pw_copy.c revision 98514
1/*-
2 * Copyright (c) 1990, 1993, 1994
3 *	The Regents of the University of California.  All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 *    notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 *    notice, this list of conditions and the following disclaimer in the
12 *    documentation and/or other materials provided with the distribution.
13 * 3. All advertising materials mentioning features or use of this software
14 *    must display the following acknowledgement:
15 *	This product includes software developed by the University of
16 *	California, Berkeley and its contributors.
17 * 4. Neither the name of the University nor the names of its contributors
18 *    may be used to endorse or promote products derived from this software
19 *    without specific prior written permission.
20 *
21 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31 * SUCH DAMAGE.
32 *
33 * $FreeBSD: head/release/picobsd/tinyware/passwd/pw_copy.c 98514 2002-06-20 21:17:33Z luigi $
34 */
35
36#ifndef lint
37static const char sccsid[] = "@(#)pw_copy.c	8.4 (Berkeley) 4/2/94";
38#endif /* not lint */
39
40#include <sys/cdefs.h>
41__FBSDID("$FreeBSD: head/release/picobsd/tinyware/passwd/pw_copy.c 98514 2002-06-20 21:17:33Z luigi $");
42
43/*
44 * This module is used to copy the master password file, replacing a single
45 * record, by chpass(1) and passwd(1).
46 */
47
48#include <err.h>
49#include <pwd.h>
50#include <stdio.h>
51#include <string.h>
52#include <unistd.h>
53
54#if 0
55#include <pw_scan.h>
56#endif
57extern int      pw_big_ids_warning;
58extern int      pw_scan __P((char *, struct passwd *));
59
60#include <pw_util.h>
61
62extern char *tempname;
63
64/* for use in pw_copy(). Compare a pw entry to a pw struct. */
65static int
66pw_equal(char *buf, struct passwd *pw)
67{
68	struct passwd buf_pw;
69	int len;
70
71	len = strlen (buf);
72	if (buf[len-1] == '\n')
73		buf[len-1] = '\0';
74	return (strcmp(pw->pw_name, buf_pw.pw_name) == 0
75	    && pw->pw_uid == buf_pw.pw_uid
76	    && pw->pw_gid == buf_pw.pw_gid
77	    && strcmp(pw->pw_class, buf_pw.pw_class) == 0
78	    && (long)pw->pw_change == (long)buf_pw.pw_change
79	    && (long)pw->pw_expire == (long)buf_pw.pw_expire
80	    && strcmp(pw->pw_gecos, buf_pw.pw_gecos) == 0
81	    && strcmp(pw->pw_dir, buf_pw.pw_dir) == 0
82	    && strcmp(pw->pw_shell, buf_pw.pw_shell) == 0);
83}
84
85void
86pw_copy(int ffd, int tfd, struct passwd *pw, struct passwd *old_pw)
87{
88	FILE *from, *to;
89	int done;
90	char *p, buf[8192];
91	char uidstr[20];
92	char gidstr[20];
93	char chgstr[20];
94	char expstr[20];
95
96	snprintf(uidstr, sizeof(uidstr), "%lu", (unsigned long)pw->pw_uid);
97	snprintf(gidstr, sizeof(gidstr), "%lu", (unsigned long)pw->pw_gid);
98	snprintf(chgstr, sizeof(chgstr), "%ld", (long)pw->pw_change);
99	snprintf(expstr, sizeof(expstr), "%ld", (long)pw->pw_expire);
