1 /* Copyright (C) 1996-1999,2001-2006,2007,2011
2 Free Software Foundation, Inc.
3 This file is part of the GNU C Library.
4 Contributed by Thorsten Kukuk <kukuk@vt.uni-paderborn.de>, 1996.
6 The GNU C Library is free software; you can redistribute it and/or
7 modify it under the terms of the GNU Lesser General Public
8 License as published by the Free Software Foundation; either
9 version 2.1 of the License, or (at your option) any later version.
11 The GNU C Library is distributed in the hope that it will be useful,
12 but WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 Lesser General Public License for more details.
16 You should have received a copy of the GNU Lesser General Public
17 License along with the GNU C Library; if not, see
18 <http://www.gnu.org/licenses/>. */
27 #include <stdio_ext.h>
29 #include <rpc/types.h>
30 #include <rpcsvc/ypclnt.h>
31 #include <bits/libc-lock.h>
32 #include <kernel-features.h>
36 static service_user
*ni
;
37 static enum nss_status (*nss_setspent
) (int stayopen
);
38 static enum nss_status (*nss_getspnam_r
) (const char *name
, struct spwd
* sp
,
39 char *buffer
, size_t buflen
,
41 static enum nss_status (*nss_getspent_r
) (struct spwd
* sp
, char *buffer
,
42 size_t buflen
, int *errnop
);
43 static enum nss_status (*nss_endspent
) (void);
45 /* Get the declaration of the parser function. */
47 #define STRUCTURE spwd
49 #include <nss/nss_files/files-parse.c>
51 /* Structure for remembering -@netgroup and -user members ... */
52 #define BLACKLIST_INITIAL_SIZE 512
53 #define BLACKLIST_INCREMENT 256
66 enum nss_status setent_status
;
68 struct blacklist_t blacklist
;
70 struct __netgrent netgrdata
;
72 typedef struct ent_t ent_t
;
74 static ent_t ext_ent
= { false, true, false, NSS_STATUS_SUCCESS
, NULL
,
76 { NULL
, NULL
, 0, 0, 0, 0, 0, 0, 0}};
78 /* Protect global state against multiple changers. */
79 __libc_lock_define_initialized (static, lock
)
81 /* Positive if O_CLOEXEC is supported, negative if it is not supported,
82 zero if it is still undecided. This variable is shared with the
83 other compat functions. */
84 #ifdef __ASSUME_O_CLOEXEC
85 # define __compat_have_cloexec 1
88 extern int __compat_have_cloexec
;
90 # define __compat_have_cloexec -1
94 /* Prototypes for local functions. */
95 static void blacklist_store_name (const char *, ent_t
*);
96 static int in_blacklist (const char *, int, ent_t
*);
98 /* Initialize the NSS interface/functions. The calling function must
101 init_nss_interface (void)
103 if (__nss_database_lookup ("shadow_compat", "passwd_compat",
106 nss_setspent
= __nss_lookup_function (ni
, "setspent");
107 nss_getspnam_r
= __nss_lookup_function (ni
, "getspnam_r");
108 nss_getspent_r
= __nss_lookup_function (ni
, "getspent_r");
109 nss_endspent
= __nss_lookup_function (ni
, "endspent");
114 give_spwd_free (struct spwd
*pwd
)
119 memset (pwd
, '\0', sizeof (struct spwd
));
127 spwd_need_buflen (struct spwd
*pwd
)
131 if (pwd
->sp_pwdp
!= NULL
)
132 len
+= strlen (pwd
->sp_pwdp
