1 /* 2 * CDDL HEADER START 3 * 4 * The contents of this file are subject to the terms of the 5 * Common Development and Distribution License (the "License"). 6 * You may not use this file except in compliance with the License. 7 * 8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 9 * or http://www.opensolaris.org/os/licensing. 10 * See the License for the specific language governing permissions 11 * and limitations under the License. 12 * 13 * When distributing Covered Code, include this CDDL HEADER in each 14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 15 * If applicable, add the following below this CDDL HEADER, with the 16 * fields enclosed by brackets "[]" replaced with your own identifying 17 * information: Portions Copyright [yyyy] [name of copyright owner] 18 * 19 * CDDL HEADER END 20 */ 21 /* 22 * Copyright (c) 1988, 2010, Oracle and/or its affiliates. All rights reserved. 23 */ 24 25 /* Copyright (c) 1984, 1986, 1987, 1988, 1989 AT&T */ 26 /* All Rights Reserved */ 27 28 #include <stdio.h> 29 #include <sys/types.h> 30 #include <shadow.h> 31 #include <pwd.h> 32 #include <string.h> 33 #include <signal.h> 34 #include <sys/stat.h> 35 #include <errno.h> 36 #include <time.h> 37 #include <unistd.h> 38 #include <stdlib.h> 39 #include <locale.h> 40 #include <fcntl.h> 41 #include <secdb.h> 42 #include <user_attr.h> 43 #include <nss.h> 44 45 #define CMT_SIZE (128+1) /* Argument sizes + 1 (for '\0') */ 46 #define DIR_SIZE (256+1) 47 #define SHL_SIZE (256+1) 48 #define ENTRY_LENGTH 512 /* Max length of an /etc/passwd entry */ 49 #define UID_MIN 100 /* Lower bound of default UID */ 50 51 #define M_MASK 01 /* Masks for the optn_mask variable */ 52 #define L_MASK 02 /* It keeps track of which options */ 53 #define C_MASK 04 /* have been entered */ 54 #define H_MASK 010 55 #define U_MASK 020 56 #define G_MASK 040 57 #define S_MASK 0100 58 #define O_MASK 0200 59 #define A_MASK 0400 60 #define D_MASK 01000 61 #define F_MASK 02000 62 #define E_MASK 04000 63 64 #define UATTR_MASK 010000 65 66 /* flags for info_mask */ 67 #define LOGNAME_EXIST 01 /* logname exists */ 68 #define BOTH_FILES 02 /* touch both password files */ 69 #define WRITE_P_ENTRY 04 /* write out password entry */ 70 #define WRITE_S_ENTRY 010 /* write out shadow entry */ 71 #define NEED_DEF_UID 020 /* need default uid */ 72 #define FOUND 040 /* found the entry in password file */ 73 #define LOCKED 0100 /* did we lock the password file */ 74 #define UATTR_FILE 0200 /* touch user_attr file */ 75 #define BAD_ENT_MESSAGE "%s: Bad entry found in /etc/passwd. Run pwconv.\n" 76 77 typedef struct kvopts { 78 const char option; 79 const char *key; 80 char *newvalue; 81 } kvopts_t; 82 83 /* mapping of extensible keywords and options */ 84 kvopts_t ua_opts[] = { 85 { 'A', USERATTR_AUTHS_KW }, 86 { 'P', USERATTR_PROFILES_KW }, 87 { 'R', USERATTR_ROLES_KW }, 88 { 'T', USERATTR_TYPE_KW }, 89 { '\0', USERATTR_DEFAULTPROJ_KW }, 90 { '\0', USERATTR_LIMPRIV_KW }, 91 { '\0', USERATTR_DFLTPRIV_KW }, 92 { '\0', USERATTR_LOCK_AFTER_RETRIES_KW }, 93 { '\0', USERATTR_LABELVIEW }, 94 { '\0', USERATTR_CLEARANCE }, 95 { '\0', USERATTR_MINLABEL }, 96 { '\0', USERATTR_IDLECMD_KW }, 97 { '\0', USERATTR_IDLETIME_KW }, 98 { '\0', USERATTR_AUDIT_FLAGS_KW }, 99 }; 100 101 #define UA_KEYS (sizeof (ua_opts)/sizeof (kvopts_t)) 102 103 104 char defdir[] = "/home/"; /* default home directory for new user */ 105 char pwdflr[] = "x"; /* password string for /etc/passwd */ 106 char lkstring[] = "*LK*"; /* lock string for shadow password */ 107 char nullstr[] = ""; /* null string */ 108 char *msg; /* pointer to error message */ 109 110 #define DATMSK "DATEMSK=/etc/datemsk" 111 112 #define OUSERATTR_FILENAME "/etc/ouser_attr" 113 #define USERATTR_TEMP "/etc/uatmp" 114 115 struct uid_blk { 116 struct uid_blk *link; 117 uid_t low; /* low bound for this uid block */ 118 uid_t high; /* high bound for this uid block */ 119 }; 120 121 extern userattr_t *fgetuserattr(FILE *); 122 123 124 /* 125 * Declare all functions that do not return integers. This is here 126 * to get rid of some lint messages 127 */ 128 129 void uid_bcom(struct uid_blk *), add_ublk(uid_t, struct uid_blk *), 130 bad_perm(void), 131 bad_usage(char *), bad_arg(char *), bad_uid(void), bad_pasf(void), 132 file_error(void), bad_news(void), no_lock(void), add_uid(uid_t), 133 rid_tmpf(void), ck_p_sz(struct passwd *), ck_s_sz(struct spwd *), 134 bad_name(char *), bad_uattr(void); 135 136 void file_copy(FILE *spf, long NIS_pos); 137 138 static FILE *fp_ptemp, *fp_stemp, *fp_uatemp; 139 static int fd_ptemp, fd_stemp, fd_uatemp; 140 141 /* 142 * The uid_blk structure is used in the search for the default 143 * uid. Each uid_blk represent a range of uid(s) that are currently 144 * used on the system. 145 */ 146 147 148 #ifndef att 149 /* 150 * getspnan routine that ONLY looks at the local shadow file 151 */ 152 struct spwd * 153 local_getspnam(char *name) 154 { 155 FILE *shadf; 156 struct spwd *sp; 157 158 if ((shadf = fopen("/etc/shadow", "r")) == NULL) 159 return (NULL); 160 161 while ((sp = fgetspent(shadf)) != NULL) { 162 if (strcmp(sp->sp_namp, name) == 0) 163 break; 164 } 165 166 fclose(shadf); 167 168 return (sp); 169 } 170 #endif 171 172 static void 173 putuserattrent(userattr_t *user, FILE *f) 174 { 175 int i, j; 176 char *key; 177 char *val; 178 kv_t *kv_pair; 179 180 /* 181 * Avoid trivial entries. Those with no attributes or with 182 * only "type=normal". This retains backward compatibility. 