/* $NetBSD: pwd_mkdb.c,v 1.58 2017/05/04 16:26:09 sevan Exp $ */ /* * Copyright (c) 2000, 2009 The NetBSD Foundation, Inc. * All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE * POSSIBILITY OF SUCH DAMAGE. */ /* * Copyright (c) 1991, 1993, 1994 * The Regents of the University of California. All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * 3. Neither the name of the University nor the names of its contributors * may be used to endorse or promote products derived from this software * without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. */ /* * Portions Copyright(C) 1994, Jason Downs. All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * * THIS SOFTWARE IS PROVIDED BY THE AUTHOR(S) ``AS IS'' AND ANY EXPRESS * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE * DISCLAIMED. IN NO EVENT SHALL THE AUTHOR(S) BE LIABLE FOR ANY DIRECT, * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER * CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. */ #if HAVE_NBTOOL_CONFIG_H #include "nbtool_config.h" #endif #include #if !defined(lint) __COPYRIGHT("@(#) Copyright (c) 2000, 2009\ The NetBSD Foundation, Inc. All rights reserved.\ Copyright (c) 1991, 1993, 1994\ The Regents of the University of California. All rights reserved."); __RCSID("$NetBSD: pwd_mkdb.c,v 1.58 2017/05/04 16:26:09 sevan Exp $"); #endif /* not lint */ #if HAVE_NBTOOL_CONFIG_H #include "compat_pwd.h" #else #include #endif #include #include #include #ifndef HAVE_NBTOOL_CONFIG_H #include #endif #include #include #include #include #include #include #include #include #include #include #include #include #ifndef HAVE_NBTOOL_CONFIG_H #include #endif #define MAX_CACHESIZE 8*1024*1024 #define MIN_CACHESIZE 2*1024*1024 #define PERM_INSECURE (S_IRUSR | S_IWUSR | S_IRGRP | S_IROTH) #define PERM_SECURE (S_IRUSR | S_IWUSR) #if HAVE_NBTOOL_CONFIG_H static const char __yp_token[] = "__YP!"; #else /* Pull this out of the C library. */ extern const char __yp_token[]; #endif static HASHINFO openinfo = { 4096, /* bsize */ 32, /* ffactor */ 256, /* nelem */ 0, /* cachesize */ NULL, /* hash() */ 0 /* lorder */ }; #define FILE_INSECURE 0x01 #define FILE_SECURE 0x02 #define FILE_ORIG 0x04 struct pwddb { DB *db; char dbname[MAX(MAXPATHLEN, LINE_MAX * 2)]; const char *fname; uint32_t rversion; uint32_t wversion; }; static char *pname; /* password file name */ static char prefix[MAXPATHLEN]; static char oldpwdfile[MAX(MAXPATHLEN, LINE_MAX * 2)]; static int lorder = BYTE_ORDER; static int logsyslog; static int clean; static int verbose; static int warning; static struct pwddb sdb, idb; void bailout(void) __dead; void cp(const char *, const char *, mode_t); void deldbent(struct pwddb *, int, void *); void mkpw_error(const char *, ...) __dead; void mkpw_warning(const char *, ...); int getdbent(struct pwddb *, int, void *, struct passwd **); void inconsistency(void) __dead; void install(const char *, const char *); void putdbents(struct pwddb *, struct passwd *, const char *, int, int, u_int, u_int); void putyptoken(struct pwddb *); void rm(const char *); int scan(FILE *, struct passwd *, int *, int *); void