) + 1;
138 copy_spwd_changes (struct spwd
*dest
, struct spwd
*src
,
139 char *buffer
, size_t buflen
)
141 if (src
->sp_pwdp
!= NULL
&& strlen (src
->sp_pwdp
))
144 dest
->sp_pwdp
= strdup (src
->sp_pwdp
);
145 else if (dest
->sp_pwdp
&&
146 strlen (dest
->sp_pwdp
) >= strlen (src
->sp_pwdp
))
147 strcpy (dest
->sp_pwdp
, src
->sp_pwdp
);
150 dest
->sp_pwdp
= buffer
;
151 strcpy (dest
->sp_pwdp
, src
->sp_pwdp
);
152 buffer
+= strlen (dest
->sp_pwdp
) + 1;
153 buflen
= buflen
- (strlen (dest
->sp_pwdp
) + 1);
156 if (src
->sp_lstchg
!= 0)
157 dest
->sp_lstchg
= src
->sp_lstchg
;
158 if (src
->sp_min
!= 0)
159 dest
->sp_min
= src
->sp_min
;
160 if (src
->sp_max
!= 0)
161 dest
->sp_max
= src
->sp_max
;
162 if (src
->sp_warn
!= -1)
163 dest
->sp_warn
= src
->sp_warn
;
164 if (src
->sp_inact
!= -1)
165 dest
->sp_inact
= src
->sp_inact
;
166 if (src
->sp_expire
!= -1)
167 dest
->sp_expire
= src
->sp_expire
;
168 if (src
->sp_flag
!= ~0ul)
169 dest
->sp_flag
= src
->sp_flag
;
172 static enum nss_status
173 internal_setspent (ent_t
*ent
, int stayopen
)
175 enum nss_status status
= NSS_STATUS_SUCCESS
;
177 ent
->first
= ent
->netgroup
= 0;
180 /* If something was left over free it. */
182 __internal_endnetgrent (&ent
->netgrdata
);
184 if (ent
->blacklist
.data
!= NULL
)
186 ent
->blacklist
.current
= 1;
187 ent
->blacklist
.data
[0] = '|';
188 ent
->blacklist
.data
[1] = '\0';
191 ent
->blacklist
.current
= 0;
193 if (ent
->stream
== NULL
)
195 ent
->stream
= fopen ("/etc/shadow", "rme");
197 if (ent
->stream
== NULL
)
198 status
= errno
== EAGAIN
? NSS_STATUS_TRYAGAIN
: NSS_STATUS_UNAVAIL
;
201 /* We have to make sure the file is `closed on exec'. */
204 if (__compat_have_cloexec
<= 0)
207 result
= flags
= fcntl (fileno_unlocked (ent
->stream
), F_GETFD
,
211 #if defined O_CLOEXEC && !defined __ASSUME_O_CLOEXEC
212 if (__compat_have_cloexec
== 0)
213 __compat_have_cloexec
= (flags
& FD_CLOEXEC
) ? 1 : -1;
215 if (__compat_have_cloexec
< 0)
219 result
= fcntl (fileno_unlocked (ent
->stream
), F_SETFD
,
227 /* Something went wrong. Close the stream and return a
229 fclose (ent
->stream
);
231 status
= NSS_STATUS_UNAVAIL
;
234 /* We take care of locking ourself. */
235 __fsetlocking (ent
->stream
, FSETLOCKING_BYCALLER
);
239 rewind (ent
->stream
);
241 give_spwd_free (&ent
->pwd
);
243 if (status
== NSS_STATUS_SUCCESS
&& nss_setspent
)
244 ent
->setent_status
= nss_setspent (stayopen
);
251 _nss_compat_setspent (int stayopen
)
253 enum nss_status result
;
255 __libc_lock_lock (lock
);
258 init_nss_interface ();
260 result
= internal_setspent (&ext_ent
, stayopen
);
262 __libc_lock_unlock (lock
);
268 static enum nss_status
269 internal_endspent (ent_t
*ent
)
274 if (ent
->stream
!= NULL
)
276 fclose (ent
->stream
);
281 __internal_endnetgrent (&ent
->netgrdata
);
283 ent
->first
= ent
->netgroup
= false;
286 if (ent
->blacklist
.data
!= NULL
)
288 ent
->blacklist
.current
= 1;
289 ent
->blacklist
.data
[0] = '|';
290 ent
->blacklist
.data
[1] = '\0';
293 ent
