1 /*- 2 * Copyright (c) 1990, 1993, 1994 3 * The Regents of the University of California. All rights reserved. 4 * Copyright (c) 2002 Networks Associates Technology, Inc. 5 * All rights reserved. 6 * 7 * Portions of this software were developed for the FreeBSD Project by 8 * ThinkSec AS and NAI Labs, the Security Research Division of Network 9 * Associates, Inc. under DARPA/SPAWAR contract N66001-01-C-8035 10 * ("CBOSS"), as part of the DARPA CHATS research program. 11 * 12 * Redistribution and use in source and binary forms, with or without 13 * modification, are permitted provided that the following conditions 14 * are met: 15 * 1. Redistributions of source code must retain the above copyright 16 * notice, this list of conditions and the following disclaimer. 17 * 2. Redistributions in binary form must reproduce the above copyright 18 * notice, this list of conditions and the following disclaimer in the 19 * documentation and/or other materials provided with the distribution. 20 * 3. All advertising materials mentioning features or use of this software 21 * must display the following acknowledgement: 22 * This product includes software developed by the University of 23 * California, Berkeley and its contributors. 24 * 4. Neither the name of the University nor the names of its contributors 25 * may be used to endorse or promote products derived from this software 26 * without specific prior written permission. 27 * 28 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 29 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 30 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 31 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 32 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 33 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 34 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 35 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 36 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 37 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 38 * SUCH DAMAGE. 39 */ 40 41 #if 0 42 #ifndef lint 43 static char sccsid[] = "@(#)edit.c 8.3 (Berkeley) 4/2/94"; 44 #endif /* not lint */ 45 #endif 46 47 #include <sys/cdefs.h> 48 __FBSDID("$FreeBSD$"); 49 50 #include <sys/param.h> 51 #include <sys/stat.h> 52 53 #include <ctype.h> 54 #include <err.h> 55 #include <errno.h> 56 #include <paths.h> 57 #include <pwd.h> 58 #include <stdio.h> 59 #include <stdlib.h> 60 #include <string.h> 61 #include <unistd.h> 62 63 #include <pw_scan.h> 64 #include <libutil.h> 65 66 #include "chpass.h" 67 68 static int display(const char *tfn, struct passwd *pw); 69 static struct passwd *verify(const char *tfn, struct passwd *pw); 70 71 struct passwd * 72 edit(const char *tfn, struct passwd *pw) 73 { 74 struct passwd *npw; 75 char *line; 76 size_t len; 77 78 if (display(tfn, pw) == -1) 79 return (NULL); 80 for (;;) { 81 switch (pw_edit(1)) { 82 case -1: 83 return (NULL); 84 case 0: 85 return (pw_dup(pw)); 86 default: 87 break; 88 } 89 if ((npw = verify(tfn, pw)) != NULL) 90 return (npw); 91 free(npw); 92 printf("re-edit the password file? "); 93 fflush(stdout); 94 if ((line = fgetln(stdin, &len)) == NULL) { 95 warn("fgetln()"); 96 return (NULL); 97 } 98 if (len > 0 && (*line == 'N' || *line == 'n')) 99 return (NULL); 100 } 101 } 102 103 /* 104 * display -- 105 * print out the file for the user to edit; strange side-effect: 106 * set conditional flag if the user gets to edit the shell. 107 */ 108 static int 109 display(const char *tfn, struct passwd *pw) 110 { 111 FILE *fp; 112 char *bp, *p; 113 114 if ((fp = fopen(tfn, "w")) == NULL) { 115 warn("%s", tfn); 116 return (-1); 117 } 118 119 (void)fprintf(fp, 120 "#Changing user information for %s.