]> git.saurik.com Git - apple/system_cmds.git/blob - pwd_mkdb.tproj/pw_scan.c
system_cmds-279.6.tar.gz
[apple/system_cmds.git] / pwd_mkdb.tproj / pw_scan.c
1 /* $OpenBSD: passwd.c,v 1.42 2003/06/26 16:34:42 deraadt Exp $ */
2
3 /*
4 * Copyright (c) 1987, 1993, 1994, 1995
5 * The Regents of the University of California. All rights reserved.
6 *
7 * Redistribution and use in source and binary forms, with or without
8 * modification, are permitted provided that the following conditions
9 * are met:
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in the
14 * documentation and/or other materials provided with the distribution.
15 * 3. Neither the name of the University nor the names of its contributors
16 * may be used to endorse or promote products derived from this software
17 * without specific prior written permission.
18 *
19 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
20 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
21 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
22 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
23 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
24 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
25 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
26 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
27 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
28 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
29 * SUCH DAMAGE.
30 */
31
32 #if defined(LIBC_SCCS) && !defined(lint)
33 static const char rcsid[] = "$OpenBSD: passwd.c,v 1.42 2003/06/26 16:34:42 deraadt Exp $";
34 #endif /* LIBC_SCCS and not lint */
35
36 #include <sys/types.h>
37 #include <sys/stat.h>
38 #include <sys/time.h>
39 #include <sys/resource.h>
40 #include <sys/wait.h>
41
42 #include <fcntl.h>
43 #include <unistd.h>
44 #include <stdlib.h>
45 #include <stdio.h>
46 #include <string.h>
47 #include <ctype.h>
48 #include <pwd.h>
49 #include <err.h>
50 #include <errno.h>
51 #include <paths.h>
52 #include <signal.h>
53 #include <limits.h>
54
55 #include "util.h"
56
57 int
58 pw_scan(char *bp, struct passwd *pw, int *flags)
59 {
60 u_long id;
61 int root;
62 char *p, *sh, *p2;
63
64 if (flags != (int *)NULL)
65 *flags = 0;
66
67 if (!(p = strsep(&bp, ":")) || *p == '\0') /* login */
68 goto fmt;
69 pw->pw_name = p;
70 root = !strcmp(pw->pw_name, "root");
71
72 if (!(pw->pw_passwd = strsep(&bp, ":"))) /* passwd */
73 goto fmt;
74
75 if (!(p = strsep(&bp, ":"))) /* uid */
76 goto fmt;
77 id = strtoul(p, &p2, 10);
78 if (root && id) {
79 warnx("root uid should be 0");
80 return (0);
81 }
82 if (*p2 != '\0') {
83 warnx("illegal uid field");
84 return (0);
85 }
86 #ifndef __APPLE__
87 /* Apple's UID_MAX is too small (sizeof signed) 3091256 */
88 if (id > UID_MAX) {
89 /* errno is set to ERANGE by strtoul(3) */
90 warnx("uid greater than %u", UID_MAX-1);
91 return (0);
92 }
93 #endif
94 pw->pw_uid = (uid_t)id;
95 if ((*p == '\0') && (flags != (int *)NULL))
96 *flags |= _PASSWORD_NOUID;
97
98 if (!(p = strsep(&bp, ":"))) /* gid */
99 goto fmt;
100 id = strtoul(p, &p2, 10);
101 if (*p2 != '\0') {
102 warnx("illegal gid field");
103 return (0);
104 }
105 #ifndef __APPLE__
106 /* Apple's UID_MAX is too small (sizeof signed) 3091256 */
107 if (id > UID_MAX) {
108 /* errno is set to ERANGE by strtoul(3) */
109 warnx("gid greater than %u", UID_MAX-1);
110 return (0);
111 }
112 #endif
113 pw->pw_gid = (gid_t)id;
114 if ((*p == '\0') && (flags != (int *)NULL))
115 *flags |= _PASSWORD_NOGID;
116
117 pw->pw_class = strsep(&bp, ":"); /* class */
118 if (!(p = strsep(&bp, ":"))) /* change */
119 goto fmt;
120 pw->pw_change = atol(p);
121 if ((*p == '\0') && (flags != (int *)NULL))
122 *flags |= _PASSWORD_NOCHG;
123 if (!(p = strsep(&bp, ":"))) /* expire */
124 goto fmt;
125 pw->pw_expire = atol(p);
126 if ((*p == '\0') && (flags != (int *)NULL))
127 *flags |= _PASSWORD_NOEXP;
128 pw->pw_gecos = strsep(&bp, ":"); /* gecos */
129 pw->pw_dir = strsep(&bp, ":"); /* directory */
130 if (!(pw->pw_shell = strsep(&bp, ":"))) /* shell */
131 goto fmt;
132
133 p = pw->pw_shell;
134 if (root && *p) { /* empty == /bin/sh */
135 for (setusershell();;) {
136 if (!(sh = getusershell())) {
137 warnx("warning, unknown root shell");
138 break;
139 }
140 if (!strcmp(p, sh))
141 break;
142 }
143 endusershell();
144 }
145
146 if ((p = strsep(&bp, ":"))) { /* too many */
147 fmt: warnx("corrupted entry");
148 return (0);
149 }
150
151 return (1);
152 }