {
938 		if (errno == ENOENT)
939 			_dns_state.num = -1;
940 		else
941 			rv = NS_UNAVAIL;
942 	} else {
943 		if ((ep = strchr(hp[0], '\n')) != NULL)
944 			*ep = '\0';			/* clear trailing \n */
945 							/* validate line */
946 		if (_pw_parse(hp[0], pw, buffer, buflen, 1))
947 			rv = NS_SUCCESS;
948 		else {				/* dodgy entry, try again */
949 			hesiod_free_list(_dns_state.context, hp);
950 			goto next_dns_entry;
951 		}
952 	}
953 
954 	if (hp)
955 		hesiod_free_list(_dns_state.context, hp);
956 	if (rv == NS_SUCCESS)
957 		*result = pw;
958 	else
959 		*result = NULL;
960 	return rv;
961 }
962 
963 static const char *_dns_uid_zones[] = {
964 	"uid",
965 	"passwd",
966 	NULL
967 };
968 
969 /*ARGSUSED*/
970 static int
971 _dns_getpwuid(void *nsrv, void *nscb, va_list ap)
972 {
973 	struct passwd	**retval = va_arg(ap, struct passwd **);
974 	uid_t		 uid	= va_arg(ap, uid_t);
975 
976 	int	rv, rerror;
977 
978 	_DIAGASSERT(retval != NULL);
979 
980 	*retval = NULL;
981 	rv = _dns_start(&_dns_state);
982 	if (rv != NS_SUCCESS)
983 		return rv;
984 	snprintf(_dns_passwdbuf, sizeof(_dns_passwdbuf),
985 	    "%u", (unsigned int)uid);
986 	rv = _dns_pwscan(&rerror, &_dns_passwd,
987 	    _dns_passwdbuf, sizeof(_dns_passwdbuf),
988 	    &_dns_state, _dns_uid_zones);
989 	if (!_dns_state.stayopen)
990 		_dns_end(&_dns_state);
991 	if (rv == NS_SUCCESS && uid == _dns_passwd.pw_uid)
992 		*retval = &_dns_passwd;
993 	return rv;
994 }
995 
996 /*ARGSUSED*/
997 static int
998 _dns_getpwuid_r(void *nsrv, void *nscb, va_list ap)
999 {
1000 	int		*retval	= va_arg(ap, int *);
1001 	uid_t		 uid	= va_arg(ap, uid_t);
1002 	struct passwd	*pw	= va_arg(ap, struct passwd *);
1003 	char		*buffer	= va_arg(ap, char *);
1004 	size_t		 buflen	= va_arg(ap, size_t);
1005 	struct passwd  **result	= va_arg(ap, struct passwd **);
1006 
1007 	struct dns_state state;
1008 	int	rv;
1009 
1010 	_DIAGASSERT(retval != NULL);
1011 	_DIAGASSERT(pw != NULL);
1012 	_DIAGASSERT(buffer != NULL);
1013 	_DIAGASSERT(result != NULL);
1014 
1015 	*result = NULL;
1016 	memset(&state, 0, sizeof(state));
1017 	snprintf(buffer, buflen, "%u", (unsigned int)uid);
1018 	rv = _dns_pwscan(retval, pw, buffer, buflen, &state, _dns_uid_zones);
1019 	_dns_end(&state);
1020 	if (rv != NS_SUCCESS)
1021 		return rv;
1022 	if (uid == pw->pw_uid) {
1023 		*result = pw;
1024 		return NS_SUCCESS;
1025 	} else
1026 		return NS_NOTFOUND;
1027 }
1028 
1029 static const char *_dns_nam_zones[] = {
1030 	"passwd",
1031 	NULL
1032 };
1033 
1034 /*ARGSUSED*/
1035 static int
1036 _dns_getpwnam(void *nsrv, void *nscb, va_list ap)
1037 {
1038 	struct passwd	**retval = va_arg(ap, struct passwd **);
1039 	const char	*name	= va_arg(ap, const char *);
1040 
1041 	int	rv, rerror;
1042 
1043 	_DIAGASSERT(retval != NULL);
1044 
1045 	*retval = NULL;
1046 	rv = _dns_start(&_dns_state);
1047 	if (rv != NS_SUCCESS)
1048 		return rv;
1049 	snprintf(_dns_passwdbuf, sizeof(_dns_passwdbuf), "%s", name);
1050 	rv = _dns_pwscan(&rerror, &_dns_passwd,
1051 	    _dns_passwdbuf, sizeof(_dns_passwdbuf),
1052 	    &_dns_state, _dns_nam_zones);
1053 	if (!_dns_state.stayopen)
1054 		_dns_end(&_dns_state);
1055 	if (rv == NS_SUCCESS && strcmp(name, _dns_passwd.pw_name) == 0)
1056 		*retval = &_dns_passwd;
1057 	return rv;
1058 }
1059 
1060 /*ARGSUSED*/
1061 static int
1062 _dns_getpwnam_r(void *nsrv, void *nscb, va_list ap)
1063 {
1064 	int		*retval	= va_arg(ap, int *);
1065 	const char	*name	= va_arg(ap, const char *);
1066 	struct passwd	*pw	= va_arg(ap, struct passwd *);
1067 	char		*buffer	= va_arg(ap, char *);
1068 	size_t		 buflen	= va_arg(ap, size_t);
1069 	struct passwd  **result	= va_arg(ap, struct passwd **);
1070 
1071 	struct dns_state state;
1072 	int	rv;
1073 
1074 	_DIAGASSERT(retval != NULL);
1075 	_DIAGASSERT(pw != NULL);
1076 	_DIAGASSERT(buffer != NULL);
1077 	_DIAGASSERT(result != NULL);
1078 
1079 	*result = NULL;
1080 	memset(&state, 0, sizeof(state));
1081 	snprintf(buffer, buflen, "%s", name);
1082 	rv = _dns_pwscan(retval, pw, buffer, buflen, &state, _dns_nam_zones);
1083 	_dns_end(&state);
1084 	if (rv != NS_SUCCESS)
1085 		return rv;
1086 	if (strcmp(name, pw->pw_name) == 0) {
1087 		*result = pw;
1088 		return NS_SUCCESS;
1089 	} else
1090 		return NS_NOTFOUND;
1091 }
1092 
1093 #endif /* HESIOD */
1094 
1095 
1096 #ifdef YP
1097 		/*
1098 		 *	nis methods
1099 		 */
1100 	/* state shared between nis methods */
1101 struct nis_state {
1102 	int		 stayopen;	/* see getpassent(3) */
1103 	char		*domain;	/* NIS domain */
1104 	int		 done;		/* non-zero if search exhausted */
1105 	char		*current;	/* current first/next match */
1106 	int		 currentlen;	/* length of _nis_current */
1107 	enum {				/* shadow map type */
1108 		NISMAP_UNKNOWN,		/*  unknown ... */
1109 		NISMAP_NONE,		/*  none: use "passwd.by*" */
1110 		NISMAP_ADJUNCT,		/*  pw_passwd from "passwd.adjunct.*" */
1111 		NISMAP_MASTER		/*  all from "master.passwd.by*" */
1112 	}		 maptype;
1113 };
1114 
1115 static struct nis_state		_nis_state;
1116 					/* storage for non _r functions */
1117 static struct passwd		_nis_passwd;
1118 static char			_nis_passwdbuf[_GETPW_R_SIZE_MAX];
1119 
1120 	/* macros for deciding which NIS maps to use. */
1121 #define	PASSWD_BYNAME(x)	((x)->maptype == NISMAP_MASTER \
1122 				    ? "master.passwd.byname" : "passwd.byname")
1123 #define	PASSWD_BYUID(x)		((x)->maptype == NISMAP_MASTER \
1124 				    ? "master.passwd.byuid" : "passwd.byuid")
1125 
1126 static int
1127 _nis_start(struct nis_state *state)
1128 {
1129 
1130 	_DIAGASSERT(state != NULL);
1131 
1132 	state->done = 0;
1133 	if (state->current) {
1134 		free(state->current);
1135 		state->current = NULL;
1136 	}
1137 	if (state->domain == NULL) {			/* setup NIS */
1138 		switch (yp_get_default_domain(&state->domain)) {
1139 		case 0:
1140 			break;
1141 		case YPERR_RESRC:
1142 			return NS_TRYAGAIN;
1143 		default:
1144 			return NS_UNAVAIL;
1145 		}
1146 	}
1147 
1148 				/* determine where to get pw_passwd from */
1149 	if (state->maptype == NISMAP_UNKNOWN) {
1150 		int	r, order;
1151 
1152 		state->maptype = NISMAP_NONE;	/* default to no adjunct */
1153 		if (geteuid() != 0)		/* non-root can't use adjunct */
1154 			return NS_SUCCESS;
1155 
1156 						/* look for "master.passwd.*" */
1157 		r = yp_order(state->domain, "master.passwd.byname", &order);
1158 		if (r == 0) {
1159 			state->maptype = NISMAP_MASTER;
1160 			return NS_SUCCESS;
1161 		}
1162 
1163 			/* master.passwd doesn't exist, try passwd.adjunct */
1164 		if (r == YPERR_MAP) {
1165 			r = yp_order(state->domain, "passwd.adjunct.byname",
1166 			    &order);
1167 			if (r == 0)
1168 				state->maptype = NISMAP_ADJUNCT;
1169 		}
1170 	}
1171 	return NS_SUCCESS;
1172 }
1173 
1174 static int
1175 _nis_end(struct nis_state *state)
1176 {
1177 
1178 	_DIAGASSERT(state != NULL);
1179 
1180 	if (state->domain)
1181 		state->domain = NULL;
1182 	state->done = 0;
1183 	if (state->current)
1184 		free(state->current);
1185 	state->current = NULL;
1186 	state->maptype = NISMAP_UNKNOWN;
1187 	return NS_SUCCESS;
1188 }
1189 
1190 /*
1191  * nis_parse
1192  *	wrapper to _pw_parse that obtains the real password from the
1193  *	"passwd.adjunct.byname" NIS map if the maptype is NISMAP_ADJUNCT.