usage(void) __dead; void wr_error(const char *) __dead; uint32_t getversion(const char *); void setversion(struct pwddb *); #ifndef __lint__ #define SWAP(sw) \ ((sizeof(sw) == 2 ? (typeof(sw))bswap16((uint16_t)sw) : \ (sizeof(sw) == 4 ? (typeof(sw))bswap32((uint32_t)sw) : \ (sizeof(sw) == 8 ? (typeof(sw))bswap64((uint64_t)sw) : (abort(), 0))))) #else #define SWAP(sw) sw #endif static void closedb(struct pwddb *db) { if ((*db->db->close)(db->db) < 0) wr_error(db->dbname); } static void opendb(struct pwddb *db, const char *dbname, const char *username, uint32_t req_version, int flags, mode_t perm) { char buf[MAXPATHLEN]; (void)snprintf(db->dbname, sizeof(db->dbname), "%s%s.tmp", prefix, dbname); if (username != NULL) { (void)snprintf(buf, sizeof(buf), "%s%s", prefix, dbname); cp(buf, db->dbname, perm); } db->db = dbopen(db->dbname, flags, perm, DB_HASH, &openinfo); if (db->db == NULL) mkpw_error("Cannot open `%s'", db->dbname); db->fname = dbname; db->rversion = getversion(dbname); if (req_version == ~0U) db->wversion = db->rversion; else db->wversion = req_version; if (warning && db->rversion == 0 && db->wversion == 0) { mkpw_warning("Database %s is a version %u database.", db->fname, db->rversion); mkpw_warning("Use %s -V 1 to upgrade once you've recompiled " "all your binaries.", getprogname()); } if (db->wversion != db->rversion) { if (username != NULL) { mkpw_warning("You cannot change a single " "record from version %u to version %u\n", db->rversion, db->wversion); bailout(); } else if (verbose) { mkpw_warning("Changing %s from version %u to version %u", db->fname, db->rversion, db->wversion); } } else { if (verbose) mkpw_warning("File `%s' version %u requested %u", db->fname, db->rversion, db->wversion); } setversion(db); } int main(int argc, char *argv[]) { int ch, makeold, tfd, lineno, found, rv, hasyp, secureonly; struct passwd pwd, *tpwd; char *username; FILE *fp, *oldfp; sigset_t set; u_int dbflg, uid_dbflg; int newuser, olduid, flags; struct stat st; u_int cachesize; uint32_t req_version; prefix[0] = '\0'; makeold = 0; oldfp = NULL; username = NULL; hasyp = 0; secureonly = 0; found = 0; newuser = 0; cachesize = 0; verbose = 0; warning = 0; logsyslog = 0; req_version = ~0U; while ((ch = getopt(argc, argv, "BLc:d:lpsu:V:vw")) != -1) switch (ch) { case 'B': /* big-endian output */ lorder = BIG_ENDIAN; break; case 'L': /* little-endian output */ lorder = LITTLE_ENDIAN; break; case 'c': cachesize = atoi(optarg) * 1024 * 1024; break; case 'd': /* set prefix */ (void)strlcpy(prefix, optarg, sizeof(prefix)); break; case 'l': openlog(getprogname(), LOG_PID, LOG_AUTH); logsyslog = 1; break; case 'p': /* create V7 "file.orig" */ makeold = 1; break; case 's': /* modify secure db only */ secureonly = 1; break; case 'u': /* modify one user only */ username = optarg; break; case 'V': req_version = (uint32_t)atoi(optarg); if (req_version > 1) { mkpw_warning("Unknown version %u", req_version); return EXIT_FAILURE; } break; case 'v': verbose++; break; case 'w': warning++; break; case '?': default: usage(); } argc -= optind; argv += optind; if (argc != 1) usage(); if (username != NULL) if (username[0] == '+' || username[0] == '-') usage(); if (secureonly) makeold = 0; /* * This could be changed to allow the user to interrupt. * Probably not worth the effort. */ (void)sigemptyset(&set); (void)sigaddset(&set, SIGTSTP); (void)sigaddset(&set, SIGHUP); (void)sigaddset(&set, SIGINT); (void)sigaddset(&set, SIGQUIT); (void)sigaddset(&set, SIGTERM); (void)sigprocmask(SIG_BLOCK, &set, NULL); /* We don't care what the user wants. */ (void)umask(0); if (username == NULL) flags = O_RDWR | O_CREAT | O_EXCL; else flags = O_RDWR; pname = *argv; /* Open the original password file */ if ((fp = fopen(pname, "r")) == NULL) mkpw_error("Cannot open `%s'", pname); openinfo.lorder = lorder; if (fstat(fileno(fp), &st) == -1) mkpw_error("Cannot stat `%s'", pname); if (cachesize) { openinfo.cachesize = cachesize; } else { /* Tweak openinfo values for large passwd files. */ cachesize = (u_int)(st.st_size * 20); if (cachesize > MAX_CACHESIZE) cachesize = MAX_CACHESIZE; else if (cachesize < MIN_CACHESIZE) cachesize = MIN_CACHESIZE; openinfo.cachesize = cachesize; } /* Open the temporary insecure password database. */ if (!secureonly) { opendb(&idb, _PATH_MP_DB, username, req_version, flags, PERM_INSECURE); clean |= FILE_INSECURE; } /* Open the temporary encrypted password database. */ opendb(&sdb, _PATH_SMP_DB, username, req_version, flags, PERM_SECURE); clean |= FILE_SECURE; /* * Open file for old password file. Minor trickiness -- don't want to * chance the file already existing, since someone (stupidly) might * still be using this for permission checking. So, open it first and * fdopen the resulting fd. The resulting file should be readable by * everyone. */ if (makeold) { (void)snprintf(oldpwdfile, sizeof(oldpwdfile), "%s.orig", pname); if ((tfd = open(oldpwdfile, O_WRONLY | O_CREAT | O_EXCL, PERM_INSECURE)) < 0) mkpw_error("Cannot create `%s'", oldpwdfile); clean |= FILE_ORIG; if ((oldfp = fdopen(tfd, "w")) == NULL) mkpw_error("Cannot fdopen `%s'", oldpwdfile); } if (username != NULL) { uid_dbflg = 0; dbflg = 0; /* * Determine if this is a new entry. */ if (getdbent(&sdb, _PW_KEYBYNAME, username, &tpwd)) newuser = 1; else { newuser = 0; olduid = tpwd->pw_uid; } } else { uid_dbflg = R_NOOVERWRITE; dbflg = R_NOOVERWRITE; } /* * If we see something go by that looks like YP, we save a special * pointer record, which if YP is enabled in the C lib, will speed * things up. */ for (lineno = 0; scan(fp, &pwd, &flags, &lineno);) { /* * Create original format password file entry. */ if (makeold) { (void)fprintf(oldfp, "%s:*:%d:%d:%s:%s:%s\n", pwd.pw_name, pwd.pw_uid, pwd.pw_gid, pwd.pw_gecos, pwd.pw_dir, pwd.pw_shell); if (ferror(oldfp)) wr_error(oldpwdfile); } if (username == NULL) { /* Look like YP? */ if (pwd.pw_name[0] == '+' || pwd.pw_name[0] == '-') hasyp++; /* Warn about potentially unsafe uid/gid overrides. */ if (pwd.pw_name[0] == '+') { if ((flags & _PASSWORD_NOUID) == 0 && pwd.pw_uid == 0) mkpw_warning("line %d: superuser " "override in YP inclusion", lineno); if ((flags & _PASSWORD_NOGID) == 0 && pwd.pw_gid == 0) mkpw_warning("line %d: wheel override " "in YP inclusion", lineno); } /* Write