/* * CDDL HEADER START * * The contents of this file are subject to the terms of the * Common Development and Distribution License (the "License"). * You may not use this file except in compliance with the License. * * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE * or http://www.opensolaris.org/os/licensing. * See the License for the specific language governing permissions * and limitations under the License. * * When distributing Covered Code, include this CDDL HEADER in each * file and include the License file at usr/src/OPENSOLARIS.LICENSE. * If applicable, add the following below this CDDL HEADER, with the * fields enclosed by brackets "[]" replaced with your own identifying * information: Portions Copyright [yyyy] [name of copyright owner] * * CDDL HEADER END */ /* * Copyright 2008 Sun Microsystems, Inc. All rights reserved. * Use is subject to license terms. */ #include #include #include #include #include #include #include #include #include "ns_sldap.h" #include #include #include #include #include #include "passwdutil.h" static struct passwd *nisplus_getpw_from_master(const char *, char *); static struct spwd *nisplus_getsp_from_master(const char *, char *); /* * name_to_int(rep) * * Translate the repository to a bitmask. * if we don't recognise the repository name, we return REP_ERANGE */ int name_to_int(char *rep_name) { int result = REP_ERANGE; if (strcmp(rep_name, "files") == 0) result = REP_FILES; else if (strcmp(rep_name, "nis") == 0) result = REP_NIS; else if (strcmp(rep_name, "nisplus") == 0) result = REP_NISPLUS; else if (strcmp(rep_name, "ldap") == 0) result = REP_LDAP; else if (strcmp(rep_name, "compat") == 0) { struct __nsw_switchconfig *cfg; enum __nsw_parse_err pserr; cfg = __nsw_getconfig("passwd_compat", &pserr); if (cfg == NULL) { result = REP_FILES | REP_NIS; } else { if (strcmp(cfg->lookups->service_name, "nisplus") == 0) result = REP_FILES | REP_NISPLUS; else if (strcmp(cfg->lookups->service_name, "ldap") == 0) result = REP_FILES | REP_LDAP; else result = REP_ERANGE; __nsw_freeconfig(cfg); } } return (result); } /* * Figure out which repository we use in compat mode. */ int get_compat_mode(void) { struct __nsw_switchconfig *cfg; enum __nsw_parse_err pserr; int result = REP_COMPAT_NIS; if ((cfg = __nsw_getconfig("passwd_compat", &pserr)) != NULL) { if (strcmp(cfg->lookups->service_name, "nisplus") == 0) result = REP_COMPAT_NISPLUS; else if (strcmp(cfg->lookups->service_name, "ldap") == 0) result = REP_COMPAT_LDAP; } __nsw_freeconfig(cfg); return (result); } /* * get_ns(rep, accesstype) * * returns a bitmask of repositories to use based on either * 1. the repository that is given as argument * 2. the nsswitch.conf file * 3. the type of access requested * * "accesstype" indicates whether we are reading from or writing to the * repository. We need to know this since "compat" will translate into * REP_NSS (the nss-switch) for READ access (needed to decode * the black-magic '+' entries) but it translates into a bitmask * on WRITE access. * * If we detect read-access in compat mode, we augment the result * with one of REP_COMPAT_{NIS,NISPLUS,LDAP}. We