1194  */
1195 static int
1196 _nis_parse(const char *entry, struct passwd *pw, char *buf, size_t buflen,
1197 	struct nis_state *state)
1198 {
1199 	size_t	elen;
1200 
1201 	_DIAGASSERT(entry != NULL);
1202 	_DIAGASSERT(pw != NULL);
1203 	_DIAGASSERT(buf != NULL);
1204 	_DIAGASSERT(state != NULL);
1205 
1206 	elen = strlen(entry);
1207 	if (elen >= buflen)
1208 		return 0;
1209 	if (! _pw_parse(entry, pw, buf, buflen,
1210 	    !(state->maptype == NISMAP_MASTER)))
1211 		return 0;
1212 
1213 	if ((state->maptype == NISMAP_ADJUNCT) &&
1214 	    (strstr(pw->pw_passwd, "##") != NULL)) {
1215 		char	*data;
1216 		int	datalen;
1217 
1218 		if (yp_match(state->domain, "passwd.adjunct.byname",
1219 		    pw->pw_name, (int)strlen(pw->pw_name),
1220 		    &data, &datalen) == 0) {
1221 			char	*bp, *ep;
1222 						/* skip name to get password */
1223 			ep = data;
1224 			if ((bp = strsep(&ep, ":")) != NULL &&
1225 			    (bp = strsep(&ep, ":")) != NULL) {
1226 					/* store new pw_passwd after entry */
1227 				strlcpy(buf + elen, bp, buflen - elen);
1228 				pw->pw_passwd = &buf[elen];
1229 			}
1230 			free(data);
1231 		}
1232 	}
1233 
1234 	return 1;
1235 }
1236 
1237 
1238 /*
1239  * _nis_pwscan
1240  *	Look for the yp key provided in buffer from map,
1241  *	and decode into pw/buffer/buflen.
1242  */
1243 static int
1244 _nis_pwscan(int *retval, struct passwd *pw, char *buffer, size_t buflen,
1245 	struct nis_state *state, const char *map)
1246 {
1247 	char	*data;
1248 	int	nisr, rv, datalen;
1249 
1250 	_DIAGASSERT(retval != NULL);
1251 	_DIAGASSERT(pw != NULL);
1252 	_DIAGASSERT(buffer != NULL);
1253 	_DIAGASSERT(state != NULL);
1254 	_DIAGASSERT(map != NULL);
1255 
1256 	*retval = 0;
1257 
1258 	if (state->domain == NULL) {	/* only start if NIS not setup */
1259 		rv = _nis_start(state);
1260 		if (rv != NS_SUCCESS)
1261 			return rv;
1262 	}
1263 
1264 	data = NULL;
1265 	rv = NS_NOTFOUND;
1266 
1267 							/* search map */
1268 	nisr = yp_match(state->domain, map, buffer, (int)strlen(buffer),
1269 	    &data, &datalen);
1270 	switch (nisr) {
1271 	case 0:
1272 		data[datalen] = '\0';			/* clear trailing \n */
1273 		if (_nis_parse(data, pw, buffer, buflen, state))
1274 			rv = NS_SUCCESS;		/* validate line */
1275 		else
1276 			rv = NS_UNAVAIL;
1277 		break;
1278 	case YPERR_KEY:
1279 		break;
1280 	default:
1281 		rv = NS_UNAVAIL;
1282 		break;
1283 	}
1284 
1285 	if (rv != NS_SUCCESS)
1286 		*retval = errno;
1287 	if (data)
1288 		free(data);
1289 	return rv;
1290 }
1291 
1292 /*ARGSUSED*/
1293 static int
1294 _nis_setpwent(void *nsrv, void *nscb, va_list ap)
1295 {
1296 
1297 	_nis_state.stayopen = 0;
1298 	return _nis_start(&_nis_state);
1299 }
1300 
1301 /*ARGSUSED*/
1302 static int
1303 _nis_setpassent(void *nsrv, void *nscb, va_list ap)
1304 {
1305 	int	*retval		= va_arg(ap, int *);
1306 	int	 stayopen	= va_arg(ap, int);
1307 
1308 	int	rv;
1309 
1310 	_nis_state.stayopen = stayopen;
1311 	rv = _nis_start(&_nis_state);
1312 	*retval = (rv == NS_SUCCESS);
1313 	return rv;
1314 }
1315 
1316 /*ARGSUSED*/
1317 static int
1318 _nis_endpwent(void *nsrv, void *nscb, va_list ap)
1319 {
1320 
1321 	return _nis_end(&_nis_state);
1322 }
1323 
1324 
1325 /*ARGSUSED*/
1326 static int
1327 _nis_getpwent(void *nsrv, void *nscb, va_list ap)
1328 {
1329 	struct passwd	**retval = va_arg(ap, struct passwd **);
1330 
1331 	char	*key, *data;
1332 	int	keylen, datalen, rv, nisr;
1333 
1334 	_DIAGASSERT(retval != NULL);
1335 
1336 	*retval = NULL;
1337 
1338 	if (_nis_state.done)				/* exhausted search */
1339 		return NS_NOTFOUND;
1340 	if (_nis_state.domain == NULL) {
1341 					/* only start if NIS not setup */
1342 		rv = _nis_start(&_nis_state);
1343 		if (rv != NS_SUCCESS)
1344 			return rv;
1345 	}
1346 
1347  next_nis_entry:
1348 	key = NULL;
1349 	data = NULL;
1350 	rv = NS_NOTFOUND;
1351 
1352 	if (_nis_state.current) {			/* already searching */
1353 		nisr = yp_next(_nis_state.domain, PASSWD_BYNAME(&_nis_state),
1354 		    _nis_state.current, _nis_state.currentlen,
1355 		    &key, &keylen, &data, &datalen);
1356 		free(_nis_state.current);
1357 		_nis_state.current = NULL;
1358 		switch (nisr) {
1359 		case 0:
1360 			_nis_state.current = key;
1361 			_nis_state.currentlen = keylen;
1362 			key = NULL;
1363 			break;
1364 		case YPERR_NOMORE:
1365 			_nis_state.done = 1;
1366 			goto nisent_out;
1367 		default:
1368 			rv = NS_UNAVAIL;
1369 			goto nisent_out;
1370 		}
1371 	} else {					/* new search */
1372 		if (yp_first(_nis_state.domain, PASSWD_BYNAME(&_nis_state),
1373 		    &_nis_state.current, &_nis_state.currentlen,
1374 		    &data, &datalen)) {
1375 			rv = NS_UNAVAIL;
1376 			goto nisent_out;
1377 		}
1378 	}
1379 
1380 	data[datalen] = '\0';				/* clear trailing \n */
1381 							/* validate line */
1382 	if (_nis_parse(data, &_nis_passwd,
1383 	    _nis_passwdbuf, sizeof(_nis_passwdbuf), &_nis_state))
1384 		rv = NS_SUCCESS;
1385 	else {					/* dodgy entry, try again */
1386 		if (key)
1387 			free(key);
1388 		free(data);
1389 		goto next_nis_entry;
1390 	}
1391 
1392  nisent_out:
1393 	if (key)
1394 		free(key);
1395 	if (data)
1396 		free(data);
1397 	if (rv == NS_SUCCESS)
1398 		*retval = &_nis_passwd;
1399 	return rv;
1400 }
1401 
1402 /*ARGSUSED*/
1403 static int
1404 _nis_getpwent_r(void *nsrv, void *nscb, va_list ap)
1405 {
1406 	int		*retval	= va_arg(ap, int *);