the database entry out. */ if (!secureonly) putdbents(&idb, &pwd, "*", flags, lineno, dbflg, uid_dbflg); continue; } else if (strcmp(username, pwd.pw_name) != 0) continue; if (found) { mkpw_warning("user `%s' listed twice in password file", username); bailout(); } /* * Ensure that the text file and database agree on * which line the record is from. */ rv = getdbent(&sdb, _PW_KEYBYNUM, &lineno, &tpwd); if (newuser) { if (rv == 0) inconsistency(); } else if (rv == 1 || strcmp(username, tpwd->pw_name) != 0) inconsistency(); else if ((uid_t)olduid != pwd.pw_uid) { /* * If we're changing UID, remove the BYUID * record for the old UID only if it has the * same username. */ if (!getdbent(&sdb, _PW_KEYBYUID, &olduid, &tpwd)) { if (strcmp(username, tpwd->pw_name) == 0) { if (!secureonly) deldbent(&idb, _PW_KEYBYUID, &olduid); deldbent(&sdb, _PW_KEYBYUID, &olduid); } } else inconsistency(); } /* * If there's an existing BYUID record for the new UID and * the username doesn't match then be sure not to overwrite * it. */ if (!getdbent(&sdb, _PW_KEYBYUID, &pwd.pw_uid, &tpwd)) if (strcmp(username, tpwd->pw_name) != 0) uid_dbflg = R_NOOVERWRITE; /* Write the database entries out */ if (!secureonly) putdbents(&idb, &pwd, "*", flags, lineno, dbflg, uid_dbflg); putdbents(&sdb, &pwd, pwd.pw_passwd, flags, lineno, dbflg, uid_dbflg); found = 1; if (!makeold) break; } if (!secureonly) { /* Store YP token if needed. */ if (hasyp) putyptoken(&idb); /* Close the insecure database. */ closedb(&idb); } /* * If rebuilding the databases, we re-parse the text file and write * the secure entries out in a separate pass. */ if (username == NULL) { rewind(fp); for (lineno = 0; scan(fp, &pwd, &flags, &lineno);) putdbents(&sdb, &pwd, pwd.pw_passwd, flags, lineno, dbflg, uid_dbflg); /* Store YP token if needed. */ if (hasyp) putyptoken(&sdb); } else if (!found) { mkpw_warning("user `%s' not found in password file", username); bailout(); } /* Close the secure database. */ closedb(&sdb); /* Install as the real password files. */ if (!secureonly) install(idb.dbname, idb.fname); install(sdb.dbname, sdb.fname); /* Install the V7 password file. */ if (makeold) { if (fflush(oldfp) == EOF) wr_error(oldpwdfile); if (fclose(oldfp) == EOF) wr_error(oldpwdfile); install(oldpwdfile, _PATH_PASSWD); } /* Set master.passwd permissions, in case caller forgot. */ (void)fchmod(fileno(fp), S_IRUSR|S_IWUSR); if (fclose(fp) == EOF) wr_error(pname); /* * Move the temporary master password file LAST -- chpass(1), * passwd(1), vipw(8) and friends all use its existence to block * other incarnations of themselves. The rename means that * everything is unlocked, as the original file can no longer be * accessed. */ install(pname, _PATH_MASTERPASSWD); exit(EXIT_SUCCESS); /* NOTREACHED */ } int scan(FILE *fp, struct passwd *pw, int *flags, int *lineno) { static char line[LINE_MAX]; char *p; int oflags; if (fgets(line, (int)sizeof(line), fp) == NULL) return (0); (*lineno)++; /* * ``... if I swallow anything evil, put your fingers down my * throat...'' * -- The Who */ if ((p = strchr(line, '\n')) == NULL) { errno = EFTYPE; /* XXX */ mkpw_error("%s, %d: