source: vendor/FreeBSD-libc/5.2/gen/pw_scan.c

Last change on this file was 1500, checked in by (none), 21 years ago

This commit was manufactured by cvs2svn to create branch 'FREEBSD'.

  • Property cvs2svn:cvs-rev set to 1.1
  • Property svn:eol-style set to native
  • Property svn:executable set to *
File size: 5.8 KB
Line 
1/*-
2 * Copyright (c) 1990, 1993, 1994
3 * The Regents of the University of California. All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
13 * 3. All advertising materials mentioning features or use of this software
14 * must display the following acknowledgement:
15 * This product includes software developed by the University of
16 * California, Berkeley and its contributors.
17 * 4. Neither the name of the University nor the names of its contributors
18 * may be used to endorse or promote products derived from this software
19 * without specific prior written permission.
20 *
21 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31 * SUCH DAMAGE.
32 */
33
34#if defined(LIBC_SCCS) && !defined(lint)
35static char sccsid[] = "@(#)pw_scan.c 8.3 (Berkeley) 4/2/94";
36#endif /* LIBC_SCCS and not lint */
37#include <sys/cdefs.h>
38__FBSDID("$FreeBSD: src/lib/libc/gen/pw_scan.c,v 1.24 2002/10/11 11:35:30 maxim Exp $");
39
40/*
41 * This module is used to "verify" password entries by chpass(1) and
42 * pwd_mkdb(8).
43 */
44
45#include <sys/param.h>
46
47#include <err.h>
48#include <errno.h>
49#include <fcntl.h>
50#include <pwd.h>
51#include <stdio.h>
52#include <string.h>
53#include <stdlib.h>
54#include <unistd.h>
55
56#include "pw_scan.h"
57
58/*
59 * Some software assumes that IDs are short. We should emit warnings
60 * for id's which cannot be stored in a short, but we are more liberal
61 * by default, warning for IDs greater than USHRT_MAX.
62 *
63 * If pw_big_ids_warning is -1 on entry to pw_scan(), it will be set based
64 * on the existence of PW_SCAN_BIG_IDS in the environment.
65 */
66static int pw_big_ids_warning = -1;
67
68int
69__pw_scan(char *bp, struct passwd *pw, int flags)
70{
71 uid_t id;
72 int root;
73 char *ep, *p, *sh;
74
75 if (pw_big_ids_warning == -1)
76 pw_big_ids_warning = getenv("PW_SCAN_BIG_IDS") == NULL ? 1 : 0;
77
78 pw->pw_fields = 0;
79 if (!(pw->pw_name = strsep(&bp, ":"))) /* login */
80 goto fmt;
81 root = !strcmp(pw->pw_name, "root");
82 if (pw->pw_name[0] && (pw->pw_name[0] != '+' || pw->pw_name[1] == '\0'))
83 pw->pw_fields |= _PWF_NAME;
84
85 if (!(pw->pw_passwd = strsep(&bp, ":"))) /* passwd */
86 goto fmt;
87 if (pw->pw_passwd[0])
88 pw->pw_fields |= _PWF_PASSWD;
89
90 if (!(p = strsep(&bp, ":"))) /* uid */
91 goto fmt;
92 if (p[0])
93 pw->pw_fields |= _PWF_UID;
94 else {
95 if (pw->pw_name[0] != '+' && pw->pw_name[0] != '-') {
96 if (flags & _PWSCAN_WARN)
97 warnx("no uid for user %s", pw->pw_name);
98 return (0);
99 }
100 }
101 id = strtoul(p, &ep, 10);
102 if (errno == ERANGE) {
103 if (flags & _PWSCAN_WARN)
104 warnx("%s > max uid value (%lu)", p, ULONG_MAX);
105 return (0);
106 }
107 if (*ep != '\0') {
108 if (flags & _PWSCAN_WARN)
109 warnx("%s uid is incorrect", p);
110 return (0);
111 }
112 if (root && id) {
113 if (flags & _PWSCAN_WARN)
114 warnx("root uid should be 0");
115 return (0);
116 }
117 if (flags & _PWSCAN_WARN && pw_big_ids_warning && id > USHRT_MAX) {
118 warnx("%s > recommended max uid value (%u)", p, USHRT_MAX);
119 /*return (0);*/ /* THIS SHOULD NOT BE FATAL! */
120 }
121 pw->pw_uid = id;
122
123 if (!(p = strsep(&bp, ":"))) /* gid */
124 goto fmt;
125 if (p[0])
126 pw->pw_fields |= _PWF_GID;
127 else {
128 if (pw->pw_name[0] != '+' && pw->pw_name[0] != '-') {
129 if (flags & _PWSCAN_WARN)
130 warnx("no gid for user %s", pw->pw_name);
131 return (0);
132 }
133 }
134 id = strtoul(p, &ep, 10);
135 if (errno == ERANGE) {
136 if (flags & _PWSCAN_WARN)
137 warnx("%s > max gid value (%lu)", p, ULONG_MAX);
138 return (0);
139 }
140 if (*ep != '\0') {
141 if (flags & _PWSCAN_WARN)
142 warnx("%s gid is incorrect", p);
143 return (0);
144 }
145 if (flags & _PWSCAN_WARN && pw_big_ids_warning && id > USHRT_MAX) {
146 warnx("%s > recommended max gid value (%u)", p, USHRT_MAX);
147 /* return (0); This should not be fatal! */
148 }
149 pw->pw_gid = id;
150
151 if (flags & _PWSCAN_MASTER ) {
152 if (!(pw->pw_class = strsep(&bp, ":"))) /* class */
153 goto fmt;
154 if (pw->pw_class[0])
155 pw->pw_fields |= _PWF_CLASS;
156
157 if (!(p = strsep(&bp, ":"))) /* change */
158 goto fmt;
159 if (p[0])
160 pw->pw_fields |= _PWF_CHANGE;
161 pw->pw_change = atol(p);
162
163 if (!(p = strsep(&bp, ":"))) /* expire */
164 goto fmt;
165 if (p[0])
166 pw->pw_fields |= _PWF_EXPIRE;
167 pw->pw_expire = atol(p);
168 }
169 if (!(pw->pw_gecos = strsep(&bp, ":"))) /* gecos */
170 goto fmt;
171 if (pw->pw_gecos[0])
172 pw->pw_fields |= _PWF_GECOS;
173
174 if (!(pw->pw_dir = strsep(&bp, ":"))) /* directory */
175 goto fmt;
176 if (pw->pw_dir[0])
177 pw->pw_fields |= _PWF_DIR;
178
179 if (!(pw->pw_shell = strsep(&bp, ":"))) /* shell */
180 goto fmt;
181
182 p = pw->pw_shell;
183 if (root && *p) /* empty == /bin/sh */
184 for (setusershell();;) {
185 if (!(sh = getusershell())) {
186 if (flags & _PWSCAN_WARN)
187 warnx("warning, unknown root shell");
188 break;
189 }
190 if (!strcmp(p, sh))
191 break;
192 }
193 if (p[0])
194 pw->pw_fields |= _PWF_SHELL;
195
196 if ((p = strsep(&bp, ":"))) { /* too many */
197fmt:
198 if (flags & _PWSCAN_WARN)
199 warnx("corrupted entry");
200 return (0);
201 }
202 return (1);
203}
Note: See TracBrowser for help on using the repository browser.