need this in order to * implement ATTR_REP_NAME in nss_getpwnam. * * A return value of REP_NOREP indicates an error. */ int get_ns(pwu_repository_t *rep, int accesstype) { struct __nsw_switchconfig *conf = NULL; enum __nsw_parse_err pserr; struct __nsw_lookup *lkp; struct __nsw_lookup *lkp2; struct __nsw_lookup *lkp3; struct __nsw_lookup *lkpn; int result = REP_NOREP; if (rep != PWU_DEFAULT_REP) { result = name_to_int(rep->type); return (result); } conf = __nsw_getconfig("passwd", &pserr); if (conf == NULL) { /* * No config found. The user didn't supply a repository, * so we try to change the password in the default * repositories (files and nis) even though we cannot * find the name service switch entry. (Backward compat) */ syslog(LOG_ERR, "passwdutil.so: nameservice switch entry for " "passwd not found."); result = REP_FILES | REP_NIS; return (result); } lkp = conf->lookups; /* * Supported nsswitch.conf can have a maximum of 3 repositories. * If we encounter an unsupported nsswitch.conf, we return REP_NSS * to fall back to the nsswitch backend. * * Note that specifying 'ad' in the configuration is acceptable * though changing AD users' passwords through passwd(1) is not. * Therefore "ad" will be silently ignored. */ if (conf->num_lookups == 1) { /* files or compat */ if (strcmp(lkp->service_name, "files") == 0) { result = name_to_int(lkp->service_name); } else if (strcmp(lkp->service_name, "compat") == 0) { if (accesstype == PWU_READ) result = REP_NSS | get_compat_mode(); else result = name_to_int(lkp->service_name); } else result = REP_NSS; } else if (conf->num_lookups == 2) { lkp2 = lkp->next; if (strcmp(lkp->service_name, "files") == 0) { result = REP_FILES; if (strcmp(lkp2->service_name, "ldap") == 0) result |= REP_LDAP; else if (strcmp(lkp2->service_name, "nis") == 0) result |= REP_NIS; else if (strcmp(lkp2->service_name, "nisplus") == 0) result |= REP_NISPLUS; else if (strcmp(lkp2->service_name, "ad") != 0) result = REP_NSS; /* AD is ignored */ } else { result = REP_NSS; } } else if (conf->num_lookups == 3) { /* * Valid configurations with 3 repositories are: * files ad [nis | ldap | nisplus] OR * files [nis | ldap | nisplus] ad */ lkp2 = lkp->next; lkp3 = lkp2->next; if (strcmp(lkp2->service_name, "ad") == 0) lkpn = lkp3; else if (strcmp(lkp3->service_name, "ad") == 0) lkpn = lkp2; else lkpn = NULL; if (strcmp(lkp->service_name, "files") == 0 && lkpn != NULL) { result = REP_FILES; if (strcmp(lkpn->service_name, "ldap") == 0) result |= REP_LDAP; else if (strcmp(lkpn->service_name, "nis") == 0) result |= REP_NIS; else if (strcmp(lkpn->service_name, "nisplus") == 0) result |= REP_NISPLUS; else result = REP_NSS; } else { result = REP_NSS; } } else { result = REP_NSS; } __nsw_freeconfig(conf); return (result); } static void nss_ldap_passwd(p) nss_db_params_t *p; { p->name = NSS_DBNAM_PASSWD; p->flags |= NSS_USE_DEFAULT_CONFIG; p->default_config = "ldap"; } static void nss_ldap_shadow(p) nss_db_params_t *p; { p->name = NSS_DBNAM_SHADOW; p->config_name = NSS_DBNAM_PASSWD; /* Use config for "passwd" */ p->flags |= NSS_USE_DEFAULT_CONFIG; p->default_config = "ldap"; } #ifdef PAM_NIS static void nss_nis_passwd(p) nss_db_params_t *p; { p->name = NSS_DBNAM_PASSWD; p->flags |= NSS_USE_DEFAULT_CONFIG; p->default_config = "nis"; } static void nss_nis_shadow(p) nss_db_params_t *p; { p->name = NSS_DBNAM_SHADOW; p->config_name = NSS_DBNAM_PASSWD; /* Use config for "passwd" */ p->flags |= NSS_USE_DEFAULT_CONFIG; p->default_config = "nis"; } #endif /* PAM_NIS */ static void nss_nisplus_passwd(p) nss_db_params_t *p; { p->name = NSS_DBNAM_PASSWD; p->flags |= NSS_USE_DEFAULT_CONFIG; p->default_config = "nisplus"; } static void nss_nisplus_shadow(p) nss_db_params_t *p; { p->name = NSS_DBNAM_SHADOW; p->config_name = NSS_DBNAM_PASSWD; /* Use config for "passwd" */ p->flags |= NSS_USE_DEFAULT_CONFIG; p->default_config = "nisplus"; } static char * gettok(nextpp) char **nextpp; { char *p = *nextpp; char *q = p; char c; if (p == 0) { return (0); } while ((c = *q) != '\0' && c != ':') { q++; } if (c == '\0') { *nextpp = 0; } else { *q++ = '\0'; *nextpp = q; } return (p); } /* * Return values: 0 = success, 1 = parse error, 2 = erange ... * The structure pointer passed in is a structure in the caller's space * wherein the field pointers would be set to areas in the buffer if * need be. instring and buffer should be separate areas. */ static int str2passwd(const char *instr, int lenstr, void *ent, char *buffer, int buflen) { struct passwd *passwd = (struct passwd *)ent; char *p, *next; int black_magic; /* "+" or "-" entry */ if (lenstr + 1 > buflen) { return (NSS_STR_PARSE_ERANGE); } /* * We copy the input string into the output buffer and * operate on it in place. */ (void) memcpy(buffer, instr, lenstr); buffer[lenstr] = '\0'; next = buffer; passwd->pw_name = p = gettok(&next); /* username */ if (*p == '\0') { /* Empty username; not allowed */ return (NSS_STR_PARSE_PARSE); } black_magic = (*p == '+' || *p == '-'); if (black_magic) { passwd->pw_uid = UID_NOBODY; passwd->pw_gid = GID_NOBODY; /* * pwconv tests pw_passwd and pw_age == NULL */ passwd->pw_passwd = ""; passwd->pw_age = ""; /* * the rest of the passwd entry is "optional" */ passwd->pw_comment = ""; passwd->pw_gecos = ""; passwd->pw_dir = ""; passwd->pw_shell = ""; } passwd->pw_passwd = p = gettok(&next); /* password */ if (p == 0) { if (black_magic) return (NSS_STR_PARSE_SUCCESS); else return (NSS_STR_PARSE_PARSE); } for (; *p != '\0'; p++) { /* age */ if (*p == ',') { *p++ = '\0'; break; } } passwd->pw_age = p; p = next; /* uid */ if (p == 0 || *p == '\0') { if (black_magic) return (NSS_STR_PARSE_SUCCESS); else return (NSS_STR_PARSE_PARSE); } if (!black_magic) { passwd->pw_uid = strtol(p, &next, 10); if (next == p) { /* uid field should be nonempty */ return (NSS_STR_PARSE_PARSE); } /* * The old code (in 2.0 thru 2.5) would check * for the uid being negative, or being greater * than 60001 (the rfs limit). If it met either of * these conditions, the uid was translated to 60001. * * Now we just check for ephemeral uids; anything else * is administrative policy */ if (passwd->pw_uid > MAXUID) passwd->pw_uid = UID_NOBODY; } if (*next++ != ':') { if (black_magic) p = gettok(&next); else