xref: /netbsd-src/lib/libc/gen/getpwent.c (revision ae1bfcddc410612bc8c58b807e1830becb69a24c)
1 /*
2  * Copyright (c) 1988 The Regents of the University of California.
3  * All rights reserved.
4  *
5  * Redistribution and use in source and binary forms, with or without
6  * modification, are permitted provided that the following conditions
7  * are met:
8  * 1. Redistributions of source code must retain the above copyright
9  *    notice, this list of conditions and the following disclaimer.
10  * 2. Redistributions in binary form must reproduce the above copyright
11  *    notice, this list of conditions and the following disclaimer in the
12  *    documentation and/or other materials provided with the distribution.
13  * 3. All advertising materials mentioning features or use of this software
14  *    must display the following acknowledgement:
15  *	This product includes software developed by the University of
16  *	California, Berkeley and its contributors.
17  * 4. Neither the name of the University nor the names of its contributors
18  *    may be used to endorse or promote products derived from this software
19  *    without specific prior written permission.
20  *
21  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
22  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
25  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31  * SUCH DAMAGE.
32  */
33 
34 #if defined(LIBC_SCCS) && !defined(lint)
35 /*static char *sccsid = "from: @(#)getpwent.c	5.21 (Berkeley) 3/14/91";*/
36 static char *rcsid = "$Id: getpwent.c,v 1.11 1994/03/09 10:10:29 deraadt Exp $";
37 #endif /* LIBC_SCCS and not lint */
38 
39 #include <sys/param.h>
40 #include <fcntl.h>
41 #include <db.h>
42 #include <syslog.h>
43 #include <pwd.h>
44 #include <utmp.h>
45 #include <errno.h>
46 #include <unistd.h>
47 #include <stdlib.h>
48 #include <string.h>
49 #include <limits.h>
50 #ifdef YP
51 #include <stdio.h>
52 #include <rpc/rpc.h>
53 #include <rpcsvc/yp_prot.h>
54 #include <rpcsvc/ypclnt.h>
55 #endif
56 
57 static struct passwd _pw_passwd;	/* password structure */
58 static DB *_pw_db;			/* password database */
59 static int _pw_keynum;			/* key counter */
60 static int _pw_stayopen;		/* keep fd's open */
61 static int __hashpw(), __initdb();
62 
63 #ifdef YP
64 static char     *__ypcurrent, *__ypdomain;
65 static int      __ypcurrentlen, __ypmode=0;
66 static char	line[1024];
67 
68 static int
69 __ypparse(pw, s)
70 struct passwd *pw;
71 char *s;
72 {
73 	char *bp, *cp;
74 
75 	bp = s;
76 	pw->pw_name = strsep(&bp, ":\n");
77 	pw->pw_passwd = strsep(&bp, ":\n");
78 	if (!(cp = strsep(&bp, ":\n")))
79 		return 1;
80 	pw->pw_uid = atoi(cp);
81 	if (!(cp = strsep(&bp, ":\n")))
82 		return 0;
83 	pw->pw_gid = atoi(cp);
84 	pw->pw_change = 0;
85 	pw->pw_class = "";
86 	pw->pw_gecos = strsep(&bp, ":\n");
87 	pw->pw_dir = strsep(&bp, ":\n");
88 	pw->pw_shell = strsep(&bp, ":\n");
89 	pw->pw_expire = 0;
90 	return 0;
91 }
92 #endif
93 
94 struct passwd *
95 getpwent()