line too long", pname, *lineno); } *p = '\0'; if (strcmp(line, "+") == 0) { /* pw_scan() can't handle "+" */ (void)strcpy(line, "+:::::::::"); } oflags = 0; if (!pw_scan(line, pw, &oflags)) { errno = EFTYPE; /* XXX */ mkpw_error("%s, %d: Syntax mkpw_error", pname, *lineno); } *flags = oflags; return (1); } void install(const char *from, const char *to) { char buf[MAXPATHLEN]; (void)snprintf(buf, sizeof(buf), "%s%s", prefix, to); if (rename(from, buf)) mkpw_error("Cannot rename `%s' to `%s'", from, buf); } void rm(const char *victim) { if (unlink(victim) < 0) warn("unlink(%s)", victim); } void cp(const char *from, const char *to, mode_t mode) { static char buf[MAXBSIZE]; int from_fd, to_fd; ssize_t rcount, wcount; if ((from_fd = open(from, O_RDONLY, 0)) < 0) mkpw_error("Cannot open `%s'", from); if ((to_fd = open(to, O_WRONLY | O_CREAT | O_EXCL, mode)) < 0) { (void)close(from_fd); mkpw_error("Cannot open `%s'", to); } while ((rcount = read(from_fd, buf, MAXBSIZE)) > 0) { wcount = write(to_fd, buf, (size_t)rcount); if (rcount != wcount || wcount == -1) { (void)close(from_fd); (void)close(to_fd); goto on_error; } } close(from_fd); if (close(to_fd)) goto on_error; if (rcount < 0) goto on_error; return; on_error: mkpw_error("Cannot copy `%s' to `%s'", from, to); } void wr_error(const char *str) { mkpw_error("Cannot write `%s'", str); } void mkpw_error(const char *fmt, ...) { va_list ap; va_start(ap, fmt); if (logsyslog) { int sverrno = errno; char efmt[BUFSIZ]; snprintf(efmt, sizeof(efmt), "%s (%%m)", fmt); errno = sverrno; vsyslog(LOG_ERR, efmt, ap); } else vwarn(fmt, ap); va_end(ap); bailout(); } void mkpw_warning(const char *fmt, ...) { va_list ap; va_start(ap, fmt); if (logsyslog) vsyslog(LOG_WARNING, fmt, ap); else vwarnx(fmt, ap); va_end(ap); } void inconsistency(void) { mkpw_warning("text files and databases are inconsistent"); mkpw_warning("re-build the databases without -u"); bailout(); } void bailout(void) { if ((clean & FILE_ORIG) != 0) rm(oldpwdfile); if ((clean & FILE_SECURE) != 0) rm(sdb.dbname); if ((clean & FILE_INSECURE) != 0) rm(idb.dbname); exit(EXIT_FAILURE); } uint32_t getversion(const char *fname) { DBT data, key; int ret; uint32_t version = 0; DB *db; db = dbopen(fname, O_RDONLY, PERM_INSECURE, DB_HASH, NULL); if (db == NULL) { /* If we are building on a separate root, assume version 1 */ if ((errno == EACCES && prefix[0]) || errno == ENOENT) return 1; mkpw_warning("Cannot open database `%s'", fname); bailout(); } key.data = __UNCONST("VERSION"); key.size = strlen((const char *)key.data) + 1; switch (ret = (*db->get)(db, &key, &data, 0)) { case -1: /* Error */ mkpw_warning("Cannot get VERSION record from database `%s'", fname); goto out; case 0: if (data.size != sizeof(version)) { mkpw_warning("Bad VERSION record in database `%s'", fname); goto out; } (void)memcpy(&version, data.data, sizeof(version)); /*FALLTHROUGH*/ case 1: if (ret == 1) mkpw_warning("Database `%s' has no version info", fname); (*db->close)(db); return version; default: mkpw_warning("internal mkpw_error db->get returns %d", ret); goto out; } out: (*db->close)(db); bailout(); /*NOTREACHED*/ } void setversion(struct pwddb *db) { DBT data, key; key.data = __UNCONST("VERSION"); key.size = strlen((const char *)key.data) + 1; data.data = &db->wversion; data.size = sizeof(uint32_t); if ((*db->db->put)(db->db, &key, &data, 0) != 0) { mkpw_warning("Can't write VERSION record to `%s'", db->dbname); bailout(); } } /* * Write entries to a database for a single user. * * The databases actually contain three copies of the original data. Each * password file entry is converted into a rough approximation of a ``struct * passwd'', with the strings placed inline. This object is then stored as * the data for three separate keys. The first key * is the pw_name field * prepended by the _PW_KEYBYNAME character. The second key is the pw_uid * field prepended by the _PW_KEYBYUID character. The third key is the line * number in the original file prepended by the _PW_KEYBYNUM character. * (The special characters are prepended to ensure that the keys do not * collide.) */ #define COMPACT(e) for (t = e; (*p++ = *t++) != '\0';) void putdbents(struct pwddb *db, struct passwd *pw, const char *passwd, int flags, int lineno, u_int dbflg, u_int uid_dbflg) { struct passwd pwd; char buf[MAX(MAXPATHLEN, LINE_MAX * 2)], tbuf[1024], *p; DBT data, key; const char *t; u_int32_t x; size_t len; (void)memcpy(&pwd, pw, sizeof(pwd)); data.data = (u_char *)buf; key.data = (u_char *)tbuf; if (lorder != BYTE_ORDER) { pwd.pw_uid = SWAP(pwd.pw_uid); pwd.pw_gid = SWAP(pwd.pw_gid); } #define WRITEPWTIMEVAR(pwvar) \ do { \ if (db->wversion == 0 && \ /*CONSTCOND*/sizeof(pwvar) == sizeof(uint64_t)) { \ uint32_t tmp = (uint32_t)pwvar; \ if (lorder != BYTE_ORDER) \ tmp = SWAP(tmp); \ (void)memmove(p, &tmp, sizeof(tmp)); \ p += sizeof(tmp); \ } else if (db->wversion == 1 && \ /*CONSTCOND*/sizeof(pwvar) == sizeof(uint32_t)) { \ uint64_t tmp = pwvar; \ if (lorder != BYTE_ORDER) \ tmp = SWAP(tmp); \ (void)memmove(p, &tmp, sizeof(tmp)); \ p += sizeof(tmp); \ } else { \ if (lorder != BYTE_ORDER) \ pwvar = SWAP(pwvar); \ (void)memmove(p, &pwvar, sizeof(pwvar)); \ p += sizeof(pwvar); \ } \ } while (/*CONSTCOND*/0) /* Create insecure data. */ p = buf; COMPACT(pwd.pw_name); COMPACT(passwd); (void)memmove(p, &pwd.pw_uid, sizeof(pwd.pw_uid)); p += sizeof(pwd.pw_uid); (void)memmove(p, &pwd.pw_gid, sizeof(pwd.pw_gid)); p += sizeof(pwd.pw_gid); WRITEPWTIMEVAR(pwd.pw_change); COMPACT(pwd.pw_class); COMPACT(pwd.pw_gecos); COMPACT(pwd.pw_dir); COMPACT(pwd.pw_shell); WRITEPWTIMEVAR(pwd.pw_expire); x = flags; if (lorder != BYTE_ORDER) x = SWAP(x); (void)memmove(p, &x, sizeof(x)); p += sizeof(x); data.size = p - buf; /* Store insecure by name. */ tbuf[0] = _PW_KEYBYNAME; len = strlen(pwd.pw_name); (void)memmove(tbuf + 1, pwd.pw_name, len); key.size = len + 1; if ((*db->db->put)(db->db, &key, &data, dbflg) == -1) wr_error(db->dbname); /* Store insecure by number. */ tbuf[0] = _PW_KEYBYNUM; x = lineno; if (lorder != BYTE_ORDER) x = SWAP(x); (void)memmove(tbuf + 1, &x, sizeof(x)); key.size = sizeof(x) + 1; if ((*db->db->put)(db->db, &key, &data, dbflg) == -1) wr_error(db->dbname); /* Store insecure by uid. */ tbuf[0] = _PW_KEYBYUID; (void)memmove(tbuf + 1, &pwd.pw_uid, sizeof(pwd.pw_uid)); key.size = sizeof(pwd.pw_uid) + 1; if ((*db->db->put)(db->db, &key, &data, uid_dbflg) == -1) wr_error(db->dbname); } void deldbent(struct pwddb *db, int type, void *keyp) { char tbuf[1024]; DBT key; u_int32_t x; size_t len; key.data = (u_char *)tbuf; switch (tbuf[0] = type) { case _PW_KEYBYNAME: len = strlen((char *)keyp); (void)memcpy(tbuf + 1, keyp, len); key.size = len + 1; break; case _PW_KEYBYNUM: case _PW_KEYBYUID: x = *(int *)keyp; if (lorder != BYTE_ORDER) x = SWAP(x); (void)memmove(tbuf + 1, &x, sizeof(x)); key.size = sizeof(x) + 1; break; } if ((*db->db->del)(db->db, &key, 0) == -1) wr_error(db->dbname); } int getdbent(struct pwddb *db, int type, void *keyp, struct passwd **tpwd) { static char buf[MAX(MAXPATHLEN, LINE_MAX * 2)]; static struct passwd pwd; char tbuf[1024], *p; DBT key, data; u_int32_t x; size_t len; int rv; data.data = (u_char *)buf; data.size = sizeof(buf); key.data = (u_char *)tbuf; switch (tbuf[0] = type) { case _PW_KEYBYNAME: len = strlen((char *)keyp); (void)memcpy(tbuf + 1, keyp, len); key.size = len + 1; break; case _PW_KEYBYNUM: case _PW_KEYBYUID: x = *(int *)keyp; if (lorder != BYTE_ORDER) x = SWAP(x); (void)memmove(tbuf + 1, &x, sizeof(x)); key.size = sizeof(x) + 1; break; } if ((rv = (*db->db->get)(db->db, &key, &data, 0)) == 1) return (rv); if (rv == -1) mkpw_error("Error getting record from `%s'", db->dbname); p = (char *)data.data; pwd.pw_name = p; while (*p++ != '\0') continue; pwd.pw_passwd = p; while (*p++ != '\0') continue; (void)memcpy(&pwd.pw_uid, p, sizeof(pwd.pw_uid)); p += sizeof(pwd.pw_uid); (void)memcpy(&pwd.pw_gid, p, sizeof(pwd.pw_gid)); p += sizeof(pwd.pw_gid); #define READPWTIMEVAR(pwvar) \ do { \ if (db->rversion == 0 && \ /*CONSTCOND*/sizeof(pwvar) == sizeof(uint64_t)) { \ uint32_t tmp; \ (void)memcpy(&tmp, p, sizeof(tmp)); \ p += sizeof(tmp); \ if (lorder != BYTE_ORDER) \ pwvar = SWAP(tmp); \ else \ pwvar = tmp; \ } else if (db->rversion == 1 && \ /*CONSTCOND*/sizeof(pwvar) == sizeof(uint32_t)) { \ uint64_t tmp; \ (void)memcpy(&tmp, p, sizeof(tmp)); \ p += sizeof(tmp); \ if (lorder != BYTE_ORDER) \ pwvar = (uint32_t)SWAP(tmp); \ else \ pwvar = (uint32_t)tmp; \ } else { \ (void)memcpy(&pwvar, p, sizeof(pwvar)); \ p += sizeof(pwvar); \ if (lorder != BYTE_ORDER) \ pwvar = SWAP(pwvar); \ } \ } while (/*CONSTCOND*/0) READPWTIMEVAR(pwd.pw_change); pwd.pw_class = p; while (*p++ != '\0') continue; pwd.pw_gecos = p; while (*p++ != '\0') continue; pwd.pw_dir = p; while (*p++ != '\0') continue; pwd.pw_shell = p; while (*p++ != '\0') continue; READPWTIMEVAR(pwd.pw_expire); if (lorder != BYTE_ORDER) { pwd.pw_uid = SWAP(pwd.pw_uid); pwd.pw_gid = SWAP(pwd.pw_gid); } *tpwd = &pwd; return (0); } void putyptoken(struct pwddb *db) { DBT data, key; key.data = __UNCONST(__yp_token); key.size = strlen(__yp_token); data.data = NULL; data.size = 0; if ((*db->db->put)(db->db, &key, &data, R_NOOVERWRITE) == -1) wr_error(db->dbname); } void usage(void) { (void)fprintf(stderr, "Usage: %s [-BLlpsvw] [-c cachesize] [-d directory] [-u user] " "[-V version] file\n", getprogname()); exit(EXIT_FAILURE); }