->blacklist
.current
= 0;
295 give_spwd_free (&ent
->pwd
);
297 return NSS_STATUS_SUCCESS
;
301 _nss_compat_endspent (void)
303 enum nss_status result
;
305 __libc_lock_lock (lock
);
307 result
= internal_endspent (&ext_ent
);
309 __libc_lock_unlock (lock
);
315 static enum nss_status
316 getspent_next_nss_netgr (const char *name
, struct spwd
*result
, ent_t
*ent
,
317 char *group
, char *buffer
, size_t buflen
,
320 char *curdomain
= NULL
, *host
, *user
, *domain
, *p2
;
324 return NSS_STATUS_UNAVAIL
;
326 /* If the setpwent call failed, say so. */
327 if (ent
->setent_status
!= NSS_STATUS_SUCCESS
)
328 return ent
->setent_status
;
332 memset (&ent
->netgrdata
, 0, sizeof (struct __netgrent
));
333 __internal_setnetgrent (group
, &ent
->netgrdata
);
339 enum nss_status status
;
341 status
= __internal_getnetgrent_r (&host
, &user
, &domain
,
342 &ent
->netgrdata
, buffer
, buflen
,
346 __internal_endnetgrent (&ent
->netgrdata
);
347 ent
->netgroup
= false;
348 give_spwd_free (&ent
->pwd
);
349 return NSS_STATUS_RETURN
;
352 if (user
== NULL
|| user
[0] == '-')
357 if (curdomain
== NULL
358 && yp_get_default_domain (&curdomain
) != YPERR_SUCCESS
)
360 __internal_endnetgrent (&ent
->netgrdata
);
361 ent
->netgroup
= false;
362 give_spwd_free (&ent
->pwd
);
363 return NSS_STATUS_UNAVAIL
;
365 if (strcmp (curdomain
, domain
) != 0)
369 /* If name != NULL, we are called from getpwnam */
371 if (strcmp (user
, name
) != 0)
374 p2len
= spwd_need_buflen (&ent
->pwd
);
378 return NSS_STATUS_TRYAGAIN
;
380 p2
= buffer
+ (buflen
- p2len
);
383 if (nss_getspnam_r (user
, result
, buffer
, buflen
, errnop
) !=
387 if (!in_blacklist (result
->sp_namp
, strlen (result
->sp_namp
), ent
))
389 /* Store the User in the blacklist for possible the "+" at the
390 end of /etc/passwd */
391 blacklist_store_name (result
->sp_namp
, ent
);
392 copy_spwd_changes (result
, &ent
->pwd
, p2
, p2len
);
397 return NSS_STATUS_SUCCESS
;
401 static enum nss_status
402 getspent_next_nss (struct spwd
*result
, ent_t
*ent
,
403 char *buffer
, size_t buflen
, int *errnop
)
405 enum nss_status status
;
410 return NSS_STATUS_UNAVAIL
;
412 p2len
= spwd_need_buflen (&ent
->pwd
);
416 return NSS_STATUS_TRYAGAIN
;
418 p2
= buffer
+ (buflen
- p2len
);
422 if ((status
= nss_getspent_r (result
, buffer
, buflen
, errnop
)) !=
426 while (in_blacklist (result
->sp_namp
, strlen (result
->sp_namp
), ent
));
428 copy_spwd_changes (result
, &ent
->pwd
, p2
, p2len
);
430 return NSS_STATUS_SUCCESS
;
434 /* This function handle the +user entrys in /etc/shadow */
435 static enum nss_status
436 getspnam_plususer (const char *name
, struct spwd
*result
, ent_t
*ent
,
437 char *buffer
, size_t buflen
, int *errnop
)
440 return NSS_STATUS_UNAVAIL
;
443 memset (&pwd
, '\0', sizeof (struct spwd
));
449 copy_spwd_changes (&pwd
, result
, NULL
, 0);
451 size_t plen
= spwd_need_buflen (&pwd
);
455 return NSS_STATUS_TRYAGAIN
;
457 char *p
= buffer
+ (buflen
- plen
);
460 enum nss_status status
= nss_getspnam_r (name
