pwd_mkdb.c revision 2916
1/*-
2 * Copyright (c) 1991, 1993, 1994
3 *	The Regents of the University of California.  All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 *    notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 *    notice, this list of conditions and the following disclaimer in the
12 *    documentation and/or other materials provided with the distribution.
13 * 3. All advertising materials mentioning features or use of this software
14 *    must display the following acknowledgement:
15 *	This product includes software developed by the University of
16 *	California, Berkeley and its contributors.
17 * 4. Neither the name of the University nor the names of its contributors
18 *    may be used to endorse or promote products derived from this software
19 *    without specific prior written permission.
20 *
21 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31 * SUCH DAMAGE.
32 */
33
34#ifndef lint
35static char copyright[] =
36"@(#) Copyright (c) 1991, 1993, 1994\n\
37	The Regents of the University of California.  All rights reserved.\n";
38#endif /* not lint */
39
40#ifndef lint
41static char sccsid[] = "@(#)pwd_mkdb.c	8.5 (Berkeley) 4/20/94";
42#endif /* not lint */
43
44#include <sys/param.h>
45#include <sys/stat.h>
46
47#include <db.h>
48#include <err.h>
49#include <errno.h>
50#include <fcntl.h>
51#include <limits.h>
52#include <pwd.h>
53#include <signal.h>
54#include <stdio.h>
55#include <stdlib.h>
56#include <string.h>
57#include <unistd.h>
58
59#include "pw_scan.h"
60
61#define	INSECURE	1
62#define	SECURE		2
63#define	PERM_INSECURE	(S_IRUSR|S_IWUSR|S_IRGRP|S_IROTH)
64#define	PERM_SECURE	(S_IRUSR|S_IWUSR)
65
66HASHINFO openinfo = {
67	4096,		/* bsize */
68	32,		/* ffactor */
69	256,		/* nelem */
70	2048 * 1024,	/* cachesize */
71	NULL,		/* hash() */
72	0		/* lorder */
73};
74
75static enum state { FILE_INSECURE, FILE_SECURE, FILE_ORIG } clean;
76static struct passwd pwd;			/* password structure */
77static char *pname;				/* password file name */
78static char prefix[MAXPATHLEN];
79
80void	cleanup __P((void));
81void	error __P((char *));
82void	mv __P((char *, char *));
83int	scan __P((FILE *, struct passwd *));
84void	usage __P((void));
85
86int
87main(argc, argv)
88	int argc;
89	char *argv[];
90{
91	DB *dp, *edp;
92	DBT data, key;
93	FILE *fp, *oldfp;
94	sigset_t set;
95	int ch, cnt, len, makeold, tfd, yp_enabled = 0;
96	char *p, *t;
97	char buf[MAX(MAXPATHLEN, LINE_MAX * 2)], tbuf[1024];
98	char buf2[MAXPATHLEN];
99
100	strcpy(prefix, _PATH_PWD);
101	makeold = 0;
102	while ((ch = getopt(argc, argv, "d:pv")) != EOF)
103		switch(ch) {
104		case 'd':
105			strcpy(prefix, optarg);
106			break;
107		case 'p':			/* create V7 "file.orig" */
108			makeold = 1;
109			break;
110		case 'v':                       /* backward compatible */
111			break;
112		case '?':
113		default:
114			usage();
115		}
116	argc -= optind;
117	argv += optind;
118
119	if (argc != 1)
120		usage();
121
122	/*
123	 * This could be changed to allow the user to interrupt.
124	 * Probably not worth the effort.
125	 */
126	sigemptyset(&set);
127	sigaddset(&set, SIGTSTP);
128	sigaddset(&set, SIGHUP);
129	sigaddset(&set, SIGINT);
130	sigaddset(&set, SIGQUIT);
131	sigaddset(&set, SIGTERM);
132	(void)sigprocmask(SIG_BLOCK, &set, (sigset_t *)NULL);
133
134	/* We don't care what the user wants. */
135	(void)umask(0);
136
137	pname = *argv;
138	/* Open the original password file */
139	if (!(fp = fopen(pname, "r")))
140		error(pname);
141
142	/* Open the temporary insecure password database. */
143	(void)snprintf(buf, sizeof(buf), "%s/%s.tmp", prefix, _MP_DB);
144	dp = dbopen(buf,
145	    O_RDWR|O_CREAT|O_EXCL, PERM_INSECURE, DB_HASH, &openinfo);
146	if (dp == NULL)
147		error(buf);
148	clean = FILE_INSECURE;
149
150	/*
151	 * Open file for old password file.  Minor trickiness -- don't want to
152	 * chance the file already existing, since someone (stupidly) might
153	 * still be using this for permission checking.  So, open it first and
154	 * fdopen the resulting fd.  The resulting file should be readable by
155	 * everyone.
156	 */
157	if (makeold) {
158		(void)snprintf(buf, sizeof(buf), "%s.orig", pname);
159		if ((tfd = open(buf,
160		    O_WRONLY|O_CREAT|O_EXCL, PERM_INSECURE)) < 0)
161			error(buf);
162		if ((oldfp = fdopen(tfd, "w")) == NULL)
163			error(buf);
164		clean = FILE_ORIG;
165	}
166
167	/*
168	 * The databases actually contain three copies of the original data.