1407 	struct passwd	*pw	= va_arg(ap, struct passwd *);
1408 	char		*buffer	= va_arg(ap, char *);
1409 	size_t		 buflen	= va_arg(ap, size_t);
1410 	struct passwd  **result	= va_arg(ap, struct passwd **);
1411 
1412 	char	*key, *data;
1413 	int	keylen, datalen, rv, nisr;
1414 
1415 	_DIAGASSERT(retval != NULL);
1416 	_DIAGASSERT(pw != NULL);
1417 	_DIAGASSERT(buffer != NULL);
1418 	_DIAGASSERT(result != NULL);
1419 
1420 	*retval = 0;
1421 
1422 	if (_nis_state.done)				/* exhausted search */
1423 		return NS_NOTFOUND;
1424 	if (_nis_state.domain == NULL) {
1425 					/* only start if NIS not setup */
1426 		rv = _nis_start(&_nis_state);
1427 		if (rv != NS_SUCCESS)
1428 			return rv;
1429 	}
1430 
1431  next_nis_entry:
1432 	key = NULL;
1433 	data = NULL;
1434 	rv = NS_NOTFOUND;
1435 
1436 	if (_nis_state.current) {			/* already searching */
1437 		nisr = yp_next(_nis_state.domain, PASSWD_BYNAME(&_nis_state),
1438 		    _nis_state.current, _nis_state.currentlen,
1439 		    &key, &keylen, &data, &datalen);
1440 		free(_nis_state.current);
1441 		_nis_state.current = NULL;
1442 		switch (nisr) {
1443 		case 0:
1444 			_nis_state.current = key;
1445 			_nis_state.currentlen = keylen;
1446 			key = NULL;
1447 			break;
1448 		case YPERR_NOMORE:
1449 			_nis_state.done = 1;
1450 			goto nisent_out;
1451 		default:
1452 			rv = NS_UNAVAIL;
1453 			goto nisent_out;
1454 		}
1455 	} else {					/* new search */
1456 		if (yp_first(_nis_state.domain, PASSWD_BYNAME(&_nis_state),
1457 		    &_nis_state.current, &_nis_state.currentlen,
1458 		    &data, &datalen)) {
1459 			rv = NS_UNAVAIL;
1460 			goto nisent_out;
1461 		}
1462 	}
1463 
1464 	data[datalen] = '\0';				/* clear trailing \n */
1465 							/* validate line */
1466 	if (_nis_parse(data, pw, buffer, buflen, &_nis_state))
1467 		rv = NS_SUCCESS;
1468 	else {					/* dodgy entry, try again */
1469 		if (key)
1470 			free(key);
1471 		free(data);
1472 		goto next_nis_entry;
1473 	}
1474 
1475  nisent_out:
1476 	if (key)
1477 		free(key);
1478 	if (data)
1479 		free(data);
1480 	if (rv == NS_SUCCESS)
1481 		*result = pw;
1482 	else
1483 		*result = NULL;
1484 	return rv;
1485 }
1486 
1487 /*ARGSUSED*/
1488 static int
1489 _nis_getpwuid(void *nsrv, void *nscb, va_list ap)
1490 {
1491 	struct passwd	**retval = va_arg(ap, struct passwd **);
1492 	uid_t		 uid	= va_arg(ap, uid_t);
1493 
1494 	int	rv, rerror;
1495 
1496 	_DIAGASSERT(retval != NULL);
1497 
1498 	*retval = NULL;
1499 	rv = _nis_start(&_nis_state);
1500 	if (rv != NS_SUCCESS)
1501 		return rv;
1502 	snprintf(_nis_passwdbuf, sizeof(_nis_passwdbuf), "%u", (unsigned int)uid);
1503 	rv = _nis_pwscan(&rerror, &_nis_passwd,
1504 	    _nis_passwdbuf, sizeof(_nis_passwdbuf),
1505 	    &_nis_state, PASSWD_BYUID(&_nis_state));
1506 	if (!_nis_state.stayopen)
1507 		_nis_end(&_nis_state);
1508 	if (rv == NS_SUCCESS && uid == _nis_passwd.pw_uid)
1509 		*retval = &_nis_passwd;
1510 	return rv;
1511 }
1512 
1513 /*ARGSUSED*/
1514 static int
1515 _nis_getpwuid_r(void *nsrv, void *nscb, va_list ap)
1516 {
1517 	int		*retval	= va_arg(ap, int *);
1518 	uid_t		 uid	= va_arg(ap, uid_t);
1519 	struct passwd	*pw	= va_arg(ap, struct passwd *);
1520 	char		*buffer	= va_arg(ap, char *);
1521 	size_t		 buflen	= va_arg(ap, size_t);
1522 	struct passwd  **result	= va_arg(ap, struct passwd **);
1523 
1524 	struct nis_state state;
1525 	int	rv;
1526 
1527 	_DIAGASSERT(retval != NULL);
1528 	_DIAGASSERT(pw != NULL);
1529 	_DIAGASSERT(buffer != NULL);
1530 	_DIAGASSERT(result != NULL);
1531 
1532 	*result = NULL;
1533 	memset(&state, 0, sizeof(state));
1534 	rv = _nis_start(&state);
1535 	if (rv != NS_SUCCESS)
1536 		return rv;
1537 	snprintf(buffer, buflen, "%u", (unsigned int)uid);
1538 	rv = _nis_pwscan(retval, pw, buffer, buflen,
1539 	    &state, PASSWD_BYUID(&state));
1540 	_nis_end(&state);
1541 	if (rv != NS_SUCCESS)
1542 		return rv;
1543 	if (uid == pw->pw_uid) {
1544 		*result = pw;
1545 		return NS_SUCCESS;
1546 	} else
1547 		return NS_NOTFOUND;
1548 }
1549 
1550 /*ARGSUSED*/
1551 static int
1552 _nis_getpwnam(void *nsrv, void *nscb, va_list ap)
1553 {
1554 	struct passwd	**retval = va_arg(ap, struct passwd **);
1555 	const char	*name	= va_arg(ap, const char *);
1556 
1557 	int	rv, rerror;
1558 
1559 	_DIAGASSERT(retval != NULL);
1560 
1561 	*retval = NULL;
1562 	rv = _nis_start(&_nis_state);
1563 	if (rv != NS_SUCCESS)
1564 		return rv;
1565 	snprintf(_nis_passwdbuf, sizeof(_nis_passwdbuf), "%s", name);
1566 	rv = _nis_pwscan(&rerror, &_nis_passwd,
1567 	    _nis_passwdbuf, sizeof(_nis_passwdbuf),
1568 	    &_nis_state, PASSWD_BYNAME(&_nis_state));
1569 	if (!_nis_state.stayopen)
1570 		_nis_end(&_nis_state);
1571 	if (rv == NS_SUCCESS && strcmp(name, _nis_passwd.pw_name) == 0)
1572 		*retval = &_nis_passwd;
1573 	return rv;
1574 }
1575 
1576 /*ARGSUSED*/
1577 static int
1578 _nis_getpwnam_r(void *nsrv, void *nscb, va_list ap)
1579 {
1580 	int		*retval	= va_arg(ap, int *);
1581 	const char	*name	= va_arg(ap, const char *);
1582 	struct passwd	*pw	= va_arg(ap, struct passwd *);
1583 	char		*buffer	= va_arg(ap, char *);
1584 	size_t		 buflen	= va_arg(ap, size_t);
1585 	struct passwd  **result	= va_arg(ap, struct passwd **);
1586 
1587 	struct nis_state state;
1588 	int	rv;
1589 
1590 	_DIAGASSERT(retval != NULL);
1591 	_DIAGASSERT(pw != NULL);
1592 	_DIAGASSERT(buffer != NULL);
