pwd_mkdb.c revision 7277
1/*-
2 * Copyright (c) 1991, 1993, 1994
3 *	The Regents of the University of California.  All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 *    notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 *    notice, this list of conditions and the following disclaimer in the
12 *    documentation and/or other materials provided with the distribution.
13 * 3. All advertising materials mentioning features or use of this software
14 *    must display the following acknowledgement:
15 *	This product includes software developed by the University of
16 *	California, Berkeley and its contributors.
17 * 4. Neither the name of the University nor the names of its contributors
18 *    may be used to endorse or promote products derived from this software
19 *    without specific prior written permission.
20 *
21 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31 * SUCH DAMAGE.
32 */
33
34#ifndef lint
35static char copyright[] =
36"@(#) Copyright (c) 1991, 1993, 1994\n\
37	The Regents of the University of California.  All rights reserved.\n";
38#endif /* not lint */
39
40#ifndef lint
41static char sccsid[] = "@(#)pwd_mkdb.c	8.5 (Berkeley) 4/20/94";
42#endif /* not lint */
43
44#include <sys/param.h>
45#include <sys/stat.h>
46
47#include <db.h>
48#include <err.h>
49#include <errno.h>
50#include <fcntl.h>
51#include <limits.h>
52#include <pwd.h>
53#include <signal.h>
54#include <stdio.h>
55#include <stdlib.h>
56#include <string.h>
57#include <unistd.h>
58
59#include "pw_scan.h"
60
61#define	INSECURE	1
62#define	SECURE		2
63#define	PERM_INSECURE	(S_IRUSR|S_IWUSR|S_IRGRP|S_IROTH)
64#define	PERM_SECURE	(S_IRUSR|S_IWUSR)
65
66HASHINFO openinfo = {
67	4096,		/* bsize */
68	32,		/* ffactor */
69	256,		/* nelem */
70	2048 * 1024,	/* cachesize */
71	NULL,		/* hash() */
72	0		/* lorder */
73};
74
75static enum state { FILE_INSECURE, FILE_SECURE, FILE_ORIG } clean;
76static struct passwd pwd;			/* password structure */
77static char *pname;				/* password file name */
78static char prefix[MAXPATHLEN];
79
80void	cleanup __P((void));
81void	error __P((char *));
82void	mv __P((char *, char *));
83int	scan __P((FILE *, struct passwd *));
84void	usage __P((void));
85
86int
87main(argc, argv)
88	int argc;
89	char *argv[];
90{
91	DB *dp, *edp;
92	DBT data, key;
93	FILE *fp, *oldfp;
94	sigset_t set;
95	int ch, cnt, pluscnt, minuscnt, len, makeold, tfd, yp_enabled = 0;
96	char *p, *t;
97	char buf[MAX(MAXPATHLEN, LINE_MAX * 2)], tbuf[1024];
98	char buf2[MAXPATHLEN];
99
100	strcpy(prefix, _PATH_PWD);
101	makeold = 0;
102	while ((ch = getopt(argc, argv, "d:pv")) != EOF)
103		switch(ch) {
104		case 'd':
105			strcpy(prefix, optarg);
106			break;
107		case 'p':			/* create V7 "file.orig" */
108			makeold = 1;
109			break;
110		case 'v':                       /* backward compatible */
111			break;
112		case '?':
113		default:
114			usage();
115		}
116	argc -= optind;
117	argv += optind;
118
119	if (argc != 1)
120		usage();
121
122	/*
123	 * This could be changed to allow the user to interrupt.
124	 * Probably not worth the effort.
125	 */
126	sigemptyset(&set);
127	sigaddset(&set, SIGTSTP);
128	sigaddset(&set, SIGHUP);
129	sigaddset(&set, SIGINT);
130	sigaddset(&set, SIGQUIT);
131	sigaddset(&set, SIGTERM);
132	(void)sigprocmask(SIG_BLOCK, &set, (sigset_t *)NULL);
133
134	/* We don't care what the user wants. */
135	(void)umask(0);
136
137	pname = *argv;
138	/* Open the original password file */
139	if (!(fp = fopen(pname, "r")))
140		error(pname);
141
142	/* Open the temporary insecure password database. */
143	(void)snprintf(buf, sizeof(buf), "%s/%s.tmp", prefix, _MP_DB);
144	dp = dbopen(buf,
145	    O_RDWR|O_CREAT|O_EXCL, PERM_INSECURE, DB_HASH, &openinfo);
146	if (dp == NULL)
147		error(buf);
148	clean = FILE_INSECURE;
149
150	/*
151	 * Open file for old password file.  Minor trickiness -- don't want to
152	 * chance the file already existing, since someone (stupidly) might
153	 * still be using this for permission checking.  So, open it first and
154	 * fdopen the resulting fd.  The resulting file should be readable by
155	 * everyone.
