2 * Copyright (c) 1988, 1993, 1994
3 * The Regents of the University of California. All rights reserved.
4 * Copyright (c) 2002 Networks Associates Technology, Inc.
7 * Portions of this software were developed for the FreeBSD Project by
8 * ThinkSec AS and NAI Labs, the Security Research Division of Network
9 * Associates, Inc. under DARPA/SPAWAR contract N66001-01-C-8035
10 * ("CBOSS"), as part of the DARPA CHATS research program.
12 * Redistribution and use in source and binary forms, with or without
13 * modification, are permitted provided that the following conditions
15 * 1. Redistributions of source code must retain the above copyright
16 * notice, this list of conditions and the following disclaimer.
17 * 2. Redistributions in binary form must reproduce the above copyright
18 * notice, this list of conditions and the following disclaimer in the
19 * documentation and/or other materials provided with the distribution.
20 * 3. All advertising materials mentioning features or use of this software
21 * must display the following acknowledgement:
22 * This product includes software developed by the University of
23 * California, Berkeley and its contributors.
24 * 4. Neither the name of the University nor the names of its contributors
25 * may be used to endorse or promote products derived from this software
26 * without specific prior written permission.
28 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
29 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
30 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
31 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
32 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
33 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
34 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
35 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
36 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
37 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
40 * @(#) Copyright (c) 1988, 1993, 1994 The Regents of the University of California. All rights reserved.
41 * @(#)chpass.c 8.4 (Berkeley) 4/2/94
42 * $FreeBSD: src/usr.bin/chpass/chpass.c,v 1.28 2006/09/25 15:06:24 marck Exp $
43 * $DragonFly: src/usr.bin/chpass/chpass.c,v 1.4 2003/11/03 19:31:28 eirikn Exp $
46 #include <sys/param.h>
66 static void baduser(void);
67 static void usage(void);
70 main(int argc
, char **argv
)
72 enum { NEWSH
, LOADENTRY
, EDITENTRY
, NEWPW
, NEWEXP
} op
;
73 struct passwd lpw
, *old_pw
, *pw
;
79 struct ypclnt
*ypclnt
;
80 const char *yp_domain
= NULL
, *yp_host
= NULL
;
86 while ((ch
= getopt(argc
, argv
, "a:p:s:e:d:h:loy")) != -1)
88 while ((ch
= getopt(argc
, argv
, "a:p:s:e:")) != -1)
133 if (op
== EDITENTRY
|| op
== NEWSH
|| op
== NEWPW
|| op
== NEWEXP
) {
135 if ((pw
= getpwuid(uid
)) == NULL
)
136 errx(1, "unknown user: uid %lu",
139 if ((pw
= getpwnam(*argv
)) == NULL
)
140 errx(1, "unknown user: %s", *argv
);
141 if (uid
!= 0 && uid
!= pw
->pw_uid
)
145 /* Make a copy for later verification */
146 if ((pw
= pw_dup(pw
)) == NULL
||
147 (old_pw
= pw_dup(pw
)) == NULL
)
152 if (pw
!= NULL
&& (pw
->pw_fields
& _PWF_SOURCE
) == _PWF_NIS
) {
153 ypclnt
= ypclnt_new(yp_domain
, "passwd.byname", yp_host
);
154 master_mode
= (ypclnt
!= NULL
&&
155 ypclnt_connect(ypclnt
) != -1 &&
156 ypclnt_havepasswdd(ypclnt
) == 1);
160 master_mode
= (uid
== 0);
163 /* protect p_shell -- it thinks NULL is /bin/sh */
166 if (p_shell(arg
, pw
, NULL
) == -1)
171 if (uid
) /* only root can change expire */
173 if (p_expire(arg
, pw
, NULL
) == -1)
177 if (op
== LOADENTRY
) {
182 if (!__pw_scan(arg
, pw
, _PWSCAN_WARN
|_PWSCAN_MASTER
))
190 if (strchr(arg
, ':'))
191 errx(1, "invalid format for password");
195 if (op
== EDITENTRY
) {
197 * We don't really need pw_*() here, but pw_edit() (used
198 * by edit()) is just too useful...
200 if (pw_init(NULL
, NULL
))
202 if ((tfd
= pw_tmp(-1)) == -1) {
207 pw
= edit(pw_tempname(), old_pw
);
212 * pw_equal does not check for crypted passwords, so we
213 * should do it explicitly
215 if (pw_equal(old_pw
, pw
) &&
216 strcmp(old_pw
->pw_passwd
, pw
->pw_passwd
) == 0)
217 errx(0, "user information unchanged");
220 if (old_pw
&& !master_mode
) {
221 password
= getpass("Password: ");
222 if (strcmp(crypt(password
, old_pw
->pw_passwd
),
223 old_pw
->pw_passwd
) != 0)
230 pw
->pw_fields
|= (old_pw
->pw_fields
& _PWF_SOURCE
);
231 switch (pw
->pw_fields
& _PWF_SOURCE
) {
234 ypclnt
= ypclnt_new(yp_domain
, "passwd.byname", yp_host
);
235 if (ypclnt
== NULL
||
236 ypclnt_connect(ypclnt
) == -1 ||
237 ypclnt_passwd(ypclnt
, pw
, password
) == -1) {
238 warnx("%s", ypclnt
->error
);
243 errx(0, "NIS user information updated");
247 if (pw_init(NULL
, NULL
))
249 if ((pfd
= pw_lock()) == -1) {
253 if ((tfd
= pw_tmp(-1)) == -1) {
257 if (pw_copy(pfd
, tfd
, pw
, old_pw
) == -1) {
261 if (pw_mkdb(pw
->pw_name
) == -1) {
266 errx(0, "user information updated");
269 errx(1, "unsupported passwd source");
277 errx(1, "%s", strerror(EACCES
));
285 "usage: chpass%s %s [user]\n",
287 " [-d domain] [-h host]",
291 "[-a list] [-p encpass] [-s shell] [-e mmm dd yy]");