\n", pw->pw_name); 121 if (master_mode) { 122 (void)fprintf(fp, "Login: %s\n", pw->pw_name); 123 (void)fprintf(fp, "Password: %s\n", pw->pw_passwd); 124 (void)fprintf(fp, "Uid [#]: %lu\n", (unsigned long)pw->pw_uid); 125 (void)fprintf(fp, "Gid [# or name]: %lu\n", 126 (unsigned long)pw->pw_gid); 127 (void)fprintf(fp, "Change [month day year]: %s\n", 128 ttoa(pw->pw_change)); 129 (void)fprintf(fp, "Expire [month day year]: %s\n", 130 ttoa(pw->pw_expire)); 131 (void)fprintf(fp, "Class: %s\n", pw->pw_class); 132 (void)fprintf(fp, "Home directory: %s\n", pw->pw_dir); 133 (void)fprintf(fp, "Shell: %s\n", 134 *pw->pw_shell ? pw->pw_shell : _PATH_BSHELL); 135 } 136 /* Only admin can change "restricted" shells. */ 137 #if 0 138 else if (ok_shell(pw->pw_shell)) 139 /* 140 * Make shell a restricted field. Ugly with a 141 * necklace, but there's not much else to do. 142 */ 143 #else 144 else if ((!list[E_SHELL].restricted && ok_shell(pw->pw_shell)) || 145 master_mode) 146 /* 147 * If change not restrict (table.c) and standard shell 148 * OR if root, then allow editing of shell. 149 */ 150 #endif 151 (void)fprintf(fp, "Shell: %s\n", 152 *pw->pw_shell ? pw->pw_shell : _PATH_BSHELL); 153 else 154 list[E_SHELL].restricted = 1; 155 bp = pw->pw_gecos; 156 157 p = strsep(&bp, ","); 158 p = strdup(p ? p : ""); 159 list[E_NAME].save = p; 160 if (!list[E_NAME].restricted || master_mode) 161 (void)fprintf(fp, "Full Name: %s\n", p); 162 163 p = strsep(&bp, ","); 164 p = strdup(p ? p : ""); 165 list[E_LOCATE].save = p; 166 if (!list[E_LOCATE].restricted || master_mode) 167 (void)fprintf(fp, "Office Location: %s\n", p); 168 169 p = strsep(&bp, ","); 170 p = strdup(p ? p : ""); 171 list[E_BPHONE].save = p; 172 if (!list[E_BPHONE].restricted || master_mode) 173 (void)fprintf(fp, "Office Phone: %s\n", p); 174 175 p = strsep(&bp, ","); 176 p = strdup(p ? p : ""); 177 list[E_HPHONE].save = p; 178 if (!list[E_HPHONE].restricted || master_mode) 179 (void)fprintf(fp, "Home Phone: %s\n", p); 180 181 bp = strdup(bp ? bp : ""); 182 list[E_OTHER].save = bp; 183 if (!list[E_OTHER].restricted || master_mode) 184 (void)fprintf(fp, "Other information: %s\n", bp); 185 186 (void)fchown(fileno(fp), getuid(), getgid()); 187 (void)fclose(fp); 188 return (0); 189 } 190 191 static struct passwd * 192 verify(const char *tfn, struct passwd *pw) 193 { 194 struct passwd *npw; 195 ENTRY *ep; 196 char *buf, *p, *val; 197 struct stat sb; 198 FILE *fp; 199 int line; 200 size_t len; 201 202 if ((pw = pw_dup(pw)) == NULL) 203 return (NULL); 204 if ((fp = fopen(tfn, "r")) == NULL || 205 fstat(fileno(fp), &sb) == -1) { 206 warn("%s", tfn); 207 free(pw); 208 return (NULL); 209 } 210 if (sb.st_size == 0) { 211 warnx("corrupted temporary file"); 212 fclose(fp); 213 free(pw); 214 return (NULL); 215 } 216 val = NULL; 217 for (line = 1; (buf = fgetln(fp, &len)) != NULL; ++line) { 218 if (*buf == '\0' || *buf == '#') 219 continue; 220 while (len > 0 && isspace(buf[len - 1])) 221 --len; 222 for (ep = list;; ++ep) { 223 if (!ep->prompt) { 224 warnx("%s: unrecognized field on line %d", 225 tfn, line); 226 goto bad; 227 } 228 if (ep->len > len) 229 continue; 230 if (strncasecmp(buf, ep->prompt, ep->len) != 0) 231 continue; 232 if (ep->restricted && !master_mode) { 233 warnx("%s: you may not change the %s field", 234 tfn, ep->prompt); 235 goto bad; 236 } 237 for (p = buf; p < buf + len && *p != ':'; ++p) 238 /* nothing */ ; 239 if (*p != ':') { 240 warnx("%s: line %d corrupted", tfn, line); 241 goto bad; 242 } 243 while (++p < buf + len && isspace(*p)) 244 /* nothing */ ; 245 free(val); 246 asprintf(&val, "%.*s", (int)(buf + len - p), p); 247 if (val == NULL) 248 goto bad; 249 if (ep->except && strpbrk(val, ep->except)) { 250 warnx("%s: invalid character in \"%s\" field '%s'", 251 tfn, ep->prompt, val); 252 goto bad; 253 } 254 if ((ep->func)(val, pw, ep)) 255 goto bad; 256 break; 257 } 258 } 259 free(val); 260 fclose(fp); 261 262 /* Build the gecos field. */ 263 len = asprintf(&p, "%s,%s,%s,%s,%s", list[E_NAME].save, 264 list[E_LOCATE].save, list[E_BPHONE].save, 265 list[E_HPHONE].save, list[E_OTHER].save); 266 if (p == NULL) { 267 warn("asprintf()"); 268 free(pw); 269 return (NULL); 270 } 271 while (len > 0 && p[len - 1] == ',') 272 p[--len] = '\0'; 273 pw->pw_gecos = p; 274 buf = pw_make(pw); 275 free(pw); 276 free(p); 277 if (buf == NULL) { 278 warn("pw_make()"); 279 return (NULL); 280 } 281 npw = pw_scan(buf, PWSCAN_WARN|PWSCAN_MASTER); 282 free(buf); 283 return (npw); 284 bad: 285 free(pw); 286 free(val); 287 fclose(fp); 288 return (NULL); 289 } 290