156	 */
157	if (makeold) {
158		(void)snprintf(buf, sizeof(buf), "%s.orig", pname);
159		if ((tfd = open(buf,
160		    O_WRONLY|O_CREAT|O_EXCL, PERM_INSECURE)) < 0)
161			error(buf);
162		if ((oldfp = fdopen(tfd, "w")) == NULL)
163			error(buf);
164		clean = FILE_ORIG;
165	}
166
167	/*
168	 * The databases actually contain three copies of the original data.
169	 * Each password file entry is converted into a rough approximation
170	 * of a ``struct passwd'', with the strings placed inline.  This
171	 * object is then stored as the data for three separate keys.  The
172	 * first key * is the pw_name field prepended by the _PW_KEYBYNAME
173	 * character.  The second key is the pw_uid field prepended by the
174	 * _PW_KEYBYUID character.  The third key is the line number in the
175	 * original file prepended by the _PW_KEYBYNUM character.  (The special
176	 * characters are prepended to ensure that the keys do not collide.)
177	 */
178	minuscnt = pluscnt = 0;
179	data.data = (u_char *)buf;
180	key.data = (u_char *)tbuf;
181	for (cnt = 1; scan(fp, &pwd); ++cnt) {
182		if(pwd.pw_name[0] == '+')
183			yp_enabled = 1;
184#define	COMPACT(e)	t = e; while (*p++ = *t++);
185		/* Create insecure data. */
186		p = buf;
187		COMPACT(pwd.pw_name);
188		COMPACT("*");
189		memmove(p, &pwd.pw_uid, sizeof(int));
190		p += sizeof(int);
191		memmove(p, &pwd.pw_gid, sizeof(int));
192		p += sizeof(int);
193		memmove(p, &pwd.pw_change, sizeof(time_t));
194		p += sizeof(time_t);
195		COMPACT(pwd.pw_class);
196		COMPACT(pwd.pw_gecos);
197		COMPACT(pwd.pw_dir);
198		COMPACT(pwd.pw_shell);
199		memmove(p, &pwd.pw_expire, sizeof(time_t));
200		p += sizeof(time_t);
201		memmove(p, &pwd.pw_fields, sizeof pwd.pw_fields);
202		p += sizeof pwd.pw_fields;
203		data.size = p - buf;
204
205		/* Store insecure by name. */
206		tbuf[0] = _PW_KEYBYNAME;
207		len = strlen(pwd.pw_name);
208		memmove(tbuf + 1, pwd.pw_name, len);
209		key.size = len + 1;
210		if ((dp->put)(dp, &key, &data, R_NOOVERWRITE) == -1)
211			error("put");
212
213		/* Store insecure by number. */
214		tbuf[0] = _PW_KEYBYNUM;
215		memmove(tbuf + 1, &cnt, sizeof(cnt));
216		key.size = sizeof(cnt) + 1;
217		if ((dp->put)(dp, &key, &data, R_NOOVERWRITE) == -1)
218			error("put");
219
220		/* Store insecure by uid. */
221		tbuf[0] = _PW_KEYBYUID;
222		memmove(tbuf + 1, &pwd.pw_uid, sizeof(pwd.pw_uid));
223		key.size = sizeof(pwd.pw_uid) + 1;
224		if ((dp->put)(dp, &key, &data, R_NOOVERWRITE) == -1)
225			error("put");
226
227		/* Store insecure special plus and special minus */
228		if ((pwd.pw_name[0] == '+' || pwd.pw_name[0] == '-')
229			&& pwd.pw_name[1]) {
230			tbuf[0] = (pwd.pw_name[0] == '+') ?
231				_PW_KEYPLUSBYNUM : _PW_KEYMINUSBYNUM;
232			memmove(tbuf + 1, (pwd.pw_name[0] == '+') ?