183 */ 184 if (user->attr == NULL) 185 return; 186 187 kv_pair = user->attr->data; 188 189 for (i = j = 0; i < user->attr->length; i++) { 190 key = kv_pair[i].key; 191 val = kv_pair[i].value; 192 if ((key == NULL) || (val == NULL)) 193 break; 194 if (strlen(val) == 0 || 195 (strcmp(key, USERATTR_TYPE_KW) == 0 && 196 strcmp(val, USERATTR_TYPE_NORMAL_KW) == 0)) 197 continue; 198 j++; 199 } 200 if (j == 0) 201 return; 202 203 (void) fprintf(f, "%s:%s:%s:%s:", user->name, user->qualifier, 204 user->res1, user->res2); 205 206 for (i = j = 0; i < user->attr->length; i++) { 207 key = kv_pair[i].key; 208 val = _escape(kv_pair[i].value, KV_SPECIAL); 209 if ((key == NULL) || (val == NULL)) 210 break; 211 if (strlen(val) == 0) 212 continue; 213 if (j > 0) 214 (void) fprintf(f, KV_DELIMITER); 215 (void) fprintf(f, "%s=%s", key, val); 216 j++; 217 } 218 (void) fprintf(f, "\n"); 219 } 220 221 static void 222 assign_attr(userattr_t *user, const char *newkey, char *val) { 223 224 int i; 225 char *key; 226 kv_t *kv_pair; 227 int avail = -1; 228 229 if (user->attr != NULL) { 230 kv_pair = user->attr->data; 231 for (i = 0; i < user->attr->length; i++) { 232 key = kv_pair[i].key; 233 if (key == NULL) { 234 avail = i; 235 continue; 236 } else if (strcmp(key, newkey) == 0) { 237 kv_pair[i].value = strdup(val); 238 return; 239 } 240 } 241 242 if (avail == -1) 243 avail = user->attr->length++; 244 kv_pair[avail].key = strdup(newkey); 245 kv_pair[avail].value = strdup(val); 246 } 247 } 248 249 static void 250 unassign_role(userattr_t *user, char *rolelist, char *role) { 251 252 char *roleptr; 253 char *templist; 254 char *temprole; 255 int length; 256 257 roleptr = rolelist; 258 templist = strdup(roleptr); 259 temprole = strtok(templist, ","); 260 while (temprole) { 261 if (strcmp(temprole, role) == 0) { 262 263 length = strlen(role); 264 roleptr += temprole - templist; 265 266 if (*(roleptr + length) == ',') 267 length++; 268 strcpy(roleptr, roleptr + length); 269 length = strlen(roleptr) - 1; 270 if (*(roleptr + length) == ',') 271 *(roleptr + length) = '\0'; 272 assign_attr(user, USERATTR_ROLES_KW, rolelist); 273 break; 274 } else { 275 temprole = strtok(NULL, ","); 276 } 277 } 278 } 279 280 struct uid_blk *uid_sp; 281 char *prognamp; /* program name */ 282 extern int errno; 283 int optn_mask = 0, info_mask = 0; 284 extern int getdate_err; 285 286 int 287 main(int argc, char **argv) 288 { 289 int c, i; 290 char *lognamp, *char_p; 291 int end_of_file = 0; 292 int error; 293 long date = 0; 294 FILE *pwf, *spf, *uaf; 295 296 struct passwd *pw_ptr1p, passwd_st; 297 struct spwd *sp_ptr1p, shadow_st; 298 userattr_t *ua_ptr1p, userattr_st; 299 static kv_t ua_kv[KV_ADD_KEYS]; 300 kva_t ua_kva; 301 struct stat statbuf; 302 struct tm *tm_ptr; 303 int NIS_entry_seen; /* NIS scanning flag */ 304 /* 305 * NIS start pos, really pointer to first entry AFTER first 306 * NIS-referant entry 307 */ 308 long NIS_pos; 309 long cur_pos; /* Current pos, used with nis-pos above */ 310 311 (void) setlocale(LC_ALL, ""); 312 313 #if !defined(TEXT_DOMAIN) /* Should be defined by cc -D */ 314 #define TEXT_DOMAIN "SYS_TEST" 315 #endif 316 (void) textdomain(TEXT_DOMAIN); 317 318 tzset(); 319 /* Get program name */ 320 prognamp = argv[0]; 321 322 /* Check identity */ 323 if (geteuid() != 0) 324 bad_perm(); 325 326 /* Lock the password file(s) */ 327 328 if (lckpwdf() != 0) 329 no_lock(); 330 info_mask |= LOCKED; /* remember we locked */ 331 332 /* initialize the two structures */ 333 334 passwd_st.pw_passwd = pwdflr; /* bogus password */ 335 passwd_st.pw_name = nullstr; /* login name */ 336 passwd_st.pw_uid = -1; /* no uid */ 337 passwd_st.pw_gid = 1; /* default gid */ 338 passwd_st.pw_age = nullstr; /* no aging info. */ 339 passwd_st.pw_comment = nullstr; /* no comments */ 340 passwd_st.pw_gecos = nullstr; /* no comments */ 341 passwd_st.pw_dir = nullstr; /* no default directory */ 342 passwd_st.pw_shell = nullstr; /* no default shell */ 343 344 shadow_st.sp_namp = nullstr; /* no name */ 345 shadow_st.sp_pwdp = lkstring; /* locked password */ 346 shadow_st.sp_lstchg = -1; /* no lastchanged date */ 347 shadow_st.sp_min = -1; /* no min */ 348 shadow_st.sp_max = -1; /* no max */ 349 shadow_st.sp_warn = -1; /* no warn */ 350 shadow_st.sp_inact = -1; /* no inactive */ 351 shadow_st.sp_expire = -1; /* no expire */ 352 shadow_st.sp_flag = 0; /* no flag */ 353 354 userattr_st.name = nullstr; 355 userattr_st.qualifier = nullstr; 356 userattr_st.res1 = nullstr; 357 userattr_st.res2 = nullstr; 358 359 ua_kva.length = 1; 360 ua_kv[0].key = USERATTR_TYPE_KW; 361 ua_kv[0].value = USERATTR_TYPE_NORMAL_KW; 362 ua_kva.data = ua_kv; 363 userattr_st.attr = &ua_kva; 364 365 /* parse the command line */ 366 367 while ((c = getopt(argc, argv, 368 "ml:c:h:u:g:s:f:e:k:A:P:R:T:oadK:")) != -1) { 369 370 switch (c) { 371 case 'm': 372 /* Modify */ 373 374 if ((A_MASK|D_MASK|M_MASK) & optn_mask) 375 bad_usage("Invalid combination of options"); 376 377 optn_mask |= M_MASK; 378 break; 379 380 case 'l' : 381 /* Change logname */ 382 383 if ((A_MASK|D_MASK|L_MASK) & optn_mask) 384 bad_usage("Invalid combination of options"); 385 386 if (strpbrk(optarg, ":\n") || 387 strlen(optarg) == 0) 388 bad_arg("Invalid argument to option -l"); 389 390 optn_mask |= L_MASK; 391 passwd_st.pw_name = optarg; 392 shadow_st.sp_namp = optarg; 393 userattr_st.name = optarg; 394 break; 395 396 case 'f' : 397 /* set inactive */ 398 399 if ((D_MASK|F_MASK) & optn_mask) 400 bad_usage("Invalid combination of options"); 401 if (((shadow_st.sp_inact = 402 strtol(optarg, &char_p, 10)) < (long)0) || 403 (*char_p != '\0') || 404 strlen(optarg) == 0) 405 bad_arg("Invalid argument to option -f"); 406 if (shadow_st.sp_inact == 0) 407 shadow_st.sp_inact = -1; 408 optn_mask |= F_MASK; 409 break; 410 411 case 'e' : 412 /* set expire date */ 413 414 if ((D_MASK|E_MASK) & optn_mask) 415 bad_usage("Invalid combination of options"); 416 417 if ((strlen(optarg)) < (size_t)2) 418 shadow_st.sp_expire = -1; 419 else { 420 putenv(DATMSK); 421 if ((tm_ptr = getdate(optarg)) == NULL) { 422 msg = "Invalid argument to option -e"; 423 bad_arg(msg); 424 } 425 if ((date = mktime(tm_ptr)) < 0) { 426 msg = "Invalid argument to option -e"; 427 bad_arg(msg); 428 } 429 shadow_st.sp_expire = (date / DAY); 430 if (shadow_st.sp_expire <= DAY_NOW) { 431 msg = "Invalid argument to option -e"; 432 bad_arg(msg); 433 } 434 } 435 436 optn_mask |= E_MASK; 437 break; 438 439 case 'c' : 440 /* The comment */ 441 442 if ((D_MASK|C_MASK) & optn_mask) 443 bad_usage("Invalid combination of options"); 444 445 if (strlen(optarg) > (size_t)CMT_SIZE || 446 strpbrk(optarg, ":\n")) 447 bad_arg("Invalid argument to option -c"); 448 449 optn_mask |= C_MASK; 450 passwd_st.pw_comment = optarg; 451 passwd_st.pw_gecos = optarg; 452 break; 453 454 case 'h' : 455 /* The home directory */ 456 457 if ((D_MASK|H_MASK) & optn_mask) 458 bad_usage("Invalid combination of options"); 459 460 if (strlen(optarg) > (size_t)DIR_SIZE || 461 strpbrk(optarg, ":\n")) 462 bad_arg("Invalid argument to option -h"); 463 464 optn_mask |= H_MASK; 465 passwd_st.pw_dir = optarg; 466 break; 467 468 case 'u' : 469 /* The uid */ 470 471 if ((D_MASK|U_MASK) & optn_mask) 472 bad_usage("Invalid combination of options"); 473 474 optn_mask |= U_MASK; 475 passwd_st.pw_uid = (uid_t)strtol(optarg, &char_p, 10); 476 if ((*char_p != '\0') || 477 (passwd_st.pw_uid < 0) || 478 (strlen(optarg) == 0)) 479 bad_arg("Invalid argument to option -u"); 480 481 break; 482 483 case 'g' : 484 /* The gid */ 485 486 if ((D_MASK|G_MASK) & optn_mask) 487 bad_usage("Invalid combination of options"); 488 489 optn_mask |= G_MASK; 490 passwd_st.pw_gid = (gid_t)strtol(optarg, &char_p, 10); 491 492 if ((*char_p != '\0') || (passwd_st.pw_gid < 0) || 493 (strlen(optarg) == 0)) 494 bad_arg("Invalid argument to option -g"); 495 break; 496 497 case 's' : 498 /* The shell */ 499 500 if ((D_MASK|S_MASK) & optn_mask) 501 bad_usage("Invalid combination of options"); 502 503 if (strlen(optarg) > (size_t)SHL_SIZE || 504 strpbrk(optarg, ":\n")) 505 bad_arg("Invalid argument to option -s"); 506 507 optn_mask |= S_MASK; 508 passwd_st.pw_shell = optarg; 509 break; 510 511 case 'o' : 512 /* Override unique uid */ 513 514 if ((D_MASK|O_MASK) & optn_mask) 515 bad_usage("Invalid combination of options"); 516 517 optn_mask |= O_MASK; 518 break; 519 520 case 'a' : 521 /* Add */ 522 523 if ((A_MASK|M_MASK|D_MASK|L_MASK) & optn_mask) 524 bad_usage("Invalid combination of options"); 525 526 optn_mask |= A_MASK; 527 break; 528 529 case 'd' : 530 /* Delete */ 531 532 if ((D_MASK|M_MASK|L_MASK|C_MASK| 533 H_MASK|U_MASK|G_MASK|S_MASK| 534 O_MASK|A_MASK) & optn_mask) 535 bad_usage("Invalid combination of options"); 536 537 optn_mask |= D_MASK; 538 break; 539 540 case 'K': 541 if (D_MASK & optn_mask) 542 bad_usage("Invalid combination of options"); 543 544 char_p = strchr(optarg, '='); 545 if (char_p == NULL) 546 bad_usage("Missing value in -K option"); 547 548 *char_p++ = '\0'; 549 550 for (i = 0; i < UA_KEYS; i++) { 551 if (strcmp(optarg, ua_opts[i].key) == 0) { 552 ua_opts[i].newvalue = 553 _escape(char_p, KV_SPECIAL); 554 assign_attr(&userattr_st, optarg, 555 char_p); 556 break; 557 } 558 } 559 if (i == UA_KEYS) 560 bad_usage("bad key"); 561 optn_mask |= UATTR_MASK; 562 break; 563 564 case '?' : 565 566 bad_usage(""); 567 break; 568 569 default : 570 /* Extended User Attributes */ 571 { 572 int j; 573 574 for (j = 0; j < UA_KEYS; j++) { 575 if (ua_opts[j].option == (char)c) { 576 if ((D_MASK) & optn_mask) 577 bad_usage("Invalid " 578 "combination of " 579 " options"); 580 optn_mask |= UATTR_MASK; 581 assign_attr(&userattr_st, 582 ua_opts[j].key, 583 _escape(optarg, 584 KV_SPECIAL)); 585 ua_opts[j].newvalue = 586 _escape(optarg, KV_SPECIAL); 587 break; 588 } 589 } 590 break; 591 } 592 } 593 } 594 595 /* check command syntax for the following errors */ 596 /* too few or too many arguments */ 597 /* no -a -m or -d option */ 598 /* -o without -u */ 599 /* -m with no other option */ 600 601 if (optind == argc || argc > (optind+1) || 602 !