1 /* Copyright (C) 1998, 1999, 2003 Free Software Foundation, Inc.
2 This file is part of the GNU C Library.
3 Contributed by Thorsten Kukuk <kukuk@uni-paderborn.de>, 1998.
5 The GNU C Library is free software; you can redistribute it and/or
6 modify it under the terms of the GNU Lesser General Public
7 License as published by the Free Software Foundation; either
8 version 2.1 of the License, or (at your option) any later version.
10 The GNU C Library is distributed in the hope that it will be useful,
11 but WITHOUT ANY WARRANTY; without even the implied warranty of
12 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
13 Lesser General Public License for more details.
15 You should have received a copy of the GNU Lesser General Public
16 License along with the GNU C Library; if not, write to the Free
17 Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA
27 #include <sys/socket.h>
31 #include "nscd-client.h"
32 #include "nscd_proto.h"
34 int __nss_not_use_nscd_passwd
;
36 static int nscd_getpw_r (const char *key
, size_t keylen
, request_type type
,
37 struct passwd
*resultbuf
, char *buffer
,
38 size_t buflen
) internal_function
;
41 __nscd_getpwnam_r (const char *name
, struct passwd
*resultbuf
, char *buffer
,
47 return nscd_getpw_r (name
, strlen (name
) + 1, GETPWBYNAME
, resultbuf
,
52 __nscd_getpwuid_r (uid_t uid
, struct passwd
*resultbuf
, char *buffer
,
58 n
= __snprintf (buf
, sizeof (buf
), "%d", uid
) + 1;
60 return nscd_getpw_r (buf
, n
, GETPWBYUID
, resultbuf
, buffer
, buflen
);
66 nscd_getpw_r (const char *key
, size_t keylen
, request_type type
,
67 struct passwd
*resultbuf
, char *buffer
, size_t buflen
)
69 int sock
= __nscd_open_socket ();
71 pw_response_header pw_resp
;
77 __nss_not_use_nscd_passwd
= 1;
81 req
.version
= NSCD_VERSION
;
85 vec
[0].iov_base
= &req
;
86 vec
[0].iov_len
= sizeof (request_header
);
87 vec
[1].iov_base
= (void *) key
;
88 vec
[1].iov_len
= keylen
;
90 nbytes
= TEMP_FAILURE_RETRY (__writev (sock
, vec
, 2));
91 if (nbytes
!= (ssize_t
) (sizeof (request_header
) + keylen
))
97 nbytes
= TEMP_FAILURE_RETRY (__read (sock
, &pw_resp
,
98 sizeof (pw_response_header
)));
99 if (nbytes
!= (ssize_t
) sizeof (pw_response_header
))
105 if (pw_resp
.found
== -1)
107 /* The daemon does not cache this database. */
109 __nss_not_use_nscd_passwd
= 1;
113 if (pw_resp
.found
== 1)
116 size_t total
= (pw_resp
.pw_name_len
+ pw_resp
.pw_passwd_len
117 + pw_resp
.pw_gecos_len
+ pw_resp
.pw_dir_len
118 + pw_resp
.pw_shell_len
);
122 __set_errno (ERANGE
);
127 /* Set the information we already have. */
128 resultbuf
->pw_uid
= pw_resp
.pw_uid
;
129 resultbuf
->pw_gid
= pw_resp
.pw_gid
;
132 resultbuf
->pw_name
= p
;
133 p
+= pw_resp
.pw_name_len
;
135 resultbuf
->pw_passwd
= p
;
136 p
+= pw_resp
.pw_passwd_len
;
138 resultbuf
->pw_gecos
= p
;
139 p
+= pw_resp
.pw_gecos_len
;
141 resultbuf
->pw_dir
= p
;
142 p
+= pw_resp
.pw_dir_len
;
144 resultbuf
->pw_shell
= p
;
146 nbytes
= TEMP_FAILURE_RETRY (__read (sock
, buffer
, total
));
150 return nbytes
== (ssize_t
) total
? 0 : -1;
155 /* The `errno' to some value != ERANGE. */
156 __set_errno (ENOENT
);