, result
, buffer
, buflen
,
462 if (status
!= NSS_STATUS_SUCCESS
)
465 if (in_blacklist (result
->sp_namp
, strlen (result
->sp_namp
), ent
))
466 return NSS_STATUS_NOTFOUND
;
468 copy_spwd_changes (result
, &pwd
, p
, plen
);
469 give_spwd_free (&pwd
);
470 /* We found the entry. */
471 return NSS_STATUS_SUCCESS
;
475 static enum nss_status
476 getspent_next_file (struct spwd
*result
, ent_t
*ent
,
477 char *buffer
, size_t buflen
, int *errnop
)
479 struct parser_data
*data
= (void *) buffer
;
488 /* We need at least 3 characters for one line. */
489 if (__builtin_expect (buflen
< 3, 0))
493 return NSS_STATUS_TRYAGAIN
;
496 fgetpos (ent
->stream
, &pos
);
497 buffer
[buflen
- 1] = '\xff';
498 p
= fgets_unlocked (buffer
, buflen
, ent
->stream
);
499 if (p
== NULL
&& feof_unlocked (ent
->stream
))
500 return NSS_STATUS_NOTFOUND
;
502 if (p
== NULL
|| __builtin_expect (buffer
[buflen
- 1] != '\xff', 0))
505 fsetpos (ent
->stream
, &pos
);
509 /* Skip leading blanks. */
513 while (*p
== '\0' || *p
== '#' /* Ignore empty and comment lines. */
514 /* Parse the line. If it is invalid, loop to
515 get the next line of the file to parse. */
516 || !(parse_res
= _nss_files_parse_spent (p
, result
, data
,
519 if (__builtin_expect (parse_res
== -1, 0))
520 /* The parser ran out of space. */
523 if (result
->sp_namp
[0] != '+' && result
->sp_namp
[0] != '-')
524 /* This is a real entry. */
528 if (result
->sp_namp
[0] == '-' && result
->sp_namp
[1] == '@'
529 && result
->sp_namp
[2] != '\0')
531 /* XXX Do not use fixed length buffers. */
533 char *user
, *host
, *domain
;
534 struct __netgrent netgrdata
;
536 bzero (&netgrdata
, sizeof (struct __netgrent
));
537 __internal_setnetgrent (&result
->sp_namp
[2], &netgrdata
);
538 while (__internal_getnetgrent_r (&host
, &user
, &domain
,
539 &netgrdata
, buf2
, sizeof (buf2
),
542 if (user
!= NULL
&& user
[0] != '-')
543 blacklist_store_name (user
, ent
);
545 __internal_endnetgrent (&netgrdata
);
550 if (result
->sp_namp
[0] == '+' && result
->sp_namp
[1] == '@'
551 && result
->sp_namp
[2] != '\0')
555 ent
->netgroup
= true;
557 copy_spwd_changes (&ent
->pwd
, result
, NULL
, 0);
559 status
= getspent_next_nss_netgr (NULL
, result
, ent
,
561 buffer
, buflen
, errnop
);
562 if (status
== NSS_STATUS_RETURN
)
569 if (result
->sp_namp
[0] == '-' && result
->sp_namp
[1] != '\0'
570 && result
->sp_namp
[1] != '@')
572 blacklist_store_name (&result
->sp_namp
[1], ent
);
577 if (result
->sp_namp
[0] == '+' && result
->sp_namp
[1] != '\0'
578 && result
->sp_namp
[1] != '@')
580 size_t len
= strlen (result
->sp_namp
);
582 enum nss_status status
;
584 /* Store the User in the blacklist for the "+" at the end of
586 memcpy (buf
, &result
->sp_namp
[1], len
);
587 status
= getspnam_plususer (&result
->sp_namp
[1], result
, ent
,
588 buffer
, buflen
, errnop
);
589 blacklist_store_name (buf
, ent
);
591 if (status
== NSS_STATUS_SUCCESS
) /* We found the entry. */
593 /* We couldn't parse the entry */
594 else if (status