((A_MASK|M_MASK|D_MASK) & optn_mask) || 603 ((optn_mask & O_MASK) && !(optn_mask & U_MASK)) || 604 ((optn_mask & M_MASK) && 605 !(optn_mask & 606 (L_MASK|C_MASK|H_MASK|U_MASK|G_MASK|S_MASK|F_MASK| 607 E_MASK|UATTR_MASK)))) 608 bad_usage("Invalid command syntax"); 609 610 /* null string argument or bad characters ? */ 611 if ((strlen(argv[optind]) == 0) || strpbrk(argv[optind], ":\n")) 612 bad_arg("Invalid name"); 613 614 lognamp = argv [optind]; 615 616 /* 617 * if we are adding a new user or modifying an existing user 618 * (not the logname), then copy logname into the two data 619 * structures 620 */ 621 622 if ((A_MASK & optn_mask) || 623 ((M_MASK & optn_mask) && !(optn_mask & L_MASK))) { 624 passwd_st.pw_name = argv [optind]; 625 shadow_st.sp_namp = argv [optind]; 626 userattr_st.name = argv [optind]; 627 } 628 629 /* Put in directory if we are adding and we need a default */ 630 631 if (!(optn_mask & H_MASK) && (optn_mask & A_MASK)) { 632 if ((passwd_st.pw_dir = malloc((size_t)DIR_SIZE)) == NULL) 633 file_error(); 634 635 *passwd_st.pw_dir = '\0'; 636 (void) strcat(passwd_st.pw_dir, defdir); 637 (void) strcat(passwd_st.pw_dir, lognamp); 638 } 639 640 /* Check the number of password files we are touching */ 641 642 if ((!((M_MASK & optn_mask) && !(L_MASK & optn_mask))) || 643 ((M_MASK & optn_mask) && ((E_MASK & optn_mask) || 644 (F_MASK & optn_mask)))) 645 info_mask |= BOTH_FILES; 646 647 if ((D_MASK|L_MASK|UATTR_MASK) & optn_mask) 648 info_mask |= UATTR_FILE; 649 650 /* Open the temporary file(s) with appropriate permission mask */ 651 /* and the appropriate owner */ 652 653 if (stat(PASSWD, &statbuf) < 0) 654 file_error(); 655 656 fd_ptemp = open(PASSTEMP, O_CREAT|O_EXCL|O_WRONLY, statbuf.st_mode); 657 if (fd_ptemp == -1) { 658 if (errno == EEXIST) { 659 if (unlink(PASSTEMP)) { 660 msg = "%s: warning: cannot unlink %s\n"; 661 (void) fprintf(stderr, gettext(msg), prognamp, 662 PASSTEMP); 663 } 664 fd_ptemp = open(PASSTEMP, O_CREAT|O_EXCL|O_WRONLY, 665 statbuf.st_mode); 666 if (fd_ptemp == -1) { 667 file_error(); 668 } 669 670 } else 671 file_error(); 672 } 673 fp_ptemp = fdopen(fd_ptemp, "w"); 674 if (fp_ptemp == NULL) 675 file_error(); 676 error = fchown(fd_ptemp, statbuf.st_uid, statbuf.st_gid); 677 if (error == 0) 678 error = fchmod(fd_ptemp, S_IRUSR|S_IWUSR|S_IRGRP|S_IROTH); 679 if (error != 0) { 680 (void) fclose(fp_ptemp); 681 if (unlink(PASSTEMP)) { 682 msg = "%s: warning: cannot unlink %s\n"; 683 (void) fprintf(stderr, gettext(msg), prognamp, 684 PASSTEMP); 685 } 686 file_error(); 687 } 688 689 if (info_mask & BOTH_FILES) { 690 if (stat(SHADOW, &statbuf) < 0) { 691 rid_tmpf(); 692 file_error(); 693 } 694 fd_stemp = open(SHADTEMP, O_CREAT|O_EXCL|O_WRONLY, 695 statbuf.st_mode); 696 if (fd_stemp == -1) { 697 if (errno == EEXIST) { 698 if (unlink(SHADTEMP)) { 699 msg = "%s: warning: cannot unlink %s\n"; 700 (void) fprintf(stderr, gettext(msg), 701 prognamp, SHADTEMP); 702 } 703 fd_stemp = open(SHADTEMP, 704 O_CREAT|O_EXCL|O_WRONLY, statbuf.st_mode); 705 if (fd_stemp == -1) { 706 rid_tmpf(); 707 file_error(); 708 } 709 710 } else { 711 rid_tmpf(); 712 file_error(); 713 } 714 } 715 fp_stemp = fdopen(fd_stemp, "w"); 716 if (fp_stemp == NULL) { 717 rid_tmpf(); 718 file_error(); 719 } 720 error = fchown(fd_stemp, statbuf.st_uid, statbuf.st_gid); 721 if (error == 0) 722 error = fchmod(fd_stemp, S_IRUSR); 723 if (error != 0) { 724 rid_tmpf(); 725 file_error(); 726 } 727 } 728 729 if (info_mask & UATTR_FILE) { 730 if (stat(USERATTR_FILENAME, &statbuf) < 0) { 731 rid_tmpf(); 732 file_error(); 733 } 734 fd_uatemp = open(USERATTR_TEMP, O_CREAT|O_EXCL|O_WRONLY, 735 statbuf.st_mode); 736 if (fd_uatemp == -1) { 737 if (errno == EEXIST) { 738 if (unlink(USERATTR_TEMP)) { 739 msg = "%s: warning: cannot unlink %s\n"; 740 (void) fprintf(stderr, gettext(msg), 741 prognamp, USERATTR_TEMP); 742 } 743 fd_uatemp = open(USERATTR_TEMP, 744 O_CREAT|O_EXCL|O_WRONLY, statbuf.st_mode); 745 if (fd_uatemp == -1) { 746 rid_tmpf(); 747 file_error(); 748 } 749 750 } else { 751 rid_tmpf(); 752 file_error(); 753 } 754 } 755 fp_uatemp = fdopen(fd_uatemp, "w"); 756 if (fp_uatemp == NULL) { 757 rid_tmpf(); 758 file_error(); 759 } 760 error = fchown(fd_uatemp, statbuf.st_uid, statbuf.st_gid); 761 if (error == 0) 762 error = fchmod(fd_uatemp, 763 S_IRUSR|S_IWUSR|S_IRGRP|S_IROTH); 764 if (error != 0) { 765 rid_tmpf(); 766 file_error(); 767 } 768 } 769 /* Default uid needed ? */ 770 771 if (!