1 /*- 2 * Copyright (c) 1990, 1993, 1994 3 * The Regents of the University of California. All rights reserved. 4 * 5 * Redistribution and use in source and binary forms, with or without 6 * modification, are permitted provided that the following conditions 7 * are met: 8 * 1. Redistributions of source code must retain the above copyright 9 * notice, this list of conditions and the following disclaimer. 10 * 2. Redistributions in binary form must reproduce the above copyright 11 * notice, this list of conditions and the following disclaimer in the 12 * documentation and/or other materials provided with the distribution. 13 * 3. All advertising materials mentioning features or use of this software 14 * must display the following acknowledgement: 15 * This product includes software developed by the University of 16 * California, Berkeley and its contributors. 17 * 4. Neither the name of the University nor the names of its contributors 18 * may be used to endorse or promote products derived from this software 19 * without specific prior written permission. 20 * 21 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 24 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 31 * SUCH DAMAGE. 32 */ 33 34 #if defined(LIBC_SCCS) && !defined(lint) 35 static char sccsid[] = "@(#)pw_scan.c 8.3 (Berkeley) 4/2/94"; 36 #endif /* LIBC_SCCS and not lint */ 37 #include <sys/cdefs.h> 38 __FBSDID("$FreeBSD$"); 39 40 /* 41 * This module is used to "verify" password entries by chpass(1) and 42 * pwd_mkdb(8). 43 */ 44 45 #include <sys/param.h> 46 47 #include <err.h> 48 #include <errno.h> 49 #include <fcntl.h> 50 #include <pwd.h> 51 #include <stdio.h> 52 #include <string.h> 53 #include <stdlib.h> 54 #include <unistd.h> 55 56 #include "pw_scan.h" 57 58 /* 59 * Some software assumes that IDs are short. We should emit warnings 60 * for id's which cannot be stored in a short, but we are more liberal 61 * by default, warning for IDs greater than USHRT_MAX. 62 * 63 * If pw_big_ids_warning is -1 on entry to pw_scan(), it will be set based 64 * on the existence of PW_SCAN_BIG_IDS in the environment. 65 */ 66 static int pw_big_ids_warning = -1; 67 68 int 69 __pw_scan(char *bp, struct passwd *pw, int flags) 70 { 71 uid_t id; 72 int root; 73 char *ep, *p, *sh; 74 75 if (pw_big_ids_warning == -1) 76 pw_big_ids_warning = getenv("PW_SCAN_BIG_IDS") == NULL ? 1 : 0; 77 78 pw->pw_fields = 0; 79 if (!(pw->pw_name = strsep(&bp, ":"))) /* login */ 80 goto fmt; 81 root = !strcmp(pw->pw_name, "root"); 82 if (pw->pw_name[0] && (pw->pw_name[0] != '+' || pw->pw_name[1] == '\0')) 83 pw->pw_fields |= _PWF_NAME; 84 85 if (!(pw->pw_passwd = strsep(&bp, ":"))) /* passwd */ 86 goto fmt; 87 if (pw->pw_passwd[0]) 88 pw->pw_fields |= _PWF_PASSWD; 89 90 if (!(p = strsep(&bp, ":"))) /* uid */ 91 goto fmt; 92 if (p[0]) 93 pw->pw_fields |= _PWF_UID; 94 else { 95 if (pw->pw_name[0] != '+' && pw->pw_name[0] != '-') { 96 if (flags & _PWSCAN_WARN) 97 warnx("no uid for user %s", pw->pw_name); 98 return (0); 99 } 100 } 101 id = strtoul(p, &ep, 10); 102 if (errno == ERANGE) { 103 if (flags & _PWSCAN_WARN) 104 warnx("%s > max uid value (%lu)", p, ULONG_MAX); 105 return (0); 106 } 107 if (*ep != '\0') { 108 if (flags & _PWSCAN_WARN) 109 warnx("%s uid is incorrect", p); 110 return (0); 111 } 112 if (root && id) { 113 if (flags & _PWSCAN_WARN) 114 warnx("root uid should be 0"); 115 return (0); 116 } 117 if (flags & _PWSCAN_WARN && pw_big_ids_warning && id > USHRT_MAX) { 118 warnx("%s > recommended max uid value (%u)", p, USHRT_MAX); 119 /*return (0);*/ /* THIS SHOULD NOT BE FATAL! */ 120 } 121 pw->pw_uid = id; 122 123 if (!(p = strsep(&bp, ":"))) /* gid */ 124 goto fmt; 125 if (p[0]) 126 pw->pw_fields |= _PWF_GID; 127 else { 128 if (pw->pw_name[0] != '+' && pw->pw_name[0] != '-') { 129 if (flags & _PWSCAN_WARN) 130 warnx("no gid for user %s", pw->pw_name); 131 return (0); 132 } 133 } 134 id = strtoul(p, &ep, 10); 135 if (errno == ERANGE) { 136 if (flags & _PWSCAN_WARN) 137 warnx("%s > max gid value (%lu)", p, ULONG_MAX); 138 return (0); 139 } 140 if (*ep != '\0') { 141 if (flags & _PWSCAN_WARN) 142 warnx("%s gid is incorrect", p); 143 return (0); 144 } 145 if (flags & _PWSCAN_WARN && pw_big_ids_warning && id > USHRT_MAX) { 146 warnx("%s > recommended max gid value (%u)", p, USHRT_MAX); 147 /* return (0); This should not be fatal! */ 148 } 149 pw->pw_gid = id; 150 151 if (flags & _PWSCAN_MASTER ) { 152 if (!(pw->pw_class = strsep(&bp, ":"))) /* class */ 153 goto fmt; 154 if (pw->pw_class[0]) 155 pw->pw_fields |= _PWF_CLASS; 156 157 if (!(p = strsep(&bp, ":"))) /* change */ 158 goto fmt; 159 if (p[0]) 160 pw->pw_fields |= _PWF_CHANGE; 161 pw->pw_change = atol(p); 162 163 if (!(p = strsep(&bp, ":"))) /* expire */ 164 goto fmt; 165 if (p[0]) 166 pw->pw_fields |= _PWF_EXPIRE; 167 pw->pw_expire = atol(p); 168 } 169 if (!(pw->pw_gecos = strsep(&bp, ":"))) /* gecos */ 170 goto fmt; 171 if (pw->pw_gecos[0]) 172 pw->pw_fields |= _PWF_GECOS; 173 174 if (!(pw->pw_dir = strsep(&bp, ":"))) /* directory */ 175 goto fmt; 176 if (pw->pw_dir[0]) 177 pw->pw_fields |= _PWF_DIR; 178 179 if (!(pw->pw_shell = strsep(&bp, ":"))) /* shell */ 180 goto fmt; 181 182 p = pw->pw_shell; 183 if (root && *p) { /* empty == /bin/sh */ 184 for (setusershell();;) { 185 if (!(sh = getusershell())) { 186 if (flags & _PWSCAN_WARN) 187 warnx("warning, unknown root shell"); 188 break; 189 } 190 if (!strcmp(p, sh)) 191 break; 192 } 193 endusershell(); 194 } 195 if (p[0]) 196 pw->pw_fields |= _PWF_SHELL; 197 198 if ((p = strsep(&bp, ":"))) { /* too many */ 199 fmt: 200 if (flags & _PWSCAN_WARN) 201 warnx("corrupted entry"); 202 return (0); 203 } 204 return (1); 205 } 206