1593 	_DIAGASSERT(result != NULL);
1594 
1595 	*result = NULL;
1596 	snprintf(buffer, buflen, "%s", name);
1597 	memset(&state, 0, sizeof(state));
1598 	rv = _nis_start(&state);
1599 	if (rv != NS_SUCCESS)
1600 		return rv;
1601 	rv = _nis_pwscan(retval, pw, buffer, buflen,
1602 	    &state, PASSWD_BYNAME(&state));
1603 	_nis_end(&state);
1604 	if (rv != NS_SUCCESS)
1605 		return rv;
1606 	if (strcmp(name, pw->pw_name) == 0) {
1607 		*result = pw;
1608 		return NS_SUCCESS;
1609 	} else
1610 		return NS_NOTFOUND;
1611 }
1612 
1613 #endif /* YP */
1614 
1615 
1616 #ifdef _PASSWD_COMPAT
1617 		/*
1618 		 *	compat methods
1619 		 */
1620 
1621 	/* state shared between compat methods */
1622 
1623 struct compat_state {
1624 	int		 stayopen;	/* see getpassent(3) */
1625 	DB		*db;		/* passwd DB */
1626 	int		 keynum;	/* key counter, -1 if no more */
1627 	enum {				/* current compat mode */
1628 		COMPAT_NOTOKEN = 0,	/*  no compat token present */
1629 		COMPAT_NONE,		/*  parsing normal pwd.db line */
1630 		COMPAT_FULL,		/*  parsing `+' entries */
1631 		COMPAT_USER,		/*  parsing `+name' entries */
1632 		COMPAT_NETGROUP		/*  parsing `+@netgroup' entries */
1633 	}		 mode;
1634 	char		*user;		/* COMPAT_USER "+name" */
1635 	DB		*exclude;	/* compat exclude DB */
1636 	struct passwd	 proto;		/* proto passwd entry */
1637 	char		 protobuf[_GETPW_R_SIZE_MAX];
1638 					/* buffer for proto ptrs */
1639 	int		 protoflags;	/* proto passwd flags */
1640 };
1641 
1642 static struct compat_state	_compat_state;
1643 					/* storage for non _r functions */
1644 static struct passwd		_compat_passwd;
1645 static char			_compat_passwdbuf[_GETPW_R_SIZE_MAX];
1646 
1647 static int
1648 _compat_start(struct compat_state *state)
1649 {
1650 	int	rv;
1651 
1652 	_DIAGASSERT(state != NULL);
1653 
1654 	state->keynum = 0;
1655 	if (state->db == NULL) {		/* not open yet */
1656 		DBT	key, data;
1657 		DBT	pkey, pdata;
1658 		char	bf[MAXLOGNAME];
1659 
1660 		rv = _pw_opendb(&state->db);
1661 		if (rv != NS_SUCCESS)
1662 			return rv;
1663 
1664 		state->mode = COMPAT_NOTOKEN;
1665 
1666 		/*
1667 		 *	Determine if the "compat" token is present in pwd.db;
1668 		 *	either "__YP!" or PW_KEYBYNAME+"+".
1669 		 *	Only works if pwd_mkdb installs the token.
1670 		 */
1671 		key.data = (u_char *)__UNCONST(__yp_token);
1672 		key.size = strlen(__yp_token);
1673 
1674 		bf[0] = _PW_KEYBYNAME;	 /* Pre-token database support. */
1675 		bf[1] = '+';
1676 		pkey.data = (u_char *)bf;
1677 		pkey.size = 2;
1678 
1679 		if ((state->db->get)(state->db, &key, &data, 0) == 0
1680 		    || (state->db->get)(state->db, &pkey, &pdata, 0) == 0)
1681 			state->mode = COMPAT_NONE;
1682 	}
1683 	return NS_SUCCESS;
1684 }
1685 
1686 static int
1687 _compat_end(struct compat_state *state)
1688 {
1689 
1690 	_DIAGASSERT(state != NULL);
1691 
1692 	state->keynum = 0;
1693 	if (state->db) {
1694 		(void)(state->db->close)(state->db);
1695 		state->db = NULL;
1696 	}
1697 	state->mode = COMPAT_NOTOKEN;
1698 	if (state->user)
1699 		free(state->user);
1700 	state->user = NULL;
1701 	if (state->exclude != NULL)
1702 		(void)(state->exclude->close)(state->exclude);
1703 	state->exclude = NULL;
1704 	state->proto.pw_name = NULL;
1705 	state->protoflags = 0;
1706 	return NS_SUCCESS;
1707 }
1708 
1709 /*
1710  * _compat_add_exclude
1711  *	add the name to the exclude list in state->exclude.
1712  */
1713 static int
1714 _compat_add_exclude(struct compat_state *state, const char *name)
1715 {
1716 	DBT	key, data;
1717 
1718 	_DIAGASSERT(state != NULL);
1719 	_DIAGASSERT(name != NULL);
1720 
1721 				/* initialize the exclusion table if needed */
1722 	if (state->exclude == NULL) {
1723 		state->exclude = dbopen(NULL, O_RDWR, 600, DB_HASH, NULL);
1724 		if (state->exclude == NULL)
1725 			return 0;
1726 	}
1727 
1728 	key.size = strlen(name);			/* set up the key */
1729 	key.data = (u_char *)__UNCONST(name);
1730 
1731 	data.data = NULL;				/* data is nothing */
1732 	data.size = 0;
1733 
1734 							/* store it */
1735 	if ((state->exclude->put)(state->exclude, &key, &data, 0) == -1)
1736 		return 0;
1737 
1738 	return 1;
1739 }
1740 
1741 /*
1742  * _compat_is_excluded
1743  *	test if a name is on the compat mode exclude list
1744  */
1745 static int
1746 _compat_is_excluded(struct compat_state *state, const char *name)
1747 {
1748 	DBT	key, data;
1749 
1750 	_DIAGASSERT(state != NULL);
1751 	_DIAGASSERT(name != NULL);
1752 
1753 	if (state->exclude == NULL)
1754 		return 0;	/* nothing excluded */
1755 
1756 	key.size = strlen(name);			/* set up the key */
1757 	key.data = (u_char *)__UNCONST(name);
1758 
1759 	if ((state->exclude->get)(state->exclude, &key, &data, 0) == 0)
1760 		return 1;				/* is excluded */
1761 
1762 	return 0;
1763 }
1764 
1765 
1766 /*
1767  * _passwdcompat_bad
1768  *	log an error if "files" or "compat" is specified in
1769  *	passwd_compat database
1770  */
1771 /*ARGSUSED*/
1772 static int
1773 _passwdcompat_bad(void *nsrv, void *nscb, va_list ap)
1774 {
1775 	static int warned;
1776 
1777 	_DIAGASSERT(cb_data != NULL);
1778 
1779 	if (!warned) {
1780 		syslog(LOG_ERR,
1781 			"nsswitch.conf passwd_compat database can't use '%s'",
1782 			(char *)nscb);
1783 	}
1784 	warned = 1;
1785 	return NS_UNAVAIL;
1786 }
1787 
1788 /*
1789  * _passwdcompat_setpassent
1790  *	Call setpassent for all passwd_compat sources.