(optn_mask & U_MASK) && (optn_mask & A_MASK)) { 772 /* mark it in the information mask */ 773 info_mask |= NEED_DEF_UID; 774 775 /* create the head of the uid number list */ 776 uid_sp = malloc(sizeof (struct uid_blk)); 777 if (uid_sp == NULL) { 778 rid_tmpf(); 779 file_error(); 780 } 781 782 uid_sp->link = NULL; 783 uid_sp->low = (UID_MIN -1); 784 uid_sp->high = (UID_MIN -1); 785 } 786 787 /* 788 * This next section is modified to allow for NIS passwd file 789 * conventions. In the case where a password entry was being 790 * added to the password file, the original AT&T code read 791 * the entire password file in, noted any information needed, and 792 * copied the entries to a temporary file. Then the new entry 793 * was added to the temporary file, and the temporary file was 794 * moved to be the real password file. 795 * 796 * The problem is, that with NIS compatability, we want to add new 797 * entries BEFORE the first NIS-referrant entry, so as not to have 798 * any surprises. To accomplish this without extensively modifying 799 * the logic of the code below, as soon as a NIS-referrant entry is 800 * found we stop copying entries to the TEMP file and instead we 801 * remember 802 * the first NIS entry and where we found it, scan the rest of the 803 * password file without copying entries, then write the new entry, copy 804 * the stored password entry, then copy the rest of the password file. 805 */ 806 807 808 error = 0; 809 810 if ((pwf = fopen("/etc/passwd", "r")) == NULL) { 811 rid_tmpf(); 812 if (errno == ENOENT) 813 bad_news(); 814 else 815 file_error(); 816 } 817 818 NIS_entry_seen = 0; 819 cur_pos = 0; 820 /* The while loop for reading PASSWD entries */ 821 info_mask |= WRITE_P_ENTRY; 822 823 while (!end_of_file) { 824 pw_ptr1p = fgetpwent(pwf); 825 if (pw_ptr1p == NULL) { 826 if (!feof(pwf)) { 827 /* A real error - report it and exit */ 828 rid_tmpf(); 829 bad_pasf(); 830 } 831 else 832 break; 833 } 834 835 if (!NIS_entry_seen) 836 info_mask |= WRITE_P_ENTRY; 837 else 838 info_mask &= ~WRITE_P_ENTRY; 839 840 /* 841 * Set up the uid usage blocks to find the first 842 * available uid above UID_MIN, if needed 843 */ 844 845 if (info_mask & NEED_DEF_UID) 846 add_uid(pw_ptr1p->pw_uid); 847 848 /* Check for unique UID */ 849 850 if (strcmp(lognamp, pw_ptr1p->pw_name) && 851 (pw_ptr1p->pw_uid == passwd_st.pw_uid) && 852 ((optn_mask & U_MASK) && !(optn_mask & O_MASK))) { 853 rid_tmpf(); /* get rid of temp files */ 854 bad_uid(); 855 } 856 857 /* Check for unique new logname */ 858 859 if (strcmp(lognamp, pw_ptr1p->pw_name) == 0 && 860 optn_mask & L_MASK && 861 strcmp(pw_ptr1p->pw_name, passwd_st.pw_name) == 0) { 862 rid_tmpf(); 863 #ifdef att 864 if (!getspnam(pw_ptr1p->pw_name)) 865 #else 866 if (!local_getspnam(pw_ptr1p->pw_name)) 867 #endif 868 bad_pasf(); 869 else 870 bad_name("logname already exists"); 871 } 872 873 if (strcmp(lognamp, pw_ptr1p->pw_name) == 0) { 874 875 /* no good if we want to add an existing logname */ 876 if (optn_mask & A_MASK) { 877 rid_tmpf(); 878 #ifdef att 879 if (!getspnam(lognamp)) 880 #else 881 if (!local_getspnam(lognamp)) 882 #endif 883 bad_pasf(); 884 else 885 bad_name("name already exists"); 886 } 887 888 /* remember we found it */ 889 info_mask |= FOUND; 890 891 /* Do not write it out on the fly */ 892 if (optn_mask & D_MASK) 893 info_mask &= ~WRITE_P_ENTRY; 894 895 if (optn_mask & M_MASK) { 896 897 #ifdef att 898 if (!getspnam(lognamp)) 899 #else 900 if (!local_getspnam(lognamp)) 901 #endif 902 { 903 rid_tmpf(); 904 bad_pasf(); 905 } 906 if (optn_mask & L_MASK) 907 pw_ptr1p->pw_name = passwd_st.pw_name; 908 909 if (optn_mask & U_MASK) 910 pw_ptr1p->pw_uid = passwd_st.pw_uid; 911 912 if (optn_mask & G_MASK) 913 pw_ptr1p->pw_gid = passwd_st.pw_gid; 914 915 if (optn_mask & C_MASK) { 916 pw_ptr1p->pw_comment = 917 passwd_st.pw_comment; 918 919 pw_ptr1p->pw_gecos = 920 passwd_st.pw_comment; 921 } 922 923 if (optn_mask & H_MASK) 924 pw_ptr1p->pw_dir = passwd_st.pw_dir; 925 926 if (optn_mask & S_MASK) 927 pw_ptr1p->pw_shell = passwd_st.pw_shell; 928 ck_p_sz(pw_ptr1p); /* check entry size */ 929 } 930 } 931 932 if (optn_mask & A_MASK) { 933 if (!NIS_entry_seen) { 934 char *p; 935 p = strchr("+-", pw_ptr1p->pw_name[0]); 936 if (p != NULL) { 937 /* 938 * Found first NIS entry. 939 * so remember it. 940 */ 941 NIS_pos = cur_pos; 942 NIS_entry_seen = 1; 943 info_mask &= ~WRITE_P_ENTRY; 944 } 945 else 946 cur_pos = ftell(pwf); 947 } 948 } 949 950 if (info_mask & WRITE_P_ENTRY) { 951 if (putpwent(pw_ptr1p, fp_ptemp)) { 952 rid_tmpf(); 953 file_error(); 954 } 955 } 956 } /* end-of-while-loop */ 957 958 if (error >= 1) { 959 msg = "%s: Bad entry found in /etc/passwd. Run pwconv.\n"; 960 fprintf(stderr, gettext(msg), prognamp); 961 } 962 963 /* Cannot find the target entry and we are deleting or modifying */ 964 965 if (!(info_mask & FOUND) && (optn_mask & (D_MASK|M_MASK))) { 966 rid_tmpf(); 967 #ifdef att 968 if (getspnam(lognamp) != NULL) 969 #else 970 if (local_getspnam(lognamp) != NULL) 971 #endif 972 bad_pasf(); 973 else 974 bad_name("name does not exist"); 975 } 976 977 /* First available uid above UID_MIN is ... */ 978 979 if (info_mask & NEED_DEF_UID) 980 passwd_st.pw_uid = uid_sp->high + 1; 981 982 /* Write out the added entry now */ 983 984 if (optn_mask & A_MASK) { 985 ck_p_sz(&passwd_st); /* Check entry size */ 986 if (putpwent(&passwd_st, fp_ptemp)) { 987 rid_tmpf(); 988 file_error(); 989 } 990 /* 991 * Now put out the rest of the password file, if needed. 