169	 * Each password file entry is converted into a rough approximation
170	 * of a ``struct passwd'', with the strings placed inline.  This
171	 * object is then stored as the data for three separate keys.  The
172	 * first key * is the pw_name field prepended by the _PW_KEYBYNAME
173	 * character.  The second key is the pw_uid field prepended by the
174	 * _PW_KEYBYUID character.  The third key is the line number in the
175	 * original file prepended by the _PW_KEYBYNUM character.  (The special
176	 * characters are prepended to ensure that the keys do not collide.)
177	 */
178	data.data = (u_char *)buf;
179	key.data = (u_char *)tbuf;
180	for (cnt = 1; scan(fp, &pwd); ++cnt) {
181		if(pwd.pw_name[0] == '+') yp_enabled = 1;
182#define	COMPACT(e)	t = e; while (*p++ = *t++);
183		/* Create insecure data. */
184		p = buf;
185		COMPACT(pwd.pw_name);
186		COMPACT("*");
187		memmove(p, &pwd.pw_uid, sizeof(int));
188		p += sizeof(int);
189		memmove(p, &pwd.pw_gid, sizeof(int));
190		p += sizeof(int);
191		memmove(p, &pwd.pw_change, sizeof(time_t));
192		p += sizeof(time_t);
193		COMPACT(pwd.pw_class);
194		COMPACT(pwd.pw_gecos);
195		COMPACT(pwd.pw_dir);
196		COMPACT(pwd.pw_shell);
197		memmove(p, &pwd.pw_expire, sizeof(time_t));
198		p += sizeof(time_t);
199		memmove(p, &pwd.pw_fields, sizeof pwd.pw_fields);
200		p += sizeof pwd.pw_fields;
201		data.size = p - buf;
202
203		/* Store insecure by name. */
204		tbuf[0] = _PW_KEYBYNAME;
205		len = strlen(pwd.pw_name);
206		memmove(tbuf + 1, pwd.pw_name, len);
207		key.size = len + 1;
208		if ((dp->put)(dp, &key, &data, R_NOOVERWRITE) == -1)
209			error("put");
210
211		/* Store insecure by number. */
212		tbuf[0] = _PW_KEYBYNUM;
213		memmove(tbuf + 1, &cnt, sizeof(cnt));
214		key.size = sizeof(cnt) + 1;
215		if ((dp->put)(dp, &key, &data, R_NOOVERWRITE) == -1)
216			error("put");
217
218		/* Store insecure by uid. */
219		tbuf[0] = _PW_KEYBYUID;
220		memmove(tbuf + 1, &pwd.pw_uid, sizeof(pwd.pw_uid));
221		key.size = sizeof(pwd.pw_uid) + 1;
222		if ((dp->put)(dp, &key, &data, R_NOOVERWRITE) == -1)
223			error("put");
224
225		/* Create original format password file entry */
226		if (makeold)
227			(void)fprintf(oldfp, "%s:*:%d:%d:%s:%s:%s\n",
228			    pwd.pw_name, pwd.pw_uid, pwd.pw_gid, pwd.pw_gecos,
229			    pwd.pw_dir, pwd.pw_shell);
230	}
231	/* If YP enabled, set flag. */
232	if(yp_enabled) {
233		tbuf[0] = _PW_KEYYPENABLED;
234		key.size = 1;
235		if ((dp->put)(dp, &key, &data, R_NOOVERWRITE) == -1)
236			error("put");
237	}
238
239	(void)(dp->close)(dp);
240	if (makeold) {
241		(void)fflush(oldfp);
242		(void)fclose(oldfp);
243	}
244
245	/* Open the temporary encrypted password database. */
246	(void)snprintf(buf, sizeof(buf), "%s/%s.tmp", prefix, _SMP_DB);
247	edp = dbopen(buf,
248	    O_RDWR|O_CREAT|O_EXCL, PERM_SECURE, DB_HASH, &openinfo);
249	if (!edp)
250		error(buf);
251	clean = FILE_SECURE;
252
253	rewind(fp);
254	for (cnt = 1; scan(fp, &pwd); ++cnt) {
255
256		/* Create secure data. */
257		p = buf;
258		COMPACT(pwd.pw_name);
259		COMPACT(pwd.pw_passwd);
260		memmove(p, &pwd.pw_uid, sizeof(int));
261		p += sizeof(int);
262		memmove(p, &pwd.pw_gid, sizeof(int));
263		p += sizeof(int);
264		memmove(p, &pwd.pw_change, sizeof(time_t));
265		p += sizeof(time_t);
266		COMPACT(pwd.pw_class);
267		COMPACT(pwd.pw_gecos);
268		COMPACT(pwd.pw_dir);
269		COMPACT(pwd.pw_shell);
270		memmove(p, &pwd.pw_expire, sizeof(time_t));
271		p += sizeof(time_t);
272		memmove(p, &pwd.pw_fields, sizeof pwd.pw_fields);
273		p += sizeof pwd.pw_fields;