1791  */
1792 static int
1793 _passwdcompat_setpassent(int stayopen)
1794 {
1795 	static const ns_dtab dtab[] = {
1796 		NS_FILES_CB(_passwdcompat_bad, "files")
1797 		NS_DNS_CB(_dns_setpassent, NULL)
1798 		NS_NIS_CB(_nis_setpassent, NULL)
1799 		NS_COMPAT_CB(_passwdcompat_bad, "compat")
1800 		{ 0 }
1801 	};
1802 
1803 	int	rv, result;
1804 
1805 	rv = nsdispatch(NULL, dtab, NSDB_PASSWD_COMPAT, "setpassent",
1806 	    __nsdefaultnis_forceall, &result, stayopen);
1807 	return rv;
1808 }
1809 
1810 /*
1811  * _passwdcompat_endpwent
1812  *	Call endpwent for all passwd_compat sources.
1813  */
1814 static int
1815 _passwdcompat_endpwent(void)
1816 {
1817 	static const ns_dtab dtab[] = {
1818 		NS_FILES_CB(_passwdcompat_bad, "files")
1819 		NS_DNS_CB(_dns_endpwent, NULL)
1820 		NS_NIS_CB(_nis_endpwent, NULL)
1821 		NS_COMPAT_CB(_passwdcompat_bad, "compat")
1822 		{ 0 }
1823 	};
1824 
1825 	return nsdispatch(NULL, dtab, NSDB_PASSWD_COMPAT, "endpwent",
1826 	    __nsdefaultnis_forceall);
1827 }
1828 
1829 /*
1830  * _passwdcompat_pwscan
1831  *	When a name lookup in compat mode is required (e.g., `+name', or a
1832  *	name in `+@netgroup'), look it up in the 'passwd_compat' nsswitch
1833  *	database.
1834  *	Fail if passwd_compat contains files or compat.
1835  */
1836 static int
1837 _passwdcompat_pwscan(struct passwd *pw, char *buffer, size_t buflen,
1838 	int search, const char *name, uid_t uid)
1839 {
1840 	static const ns_dtab compatentdtab[] = {
1841 		NS_FILES_CB(_passwdcompat_bad, "files")
1842 		NS_DNS_CB(_dns_getpwent_r, NULL)
1843 		NS_NIS_CB(_nis_getpwent_r, NULL)
1844 		NS_COMPAT_CB(_passwdcompat_bad, "compat")
1845 		{ 0 }
1846 	};
1847 	static const ns_dtab compatuiddtab[] = {
1848 		NS_FILES_CB(_passwdcompat_bad, "files")
1849 		NS_DNS_CB(_dns_getpwuid_r, NULL)
1850 		NS_NIS_CB(_nis_getpwuid_r, NULL)
1851 		NS_COMPAT_CB(_passwdcompat_bad, "compat")
1852 		{ 0 }
1853 	};
1854 	static const ns_dtab compatnamdtab[] = {
1855 		NS_FILES_CB(_passwdcompat_bad, "files")
1856 		NS_DNS_CB(_dns_getpwnam_r, NULL)
1857 		NS_NIS_CB(_nis_getpwnam_r, NULL)
1858 		NS_COMPAT_CB(_passwdcompat_bad, "compat")
1859 		{ 0 }
1860 	};
1861 
1862 	int		rv, crv;
1863 	struct passwd	*cpw;
1864 
1865 	switch (search) {
1866 	case _PW_KEYBYNUM:
1867 		rv = nsdispatch(NULL, compatentdtab,
1868 		    NSDB_PASSWD_COMPAT, "getpwent_r", __nsdefaultnis,
1869 		    &crv, pw, buffer, buflen, &cpw);
1870 		break;
1871 	case _PW_KEYBYNAME:
1872 		_DIAGASSERT(name != NULL);
1873 		rv = nsdispatch(NULL, compatnamdtab,
1874 		    NSDB_PASSWD_COMPAT, "getpwnam_r", __nsdefaultnis,
1875 		    &crv, name, pw, buffer, buflen, &cpw);
1876 		break;
1877 	case _PW_KEYBYUID:
1878 		rv = nsdispatch(NULL, compatuiddtab,
1879 		    NSDB_PASSWD_COMPAT, "getpwuid_r", __nsdefaultnis,
1880 		    &crv, uid, pw, buffer, buflen, &cpw);
1881 		break;
1882 	default:
1883 		abort();
1884 		/*NOTREACHED*/
1885 	}
1886 	return rv;
1887 }
1888 
1889 /*
1890  * _compat_pwscan
1891  *	Search state->db for the next desired entry.
1892  *	If search is _PW_KEYBYNUM, look for state->keynum.
1893  *	If search is _PW_KEYBYNAME, look for name.
1894  *	If search is _PW_KEYBYUID, look for uid.
1895  *	Sets *retval to the errno if the result is not NS_SUCCESS.
1896  */
1897 static int
1898 _compat_pwscan(int *retval, struct passwd *pw, char *buffer, size_t buflen,
1899 	struct compat_state *state, int search, const char *name, uid_t uid)
1900 {
1901 	DBT		 key;
1902 	int		 rv, r, pwflags;
1903 	const char	*user, *host, *dom;
1904 	const void	*from;
1905 	size_t		 fromlen;
1906 
1907 	_DIAGASSERT(retval != NULL);
1908 	_DIAGASSERT(pw != NULL);
1909 	_DIAGASSERT(buffer != NULL);
1910 	_DIAGASSERT(state != NULL);
1911 	/* name may be NULL */
1912 
1913 	*retval = 0;
1914 
1915 	if (state->db == NULL) {
1916 		rv = _compat_start(state);
1917 		if (rv != NS_SUCCESS)
1918 			return rv;
1919 	}
1920 	if (buflen <= 1) {			/* buffer too small */
1921 		*retval = ERANGE;
1922 		return NS_UNAVAIL;
1923 	}
1924 
1925 	for (;;) {				/* loop over pwd.db */
1926 		rv = NS_NOTFOUND;
1927 		if (state->mode != COMPAT_NOTOKEN &&
1928 		    state->mode != COMPAT_NONE) {
1929 						/* doing a compat lookup */
1930 			struct passwd	cpw;
1931 			char		cbuf[_GETPW_R_SIZE_MAX];
1932 
1933 			switch (state->mode) {
1934 
1935 			case COMPAT_FULL:
1936 					/* get next user */
1937 				rv = _passwdcompat_pwscan(&cpw,
1938 				    cbuf, sizeof(cbuf),
1939 				    _PW_KEYBYNUM, NULL, 0);
1940 				if (rv != NS_SUCCESS)
1941 					state->mode = COMPAT_NONE;
1942 				break;
1943 
1944 			case COMPAT_NETGROUP:
1945 /* XXXREENTRANT: getnetgrent is not thread safe */
1946 					/* get next user from netgroup */
1947 				r = getnetgrent(&host, &user, &dom);
1948 				if (r == 0) {	/* end of group */
1949 					endnetgrent();
1950 					state->mode = COMPAT_NONE;
1951 					break;
1952 				}
1953 				if (!user || !*user)
1954 					break;
1955 				rv = _passwdcompat_pwscan(&cpw,
1956 				    cbuf, sizeof(cbuf),
1957 				    _PW_KEYBYNAME, user, 0);
1958 				break;
1959 
1960 			case COMPAT_USER:
1961 					/* get specific user */
1962 				if (state->user == NULL) {
1963 					state->mode = COMPAT_NONE;
1964 					break;
1965 				}
1966 				rv = _passwdcompat_pwscan(&cpw,
1967 				    cbuf, sizeof(cbuf),
1968 				    _PW_KEYBYNAME, state->user, 0);
1969 				free(state->user);
1970 				state->user = NULL;