== NSS_STATUS_RETURN
595 /* entry doesn't exist */
596 || status
== NSS_STATUS_NOTFOUND
)
600 if (status
== NSS_STATUS_TRYAGAIN
)
602 fsetpos (ent
->stream
, &pos
);
610 if (result
->sp_namp
[0] == '+' && result
->sp_namp
[1] == '\0')
614 copy_spwd_changes (&ent
->pwd
, result
, NULL
, 0);
616 return getspent_next_nss (result
, ent
, buffer
, buflen
, errnop
);
620 return NSS_STATUS_SUCCESS
;
624 static enum nss_status
625 internal_getspent_r (struct spwd
*pw
, ent_t
*ent
,
626 char *buffer
, size_t buflen
, int *errnop
)
630 enum nss_status status
;
632 /* We are searching members in a netgroup */
633 /* Since this is not the first call, we don't need the group name */
634 status
= getspent_next_nss_netgr (NULL
, pw
, ent
, NULL
, buffer
,
637 if (status
== NSS_STATUS_RETURN
)
638 return getspent_next_file (pw
, ent
, buffer
, buflen
, errnop
);
643 return getspent_next_file (pw
, ent
, buffer
, buflen
, errnop
);
645 return getspent_next_nss (pw
, ent
, buffer
, buflen
, errnop
);
650 _nss_compat_getspent_r (struct spwd
*pwd
, char *buffer
, size_t buflen
,
653 enum nss_status result
= NSS_STATUS_SUCCESS
;
655 __libc_lock_lock (lock
);
657 /* Be prepared that the setpwent function was not called before. */
659 init_nss_interface ();
661 if (ext_ent
.stream
== NULL
)
662 result
= internal_setspent (&ext_ent
, 1);
664 if (result
== NSS_STATUS_SUCCESS
)
665 result
= internal_getspent_r (pwd
, &ext_ent
, buffer
, buflen
, errnop
);
667 __libc_lock_unlock (lock
);
673 /* Searches in /etc/passwd and the NIS/NIS+ map for a special user */
674 static enum nss_status
675 internal_getspnam_r (const char *name
, struct spwd
*result
, ent_t
*ent
,
676 char *buffer
, size_t buflen
, int *errnop
)
678 struct parser_data
*data
= (void *) buffer
;
688 /* We need at least 3 characters for one line. */
689 if (__builtin_expect (buflen
< 3, 0))
693 return NSS_STATUS_TRYAGAIN
;
696 fgetpos (ent
->stream
, &pos
);
697 buffer
[buflen
- 1] = '\xff';
698 p
= fgets_unlocked (buffer
, buflen
, ent
->stream
);
699 if (p
== NULL
&& feof_unlocked (ent
->stream
))
700 return NSS_STATUS_NOTFOUND
;
702 if (p
== NULL
|| buffer
[buflen
- 1] != '\xff')
705 fsetpos (ent
->stream
, &pos
);
709 /* Terminate the line for any case. */
710 buffer
[buflen
- 1] = '\0';
712 /* Skip leading blanks. */
716 while (*p
== '\0' || *p
== '#' || /* Ignore empty and comment lines. */
717 /* Parse the line. If it is invalid, loop to
718 get the next line of the file to parse. */
719 !(parse_res
= _nss_files_parse_spent (p
, result
, data
, buflen
,
722 if (__builtin_expect (parse_res
== -1, 0))
723 /* The parser ran out of space. */
726 /* This is a real entry. */
727 if (result
->sp_namp
[0] != '+' && result
->sp_namp
[0] != '-')
729 if (strcmp (result
->sp_namp
, name
) == 0)
730 return NSS_STATUS_SUCCESS
;
736 /* If the loaded NSS module does not support this service, add
737 all users from a +@netgroup entry to the blacklist, too. */
738 if (result
->sp_namp
[0] == '-' && result
->sp_namp
[1] == '@'
739 && result