992 */ 993 if (NIS_entry_seen) { 994 int n; 995 char buf[1024]; 996 997 if (fseek(pwf, NIS_pos, SEEK_SET) < 0) { 998 rid_tmpf(); 999 file_error(); 1000 } 1001 while ((n = fread(buf, sizeof (char), 1024, pwf)) > 0) { 1002 if (fwrite(buf, sizeof (char), n, fp_ptemp) 1003 != n) { 1004 rid_tmpf(); 1005 file_error(); 1006 } 1007 } 1008 } 1009 } 1010 1011 (void) fclose(pwf); 1012 1013 /* flush and sync the file before closing it */ 1014 if (fflush(fp_ptemp) != 0 || fsync(fd_ptemp) != 0) 1015 file_error(); 1016 1017 /* Now we are done with PASSWD */ 1018 (void) fclose(fp_ptemp); 1019 1020 /* Do this if we are touching both password files */ 1021 1022 1023 if (info_mask & BOTH_FILES) { 1024 info_mask &= ~FOUND; /* Reset FOUND flag */ 1025 1026 /* The while loop for reading SHADOW entries */ 1027 info_mask |= WRITE_S_ENTRY; 1028 1029 end_of_file = 0; 1030 errno = 0; 1031 error = 0; 1032 1033 NIS_entry_seen = 0; 1034 cur_pos = 0; 1035 1036 if ((spf = fopen("/etc/shadow", "r")) == NULL) { 1037 rid_tmpf(); 1038 file_error(); 1039 } 1040 1041 while (!end_of_file) { 1042 sp_ptr1p = fgetspent(spf); 1043 if (sp_ptr1p == NULL) { 1044 if (!feof(spf)) { 1045 rid_tmpf(); 1046 bad_pasf(); 1047 } 1048 else 1049 break; 1050 } 1051 1052 if (!NIS_entry_seen) 1053 info_mask |= WRITE_S_ENTRY; 1054 else 1055 info_mask &= ~WRITE_S_ENTRY; 1056 1057 /* 1058 * See if the new logname already exist in the 1059 * shadow passwd file 1060 */ 1061 if ((optn_mask & M_MASK) && 1062 strcmp(lognamp, shadow_st.sp_namp) != 0 && 1063 strcmp(sp_ptr1p->sp_namp, shadow_st.sp_namp) == 0) { 1064 rid_tmpf(); 1065 bad_pasf(); 1066 } 1067 1068 if (strcmp(lognamp, sp_ptr1p->sp_namp) == 0) { 1069 info_mask |= FOUND; 1070 if (optn_mask & A_MASK) { 1071 /* password file inconsistent */ 1072 rid_tmpf(); 1073 bad_pasf(); 1074 } 1075 1076 if (optn_mask & M_MASK) { 1077 sp_ptr1p->sp_namp = shadow_st.sp_namp; 1078 if (F_MASK & optn_mask) 1079 sp_ptr1p->sp_inact = 1080 shadow_st.sp_inact; 1081 if (E_MASK & optn_mask) 1082 sp_ptr1p->sp_expire = 1083 shadow_st.sp_expire; 1084 1085 ck_s_sz(sp_ptr1p); 1086 } 1087 1088 if (optn_mask & D_MASK) 1089 info_mask &= ~WRITE_S_ENTRY; 1090 } 1091 1092 if (optn_mask & A_MASK) { 1093 if (!NIS_entry_seen) { 1094 char *p; 1095 p = strchr("+-", sp_ptr1p->sp_namp[0]); 1096 if (p != NULL) { 1097 /* 1098 * Found first NIS entry. 1099 * so remember it. 1100 */ 1101 NIS_pos = cur_pos; 1102 NIS_entry_seen = 1; 1103 info_mask &= ~WRITE_S_ENTRY; 1104 } 1105 else 1106 cur_pos = ftell(spf); 1107 } 1108 } 1109 1110 if (info_mask & WRITE_S_ENTRY) { 1111 if (putspent(sp_ptr1p, fp_stemp)) { 1112 rid_tmpf(); 1113 file_error(); 1114 } 1115 } 1116 1117 } /* end-of-while-loop */ 1118 1119 if (error >= 1) { 1120 1121 msg = BAD_ENT_MESSAGE; 1122 fprintf(stderr, gettext(msg), prognamp); 1123 } 1124 1125 /* 1126 * If we cannot find the entry and we are deleting or 1127 * modifying 1128 */ 1129 1130 if (!(info_mask & FOUND) && (optn_mask & (D_MASK|M_MASK))) { 1131 rid_tmpf(); 1132 bad_pasf(); 1133 } 1134 1135 if (optn_mask & A_MASK) { 1136 ck_s_sz(&shadow_st); 1137 if (putspent(&shadow_st, fp_stemp)) { 1138 rid_tmpf(); 1139 file_error(); 1140 } 1141 1142 /* 1143 * Now put out the rest of the shadow file, if needed. 1144 */ 1145 if (NIS_entry_seen) { 1146 file_copy(spf, NIS_pos); 1147 } 1148 } 1149 1150 /* flush and sync the file before closing it */ 1151 if (fflush(fp_stemp) != 0 || fsync(fd_stemp) != 0) 1152 file_error(); 1153 (void) fclose(fp_stemp); 1154 1155 /* Done with SHADOW */ 1156 (void) fclose(spf); 1157 1158 } /* End of if info_mask */ 1159 1160 if (info_mask & UATTR_FILE) { 1161 info_mask &= ~FOUND; /* Reset FOUND flag */ 1162 1163 /* The while loop for reading USER_ATTR entries */ 1164 info_mask |= WRITE_S_ENTRY; 1165 1166 end_of_file = 0; 1167 errno = 0; 1168 error = 0; 1169 1170 NIS_entry_seen = 0; 1171 cur_pos = 0; 1172 1173 if ((uaf = fopen(USERATTR_FILENAME, "r")) == NULL) { 1174 rid_tmpf(); 1175 file_error(); 1176 } 1177 1178 while (!end_of_file) { 1179 ua_ptr1p = fgetuserattr(uaf); 1180 if (ua_ptr1p == NULL) { 1181 if (!feof(uaf)) { 1182 rid_tmpf(); 1183 bad_uattr(); 1184 } 1185 else 1186 break; 1187 } 1188 1189 if (ua_ptr1p->name[0] == '#') { 1190 /* 1191 * If this is a comment, write it back as it 1192 * is. 1193 */ 1194 if (ua_ptr1p->qualifier[0] == '\0' && 1195 ua_ptr1p->res1[0] == '\0' && 1196 ua_ptr1p->res2[0] == '\0' && 1197 (ua_ptr1p->attr == NULL || 1198 ua_ptr1p->attr->length == 0)) 1199 (void) fprintf(fp_uatemp, "%s\n", 1200 ua_ptr1p->name); 1201 else 1202 /* 1203 * This is a commented user_attr entry; 1204 * reformat it, and write it back. 1205 */ 1206 putuserattrent(ua_ptr1p, fp_uatemp); 1207 free_userattr(ua_ptr1p); 1208 continue; 1209 } 1210 1211 if (!NIS_entry_seen) 1212 info_mask |= WRITE_S_ENTRY; 1213 else 1214 info_mask &= ~WRITE_S_ENTRY; 1215 1216 /* 1217 * See if the new logname already exist in the 1218 * user_attr file 1219 */ 1220 if ((optn_mask & M_MASK) && 1221 strcmp(lognamp, userattr_st.name) != 0 && 1222 strcmp(ua_ptr1p->name, userattr_st.name) == 0) { 1223 rid_tmpf(); 1224 bad_pasf(); 1225 } 1226 1227 if (strcmp(lognamp, ua_ptr1p->name) == 0) { 1228 info_mask |= FOUND; 1229 if (optn_mask & A_MASK) { 1230 /* password file inconsistent */ 1231 rid_tmpf(); 1232 bad_pasf(); 1233 } 1234 1235 if (optn_mask & M_MASK) { 1236 int j; 1237 char *value; 1238 1239 for (j = 0; j < UA_KEYS; j++) { 1240 if (ua_opts[j].newvalue != NULL) 1241 continue; 1242 value = 1243 kva_match(ua_ptr1p->attr, 1244 (char *)ua_opts[j].key); 1245 if (value == NULL) 1246 continue; 1247 assign_attr(&userattr_st, 1248 ua_opts[j].key, 1249 value); 1250 } 1251 free_userattr(ua_ptr1p); 1252 ua_ptr1p = &userattr_st; 1253 } 1254 1255 if (optn_mask & D_MASK) 1256 info_mask &= ~WRITE_S_ENTRY; 1257 } else if (optn_mask & D_MASK) { 1258 char *rolelist; 1259 1260 rolelist = kva_match(ua_ptr1p->attr, 1261 USERATTR_ROLES_KW); 1262 if (rolelist) { 1263 unassign_role(ua_ptr1p, 1264 rolelist, lognamp); 1265 } 1266 } 1267 1268 if (info_mask & WRITE_S_ENTRY) { 1269 putuserattrent(ua_ptr1p, fp_uatemp); 1270 } 1271 1272 if (!