* Copyright (c) 1988 The Regents of the University of California.
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
* 3. All advertising materials mentioning features or use of this software
* must display the following acknowledgement:
* This product includes software developed by the University of
* California, Berkeley and its contributors.
* 4. Neither the name of the University nor the names of its contributors
* may be used to endorse or promote products derived from this software
* without specific prior written permission.
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
#if defined(LIBC_SCCS) && !defined(lint)
/*static char *sccsid = "from: @(#)getpwent.c 5.21 (Berkeley) 3/14/91";*/
static char *rcsid
= "$Id: getpwent.c,v 1.10 1993/12/10 12:46:29 deraadt Exp $";
#endif /* LIBC_SCCS and not lint */
#include <rpcsvc/yp_prot.h>
#include <rpcsvc/ypclnt.h>
static struct passwd _pw_passwd
; /* password structure */
static DB
*_pw_db
; /* password database */
static int _pw_keynum
; /* key counter */
static int _pw_stayopen
; /* keep fd's open */
static int __hashpw(), __initdb();
static char *__ypcurrent
, *__ypdomain
;
static int __ypcurrentlen
, __ypmode
=0;
pw
->pw_name
= strsep(&bp
, ":\n");
pw
->pw_passwd
= strsep(&bp
, ":\n");
if (!(cp
= strsep(&bp
, ":\n")))
if (!(cp
= strsep(&bp
, ":\n")))
pw
->pw_gecos
= strsep(&bp
, ":\n");
pw
->pw_dir
= strsep(&bp
, ":\n");
pw
->pw_shell
= strsep(&bp
, ":\n");
char bf
[sizeof(_pw_keynum
) + 1];
if (!_pw_db
&& !__initdb())
return((struct passwd
*)NULL
);
if( _yp_check(&__ypdomain
) == 0) {
r
= yp_next(__ypdomain
, "passwd.byname",
__ypcurrent
, __ypcurrentlen
,
&key
, &keylen
, &data
, &datalen
);
/*printf("yp_next %d\n", r);*/
bcopy(data
, line
, datalen
);
r
= yp_first(__ypdomain
, "passwd.byname",
&__ypcurrent
, &__ypcurrentlen
,
/*printf("yp_first %d\n", r);*/
bcopy(data
, line
, datalen
);
/*printf("line = %s\n", line);*/
bcopy((char *)&_pw_keynum
, bf
+ 1, sizeof(_pw_keynum
));
key
.size
= sizeof(_pw_keynum
) + 1;
if(strcmp(_pw_passwd
.pw_name
, "+") == 0) {
return (struct passwd
*)NULL
;
_pw_passwd
.pw_name
= strsep(&bp
, ":\n");
_pw_passwd
.pw_passwd
= strsep(&bp
, ":\n");
if (!(cp
= strsep(&bp
, ":\n")))
_pw_passwd
.pw_uid
= atoi(cp
);
if (!(cp
= strsep(&bp
, ":\n")))
_pw_passwd
.pw_gid
= atoi(cp
);
_pw_passwd
.pw_change
= 0;
_pw_passwd
.pw_class
= "";
_pw_passwd
.pw_gecos
= strsep(&bp
, ":\n");
_pw_passwd
.pw_dir
= strsep(&bp
, ":\n");
_pw_passwd
.pw_shell
= strsep(&bp
, ":\n");
_pw_passwd
.pw_expire
= 0;
char bf
[UT_NAMESIZE
+ 1];
if (!_pw_db
&& !__initdb())
return((struct passwd
*)NULL
);
bcopy("+", bf
+ 1, MIN(len
, UT_NAMESIZE
));
* If there is a user called "+", then YP is active. In that
* case we must sequence through the passwd file in sequence.
for(_pw_keynum
=1; _pw_keynum
; _pw_keynum
++) {
bcopy((char *)&_pw_keynum
, bf
+ 1, sizeof(_pw_keynum
));
key
.size
= sizeof(_pw_keynum
) + 1;
if(strcmp(_pw_passwd
.pw_name
, "+") == 0) {
if(_yp_check(&__ypdomain
) == 0) {
r
= yp_match(__ypdomain
, "passwd.byname",
&__ypcurrent
, &__ypcurrentlen
);
bcopy(__ypcurrent
, line
, __ypcurrentlen
);
line
[__ypcurrentlen
] = '\0';
if(__ypparse(&_pw_passwd
, line
))
if( strcmp(_pw_passwd
.pw_name
, name
) == 0) {
(void)(_pw_db
->close
)(_pw_db
);
(void)(_pw_db
->close
)(_pw_db
);
return (struct passwd
*)NULL
;
bcopy(name
, bf
+ 1, MIN(len
, UT_NAMESIZE
));
(void)(_pw_db
->close
)(_pw_db
);
return(rval
? &_pw_passwd
: (struct passwd
*)NULL
);
char bf
[sizeof(_pw_keynum
) + 1];
if (!_pw_db
&& !__initdb())
return((struct passwd
*)NULL
);
bcopy("+", bf
+ 1, MIN(len
, UT_NAMESIZE
));
* If there is a user called "+", then YP is active. In that
* case we must sequence through the passwd file in sequence.
for(_pw_keynum
=1; _pw_keynum
; _pw_keynum
++) {
bcopy((char *)&_pw_keynum
, bf
+ 1, sizeof(_pw_keynum
));
key
.size
= sizeof(_pw_keynum
) + 1;
if(strcmp(_pw_passwd
.pw_name
, "+") == 0) {
if(_yp_check(&__ypdomain
) == 0) {
sprintf(uidbuf
, "%d", uid
);
r
= yp_match(__ypdomain
, "passwd.byuid",
&__ypcurrent
, &__ypcurrentlen
);
bcopy(__ypcurrent
, line
, __ypcurrentlen
);
line
[__ypcurrentlen
] = '\0';
if(__ypparse(&_pw_passwd
, line
))
if( _pw_passwd
.pw_uid
== uid
) {
(void)(_pw_db
->close
)(_pw_db
);
(void)(_pw_db
->close
)(_pw_db
);
return (struct passwd
*)NULL
;
bcopy(&keyuid
, bf
+ 1, sizeof(keyuid
));
key
.size
= sizeof(keyuid
) + 1;
(void)(_pw_db
->close
)(_pw_db
);
return(rval
? &_pw_passwd
: (struct passwd
*)NULL
);
(void)(_pw_db
->close
)(_pw_db
);
p
= (geteuid()) ? _PATH_MP_DB
: _PATH_SMP_DB
;
_pw_db
= dbopen(p
, O_RDONLY
, 0, DB_HASH
, NULL
);
syslog(LOG_ERR
, "%s: %m", p
);
if ((_pw_db
->get
)(_pw_db
, key
, &data
, 0))
if (data
.size
> max
&& !(line
= realloc(line
, max
+= 1024)))
#define EXPAND(e) e = t; while (*t++ = *p++);
EXPAND(_pw_passwd
.pw_name
);
EXPAND(_pw_passwd
.pw_passwd
);
bcopy(p
, (char *)&_pw_passwd
.pw_uid
, sizeof(int));
bcopy(p
, (char *)&_pw_passwd
.pw_gid
, sizeof(int));
bcopy(p
, (char *)&_pw_passwd
.pw_change
, sizeof(time_t));
EXPAND(_pw_passwd
.pw_class
);
EXPAND(_pw_passwd
.pw_gecos
);
EXPAND(_pw_passwd
.pw_dir
);
EXPAND(_pw_passwd
.pw_shell
);
bcopy(p
, (char *)&_pw_passwd
.pw_expire
, sizeof(time_t));