233				&pluscnt : &minuscnt, sizeof(cnt));
234			if (pwd.pw_name[0] == '+')
235				pluscnt++;
236			else
237				minuscnt++;
238			key.size = sizeof(cnt) + 1;
239			if ((dp->put)(dp, &key, &data, R_NOOVERWRITE) == -1)
240				error("put");
241		}
242
243		/* Create original format password file entry */
244		if (makeold)
245			(void)fprintf(oldfp, "%s:*:%d:%d:%s:%s:%s\n",
246			    pwd.pw_name, pwd.pw_uid, pwd.pw_gid, pwd.pw_gecos,
247			    pwd.pw_dir, pwd.pw_shell);
248	}
249	/* If YP enabled, set flag. */
250	if(yp_enabled) {
251		buf[0] = yp_enabled + 2;
252		data.size = 1;
253		tbuf[0] = _PW_KEYYPENABLED;
254		key.size = 1;
255		if ((dp->put)(dp, &key, &data, R_NOOVERWRITE) == -1)
256			error("put");
257	}
258	/* If we have +@netgroup entries, store the plus counter */
259	if(pluscnt) {
260		buf[0] = pluscnt;
261		data.size = sizeof(pluscnt);
262		tbuf[0] = _PW_KEYPLUSCNT;
263		key.size = 1;
264		if ((dp->put)(dp, &key, &data, R_NOOVERWRITE) == -1)
265			error("put");
266	}
267	/* If we have -@netgroup entries, store the minus counter */
268	if(minuscnt) {
269		buf[0] = minuscnt;
270		data.size = sizeof(minuscnt);
271		tbuf[0] = _PW_KEYMINUSCNT;
272		key.size = 1;
273		if ((dp->put)(dp, &key, &data, R_NOOVERWRITE) == -1)
274			error("put");
275	}
276
277	(void)(dp->close)(dp);
278	if (makeold) {
279		(void)fflush(oldfp);
280		(void)fclose(oldfp);
281	}
282
283	/* Open the temporary encrypted password database. */
284	(void)snprintf(buf, sizeof(buf), "%s/%s.tmp", prefix, _SMP_DB);
285	edp = dbopen(buf,
286	    O_RDWR|O_CREAT|O_EXCL, PERM_SECURE, DB_HASH, &openinfo);
287	if (!edp)
288		error(buf);
289	clean = FILE_SECURE;
290
291	rewind(fp);
292	minuscnt = pluscnt = 0;
293	for (cnt = 1; scan(fp, &pwd); ++cnt) {
294
295		/* Create secure data. */
296		p = buf;
297		COMPACT(pwd.pw_name);
298		COMPACT(pwd.pw_passwd);
299		memmove(p, &pwd.pw_uid, sizeof(int));
300		p += sizeof(int);
301		memmove(p, &pwd.pw_gid, sizeof(int));
302		p += sizeof(int);
303		memmove(p, &pwd.pw_change, sizeof(time_t));
304		p += sizeof(time_t);
305		COMPACT(pwd.pw_class);
306		COMPACT(pwd.pw_gecos);
307		COMPACT(pwd.pw_dir);
308		COMPACT(pwd.pw_shell);
309		memmove(p, &pwd.pw_expire, sizeof(time_t));
310		p += sizeof(time_t);
311		memmove(p, &pwd.pw_fields, sizeof pwd.pw_fields);
312		p += sizeof pwd.pw_fields;
313		data.size = p - buf;
314
315		/* Store secure by name. */
316		tbuf[0] = _PW_KEYBYNAME;
317		len = strlen(pwd.pw_name);
318		memmove(tbuf + 1, pwd.pw_name, len);
319		key.size = len + 1;
320		if ((dp->put)(edp, &key, &data, R_NOOVERWRITE) == -1)
321			error("put");
322
323		/* Store secure by number. */
324		tbuf[0] = _PW_KEYBYNUM;
325		memmove(tbuf + 1, &cnt, sizeof(cnt));
326		key.size = sizeof(cnt) + 1;
327		if ((dp->put)(edp, &key, &data, R_NOOVERWRITE) == -1)
328			error("put");
329
330		/* Store secure by uid. */
331		tbuf[0] = _PW_KEYBYUID;
332		memmove(tbuf + 1, &pwd.pw_uid, sizeof(pwd.pw_uid));
333		key.size = sizeof(pwd.pw_uid) + 1;
334		if ((dp->put)(edp, &key, &data, R_NOOVERWRITE) == -1)
335			error("put");
336
337		/* Store secure special plus and special minus */
338		if ((pwd.pw_name[0] == '+' || pwd.pw_name[0] == '-')
339			&& pwd.pw_name[1]) {
340			tbuf[0] = (pwd.pw_name[0] == '+') ?
341				_PW_KEYPLUSBYNUM : _PW_KEYMINUSBYNUM;
342			memmove(tbuf + 1, (pwd.pw_name[0] == '+') ?