(optn_mask & M_MASK)) 1273 free_userattr(ua_ptr1p); 1274 } /* end-of-while-loop */ 1275 1276 if (error >= 1) { 1277 1278 msg = BAD_ENT_MESSAGE; 1279 fprintf(stderr, gettext(msg), prognamp); 1280 } 1281 1282 /* 1283 * Add entry in user_attr if masks is UATTR_MASK 1284 * We don't need to do anything for L_MASK if there's 1285 * no user_attr entry for the user being modified. 1286 */ 1287 if (!(info_mask & FOUND) && !(L_MASK & optn_mask) && 1288 !(D_MASK & optn_mask)) { 1289 putuserattrent(&userattr_st, fp_uatemp); 1290 } 1291 1292 /* flush and sync the file before closing it */ 1293 if (fflush(fp_uatemp) != 0 || fsync(fd_uatemp) != 0) 1294 file_error(); 1295 (void) fclose(fp_uatemp); 1296 1297 /* Done with USERATTR */ 1298 (void) fclose(uaf); 1299 1300 } /* End of if info_mask */ 1301 /* ignore all signals */ 1302 1303 for (i = 1; i < NSIG; i++) 1304 (void) sigset(i, SIG_IGN); 1305 1306 errno = 0; /* For correcting sigset to SIGKILL */ 1307 1308 if (unlink(OPASSWD) && access(OPASSWD, 0) == 0) 1309 file_error(); 1310 1311 if (link(PASSWD, OPASSWD) == -1) 1312 file_error(); 1313 1314 1315 if (rename(PASSTEMP, PASSWD) == -1) { 1316 if (link(OPASSWD, PASSWD)) 1317 bad_news(); 1318 file_error(); 1319 } 1320 1321 1322 if (info_mask & BOTH_FILES) { 1323 1324 if (unlink(OSHADOW) && access(OSHADOW, 0) == 0) { 1325 if (rec_pwd()) 1326 bad_news(); 1327 else 1328 file_error(); 1329 } 1330 1331 if (link(SHADOW, OSHADOW) == -1) { 1332 if (rec_pwd()) 1333 bad_news(); 1334 else 1335 file_error(); 1336 } 1337 1338 1339 if (rename(SHADTEMP, SHADOW) == -1) { 1340 if (rename(OSHADOW, SHADOW) == -1) 1341 bad_news(); 1342 1343 if (rec_pwd()) 1344 bad_news(); 1345 else 1346 file_error(); 1347 } 1348 1349 } 1350 if (info_mask & UATTR_FILE) { 1351 if (unlink(OUSERATTR_FILENAME) && 1352 access(OUSERATTR_FILENAME, 0) == 0) { 1353 if (rec_pwd()) 1354 bad_news(); 1355 else 1356 file_error(); 1357 } 1358 1359 if (link(USERATTR_FILENAME, OUSERATTR_FILENAME) == -1) { 1360 if (rec_pwd()) 1361 bad_news(); 1362 else 1363 file_error(); 1364 } 1365 1366 1367 if (rename(USERATTR_TEMP, USERATTR_FILENAME) == -1) { 1368 if (rename(OUSERATTR_FILENAME, USERATTR_FILENAME) == -1) 1369 bad_news(); 1370 1371 if (rec_pwd()) 1372 bad_news(); 1373 else 1374 file_error(); 1375 } 1376 1377 } 1378 1379 ulckpwdf(); 1380 1381 /* 1382 * Return 0 status, indicating success 1383 */ 1384 return (0); 1385 1386 } /* end of main */ 1387 1388 /* Try to recover the old password file */ 1389 1390 int 1391 rec_pwd(void) 1392 { 1393 if (unlink(PASSWD) || link(OPASSWD, PASSWD)) 1394 return (-1); 1395 1396 return (0); 1397 } 1398 1399 /* combine two uid_blk's */ 1400 1401 void 1402 uid_bcom(struct uid_blk *uid_p) 1403 { 1404 struct uid_blk *uid_tp; 1405 1406 uid_tp = uid_p->link; 1407 uid_p->high = uid_tp->high; 1408 uid_p->link = uid_tp->link; 1409 1410 free(uid_tp); 1411 } 1412 1413 /* add a new uid_blk */ 1414 1415 void 1416 add_ublk(uid_t num, struct uid_blk *uid_p) 1417 { 1418 struct uid_blk *uid_tp; 1419 1420 uid_tp = malloc(sizeof (struct uid_blk)); 1421 if (uid_tp == NULL) { 1422 rid_tmpf(); 1423 file_error(); 1424 } 1425 1426 uid_tp->high = uid_tp->low = num; 1427 uid_tp->link = uid_p->link; 1428 uid_p->link = uid_tp; 1429 } 1430 1431 /* 1432 * Here we are using a linked list of uid_blk to keep track of all 1433 * the used uids. Each uid_blk represents a range of used uid, 1434 * with low represents the low inclusive end and high represents 1435 * the high inclusive end. In the beginning, we initialize a linked 1436 * list of one uid_blk with low = high = (UID_MIN-1). This was 1437 * done in main(). 1438 * Each time we read in another used uid, we add it onto the linked 1439 * list by either making a new uid_blk, decrementing the low of 1440 * an existing uid_blk, incrementing the high of an existing 1441 * uid_blk, or combining two existing uid_blks. After we finished 1442 * building this linked list, the first available uid above or 1443 * equal to UID_MIN is the high of the first uid_blk in the linked 1444 * list + 1. 