1971 				state->mode = COMPAT_NONE;
1972 				break;
1973 
1974 			case COMPAT_NOTOKEN:
1975 			case COMPAT_NONE:
1976 				abort();
1977 
1978 			}
1979 			if (rv != NS_SUCCESS)	/* if not matched, next loop */
1980 				continue;
1981 
1982 				/* copy cpw to pw, applying prototype */
1983 			if (! _pw_copy(&cpw, pw, buffer, buflen,
1984 			    &state->proto, state->protoflags)) {
1985 				rv = NS_UNAVAIL;
1986 				break;
1987 			}
1988 
1989 			if (_compat_is_excluded(state, pw->pw_name))
1990 				continue;	/* excluded; next loop */
1991 
1992 			if ((search == _PW_KEYBYNAME
1993 					&& strcmp(pw->pw_name, name) != 0)
1994 			    || (search == _PW_KEYBYUID && pw->pw_uid != uid)) {
1995 				continue;	/* not specific; next loop */
1996 			}
1997 
1998 			break;			/* exit loop if found */
1999 		} else {			/* not a compat line */
2000 			state->proto.pw_name = NULL;
2001 						/* clear prototype */
2002 		}
2003 
2004 		if (state->mode == COMPAT_NOTOKEN) {
2005 				/* no compat token; do direct lookup */
2006 			switch (search) {
2007 			case _PW_KEYBYNUM:
2008 				if (state->keynum == -1)  /* no more records */
2009 					return NS_NOTFOUND;
2010 				state->keynum++;
2011 				from = &state->keynum;
2012 				fromlen = sizeof(state->keynum);
2013 				break;
2014 			case _PW_KEYBYNAME:
2015 				from = name;
2016 				fromlen = strlen(name);
2017 				break;
2018 			case _PW_KEYBYUID:
2019 				from = &uid;
2020 				fromlen = sizeof(uid);
2021 				break;
2022 			default:
2023 				abort();
2024 			}
2025 			buffer[0] = search;
2026 		} else {
2027 				/* compat token; do line by line */
2028 			if (state->keynum == -1)  /* no more records */
2029 				return NS_NOTFOUND;
2030 			state->keynum++;
2031 			from = &state->keynum;
2032 			fromlen = sizeof(state->keynum);
2033 			buffer[0] = _PW_KEYBYNUM;
2034 		}
2035 
2036 		if (buflen <= fromlen) {		/* buffer too small */
2037 			*retval = ERANGE;
2038 			return NS_UNAVAIL;
2039 		}
2040 		memmove(buffer + 1, from, fromlen);	/* setup key */
2041 		key.size = fromlen + 1;
2042 		key.data = (u_char *)buffer;
2043 
2044 		rv = _pw_getkey(state->db, &key, pw, buffer, buflen, &pwflags);
2045 		if (rv != NS_SUCCESS)		/* stop on error */
2046 			break;
2047 
2048 		if (state->mode == COMPAT_NOTOKEN)
2049 			break;			/* stop if no compat token */
2050 
2051 		if (pw->pw_name[0] == '+') {
2052 						/* compat inclusion */
2053 			switch(pw->pw_name[1]) {
2054 			case '\0':		/* `+' */
2055 				state->mode = COMPAT_FULL;
2056 						/* reset passwd_compat search */
2057 /* XXXREENTRANT: setpassent is not thread safe ? */
2058 				(void) _passwdcompat_setpassent(0);
2059 				break;
2060 			case '@':		/* `+@netgroup' */
2061 				state->mode = COMPAT_NETGROUP;
2062 						/* reset netgroup search */
2063 /* XXXREENTRANT: setnetgrent is not thread safe */
2064 				setnetgrent(pw->pw_name + 2);
2065 				break;
2066 			default:		/* `+name' */
2067 				state->mode = COMPAT_USER;
2068 				if (state->user)
2069 					free(state->user);
2070 				state->user = strdup(pw->pw_name + 1);
2071 				break;
2072 			}
2073 						/* save the prototype */
2074 			state->protoflags = pwflags;
2075 			if (! _pw_copy(pw, &state->proto, state->protobuf,
2076 			    sizeof(state->protobuf), NULL, 0)) {
2077 				rv = NS_UNAVAIL;
2078 				break;
2079 			}
2080 			continue;		/* loop again after inclusion */
2081 		} else if (pw->pw_name[0] == '-') {
2082 						/* compat exclusion */
2083 			rv = NS_SUCCESS;
2084 			switch(pw->pw_name[1]) {
2085 			case '\0':		/* `-' */
2086 				break;
2087 			case '@':		/* `-@netgroup' */
2088 /* XXXREENTRANT: {set,get,end}netgrent is not thread safe */
2089 				setnetgrent(pw->pw_name + 2);
2090 				while (getnetgrent(&host, &user, &dom)) {
2091 					if (!user || !*user)
2092 						continue;
2093 					if (! _compat_add_exclude(state,user)) {
2094 						rv = NS_UNAVAIL;
2095 						break;
2096 					}
2097 				}
2098 				endnetgrent();
2099 				break;
2100 			default:		/* `-name' */
2101 				if (! _compat_add_exclude(state,
2102 				    pw->pw_name + 1)) {
2103 					rv = NS_UNAVAIL;
2104 				}
2105 				break;
2106 			}
2107 			if (rv != NS_SUCCESS)	/* exclusion failure */
2108 				break;
2109 			continue;		/* loop again after exclusion */
2110 		}
2111 		if (search == _PW_KEYBYNUM ||
2112 		    (search == _PW_KEYBYUID && pw->pw_uid == uid) ||
2113 		    (search == _PW_KEYBYNAME && strcmp(pw->pw_name, name) == 0))
2114 			break;			/* token mode match found */
2115 	}
2116 
2117 	if (rv == NS_NOTFOUND &&
2118 	    (search == _PW_KEYBYNUM || state->mode != COMPAT_NOTOKEN))
2119 		state->keynum = -1;		/* flag `no more records' */
2120 
2121 	if (rv == NS_SUCCESS) {
2122 		if ((search == _PW_KEYBYNAME && strcmp(pw->pw_name, name) != 0)
2123 		    || (search == _PW_KEYBYUID && pw->pw_uid != uid))
2124 			rv = NS_NOTFOUND;
2125 	}
2126 
2127 	if (rv != NS_SUCCESS)
2128 		*retval = errno;
2129 	return rv;
2130 }
2131 
2132 /*ARGSUSED*/
2133 static int
2134 _compat_setpwent(void *nsrv, void *nscb, va_list ap)
2135 {
2136 
2137 					/* force passwd_compat setpwent() */
2138 	(void) _passwdcompat_setpassent(0);
2139 
2140 					/* reset state, keep db open */
2141 	_compat_state.stayopen = 0;
2142 	return _compat_start(&_compat_state);
2143 }
2144 
2145 /*ARGSUSED*/
2146 static int
2147 _compat_setpassent(void *nsrv, void *nscb, va_list ap)
2148 {
2149 	int	*retval		= va_arg(ap, int *);