96 {
97 	DBT key;
98 	char bf[sizeof(_pw_keynum) + 1];
99 #ifdef YP
100 	char *bp, *cp;
101 #endif
102 
103 	if (!_pw_db && !__initdb())
104 		return((struct passwd *)NULL);
105 
106 #ifdef YP
107 again:
108 	if(__ypmode) {
109 		char *key, *data;
110 		int keylen, datalen;
111 		int r;
112 
113 		if(!__ypdomain) {
114 			if( _yp_check(&__ypdomain) == 0) {
115 				__ypmode = 0;
116 				goto again;
117 			}
118 		}
119 		if(__ypcurrent) {
120 			r = yp_next(__ypdomain, "passwd.byname",
121 				__ypcurrent, __ypcurrentlen,
122 				&key, &keylen, &data, &datalen);
123 			free(__ypcurrent);
124 			__ypcurrent = NULL;
125 			/*printf("yp_next %d\n", r);*/
126 			switch(r) {
127 			case 0:
128 				break;
129 			default:
130 				__ypcurrent = NULL;
131 				__ypmode = 0;
132 				free(data);
133 				data = NULL;
134 				goto again;
135 			}
136 			__ypcurrent = key;
137 			__ypcurrentlen = keylen;
138 			bcopy(data, line, datalen);
139 			free(data);
140 			data = NULL;
141 		} else {
142 			r = yp_first(__ypdomain, "passwd.byname",
143 				&__ypcurrent, &__ypcurrentlen,
144 				&data, &datalen);
145 			/*printf("yp_first %d\n", r);*/
146 			switch(r) {
147 			case 0:
148 				break;
149 			default:
150 				__ypmode = 0;
151 				free(data);
152 				goto again;
153 			}
154 			bcopy(data, line, datalen);
155 			free(data);
156 			data = NULL;
157 		}
158 		line[datalen] = '\0';
159 		/*printf("line = %s\n", line);*/
160 		bp = line;
161 		goto parse;
162 	}
163 #endif
164 
165 	++_pw_keynum;
166 	bf[0] = _PW_KEYBYNUM;
167 	bcopy((char *)&_pw_keynum, bf + 1, sizeof(_pw_keynum));
168 	key.data = (u_char *)bf;
169 	key.size = sizeof(_pw_keynum) + 1;
170 	if(__hashpw(&key)) {
171 #ifdef YP
172 		if(strcmp(_pw_passwd.pw_name, "+") == 0) {
173 			__ypmode = 1;
174 			goto again;
175 		}
176 #endif
177 		return &_pw_passwd;
178 	}
179 	return (struct passwd *)NULL;
180 
181 #ifdef YP
182 parse:
183 	_pw_passwd.pw_name = strsep(&bp, ":\n");
184 	_pw_passwd.pw_passwd = strsep(&bp, ":\n");
185 	if (!(cp = strsep(&bp, ":\n")))
186 		goto again;
187 	_pw_passwd.pw_uid = atoi(cp);
188 	if (!(cp = strsep(&bp, ":\n")))
189 		goto again;
190 	_pw_passwd.pw_gid = atoi(cp);
191 	_pw_passwd.pw_change = 0;
192 	_pw_passwd.pw_class = "";
193 	_pw_passwd.pw_gecos = strsep(&bp, ":\n");
194 	_pw_passwd.pw_dir = strsep(&bp, ":\n");
195 	_pw_passwd.pw_shell = strsep(&bp, ":\n");
196 	_pw_passwd.pw_expire = 0;
197 	return &_pw_passwd;
198 #endif
199 }
200 
201 struct passwd *
202 getpwnam(name)
203 	const char *name;
204 {
205 	DBT key;
206 	int len, rval;
207 	char bf[UT_NAMESIZE + 1];
208 
209 	if (!_pw_db && !__initdb())
210 		return((struct passwd *)NULL);
211 
212 #ifdef YP
213 	bf[0] = _PW_KEYBYNAME;
214 	len = strlen("+");
215 	bcopy("+", bf + 1, MIN(len, UT_NAMESIZE));
216 	key.data = (u_char *)bf;
217 	key.size = len + 1;
218 
219 	/*
220 	 * If there is a user called "+", then YP is active. In that
221 	 * case we must sequence through the passwd file in sequence.
