r5592: Oops, accidentally committed test version of rpcclient. Reverting changes.
[Samba/gbeck.git] / source3 / lib / util_pw.c
blob0d7ffe09e9bc343a8b6358a9868d380e8c532a53
1 /*
2 Unix SMB/CIFS implementation.
4 Safe versions of getpw* calls
6 Copyright (C) Andrew Bartlett 2002
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 2 of the License, or
11 (at your option) any later version.
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
18 You should have received a copy of the GNU General Public License
19 along with this program; if not, write to the Free Software
20 Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
23 #include "includes.h"
25 static struct passwd *alloc_copy_passwd(const struct passwd *from)
27 struct passwd *ret = SMB_XMALLOC_P(struct passwd);
28 ZERO_STRUCTP(ret);
29 ret->pw_name = smb_xstrdup(from->pw_name);
30 ret->pw_passwd = smb_xstrdup(from->pw_passwd);
31 ret->pw_uid = from->pw_uid;
32 ret->pw_gid = from->pw_gid;
33 ret->pw_gecos = smb_xstrdup(from->pw_gecos);
34 ret->pw_dir = smb_xstrdup(from->pw_dir);
35 ret->pw_shell = smb_xstrdup(from->pw_shell);
36 return ret;
39 void passwd_free (struct passwd **buf)
41 if (!*buf) {
42 DEBUG(0, ("attempted double-free of allocated passwd\n"));
43 return;
46 SAFE_FREE((*buf)->pw_name);
47 SAFE_FREE((*buf)->pw_passwd);
48 SAFE_FREE((*buf)->pw_gecos);
49 SAFE_FREE((*buf)->pw_dir);
50 SAFE_FREE((*buf)->pw_shell);
52 SAFE_FREE(*buf);
55 #define PWNAMCACHE_SIZE 4
56 static struct passwd *pwnam_cache[PWNAMCACHE_SIZE];
57 static BOOL pwnam_cache_initialized = False;
59 static void init_pwnam_cache(void)
61 int i;
63 if (pwnam_cache_initialized)
64 return;
66 for (i=0; i<PWNAMCACHE_SIZE; i++)
67 pwnam_cache[i] = NULL;
69 pwnam_cache_initialized = True;
70 return;
73 struct passwd *getpwnam_alloc(const char *name)
75 int i;
77 struct passwd *temp;
79 init_pwnam_cache();
81 for (i=0; i<PWNAMCACHE_SIZE; i++) {
82 if ((pwnam_cache[i] != NULL) &&
83 (strcmp(name, pwnam_cache[i]->pw_name) == 0)) {
84 DEBUG(10, ("Got %s from pwnam_cache\n", name));
85 return alloc_copy_passwd(pwnam_cache[i]);
89 temp = sys_getpwnam(name);
91 if (!temp) {
92 #if 0
93 if (errno == ENOMEM) {
94 /* what now? */
96 #endif
97 return NULL;
100 for (i=0; i<PWNAMCACHE_SIZE; i++) {
101 if (pwnam_cache[i] == NULL)
102 break;
105 if (i == PWNAMCACHE_SIZE)
106 i = rand() % PWNAMCACHE_SIZE;
108 if (pwnam_cache[i] != NULL)
109 passwd_free(&pwnam_cache[i]);
111 pwnam_cache[i] = alloc_copy_passwd(temp);
113 return alloc_copy_passwd(temp);
116 struct passwd *getpwuid_alloc(uid_t uid)
118 struct passwd *temp;
120 temp = sys_getpwuid(uid);
122 if (!temp) {
123 #if 0
124 if (errno == ENOMEM) {
125 /* what now? */
127 #endif
128 return NULL;
131 return alloc_copy_passwd(temp);