1445 */ 1446 /* add_uid() adds uid to the link list of used uids */ 1447 void 1448 add_uid(uid_t uid) 1449 { 1450 struct uid_blk *uid_p; 1451 /* Only keep track of the ones above UID_MIN */ 1452 1453 if (uid >= UID_MIN) { 1454 uid_p = uid_sp; 1455 1456 while (uid_p != NULL) { 1457 1458 if (uid_p->link != NULL) { 1459 1460 if (uid >= uid_p->link->low) 1461 uid_p = uid_p->link; 1462 1463 else if (uid >= uid_p->low && 1464 uid <= uid_p->high) { 1465 uid_p = NULL; 1466 } 1467 1468 else if (uid == (uid_p->high+1)) { 1469 1470 if (++uid_p->high == 1471 (uid_p->link->low - 1)) { 1472 uid_bcom(uid_p); 1473 } 1474 uid_p = NULL; 1475 } 1476 1477 else if (uid == (uid_p->link->low - 1)) { 1478 uid_p->link->low --; 1479 uid_p = NULL; 1480 } 1481 1482 else if (uid < uid_p->link->low) { 1483 add_ublk(uid, uid_p); 1484 uid_p = NULL; 1485 } 1486 } /* if uid_p->link */ 1487 1488 else { 1489 1490 if (uid == (uid_p->high + 1)) { 1491 uid_p->high++; 1492 uid_p = NULL; 1493 } else if (uid >= uid_p->low && 1494 uid <= uid_p->high) { 1495 uid_p = NULL; 1496 } else { 1497 add_ublk(uid, uid_p); 1498 uid_p = NULL; 1499 } 1500 } /* else */ 1501 } /* while uid_p */ 1502 1503 } /* if uid */ 1504 } 1505 1506 void 1507 bad_perm(void) 1508 { 1509 (void) fprintf(stderr, gettext("%s: Permission denied\n"), prognamp); 1510 exit(1); 1511 } 1512 1513 void 1514 bad_usage(char *sp) 1515 { 1516 if (strlen(sp) != 0) 1517 (void) fprintf(stderr, "%s: %s\n", prognamp, gettext(sp)); 1518 (void) fprintf(stderr, gettext("Usage:\n\ 1519 %s -a [-c comment] [-h homedir] [-u uid [-o]] [-g gid] \n\ 1520 [-s shell] [-f inactive] [-e expire] name\n\ 1521 %s -m -c comment | -h homedir | -u uid [-o] | -g gid |\n\ 1522 -s shell | -f inactive | -e expire | -l logname name\n\ 1523 %s -d name\n"), prognamp, prognamp, prognamp); 1524 if (info_mask & LOCKED) 1525 ulckpwdf(); 1526 exit(2); 1527 } 1528 1529 void 1530 bad_arg(char *s) 1531 { 1532 (void) fprintf(stderr, "%s: %s\n", prognamp, gettext(s)); 1533 1534 if (info_mask & LOCKED) 1535 ulckpwdf(); 1536 exit(3); 1537 } 1538 1539 void 1540 bad_name(char *s) 1541 { 1542 (void) fprintf(stderr, "%s: %s\n", prognamp, gettext(s)); 1543 ulckpwdf(); 1544 exit(9); 1545 } 1546 1547 void 1548 bad_uid(void) 1549 { 1550 (void) fprintf(stderr, gettext("%s: UID in use\n"), prognamp); 1551 1552 ulckpwdf(); 1553 exit(4); 1554 } 1555 1556 void 1557 bad_pasf(void) 1558 { 1559 msg = "%s: Inconsistent password files\n"; 1560 (void) fprintf(stderr, gettext(msg), prognamp); 1561 1562 ulckpwdf(); 1563 exit(5); 1564 } 1565 1566 void 1567 bad_uattr(void) 1568 { 1569 msg = "%s: Bad user_attr database\n"; 1570 (void) fprintf(stderr, gettext(msg), prognamp); 1571 1572 ulckpwdf(); 1573 exit(5); 1574 } 1575 1576 void 1577 file_error(void) 1578 { 1579 msg = "%s: Unexpected failure. Password files unchanged\n"; 1580 (void) fprintf(stderr, gettext(msg), prognamp); 1581 1582 ulckpwdf(); 1583 exit(6); 1584 } 1585 1586 void 1587 bad_news(void) 1588 { 1589 msg = "%s: Unexpected failure. Password file(s) missing\n"; 1590 (void) fprintf(stderr, gettext(msg), prognamp); 1591 1592 ulckpwdf(); 1593 exit(7); 1594 } 1595 1596 void 1597 no_lock(void) 1598 { 1599 msg = "%s: Password file(s) busy. Try again later\n"; 1600 (void) fprintf(stderr, gettext(msg), prognamp); 1601 1602 exit(8); 1603 } 1604 1605 /* Check for the size of the whole passwd entry */ 1606 void 1607 ck_p_sz(struct passwd *pwp) 1608 { 1609 char ctp[128]; 1610 1611 /* Ensure that the combined length of the individual */ 1612 /* fields will fit in a passwd entry. The 1 accounts for the */ 1613 /* newline and the 6 accounts for the colons (:'s) */ 1614 if (((int)strlen(pwp->pw_name) + 1 + 1615 sprintf(ctp, "%d", pwp->pw_uid) + 1616 sprintf(ctp, "%d", pwp->pw_gid) + 1617 (int)strlen(pwp->pw_comment) + 1618 (int)strlen(pwp->pw_dir) + 1619 (int)strlen(pwp->pw_shell) + 6) > (ENTRY_LENGTH-1)) { 1620 rid_tmpf(); 1621 bad_arg("New password entry too long"); 1622 } 1623 } 1624 1625 /* Check for the size of the whole passwd entry */ 1626 void 1627 ck_s_sz(struct spwd *ssp) 1628 { 1629 char ctp[128]; 1630 1631 /* Ensure that the combined length of the individual */ 1632 /* fields will fit in a shadow entry. The 1 accounts for the */ 1633 /* newline and the 7 accounts for the colons (:'s) */ 1634 if (((int)strlen(ssp->sp_namp) + 1 + 1635 (int)strlen(ssp->sp_pwdp) + 1636 sprintf(ctp, "%d", ssp->sp_lstchg) + 1637 sprintf(ctp, "%d", ssp->sp_min) + 1638 sprintf(ctp, "%d", ssp->sp_max) + 1639 sprintf(ctp, "%d", ssp->sp_warn) + 1640 sprintf(ctp, "%d", ssp->sp_inact) + 1641 sprintf(ctp, "%d", ssp->sp_expire) + 7) > (ENTRY_LENGTH - 1)) { 1642 rid_tmpf(); 1643 bad_arg("New password entry too long"); 1644 } 1645 } 1646 1647 /* Get rid of the temp files */ 1648 void 1649 rid_tmpf(void) 1650 { 1651 (void) fclose(fp_ptemp); 1652 1653 if (unlink(PASSTEMP)) { 1654 msg = "%s: warning: cannot unlink %s\n"; 1655 (void) fprintf(stderr, gettext(msg), prognamp, PASSTEMP); 1656 } 1657 1658 if (info_mask & BOTH_FILES) { 1659 (void) fclose(fp_stemp); 1660 1661 if (unlink(SHADTEMP)) { 1662 msg = "%s: warning: cannot unlink %s\n"; 1663 (void) fprintf(stderr, gettext(msg), prognamp, 1664 SHADTEMP); 1665 } 1666 } 1667 1668 if (info_mask & UATTR_FILE) { 1669 (void) fclose(fp_uatemp); 1670 1671 if (unlink(USERATTR_TEMP)) { 1672 msg = "%s: warning: cannot unlink %s\n"; 1673 (void) fprintf(stderr, gettext(msg), prognamp, 1674 USERATTR_TEMP); 1675 } 1676 } 1677 } 1678 1679 void 1680 file_copy(FILE *spf, long NIS_pos) 1681 { 1682 int n; 1683 char buf[1024]; 1684 1685 if (fseek(spf, NIS_pos, SEEK_SET) < 0) { 1686 rid_tmpf(); 1687 file_error(); 1688 } 1689 while ((n = fread(buf, sizeof (char), 1024, spf)) > 0) { 1690 if (fwrite(buf, sizeof (char), n, fp_stemp) != n) { 1691 rid_tmpf(); 1692 file_error(); 1693 } 1694 } 1695 } 1696