1/*-
2 * Copyright (c) 1990, 1993, 1994
3 *	The Regents of the University of California.  All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 *    notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 *    notice, this list of conditions and the following disclaimer in the
12 *    documentation and/or other materials provided with the distribution.
13 * 3. All advertising materials mentioning features or use of this software
14 *    must display the following acknowledgement:
15 *	This product includes software developed by the University of
16 *	California, Berkeley and its contributors.
17 * 4. Neither the name of the University nor the names of its contributors
18 *    may be used to endorse or promote products derived from this software
19 *    without specific prior written permission.
20 *
21 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31 * SUCH DAMAGE.
32 */
33
34#ifndef lint
35static const char sccsid[] = "@(#)pw_copy.c	8.4 (Berkeley) 4/2/94";
36#endif /* not lint */
37
38#include <sys/cdefs.h>
39__FBSDID("$FreeBSD$");
40
41/*
42 * This module is used to copy the master password file, replacing a single
43 * record, by chpass(1) and passwd(1).
44 */
45
46#include <err.h>
47#include <pwd.h>
48#include <stdio.h>
49#include <string.h>
50#include <unistd.h>
51
52#if 0
53#include <pw_scan.h>
54#endif
55extern int      pw_big_ids_warning;
56extern int      pw_scan(char *, struct passwd *);
57
58#include <pw_util.h>
59
60extern char *tempname;
61
62/* for use in pw_copy(). Compare a pw entry to a pw struct. */
63static int
64pw_equal(char *buf, struct passwd *pw)
65{
66	struct passwd buf_pw;
67	int len;
68
69	len = strlen (buf);
70	if (buf[len-1] == '\n')
71		buf[len-1] = '\0';
72	return (strcmp(pw->pw_name, buf_pw.pw_name) == 0
73	    && pw->pw_uid == buf_pw.pw_uid
74	    && pw->pw_gid == buf_pw.pw_gid
75	    && strcmp(pw->pw_class, buf_pw.pw_class) == 0
76	    && (long)pw->pw_change == (long)buf_pw.pw_change
77	    && (long)pw->pw_expire == (long)buf_pw.pw_expire
78	    && strcmp(pw->pw_gecos, buf_pw.pw_gecos) == 0
79	    && strcmp(pw->pw_dir, buf_pw.pw_dir) == 0
80	    && strcmp(pw->pw_shell, buf_pw.pw_shell) == 0);
81}
82
83void
84pw_copy(int ffd, int tfd, struct passwd *pw, struct passwd *old_pw)
85{
86	FILE *from, *to;
87	int done;
88	char *p, buf[8192];
89	char uidstr[20];
90	char gidstr[20];
91	char chgstr[20];
92	char expstr[20];
93
94	snprintf(uidstr, sizeof(uidstr), "%lu", (unsigned long)pw->pw_uid);
95	snprintf(gidstr, sizeof(gidstr), "%lu", (unsigned long)pw->pw_gid);
96	snprintf(chgstr, sizeof(chgstr), "%ld", (long)pw->pw_change);
97	snprintf(expstr, sizeof(expstr), "%ld", (long)pw->pw_expire);
98
99	if (!(from = fdopen(ffd, "r")))
100		pw_error(_PATH_MASTERPASSWD, 1, 1);
101	if (!(to = fdopen(tfd, "w")))
102		pw_error(tempname, 1, 1);
103
104	for (done = 0; fgets(buf, sizeof(buf), from);) {
105		if (!strchr(buf, '\n')) {
106			warnx("%s: line too long", _PATH_MASTERPASSWD);
107			pw_error(NULL, 0, 1);
108		}
109		if (done) {
110			(void)fprintf(to, "%s", buf);
111			if (ferror(to))
112				goto err;
113			continue;
114		}
115		for (p = buf; *p != '\n'; p++)
116			if (*p != ' ' && *p != '\t')
117				break;
118		if (*p == '#' || *p == '\n') {
119			(void)fprintf(to, "%s", buf);
120			if (ferror(to))
121				goto err;
122			continue;
123		}
124		if (!(p = strchr(buf, ':'))) {
125			warnx("%s: corrupted entry", _PATH_MASTERPASSWD);
126			pw_error(NULL, 0, 1);
127		}
128		*p = '\0';
129		if (strcmp(buf, pw->pw_name)) {
130			*p = ':';
131			(void)fprintf(to, "%s", buf);
132			if (ferror(to))
133				goto err;
134			continue;
135		}
136		*p = ':';
137		if (old_pw && !pw_equal(buf, old_pw)) {
138			warnx("%s: entry for %s has changed",
139			      _PATH_MASTERPASSWD, pw->pw_name);
140			pw_error(NULL, 0, 1);
141		}
142		(void)fprintf(to, "%s:%s:%s:%s:%s:%s:%s:%s:%s:%s\n",
143		    pw->pw_name, pw->pw_passwd,
144		    pw->pw_fields & _PWF_UID ? uidstr : "",
145		    pw->pw_fields & _PWF_GID ? gidstr : "",
146		    pw->pw_class,
147		    pw->pw_fields & _PWF_CHANGE ? chgstr : "",
148		    pw->pw_fields & _PWF_EXPIRE ? expstr : "",
149		    pw->pw_gecos, pw->pw_dir, pw->pw_shell);
150		done = 1;
151		if (ferror(to))
152			goto err;
153	}
154	if (!done) {
155#ifdef YP
156	/* Ultra paranoid: shouldn't happen. */
157		if (getuid())  {
158			warnx("%s: not found in %s -- permission denied",
159					pw->pw_name, _PATH_MASTERPASSWD);
160			pw_error(NULL, 0, 1);
161		} else
162#endif /* YP */
163		(void)fprintf(to, "%s:%s:%s:%s:%s:%s:%s:%s:%s:%s\n",
164		    pw->pw_name, pw->pw_passwd,
165		    pw->pw_fields & _PWF_UID ? uidstr : "",
166		    pw->pw_fields & _PWF_GID ? gidstr : "",
167		    pw->pw_class,
168		    pw->pw_fields & _PWF_CHANGE ? chgstr : "",
169		    pw->pw_fields & _PWF_EXPIRE ? expstr : "",
170		    pw->pw_gecos, pw->pw_dir, pw->pw_shell);
171	}
172
173	if (ferror(to))
174err:		pw_error(NULL, 1, 1);
175	(void)fclose(to);
176}
177
178#include <sys/param.h>
179
180#include <err.h>
181#include <errno.h>
182#include <fcntl.h>
183#include <pwd.h>
184#include <stdio.h>
185#include <string.h>
186#include <stdlib.h>
187#include <unistd.h>
188
189
190/*
191 * Some software assumes that IDs are short.  We should emit warnings
192 * for id's which can not be stored in a short, but we are more liberal
193 * by default, warning for IDs greater than USHRT_MAX.