274		data.size = p - buf;
275
276		/* Store secure by name. */
277		tbuf[0] = _PW_KEYBYNAME;
278		len = strlen(pwd.pw_name);
279		memmove(tbuf + 1, pwd.pw_name, len);
280		key.size = len + 1;
281		if ((dp->put)(edp, &key, &data, R_NOOVERWRITE) == -1)
282			error("put");
283
284		/* Store secure by number. */
285		tbuf[0] = _PW_KEYBYNUM;
286		memmove(tbuf + 1, &cnt, sizeof(cnt));
287		key.size = sizeof(cnt) + 1;
288		if ((dp->put)(edp, &key, &data, R_NOOVERWRITE) == -1)
289			error("put");
290
291		/* Store secure by uid. */
292		tbuf[0] = _PW_KEYBYUID;
293		memmove(tbuf + 1, &pwd.pw_uid, sizeof(pwd.pw_uid));
294		key.size = sizeof(pwd.pw_uid) + 1;
295		if ((dp->put)(edp, &key, &data, R_NOOVERWRITE) == -1)
296			error("put");
297	}
298
299	/* If YP enabled, set flag. */
300	if(yp_enabled) {
301		tbuf[0] = _PW_KEYYPENABLED;
302		key.size = 1;
303		if ((dp->put)(edp, &key, &data, R_NOOVERWRITE) == -1)
304			error("put");
305	}
306
307	(void)(edp->close)(edp);
308
309	/* Set master.passwd permissions, in case caller forgot. */
310	(void)fchmod(fileno(fp), S_IRUSR|S_IWUSR);
311	(void)fclose(fp);
312
313	/* Install as the real password files. */
314	(void)snprintf(buf, sizeof(buf), "%s/%s.tmp", prefix, _MP_DB);
315	(void)snprintf(buf2, sizeof(buf2), "%s/%s", prefix, _MP_DB);
316	mv(buf, buf2);
317	(void)snprintf(buf, sizeof(buf), "%s/%s.tmp", prefix, _SMP_DB);
318	(void)snprintf(buf2, sizeof(buf2), "%s/%s", prefix, _SMP_DB);
319	mv(buf, buf2);
320	if (makeold) {
321		(void)snprintf(buf2, sizeof(buf2), "%s/%s", prefix, _PASSWD);
322		(void)snprintf(buf, sizeof(buf), "%s.orig", pname);
323		mv(buf, buf2);
324	}
325	/*
326	 * Move the master password LAST -- chpass(1), passwd(1) and vipw(8)
327	 * all use flock(2) on it to block other incarnations of themselves.
328	 * The rename means that everything is unlocked, as the original file
329	 * can no longer be accessed.
330	 */
331	(void)snprintf(buf, sizeof(buf), "%s/%s", prefix, _MASTERPASSWD);
332	mv(pname, buf);
333	exit(0);
334}
335
336int
337scan(fp, pw)
338	FILE *fp;
339	struct passwd *pw;
340{
341	static int lcnt;
342	static char line[LINE_MAX];
343	char *p;
344
345	if (!fgets(line, sizeof(line), fp))
346		return (0);
347	++lcnt;
348	/*
349	 * ``... if I swallow anything evil, put your fingers down my
350	 * throat...''
351	 *	-- The Who
352	 */
353	if (!(p = strchr(line, '\n'))) {
354		warnx("line too long");
355		goto fmt;
356
357	}
358	*p = '\0';
359	if (!pw_scan(line, pw)) {
360		warnx("at line #%d", lcnt);
361fmt:		errno = EFTYPE;	/* XXX */
362		error(pname);
363	}
364
365	return (1);
366}
367
368void
369mv(from, to)
370	char *from, *to;
371{
372	char buf[MAXPATHLEN];
373
374	if (rename(from, to)) {
375		int sverrno = errno;
376		(void)snprintf(buf, sizeof(buf), "%s to %s", from, to);
377		errno = sverrno;
378		error(buf);
379	}
380}
381
382void
383error(name)
384	char *name;
385{
386
387	warn(name);
388	cleanup();
389	exit(1);
390}
391
392void
393cleanup()
394{
395	char buf[MAXPATHLEN];
396
397	switch(clean) {
398	case FILE_ORIG:
399		(void)snprintf(buf, sizeof(buf), "%s.orig", pname);
400		(void)unlink(buf);
401		/* FALLTHROUGH */
402	case FILE_SECURE:
403		(void)snprintf(buf, sizeof(buf), "%s/%s.tmp", prefix, _SMP_DB);
404		(void)unlink(buf);
405		/* FALLTHROUGH */
406	case FILE_INSECURE:
407		(void)snprintf(buf, sizeof(buf), "%s/%s.tmp", prefix, _MP_DB);
408		(void)unlink(buf);
409	}
410}
411
412void
413usage()
414{
415
416	(void)fprintf(stderr, "usage: pwd_mkdb [-p] [-d <dest dir>] file\n");
417	exit(1);
418}
419