1 .\" Copyright (c) 1988, 1991, 1993
2 .\" The Regents of the University of California. All rights reserved.
4 .\" Redistribution and use in source and binary forms, with or without
5 .\" modification, are permitted provided that the following conditions
7 .\" 1. Redistributions of source code must retain the above copyright
8 .\" notice, this list of conditions and the following disclaimer.
9 .\" 2. Redistributions in binary form must reproduce the above copyright
10 .\" notice, this list of conditions and the following disclaimer in the
11 .\" documentation and/or other materials provided with the distribution.
12 .\" 4. Neither the name of the University nor the names of its contributors
13 .\" may be used to endorse or promote products derived from this software
14 .\" without specific prior written permission.
16 .\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
17 .\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
18 .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
19 .\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
20 .\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
21 .\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
22 .\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
23 .\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
24 .\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
25 .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
28 .\" From: @(#)getpwent.3 8.2 (Berkeley) 12/11/93
29 .\" $FreeBSD: src/lib/libc/gen/getpwent.3,v 1.30 2007/01/09 00:27:54 imp Exp $
30 .\" $DragonFly: src/lib/libc/gen/getpwent.3,v 1.5 2006/05/26 19:39:36 swildner Exp $
45 .Nd password database operations
54 .Fn getpwent_r "struct passwd *pwd" "char *buffer" "size_t bufsize" "struct passwd **result"
56 .Fn getpwnam "const char *login"
58 .Fn getpwnam_r "const char *name" "struct passwd *pwd" "char *buffer" "size_t bufsize" "struct passwd **result"
60 .Fn getpwuid "uid_t uid"
62 .Fn getpwuid_r "uid_t uid" "struct passwd *pwd" "char *buffer" "size_t bufsize" "struct passwd **result"
64 .Fn setpassent "int stayopen"
71 operate on the password database file
75 Each entry in the database is defined by the structure
80 .Bd -literal -offset indent
82 char *pw_name; /* user name */
83 char *pw_passwd; /* encrypted password */
84 uid_t pw_uid; /* user uid */
85 gid_t pw_gid; /* user gid */
86 time_t pw_change; /* password change time */
87 char *pw_class; /* user access class */
88 char *pw_gecos; /* Honeywell login info */
89 char *pw_dir; /* home directory */
90 char *pw_shell; /* default shell */
91 time_t pw_expire; /* account expiration */
92 int pw_fields; /* internal: fields filled in */
100 search the password database for the given login name or user uid,
101 respectively, always returning the first one encountered.
106 sequentially reads the password database and is intended for programs
107 that wish to process the complete list of users.
114 are thread-safe versions of
120 The caller must provide storage for the results of the search in
128 When these functions are successful, the
130 argument will be filled-in, and a pointer to that argument will be
133 If an entry is not found or an error occurs,
141 accomplishes two purposes.
144 to ``rewind'' to the beginning of the database.
147 is non-zero, file descriptors are left open, significantly speeding
148 up subsequent accesses for all of the routines.
149 (This latter functionality is unnecessary for
151 as it does not close its file descriptors by default.)
153 It is dangerous for long-running programs to keep the file descriptors
154 open as the database will become out of date if it is updated while the
162 with an argument of zero.
167 closes any open files.
169 These routines have been written to ``shadow'' the password file, e.g.\&
170 allow only certain programs to have access to the encrypted password.
171 If the process which calls them has an effective uid of 0, the encrypted
172 password will be returned, otherwise, the password field of the returned
173 structure will point to the string
181 return a valid pointer to a passwd structure on success
184 if the entry is not found or if an error occurs.
185 If an error does occur,
188 Note that programs must explicitly set
190 to zero before calling any of these functions if they need to
191 distinguish between a non-existent entry and an error.
197 return 0 if no error occurred, or an error number to indicate failure.
198 It is not an error if a matching entry is not found.
203 and the return value is 0, no matching entry exists.)
207 function returns 0 on failure and 1 on success.
213 have no return value.
215 .Bl -tag -width /etc/master.passwd -compact
217 The insecure password database file
219 The secure password database file
220 .It Pa /etc/master.passwd
221 The current password file
223 A Version 7 format password file
226 The historic function
228 which allowed the specification of alternate password databases,
229 has been deprecated and is no longer available.
231 These routines may fail for any of the errors specified in
237 in addition to the following:
240 The buffer specified by the
244 arguments was insufficiently sized to store the result.
245 The caller should retry with a larger buffer.
250 .Xr nsswitch.conf 5 ,
275 functions appeared in
286 functions appeared in
296 leave their results in an internal static object and return
297 a pointer to that object.
300 will modify the same object.
309 are fairly useless in a networked environment and should be
310 avoided, if possible.
316 make no attempt to suppress duplicate information if multiple
317 sources are specified in
318 .Xr nsswitch.conf 5 .