194 *
195 * If pw_big_ids_warning is anything other than -1 on entry to pw_scan()
196 * it will be set based on the existence of PW_SCAN_BIG_IDS in the
197 * environment.
198 */
199int     pw_big_ids_warning = -1;
200
201int
202pw_scan(bp, pw)
203        char *bp;
204        struct passwd *pw;
205{
206        uid_t id;
207        int root;
208        char *p, *sh;
209
210        if (pw_big_ids_warning == -1)
211                pw_big_ids_warning = getenv("PW_SCAN_BIG_IDS") == NULL ? 1 : 0;
212
213        pw->pw_fields = 0;
214        if (!(pw->pw_name = strsep(&bp, ":")))          /* login */
215                goto fmt;
216        root = !strcmp(pw->pw_name, "root");
217        if(pw->pw_name[0] && (pw->pw_name[0] != '+' || pw->pw_name[1] == '\0'))
218                pw->pw_fields |= _PWF_NAME;
219
220        if (!(pw->pw_passwd = strsep(&bp, ":")))        /* passwd */
221                goto fmt;
222        if(pw->pw_passwd[0]) pw->pw_fields |= _PWF_PASSWD;
223
224        if (!(p = strsep(&bp, ":")))                    /* uid */
225                goto fmt;
226        if (p[0])
227                pw->pw_fields |= _PWF_UID;
228        else {
229                if (pw->pw_name[0] != '+' && pw->pw_name[0] != '-') {
230                        warnx("no uid for user %s", pw->pw_name);
231                        return (0);
232                }
233        }
234        id = strtoul(p, (char **)NULL, 10);
235        if (errno == ERANGE) {
236                warnx("%s > max uid value (%lu)", p, ULONG_MAX);
237                return (0);
238        }
239        if (root && id) {
240                warnx("root uid should be 0");
241                return (0);
242        }
243        if (pw_big_ids_warning && id > USHRT_MAX) {
244                warnx("%s > recommended max uid value (%u)", p, USHRT_MAX);
245                /*return (0);*/ /* THIS SHOULD NOT BE FATAL! */
246        }
247        pw->pw_uid = id;
248
249        if (!(p = strsep(&bp, ":")))                    /* gid */
250                goto fmt;
251        if(p[0]) pw->pw_fields |= _PWF_GID;
252        id = strtoul(p, (char **)NULL, 10);
253        if (errno == ERANGE) {
254                warnx("%s > max gid value (%u)", p, ULONG_MAX);
255                return (0);
256        }
257        if (pw_big_ids_warning && id > USHRT_MAX) {
258                warnx("%s > recommended max gid value (%u)", p, USHRT_MAX);
259                /* return (0); This should not be fatal! */
260        }
261        pw->pw_gid = id;
262
263        pw->pw_class = strsep(&bp, ":");                /* class */
264        if(pw->pw_class[0]) pw->pw_fields |= _PWF_CLASS;
265
266        if (!(p = strsep(&bp, ":")))                    /* change */
267                goto fmt;
268        if(p[0]) pw->pw_fields |= _PWF_CHANGE;
269        pw->pw_change = atol(p);
270
271        if (!(p = strsep(&bp, ":")))                    /* expire */
272                goto fmt;
273        if(p[0]) pw->pw_fields |= _PWF_EXPIRE;
274        pw->pw_expire = atol(p);
275
276        if (!(pw->pw_gecos = strsep(&bp, ":")))         /* gecos */
277                goto fmt;
278        if(pw->pw_gecos[0]) pw->pw_fields |= _PWF_GECOS;
279
280        if (!(pw->pw_dir = strsep(&bp, ":")))                   /* directory */
281                goto fmt;
282        if(pw->pw_dir[0]) pw->pw_fields |= _PWF_DIR;
283
284        if (!(pw->pw_shell = strsep(&bp, ":")))         /* shell */
285                goto fmt;
286
287        p = pw->pw_shell;
288        if (root && *p)                                 /* empty == /bin/sh */
289                for (setusershell();;) {
290                        if (!(sh = getusershell())) {
291                                warnx("warning, unknown root shell");
292                                break;
293                        }
294                        if (!strcmp(p, sh))
295                                break;
296                }
297        if(p[0]) pw->pw_fields |= _PWF_SHELL;
298
299        if ((p = strsep(&bp, ":"))) {                   /* too many */
300fmt:            warnx("corrupted entry");
301                return (0);
302        }
303        return (1);
304}
305