222 	 */
223 	if ( __hashpw(&key)) {
224 		int r;
225 
226 		for(_pw_keynum=1; _pw_keynum; _pw_keynum++) {
227 			bf[0] = _PW_KEYBYNUM;
228 			bcopy((char *)&_pw_keynum, bf + 1, sizeof(_pw_keynum));
229 			key.data = (u_char *)bf;
230 			key.size = sizeof(_pw_keynum) + 1;
231 			if(__hashpw(&key) == 0)
232 				break;
233 			if(strcmp(_pw_passwd.pw_name, "+") == 0) {
234 				if(!__ypdomain) {
235 					if(_yp_check(&__ypdomain) == 0) {
236 						continue;
237 					}
238 				}
239 				if(__ypcurrent) {
240 					free(__ypcurrent);
241 					__ypcurrent = NULL;
242 				}
243 				r = yp_match(__ypdomain, "passwd.byname",
244 					name, strlen(name),
245 					&__ypcurrent, &__ypcurrentlen);
246 				switch(r) {
247 				case 0:
248 					break;
249 				default:
250 					free(__ypcurrent);
251 					__ypcurrent = NULL;
252 					continue;
253 				}
254 				bcopy(__ypcurrent, line, __ypcurrentlen);
255 				line[__ypcurrentlen] = '\0';
256 				if(__ypparse(&_pw_passwd, line))
257 					continue;
258 			}
259 			if( strcmp(_pw_passwd.pw_name, name) == 0) {
260 				if (!_pw_stayopen) {
261 					(void)(_pw_db->close)(_pw_db);
262 					_pw_db = (DB *)NULL;
263 				}
264 				return &_pw_passwd;
265 			}
266 			continue;
267 		}
268 		if (!_pw_stayopen) {
269 			(void)(_pw_db->close)(_pw_db);
270 			_pw_db = (DB *)NULL;
271 		}
272 		return (struct passwd *)NULL;
273 	}
274 #endif /* YP */
275 
276 	bf[0] = _PW_KEYBYNAME;
277 	len = strlen(name);
278 	bcopy(name, bf + 1, MIN(len, UT_NAMESIZE));
279 	key.data = (u_char *)bf;
280 	key.size = len + 1;
281 	rval = __hashpw(&key);
282 
283 	if (!_pw_stayopen) {
284 		(void)(_pw_db->close)(_pw_db);
285 		_pw_db = (DB *)NULL;
286 	}
287 	return(rval ? &_pw_passwd : (struct passwd *)NULL);
288 }
289 
290 struct passwd *
291 #ifdef __STDC__
292 getpwuid(uid_t uid)
293 #else
294 getpwuid(uid)
295 	int uid;
296 #endif
297 {
298 	DBT key;
299 	char bf[sizeof(_pw_keynum) + 1];
300 	int keyuid, rval, len;
301 
302 	if (!_pw_db && !__initdb())
303 		return((struct passwd *)NULL);
304 
305 #ifdef YP
306 	bf[0] = _PW_KEYBYNAME;
307 	len = strlen("+");
308 	bcopy("+", bf + 1, MIN(len, UT_NAMESIZE));
309 	key.data = (u_char *)bf;
310 	key.size = len + 1;
311 
312 	/*
313 	 * If there is a user called "+", then YP is active. In that
314 	 * case we must sequence through the passwd file in sequence.
315 	 */
316 	if ( __hashpw(&key)) {
317 		char uidbuf[20];
318 		int r;
319 
320 		for(_pw_keynum=1; _pw_keynum; _pw_keynum++) {
321 			bf[0] = _PW_KEYBYNUM;
322 			bcopy((char *)&_pw_keynum, bf + 1, sizeof(_pw_keynum));
323 			key.data = (u_char *)bf;
324 			key.size = sizeof(_pw_keynum) + 1;
325 			if(__hashpw(&key) == 0)
326 				break;
327 			if(strcmp(_pw_passwd.pw_name, "+") == 0) {
328 				if(!__ypdomain) {
329 					if(_yp_check(&__ypdomain) == 0) {
330 						continue;
331 					}
332 				}
333 				if(__ypcurrent) {
334 					free(__ypcurrent);
335 					__ypcurrent = NULL;
336 				}
337 				sprintf(uidbuf, "%d", uid);