2150 	int	 stayopen	= va_arg(ap, int);
2151 
2152 	int	rv;
2153 
2154 					/* force passwd_compat setpassent() */
2155 	(void) _passwdcompat_setpassent(stayopen);
2156 
2157 	_compat_state.stayopen = stayopen;
2158 	rv = _compat_start(&_compat_state);
2159 	*retval = (rv == NS_SUCCESS);
2160 	return rv;
2161 }
2162 
2163 /*ARGSUSED*/
2164 static int
2165 _compat_endpwent(void *nsrv, void *nscb, va_list ap)
2166 {
2167 
2168 					/* force passwd_compat endpwent() */
2169 	(void) _passwdcompat_endpwent();
2170 
2171 					/* reset state, close db */
2172 	_compat_state.stayopen = 0;
2173 	return _compat_end(&_compat_state);
2174 }
2175 
2176 
2177 /*ARGSUSED*/
2178 static int
2179 _compat_getpwent(void *nsrv, void *nscb, va_list ap)
2180 {
2181 	struct passwd	**retval = va_arg(ap, struct passwd **);
2182 
2183 	int	rv, rerror;
2184 
2185 	_DIAGASSERT(retval != NULL);
2186 
2187 	*retval = NULL;
2188 	rv = _compat_pwscan(&rerror, &_compat_passwd,
2189 	    _compat_passwdbuf, sizeof(_compat_passwdbuf),
2190 	    &_compat_state, _PW_KEYBYNUM, NULL, 0);
2191 	if (rv == NS_SUCCESS)
2192 		*retval = &_compat_passwd;
2193 	return rv;
2194 }
2195 
2196 /*ARGSUSED*/
2197 static int
2198 _compat_getpwent_r(void *nsrv, void *nscb, va_list ap)
2199 {
2200 	int		*retval	= va_arg(ap, int *);
2201 	struct passwd	*pw	= va_arg(ap, struct passwd *);
2202 	char		*buffer	= va_arg(ap, char *);
2203 	size_t		 buflen	= va_arg(ap, size_t);
2204 	struct passwd  **result	= va_arg(ap, struct passwd **);
2205 
2206 	int		rv;
2207 
2208 	_DIAGASSERT(retval != NULL);
2209 	_DIAGASSERT(pw != NULL);
2210 	_DIAGASSERT(buffer != NULL);
2211 	_DIAGASSERT(result != NULL);
2212 
2213 	rv = _compat_pwscan(retval, pw, buffer, buflen, &_compat_state,
2214 	    _PW_KEYBYNUM, NULL, 0);
2215 	if (rv == NS_SUCCESS)
2216 		*result = pw;
2217 	else
2218 		*result = NULL;
2219 	return rv;
2220 }
2221 
2222 
2223 /*ARGSUSED*/
2224 static int
2225 _compat_getpwnam(void *nsrv, void *nscb, va_list ap)
2226 {
2227 	struct passwd	**retval = va_arg(ap, struct passwd **);
2228 	const char	*name	= va_arg(ap, const char *);
2229 
2230 	int	rv, rerror;
2231 
2232 	_DIAGASSERT(retval != NULL);
2233 
2234 	*retval = NULL;
2235 	rv = _compat_start(&_compat_state);
2236 	if (rv != NS_SUCCESS)
2237 		return rv;
2238 	rv = _compat_pwscan(&rerror, &_compat_passwd,
2239 	    _compat_passwdbuf, sizeof(_compat_passwdbuf),
2240 	    &_compat_state, _PW_KEYBYNAME, name, 0);
2241 	if (!_compat_state.stayopen)
2242 		_compat_end(&_compat_state);
2243 	if (rv == NS_SUCCESS)
2244 		*retval = &_compat_passwd;
2245 	return rv;
2246 }
2247 
2248 /*ARGSUSED*/
2249 static int
2250 _compat_getpwnam_r(void *nsrv, void *nscb, va_list ap)
2251 {
2252 	int		*retval	= va_arg(ap, int *);
2253 	const char	*name	= va_arg(ap, const char *);
2254 	struct passwd	*pw	= va_arg(ap, struct passwd *);
2255 	char		*buffer	= va_arg(ap, char *);
2256 	size_t		 buflen	= va_arg(ap, size_t);
2257 	struct passwd  **result	= va_arg(ap, struct passwd **);
2258 
2259 	struct compat_state	state;
2260 	int		rv;
2261 
2262 	_DIAGASSERT(retval != NULL);
2263 	_DIAGASSERT(pw != NULL);
2264 	_DIAGASSERT(buffer != NULL);
2265 	_DIAGASSERT(result != NULL);
2266 
2267 	*result = NULL;
2268 	memset(&state, 0, sizeof(state));
2269 	rv = _compat_pwscan(retval, pw, buffer, buflen, &state,
2270 	    _PW_KEYBYNAME, name, 0);
2271 	_compat_end(&state);
2272 	if (rv == NS_SUCCESS)
2273 		*result = pw;
2274 	return rv;
2275 }
2276 
2277 /*ARGSUSED*/
2278 static int
2279 _compat_getpwuid(void *nsrv, void *nscb, va_list ap)
2280 {
2281 	struct passwd	**retval = va_arg(ap, struct passwd **);
2282 	uid_t		 uid	= va_arg(ap, uid_t);
2283 
2284 	int	rv, rerror;
2285 
2286 	_DIAGASSERT(retval != NULL);
2287 
2288 	*retval = NULL;
2289 	rv = _compat_start(&_compat_state);
2290 	if (rv != NS_SUCCESS)
2291 		return rv;
2292 	rv = _compat_pwscan(&rerror, &_compat_passwd,
2293 	    _compat_passwdbuf, sizeof(_compat_passwdbuf),
2294 	    &_compat_state, _PW_KEYBYUID, NULL, uid);
2295 	if (!_compat_state.stayopen)
2296 		_compat_end(&_compat_state);
2297 	if (rv == NS_SUCCESS)
2298 		*retval = &_compat_passwd;
2299 	return rv;
2300 }
2301 
2302 /*ARGSUSED*/
2303 static int
2304 _compat_getpwuid_r(void *nsrv, void *nscb, va_list ap)
2305 {
2306 	int		*retval	= va_arg(ap, int *);
2307 	uid_t		 uid	= va_arg(ap, uid_t);
2308 	struct passwd	*pw	= va_arg(ap, struct passwd *);
2309 	char		*buffer	= va_arg(ap, char *);
2310 	size_t		 buflen	= va_arg(ap, size_t);
2311 	struct passwd  **result	= va_arg(ap, struct passwd **);
2312 
2313 	struct compat_state	state;
2314 	int		rv;
2315 
2316 	_DIAGASSERT(retval != NULL);
2317 	_DIAGASSERT(pw != NULL);
2318 	_DIAGASSERT(buffer != NULL);
2319 	_DIAGASSERT(result != NULL);
2320 
2321 	*result = NULL;
2322 	memset(&state, 0, sizeof(state));
2323 	rv = _compat_pwscan(retval, pw, buffer, buflen, &state,
2324 	    _PW_KEYBYUID, NULL, uid);
2325 	_compat_end(&state);
2326 	if (rv == NS_SUCCESS)
2327 		*result = pw;
2328 	return rv;
2329 }
2330 
2331 #endif /* _PASSWD_COMPAT */
2332 
2333 
2334 		/*
2335 		 *	public functions
2336 		 */
2337 
2338 struct passwd *
2339 getpwent(void)
2340 {
2341 	int		r;
2342 	struct passwd	*retval;
2343 
2344 	static const ns_dtab dtab[] = {
2345 		NS_FILES_CB(_files_getpwent, NULL)
2346 		NS_DNS_CB(_dns_getpwent, NULL)
2347 		NS_NIS_CB(_nis_getpwent, NULL)
2348 		NS_COMPAT_CB(_compat_getpwent, NULL)