343				&pluscnt : &minuscnt, sizeof(cnt));
344			if (pwd.pw_name[0] == '+')
345				pluscnt++;
346			else
347				minuscnt++;
348			key.size = sizeof(cnt) + 1;
349			if ((dp->put)(edp, &key, &data, R_NOOVERWRITE) == -1)
350				error("put");
351		}
352	}
353	/* If YP enabled, set flag. */
354	if(yp_enabled) {
355		buf[0] = yp_enabled + 2;
356		data.size = 1;
357		tbuf[0] = _PW_KEYYPENABLED;
358		key.size = 1;
359		if ((edp->put)(edp, &key, &data, R_NOOVERWRITE) == -1)
360			error("put");
361	}
362	/* If we have +@netgroup entries, store the plus counter */
363	if(pluscnt) {
364		buf[0] = pluscnt;
365		data.size = sizeof(pluscnt);
366		tbuf[0] = _PW_KEYPLUSCNT;
367		key.size = 1;
368		if ((edp->put)(edp, &key, &data, R_NOOVERWRITE) == -1)
369			error("put");
370	}
371	/* If we have -@netgroup entries, store the minus counter */
372	if(minuscnt) {
373		buf[0] = minuscnt;
374		data.size = sizeof(minuscnt);
375		tbuf[0] = _PW_KEYMINUSCNT;
376		key.size = 1;
377		if ((edp->put)(edp, &key, &data, R_NOOVERWRITE) == -1)
378			error("put");
379	}
380	(void)(edp->close)(edp);
381
382	/* Set master.passwd permissions, in case caller forgot. */
383	(void)fchmod(fileno(fp), S_IRUSR|S_IWUSR);
384	(void)fclose(fp);
385
386	/* Install as the real password files. */
387	(void)snprintf(buf, sizeof(buf), "%s/%s.tmp", prefix, _MP_DB);
388	(void)snprintf(buf2, sizeof(buf2), "%s/%s", prefix, _MP_DB);
389	mv(buf, buf2);
390	(void)snprintf(buf, sizeof(buf), "%s/%s.tmp", prefix, _SMP_DB);
391	(void)snprintf(buf2, sizeof(buf2), "%s/%s", prefix, _SMP_DB);
392	mv(buf, buf2);
393	if (makeold) {
394		(void)snprintf(buf2, sizeof(buf2), "%s/%s", prefix, _PASSWD);
395		(void)snprintf(buf, sizeof(buf), "%s.orig", pname);
396		mv(buf, buf2);
397	}
398	/*
399	 * Move the master password LAST -- chpass(1), passwd(1) and vipw(8)
400	 * all use flock(2) on it to block other incarnations of themselves.
401	 * The rename means that everything is unlocked, as the original file
402	 * can no longer be accessed.
403	 */
404	(void)snprintf(buf, sizeof(buf), "%s/%s", prefix, _MASTERPASSWD);
405	mv(pname, buf);
406	exit(0);
407}
408
409int
410scan(fp, pw)
411	FILE *fp;
412	struct passwd *pw;
413{
414	static int lcnt;
415	static char line[LINE_MAX];
416	char *p;
417
418	if (!fgets(line, sizeof(line), fp))
419		return (0);
420	++lcnt;
421	/*
422	 * ``... if I swallow anything evil, put your fingers down my
423	 * throat...''
424	 *	-- The Who
425	 */
426	if (!(p = strchr(line, '\n'))) {
427		warnx("line too long");
428		goto fmt;
429
430	}
431	*p = '\0';
432	if (!pw_scan(line, pw)) {
433		warnx("at line #%d", lcnt);
434fmt:		errno = EFTYPE;	/* XXX */
435		error(pname);
436	}
437
438	return (1);
439}
440
441void
442mv(from, to)
443	char *from, *to;
444{
445	char buf[MAXPATHLEN];
446
447	if (rename(from, to)) {
448		int sverrno = errno;
449		(void)snprintf(buf, sizeof(buf), "%s to %s", from, to);
450		errno = sverrno;
451		error(buf);
452	}
453}
454
455void
456error(name)
457	char *name;
458{
459
460	warn(name);
461	cleanup();
462	exit(1);
463}
464
465void
466cleanup()
467{
468	char buf[MAXPATHLEN];
469
470	switch(clean) {
471	case FILE_ORIG:
472		(void)snprintf(buf, sizeof(buf), "%s.orig", pname);
473		(void)unlink(buf);
474		/* FALLTHROUGH */
475	case FILE_SECURE:
476		(void)snprintf(buf, sizeof(buf), "%s/%s.tmp", prefix, _SMP_DB);
477		(void)unlink(buf);
478		/* FALLTHROUGH */
479	case FILE_INSECURE:
480		(void)snprintf(buf, sizeof(buf), "%s/%s.tmp", prefix, _MP_DB);
481		(void)unlink(buf);
482	}
483}
484
485void
486usage()
487{
488
489	(void)fprintf(stderr, "usage: pwd_mkdb [-p] [-d <dest dir>] file\n");
490	exit(1);
491}
492