100
101	if (!(from = fdopen(ffd, "r")))
102		pw_error(_PATH_MASTERPASSWD, 1, 1);
103	if (!(to = fdopen(tfd, "w")))
104		pw_error(tempname, 1, 1);
105
106	for (done = 0; fgets(buf, sizeof(buf), from);) {
107		if (!strchr(buf, '\n')) {
108			warnx("%s: line too long", _PATH_MASTERPASSWD);
109			pw_error(NULL, 0, 1);
110		}
111		if (done) {
112			(void)fprintf(to, "%s", buf);
113			if (ferror(to))
114				goto err;
115			continue;
116		}
117		for (p = buf; *p != '\n'; p++)
118			if (*p != ' ' && *p != '\t')
119				break;
120		if (*p == '#' || *p == '\n') {
121			(void)fprintf(to, "%s", buf);
122			if (ferror(to))
123				goto err;
124			continue;
125		}
126		if (!(p = strchr(buf, ':'))) {
127			warnx("%s: corrupted entry", _PATH_MASTERPASSWD);
128			pw_error(NULL, 0, 1);
129		}
130		*p = '\0';
131		if (strcmp(buf, pw->pw_name)) {
132			*p = ':';
133			(void)fprintf(to, "%s", buf);
134			if (ferror(to))
135				goto err;
136			continue;
137		}
138		*p = ':';
139		if (old_pw && !pw_equal(buf, old_pw)) {
140			warnx("%s: entry for %s has changed",
141			      _PATH_MASTERPASSWD, pw->pw_name);
142			pw_error(NULL, 0, 1);
143		}
144		(void)fprintf(to, "%s:%s:%s:%s:%s:%s:%s:%s:%s:%s\n",
145		    pw->pw_name, pw->pw_passwd,
146		    pw->pw_fields & _PWF_UID ? uidstr : "",
147		    pw->pw_fields & _PWF_GID ? gidstr : "",
148		    pw->pw_class,
149		    pw->pw_fields & _PWF_CHANGE ? chgstr : "",
150		    pw->pw_fields & _PWF_EXPIRE ? expstr : "",
151		    pw->pw_gecos, pw->pw_dir, pw->pw_shell);
152		done = 1;
153		if (ferror(to))
154			goto err;
155	}
156	if (!done) {
157#ifdef YP
158	/* Ultra paranoid: shouldn't happen. */
159		if (getuid())  {
160			warnx("%s: not found in %s -- permission denied",
161					pw->pw_name, _PATH_MASTERPASSWD);
162			pw_error(NULL, 0, 1);
163		} else
164#endif /* YP */
165		(void)fprintf(to, "%s:%s:%s:%s:%s:%s:%s:%s:%s:%s\n",
166		    pw->pw_name, pw->pw_passwd,
167		    pw->pw_fields & _PWF_UID ? uidstr : "",
168		    pw->pw_fields & _PWF_GID ? gidstr : "",
169		    pw->pw_class,
170		    pw->pw_fields & _PWF_CHANGE ? chgstr : "",
171		    pw->pw_fields & _PWF_EXPIRE ? expstr : "",
172		    pw->pw_gecos, pw->pw_dir, pw->pw_shell);
173	}
174
175	if (ferror(to))
176err:		pw_error(NULL, 1, 1);
177	(void)fclose(to);
178}
179
180#include <sys/param.h>
181
182#include <err.h>
183#include <errno.h>
184#include <fcntl.h>
185#include <pwd.h>
186#include <stdio.h>
187#include <string.h>
188#include <stdlib.h>
189#include <unistd.h>
190
191
192/*
193 * Some software assumes that IDs are short.  We should emit warnings
194 * for id's which can not be stored in a short, but we are more liberal
195 * by default, warning for IDs greater than USHRT_MAX.
196 *
197 * If pw_big_ids_warning is anything other than -1 on entry to pw_scan()
198 * it will be set based on the existance of PW_SCAN_BIG_IDS in the
199 * environment.