return (NSS_STR_PARSE_PARSE); } p = next; /* gid */ if (p == 0 || *p == '\0') { if (black_magic) return (NSS_STR_PARSE_SUCCESS); else return (NSS_STR_PARSE_PARSE); } if (!black_magic) { passwd->pw_gid = strtol(p, &next, 10); if (next == p) { /* gid field should be nonempty */ return (NSS_STR_PARSE_PARSE); } /* * gid should be non-negative; anything else * is administrative policy. */ if (passwd->pw_gid > MAXUID) passwd->pw_gid = GID_NOBODY; } if (*next++ != ':') { if (black_magic) p = gettok(&next); else return (NSS_STR_PARSE_PARSE); } passwd->pw_gecos = passwd->pw_comment = p = gettok(&next); if (p == 0) { if (black_magic) return (NSS_STR_PARSE_SUCCESS); else return (NSS_STR_PARSE_PARSE); } passwd->pw_dir = p = gettok(&next); if (p == 0) { if (black_magic) return (NSS_STR_PARSE_SUCCESS); else return (NSS_STR_PARSE_PARSE); } passwd->pw_shell = p = gettok(&next); if (p == 0) { if (black_magic) return (NSS_STR_PARSE_SUCCESS); else return (NSS_STR_PARSE_PARSE); } /* Better not be any more fields... */ if (next == 0) { /* Successfully parsed and stored */ return (NSS_STR_PARSE_SUCCESS); } return (NSS_STR_PARSE_PARSE); } typedef const char *constp; /* * Return value 1 means success and more input, 0 means error or no more */ static int getfield(nextp, limit, uns, valp) constp *nextp; constp limit; int uns; void *valp; { constp p = *nextp; char *endfield; char numbuf[12]; /* Holds -2^31 and trailing ':' */ int len; long x; unsigned long ux; if (p == 0 || p >= limit) { return (0); } if (*p == ':') { p++; *nextp = p; return (p < limit); } if ((len = limit - p) > sizeof (numbuf) - 1) { len = sizeof (numbuf) - 1; } /* * We want to use strtol() and we have a readonly non-zero-terminated * string, so first we copy and terminate the interesting bit. * Ugh. (It's convenient to terminate with a colon rather than \0). */ if ((endfield = memccpy(numbuf, p, ':', len)) == 0) { if (len != limit - p) { /* Error -- field is too big to be a legit number */ return (0); } numbuf[len] = ':'; p = limit; } else { p += (endfield - numbuf); } if (uns) { ux = strtoul(numbuf, &endfield, 10); if (*endfield != ':') { /* Error -- expected */ return (0); } *((unsigned int *)valp) = (unsigned int)ux; } else { x = strtol(numbuf, &endfield, 10); if (*endfield != ':') { /* Error -- expected */ return (0); } *((int *)valp) = (int)x; } *nextp = p; return (p < limit); } /* * str2spwd() -- convert a string to a shadow passwd entry. The parser is * more liberal than the passwd or group parsers; since it's legitimate * for almost all the fields here to be blank, the parser lets one omit * any number of blank fields at the end of the entry. The acceptable * forms for '+' and '-' entries are the same as those for normal entries. * === Is this likely to do more harm than good? * * Return values: 0 = success, 1 = parse error, 2 = erange ... * The structure pointer passed in is a structure in the caller's space * wherein the field pointers would be set to areas in the buffer if * need be. instring and buffer should be separate areas. */ int str2spwd(instr, lenstr, ent, buffer, buflen) const char *instr; int