338 				r = yp_match(__ypdomain, "passwd.byuid",
339 					uidbuf, strlen(uidbuf),
340 					&__ypcurrent, &__ypcurrentlen);
341 				switch(r) {
342 				case 0:
343 					break;
344 				default:
345 					free(__ypcurrent);
346 					__ypcurrent = NULL;
347 					continue;
348 				}
349 				bcopy(__ypcurrent, line, __ypcurrentlen);
350 				line[__ypcurrentlen] = '\0';
351 				if(__ypparse(&_pw_passwd, line))
352 					continue;
353 			}
354 			if( _pw_passwd.pw_uid == uid) {
355 				if (!_pw_stayopen) {
356 					(void)(_pw_db->close)(_pw_db);
357 					_pw_db = (DB *)NULL;
358 				}
359 				return &_pw_passwd;
360 			}
361 			continue;
362 		}
363 		if (!_pw_stayopen) {
364 			(void)(_pw_db->close)(_pw_db);
365 			_pw_db = (DB *)NULL;
366 		}
367 		return (struct passwd *)NULL;
368 	}
369 #endif /* YP */
370 
371 	bf[0] = _PW_KEYBYUID;
372 	keyuid = uid;
373 	bcopy(&keyuid, bf + 1, sizeof(keyuid));
374 	key.data = (u_char *)bf;
375 	key.size = sizeof(keyuid) + 1;
376 	rval = __hashpw(&key);
377 
378 	if (!_pw_stayopen) {
379 		(void)(_pw_db->close)(_pw_db);
380 		_pw_db = (DB *)NULL;
381 	}
382 	return(rval ? &_pw_passwd : (struct passwd *)NULL);
383 }
384 
385 int
386 setpassent(stayopen)
387 	int stayopen;
388 {
389 	_pw_keynum = 0;
390 	_pw_stayopen = stayopen;
391 #ifdef YP
392 	__ypmode = 0;
393 	if(__ypcurrent)
394 		free(__ypcurrent);
395 	__ypcurrent = NULL;
396 #endif
397 	return(1);
398 }
399 
400 void
401 setpwent()
402 {
403 	(void) setpassent(0);
404 }
405 
406 void
407 endpwent()
408 {
409 	_pw_keynum = 0;
410 	if (_pw_db) {
411 		(void)(_pw_db->close)(_pw_db);
412 		_pw_db = (DB *)NULL;
413 	}
414 #ifdef YP
415 	__ypmode = 0;
416 	if(__ypcurrent)
417 		free(__ypcurrent);
418 	__ypcurrent = NULL;
419 #endif
420 }
421 
422 static int
423 __initdb()
424 {
425 	static int warned;
426 	char *p;
427 
428 	p = (geteuid()) ? _PATH_MP_DB : _PATH_SMP_DB;
429 	_pw_db = dbopen(p, O_RDONLY, 0, DB_HASH, NULL);
430 	if (_pw_db)
431 		return(1);
432 	if (!warned)
433 		syslog(LOG_ERR, "%s: %m", p);
434 	warned = 1;
435 	return(0);
436 }
437 
438 static int
439 __hashpw(key)
440 	DBT *key;
441 {
442 	register char *p, *t;
443 	static u_int max;
444 	static char *line;
445 	DBT data;
446 
447 	if ((_pw_db->get)(_pw_db, key, &data, 0))
448 		return(0);
449 	p = (char *)data.data;
450 	if (data.size > max && !(line = realloc(line, max += 1024)))
451 		return(0);
452 
453 	t = line;
454 #define	EXPAND(e)	e = t; while (*t++ = *p++);
455 	EXPAND(_pw_passwd.pw_name);
456 	EXPAND(_pw_passwd.pw_passwd);
457 	bcopy(p, (char *)&_pw_passwd.pw_uid, sizeof(int));
458 	p += sizeof(int);
459 	bcopy(p, (char *)&_pw_passwd.pw_gid, sizeof(int));
460 	p += sizeof(int);
461 	bcopy(p, (char *)&_pw_passwd.pw_change, sizeof(time_t));
462 	p += sizeof(time_t);
463 	EXPAND(_pw_passwd.pw_class);
464 	EXPAND(_pw_passwd.pw_gecos);
465 	EXPAND(_pw_passwd.pw_dir);
466 	EXPAND(_pw_passwd.pw_shell);
467 	bcopy(p, (char *)&_pw_passwd.pw_expire, sizeof(time_t));
468 	p += sizeof(time_t);
469 	return(1);
470 }
471