200 */
201int     pw_big_ids_warning = -1;
202
203int
204pw_scan(bp, pw)
205        char *bp;
206        struct passwd *pw;
207{
208        uid_t id;
209        int root;
210        char *p, *sh;
211
212        if (pw_big_ids_warning == -1)
213                pw_big_ids_warning = getenv("PW_SCAN_BIG_IDS") == NULL ? 1 : 0;
214
215        pw->pw_fields = 0;
216        if (!(pw->pw_name = strsep(&bp, ":")))          /* login */
217                goto fmt;
218        root = !strcmp(pw->pw_name, "root");
219        if(pw->pw_name[0] && (pw->pw_name[0] != '+' || pw->pw_name[1] == '\0'))
220                pw->pw_fields |= _PWF_NAME;
221
222        if (!(pw->pw_passwd = strsep(&bp, ":")))        /* passwd */
223                goto fmt;
224        if(pw->pw_passwd[0]) pw->pw_fields |= _PWF_PASSWD;
225
226        if (!(p = strsep(&bp, ":")))                    /* uid */
227                goto fmt;
228        if (p[0])
229                pw->pw_fields |= _PWF_UID;
230        else {
231                if (pw->pw_name[0] != '+' && pw->pw_name[0] != '-') {
232                        warnx("no uid for user %s", pw->pw_name);
233                        return (0);
234                }
235        }
236        id = strtoul(p, (char **)NULL, 10);
237        if (errno == ERANGE) {
238                warnx("%s > max uid value (%lu)", p, ULONG_MAX);
239                return (0);
240        }
241        if (root && id) {
242                warnx("root uid should be 0");
243                return (0);
244        }
245        if (pw_big_ids_warning && id > USHRT_MAX) {
246                warnx("%s > recommended max uid value (%u)", p, USHRT_MAX);
247                /*return (0);*/ /* THIS SHOULD NOT BE FATAL! */
248        }
249        pw->pw_uid = id;
250
251        if (!(p = strsep(&bp, ":")))                    /* gid */
252                goto fmt;
253        if(p[0]) pw->pw_fields |= _PWF_GID;
254        id = strtoul(p, (char **)NULL, 10);
255        if (errno == ERANGE) {
256                warnx("%s > max gid value (%u)", p, ULONG_MAX);
257                return (0);
258        }
259        if (pw_big_ids_warning && id > USHRT_MAX) {
260                warnx("%s > recommended max gid value (%u)", p, USHRT_MAX);
261                /* return (0); This should not be fatal! */
262        }
263        pw->pw_gid = id;
264
265        pw->pw_class = strsep(&bp, ":");                /* class */
266        if(pw->pw_class[0]) pw->pw_fields |= _PWF_CLASS;
267
268        if (!(p = strsep(&bp, ":")))                    /* change */
269                goto fmt;
270        if(p[0]) pw->pw_fields |= _PWF_CHANGE;
271        pw->pw_change = atol(p);
272
273        if (!(p = strsep(&bp, ":")))                    /* expire */
274                goto fmt;
275        if(p[0]) pw->pw_fields |= _PWF_EXPIRE;
276        pw->pw_expire = atol(p);
277
278        if (!(pw->pw_gecos = strsep(&bp, ":")))         /* gecos */
279                goto fmt;
280        if(pw->pw_gecos[0]) pw->pw_fields |= _PWF_GECOS;
281
282        if (!(pw->pw_dir = strsep(&bp, ":")))                   /* directory */
283                goto fmt;
284        if(pw->pw_dir[0]) pw->pw_fields |= _PWF_DIR;
285
286        if (!(pw->pw_shell = strsep(&bp, ":")))         /* shell */
287                goto fmt;
288
289        p = pw->pw_shell;
290        if (root && *p)                                 /* empty == /bin/sh */
291                for (setusershell();;) {
292                        if (!(sh = getusershell())) {
293                                warnx("warning, unknown root shell");
294                                break;
295                        }
296                        if (!strcmp(p, sh))
297                                break;
298                }
299        if(p[0]) pw->pw_fields |= _PWF_SHELL;
300
301        if ((p = strsep(&bp, ":"))) {                   /* too many */
302fmt:            warnx("corrupted entry");
303                return (0);
304        }
305        return (1);
306}
307