2349 		{ 0 }
2350 	};
2351 
2352 	mutex_lock(&_pwmutex);
2353 	r = nsdispatch(NULL, dtab, NSDB_PASSWD, "getpwent", __nsdefaultcompat,
2354 	    &retval);
2355 	mutex_unlock(&_pwmutex);
2356 	return (r == NS_SUCCESS) ? retval : NULL;
2357 }
2358 
2359 int
2360 getpwent_r(struct passwd *pwd, char *buffer, size_t buflen,
2361     struct passwd **result)
2362 {
2363 	int	r, retval;
2364 
2365 	static const ns_dtab dtab[] = {
2366 		NS_FILES_CB(_files_getpwent_r, NULL)
2367 		NS_DNS_CB(_dns_getpwent_r, NULL)
2368 		NS_NIS_CB(_nis_getpwent_r, NULL)
2369 		NS_COMPAT_CB(_compat_getpwent_r, NULL)
2370 		{ 0 }
2371 	};
2372 
2373 	_DIAGASSERT(pwd != NULL);
2374 	_DIAGASSERT(buffer != NULL);
2375 	_DIAGASSERT(result != NULL);
2376 
2377 	*result = NULL;
2378 	retval = 0;
2379 	mutex_lock(&_pwmutex);
2380 	r = nsdispatch(NULL, dtab, NSDB_PASSWD, "getpwent_r", __nsdefaultcompat,
2381 	    &retval, pwd, buffer, buflen, result);
2382 	mutex_unlock(&_pwmutex);
2383 	return (r == NS_SUCCESS) ? 0 : retval ? retval : ENOENT;
2384 }
2385 
2386 
2387 struct passwd *
2388 getpwnam(const char *name)
2389 {
2390 	int		rv;
2391 	struct passwd	*retval;
2392 
2393 	static const ns_dtab dtab[] = {
2394 		NS_FILES_CB(_files_getpwnam, NULL)
2395 		NS_DNS_CB(_dns_getpwnam, NULL)
2396 		NS_NIS_CB(_nis_getpwnam, NULL)
2397 		NS_COMPAT_CB(_compat_getpwnam, NULL)
2398 		{ 0 }
2399 	};
2400 
2401 	mutex_lock(&_pwmutex);
2402 	rv = nsdispatch(NULL, dtab, NSDB_PASSWD, "getpwnam", __nsdefaultcompat,
2403 	    &retval, name);
2404 	mutex_unlock(&_pwmutex);
2405 	return (rv == NS_SUCCESS) ? retval : NULL;
2406 }
2407 
2408 int
2409 getpwnam_r(const char *name, struct passwd *pwd, char *buffer, size_t buflen,
2410 	struct passwd **result)
2411 {
2412 	int	r, retval;
2413 
2414 	static const ns_dtab dtab[] = {
2415 		NS_FILES_CB(_files_getpwnam_r, NULL)
2416 		NS_DNS_CB(_dns_getpwnam_r, NULL)
2417 		NS_NIS_CB(_nis_getpwnam_r, NULL)
2418 		NS_COMPAT_CB(_compat_getpwnam_r, NULL)
2419 		{ 0 }
2420 	};
2421 
2422 	_DIAGASSERT(name != NULL);
2423 	_DIAGASSERT(pwd != NULL);
2424 	_DIAGASSERT(buffer != NULL);
2425 	_DIAGASSERT(result != NULL);
2426 
2427 	*result = NULL;
2428 	retval = 0;
2429 	mutex_lock(&_pwmutex);
2430 	r = nsdispatch(NULL, dtab, NSDB_PASSWD, "getpwnam_r", __nsdefaultcompat,
2431 	    &retval, name, pwd, buffer, buflen, result);
2432 	mutex_unlock(&_pwmutex);
2433 	return (r == NS_SUCCESS) ? 0 : retval ? retval : ENOENT;
2434 }
2435 
2436 struct passwd *
2437 getpwuid(uid_t uid)
2438 {
2439 	int		rv;
2440 	struct passwd	*retval;
2441 
2442 	static const ns_dtab dtab[] = {
2443 		NS_FILES_CB(_files_getpwuid, NULL)
2444 		NS_DNS_CB(_dns_getpwuid, NULL)
2445 		NS_NIS_CB(_nis_getpwuid, NULL)
2446 		NS_COMPAT_CB(_compat_getpwuid, NULL)
2447 		{ 0 }
2448 	};
2449 
2450 	mutex_lock(&_pwmutex);
2451 	rv = nsdispatch(NULL, dtab, NSDB_PASSWD, "getpwuid", __nsdefaultcompat,
2452 	    &retval, uid);
2453 	mutex_unlock(&_pwmutex);
2454 	return (rv == NS_SUCCESS) ? retval : NULL;
2455 }
2456 
2457 int
2458 getpwuid_r(uid_t uid, struct passwd *pwd, char *buffer, size_t buflen,
2459 	struct passwd **result)
2460 {
2461 	int	r, retval;
2462 
2463 	static const ns_dtab dtab[] = {
2464 		NS_FILES_CB(_files_getpwuid_r, NULL)
2465 		NS_DNS_CB(_dns_getpwuid_r, NULL)
2466 		NS_NIS_CB(_nis_getpwuid_r, NULL)
2467 		NS_COMPAT_CB(_compat_getpwuid_r, NULL)
2468 		{ 0 }
2469 	};
2470 
2471 	_DIAGASSERT(pwd != NULL);
2472 	_DIAGASSERT(buffer != NULL);
2473 	_DIAGASSERT(result != NULL);
2474 
2475 	*result = NULL;
2476 	retval = 0;
2477 	mutex_lock(&_pwmutex);
2478 	r = nsdispatch(NULL, dtab, NSDB_PASSWD, "getpwuid_r", __nsdefaultcompat,
2479 	    &retval, uid, pwd, buffer, buflen, result);
2480 	mutex_unlock(&_pwmutex);
2481 	return (r == NS_SUCCESS) ? 0 : retval ? retval : ENOENT;
2482 }
2483 
2484 void
2485 endpwent(void)
2486 {
2487 	static const ns_dtab dtab[] = {
2488 		NS_FILES_CB(_files_endpwent, NULL)
2489 		NS_DNS_CB(_dns_endpwent, NULL)
2490 		NS_NIS_CB(_nis_endpwent, NULL)
2491 		NS_COMPAT_CB(_compat_endpwent, NULL)
2492 		{ 0 }
2493 	};
2494 
2495 	mutex_lock(&_pwmutex);
2496 					/* force all endpwent() methods */
2497 	(void) nsdispatch(NULL, dtab, NSDB_PASSWD, "endpwent",
2498 	    __nsdefaultcompat_forceall);
2499 	mutex_unlock(&_pwmutex);
2500 }
2501 
2502 /*ARGSUSED*/
2503 int
2504 setpassent(int stayopen)
2505 {
2506 	static const ns_dtab dtab[] = {
2507 		NS_FILES_CB(_files_setpassent, NULL)
2508 		NS_DNS_CB(_dns_setpassent, NULL)
2509 		NS_NIS_CB(_nis_setpassent, NULL)
2510 		NS_COMPAT_CB(_compat_setpassent, NULL)
2511 		{ 0 }
2512 	};
2513 	int	rv, retval;
2514 
2515 	mutex_lock(&_pwmutex);
2516 					/* force all setpassent() methods */
2517 	rv = nsdispatch(NULL, dtab, NSDB_PASSWD, "setpassent",
2518 	    __nsdefaultcompat_forceall, &retval, stayopen);
2519 	mutex_unlock(&_pwmutex);
2520 	return (rv == NS_SUCCESS) ? retval : 0;
2521 }
2522 
2523 void
2524 setpwent(void)
2525 {
2526 	static const ns_dtab dtab[] = {
2527 		NS_FILES_CB(_files_setpwent, NULL)
2528 		NS_DNS_CB(_dns_setpwent, NULL)
2529 		NS_NIS_CB(_nis_setpwent, NULL)
2530 		NS_COMPAT_CB(_compat_setpwent, NULL)
2531 		{ 0 }
2532 	};
2533 
2534 	mutex_lock(&_pwmutex);
2535 					/* force all setpwent() methods */
2536 	(void) nsdispatch(NULL, dtab, NSDB_PASSWD, "setpwent",
2537 	    __nsdefaultcompat_forceall);
2538 	mutex_unlock(&_pwmutex);
2539 }
2540