lenstr; void *ent; /* really (struct spwd *) */ char *buffer; int buflen; { struct spwd *shadow = (struct spwd *)ent; const char *p = instr, *limit; char *bufp; int lencopy, black_magic; limit = p + lenstr; if ((p = memchr(instr, ':', lenstr)) == 0 || ++p >= limit || (p = memchr(p, ':', limit - p)) == 0) { lencopy = lenstr; p = 0; } else { lencopy = p - instr; p++; } if (lencopy + 1 > buflen) { return (NSS_STR_PARSE_ERANGE); } (void) memcpy(buffer, instr, lencopy); buffer[lencopy] = 0; black_magic = (*instr == '+' || *instr == '-'); shadow->sp_namp = bufp = buffer; shadow->sp_pwdp = 0; shadow->sp_lstchg = -1; shadow->sp_min = -1; shadow->sp_max = -1; shadow->sp_warn = -1; shadow->sp_inact = -1; shadow->sp_expire = -1; shadow->sp_flag = 0; if ((bufp = strchr(bufp, ':')) == 0) { if (black_magic) return (NSS_STR_PARSE_SUCCESS); else return (NSS_STR_PARSE_PARSE); } *bufp++ = '\0'; shadow->sp_pwdp = bufp; if (instr == 0) { if ((bufp = strchr(bufp, ':')) == 0) { if (black_magic) return (NSS_STR_PARSE_SUCCESS); else return (NSS_STR_PARSE_PARSE); } *bufp++ = '\0'; p = bufp; } /* else p was set when we copied name and passwd into the buffer */ if (!getfield(&p, limit, 0, &shadow->sp_lstchg)) return (NSS_STR_PARSE_SUCCESS); if (!getfield(&p, limit, 0, &shadow->sp_min)) return (NSS_STR_PARSE_SUCCESS); if (!getfield(&p, limit, 0, &shadow->sp_max)) return (NSS_STR_PARSE_SUCCESS); if (!getfield(&p, limit, 0, &shadow->sp_warn)) return (NSS_STR_PARSE_SUCCESS); if (!getfield(&p, limit, 0, &shadow->sp_inact)) return (NSS_STR_PARSE_SUCCESS); if (!getfield(&p, limit, 0, &shadow->sp_expire)) return (NSS_STR_PARSE_SUCCESS); if (!getfield(&p, limit, 1, &shadow->sp_flag)) return (NSS_STR_PARSE_SUCCESS); if (p != limit) { /* Syntax error -- garbage at end of line */ return (NSS_STR_PARSE_PARSE); } return (NSS_STR_PARSE_SUCCESS); } static nss_XbyY_buf_t *buffer; static DEFINE_NSS_DB_ROOT(db_root); #define GETBUF() \ NSS_XbyY_ALLOC(&buffer, sizeof (struct passwd), NSS_BUFLEN_PASSWD) #pragma fini(endutilpwent) static void endutilpwent(void) { NSS_XbyY_FREE(&buffer); nss_delete(&db_root); } struct passwd * getpwnam_from(const char *name, pwu_repository_t *rep, int reptype) { nss_XbyY_buf_t *b = GETBUF(); nss_XbyY_args_t arg; if (b == 0) return (0); NSS_XbyY_INIT(&arg, b->result, b->buffer, b->buflen, str2passwd); arg.key.name = name; switch (reptype) { case REP_LDAP: (void) nss_search(&db_root, nss_ldap_passwd, NSS_DBOP_PASSWD_BYNAME, &arg); break; case REP_NISPLUS: if (rep && rep->scope) return (nisplus_getpw_from_master(name, rep->scope)); (void) nss_search(&db_root, nss_nisplus_passwd, NSS_DBOP_PASSWD_BYNAME, &arg); break; #ifdef PAM_NIS case REP_NIS: (void) nss_search(&db_root, nss_nis_passwd, NSS_DBOP_PASSWD_BYNAME, &arg); break; #endif default: return (NULL); } return (struct passwd *)NSS_XbyY_FINI(&arg); } /*ARGSUSED*/ struct passwd * getpwuid_from(uid_t uid, pwu_repository_t *rep, int reptype) { nss_XbyY_buf_t *b = GETBUF(); nss_XbyY_args_t arg; if (b == 0) return (0); NSS_XbyY_INIT(&arg, b->result, b->buffer, b->buflen, str2passwd); arg.key.uid = uid; switch (reptype) { case REP_LDAP: (void) nss_search(&db_root, nss_ldap_passwd, NSS_DBOP_PASSWD_BYUID, &arg); break; case REP_NISPLUS: (void) nss_search(&db_root, nss_nisplus_passwd, NSS_DBOP_PASSWD_BYUID, &arg); break; #ifdef PAM_NIS case REP_NIS: (void) nss_search(&db_root, nss_nis_passwd, NSS_DBOP_PASSWD_BYUID, &arg); break; #endif default: return (NULL); } return (struct passwd *)NSS_XbyY_FINI(&arg); } static nss_XbyY_buf_t *spbuf; static DEFINE_NSS_DB_ROOT(spdb_root); #define GETSPBUF() \ NSS_XbyY_ALLOC(&spbuf, sizeof (struct spwd), NSS_BUFLEN_SHADOW) #pragma fini(endutilspent) static void endutilspent(void) { NSS_XbyY_FREE(&spbuf); nss_delete(&spdb_root); } struct spwd * getspnam_from(const char *name, pwu_repository_t *rep, int reptype) { nss_XbyY_buf_t *b = GETSPBUF(); nss_XbyY_args_t arg; if (b == 0) return (0); NSS_XbyY_INIT(&arg, b->result, b->buffer, b->buflen, str2spwd); arg.key.name = name; switch (reptype) { case REP_LDAP: (void) nss_search(&spdb_root, nss_ldap_shadow, NSS_DBOP_SHADOW_BYNAME, &arg); break; case REP_NISPLUS: if (rep && rep->scope) return (nisplus_getsp_from_master(name, rep->scope)); (void) nss_search(&spdb_root, nss_nisplus_shadow, NSS_DBOP_SHADOW_BYNAME, &arg); break; #ifdef PAM_NIS case REP_NIS: (void) nss_search(&spdb_root, nss_nis_shadow, NSS_DBOP_SHADOW_BYNAME, &arg); break; #endif default: return (NULL); } return (struct spwd *)NSS_XbyY_FINI(&arg); } static nis_result * nisplus_match(const char *name, char *domain, char *buf, int len) { int n; int flags; nis_result *res; nis_object *object; n = snprintf(buf, len, "[name=%s],passwd.org_dir.%s", name, domain); if (n >= len) { syslog(LOG_ERR, "nisplus_match: name too long"); return (NULL); } if (buf[n-1] != '.') { if (n == len-1) { syslog(LOG_ERR, "nisplus_match: name too long"); return (NULL); } buf[n++] = '.'; buf[n] = '\0'; } flags = USE_DGRAM | FOLLOW_LINKS | FOLLOW_PATH | MASTER_ONLY; res = nis_list(buf, flags, NULL, NULL); if (res == NULL) { syslog(LOG_ERR, "nisplus_match: nis_list returned NULL"); return (NULL); } if (NIS_RES_STATUS(res) != NIS_SUCCESS || NIS_RES_NUMOBJ(res) != 1) { syslog(LOG_ERR, "nisplus_match: match failed: %s", nis_sperrno(NIS_RES_STATUS(res))); nis_freeresult(res); return (NULL); } object = NIS_RES_OBJECT(res); if (object->EN_data.en_cols.en_cols_len < 8) { syslog(LOG_ERR, "nisplus_match: " "not a valid passwd table entry for user %s", name); nis_freeresult(res); return (NULL); } return (res); } #define SAFE_STRDUP(dst, idx) \ if ((idx) <= 3 && ENTRY_VAL(nret, (idx)) == NULL) { \ syslog(LOG_ERR, \ "passwdutil: missing field from password entry"); \ goto error; \ } \ len = ENTRY_LEN(nret, (idx)); \ (dst) = malloc(len+1); \ if ((dst) == NULL) { \ syslog(LOG_ERR, "passwdutil: out of memory"); \ goto error; \ } \ (dst)[len] = '\0'; \ (void) strncpy((dst), \ ENTRY_VAL(nret, (idx)) ? ENTRY_VAL(nret, (idx)) : "", \ len); static struct passwd * nisplus_getpw_from_master(const char *name, char *domain) { char lookup[NIS_MAXNAMELEN+1]; nis_result *res; nis_object *nret; int len; char *p; struct passwd *pw; if ((pw = calloc(1, sizeof (*pw))) == NULL) return (NULL); res = nisplus_match(name, domain, lookup, sizeof (lookup)); if (res == NULL) return (NULL); nret = NIS_RES_OBJECT(res); SAFE_STRDUP(pw->pw_name, 0); if ((pw->pw_passwd = strdup("x")) == NULL) { syslog(LOG_ERR, "passwdutil: out of memory"); goto error; } SAFE_STRDUP(p, 2); pw->pw_uid = atoi(p); free(p); SAFE_STRDUP(p, 3); pw->pw_gid = atoi(p); free(p); pw->pw_age = NULL; pw->pw_comment = NULL; /*CONSTANTCONDITION*/ SAFE_STRDUP(pw->pw_gecos, 4); /*CONSTANTCONDITION*/ SAFE_STRDUP(pw->pw_dir, 5); /*CONSTANTCONDITION*/ SAFE_STRDUP(pw->pw_shell, 6); nis_freeresult(res); return (pw); error: nis_freeresult(res); if (pw->pw_name) free(pw->pw_name); if (pw->pw_passwd) free(pw->pw_passwd); if (pw->pw_gecos) free(pw->pw_gecos); if (pw->pw_dir) free(pw->pw_dir); if (pw->pw_shell) free(pw->pw_shell); free(pw); return (NULL); } /* * struct spwd * nisplus_getsp_from_master() * * Get the shadow structure from a NIS+ master. * This routine normally runs with EUID==0. This can cause trouble * if the NIS+ tables are locked down so that only the owner can * access the encrypted password. If we detect that scenario, we switch * EUID to the owner of the record and refetch it. */ static struct spwd * nisplus_getsp_from_master(const char *name, char *domain) { char lookup[NIS_MAXNAMELEN+1]; nis_result *res = NULL; nis_object *nret = NULL; int len; struct spwd *spw; char *shadow = NULL; const char *p = NULL; const char *limit; res = nisplus_match(name, domain, lookup, sizeof (lookup)); if (res == NULL) return (NULL); nret = NIS_RES_OBJECT(res); /*CONSTANTCONDITION*/ SAFE_STRDUP(shadow, 7); /* * If we got NOPWDRTR as password, try again with EUID set * to the UID of the record-owner. */ if (strncmp(shadow, NOPWDRTR, 4) == 0) { char *p; uid_t owner_uid; uid_t euid = geteuid(); SAFE_STRDUP(p, 2); /* record-owner field */ owner_uid = atoi(p); free(p); if (owner_uid != euid) { /* re-obtain entry using owners EUID */ free(shadow); nis_freeresult(res); (void) seteuid(owner_uid); res = nisplus_match(name, domain, lookup, sizeof (lookup)); (void) seteuid(euid); if (res == NULL) return (NULL); nret = NIS_RES_OBJECT(res); /*CONSTANTCONDITION*/ SAFE_STRDUP(shadow, 7); } } if ((spw = calloc(1, sizeof (*spw))) == NULL) { nis_freeresult(res); return (NULL); } SAFE_STRDUP(spw->sp_namp, 0); SAFE_STRDUP(spw->sp_pwdp, 1); nis_freeresult(res); limit = shadow + strlen(shadow) + 1; p = shadow; spw->sp_lstchg = -1; spw->sp_min = -1; spw->sp_max = -1; spw->sp_warn = -1; spw->sp_inact = -1; spw->sp_expire = -1; spw->sp_flag = 0; if (!getfield(&p, limit, 0, &spw->sp_lstchg)) goto out; if (!getfield(&p, limit, 0, &spw->sp_min)) goto out; if (!getfield(&p, limit, 0, &spw->sp_max)) goto out; if (!getfield(&p, limit, 0, &spw->sp_warn)) goto out; if (!getfield(&p, limit, 0, &spw->sp_inact)) goto out; if (!getfield(&p, limit, 0, &spw->sp_expire)) goto out; if (!getfield(&p, limit, 1, &spw->sp_flag)) goto out; if (p != limit) { syslog(LOG_ERR, "passwdutil: garbage at end of record"); goto error; } out: free(shadow); return (spw); error: if (spw->sp_namp) free(spw->sp_namp); if (spw->sp_pwdp) free(spw->sp_pwdp); free(spw); if (shadow) free(shadow); return (NULL); }