->sp_namp
[2] != '\0')
741 if (innetgr (&result
->sp_namp
[2], NULL
, name
, NULL
))
742 return NSS_STATUS_NOTFOUND
;
747 if (result
->sp_namp
[0] == '+' && result
->sp_namp
[1] == '@'
748 && result
->sp_namp
[2] != '\0')
750 enum nss_status status
;
752 if (innetgr (&result
->sp_namp
[2], NULL
, name
, NULL
))
754 status
= getspnam_plususer (name
, result
, ent
, buffer
,
757 if (status
== NSS_STATUS_RETURN
)
766 if (result
->sp_namp
[0] == '-' && result
->sp_namp
[1] != '\0'
767 && result
->sp_namp
[1] != '@')
769 if (strcmp (&result
->sp_namp
[1], name
) == 0)
770 return NSS_STATUS_NOTFOUND
;
776 if (result
->sp_namp
[0] == '+' && result
->sp_namp
[1] != '\0'
777 && result
->sp_namp
[1] != '@')
779 if (strcmp (name
, &result
->sp_namp
[1]) == 0)
781 enum nss_status status
;
783 status
= getspnam_plususer (name
, result
, ent
,
784 buffer
, buflen
, errnop
);
786 if (status
== NSS_STATUS_RETURN
)
787 /* We couldn't parse the entry */
788 return NSS_STATUS_NOTFOUND
;
795 if (result
->sp_namp
[0] == '+' && result
->sp_namp
[1] == '\0')
797 enum nss_status status
;
799 status
= getspnam_plususer (name
, result
, ent
,
800 buffer
, buflen
, errnop
);
802 if (status
== NSS_STATUS_SUCCESS
)
803 /* We found the entry. */
805 else if (status
== NSS_STATUS_RETURN
)
806 /* We couldn't parse the entry */
807 return NSS_STATUS_NOTFOUND
;
812 return NSS_STATUS_SUCCESS
;
817 _nss_compat_getspnam_r (const char *name
, struct spwd
*pwd
,
818 char *buffer
, size_t buflen
, int *errnop
)
820 enum nss_status result
;
821 ent_t ent
= { false, true, false, NSS_STATUS_SUCCESS
, NULL
, { NULL
, 0, 0},
822 { NULL
, NULL
, 0, 0, 0, 0, 0, 0, 0}};
824 if (name
[0] == '-' || name
[0] == '+')
825 return NSS_STATUS_NOTFOUND
;
827 __libc_lock_lock (lock
);
830 init_nss_interface ();
832 __libc_lock_unlock (lock
);
834 result
= internal_setspent (&ent
, 0);
836 if (result
== NSS_STATUS_SUCCESS
)
837 result
= internal_getspnam_r (name
, pwd
, &ent
, buffer
, buflen
, errnop
);
839 internal_endspent (&ent
);
845 /* Support routines for remembering -@netgroup and -user entries.
846 The names are stored in a single string with `|' as separator. */
848 blacklist_store_name (const char *name
, ent_t
*ent
)
850 int namelen
= strlen (name
);
853 /* first call, setup cache */
854 if (ent
->blacklist
.size
== 0)
856 ent
->blacklist
.size
= MAX (BLACKLIST_INITIAL_SIZE
, 2 * namelen
);
857 ent
->blacklist
.data
= malloc (ent
->blacklist
.size
);
858 if (ent
->blacklist
.data
== NULL
)
860 ent
->blacklist
.data
[0] = '|';
861 ent
->blacklist
.data
[1] = '\0';
862 ent
->blacklist
.current
= 1;
866 if (in_blacklist (name
, namelen
, ent
))
867 return; /* no duplicates */
869 if (ent
->blacklist
.current
+ namelen
+ 1 >= ent
->blacklist
.size
)
871 ent
->blacklist
.size
+= MAX (BLACKLIST_INCREMENT
, 2 * namelen
);
872 tmp
= realloc (ent
->blacklist
.data
, ent
->blacklist
.size
);
875 free (ent
->blacklist
.data
);
876 ent
->blacklist
.size
= 0;
879 ent
->blacklist
.data
= tmp
;
883 tmp
= stpcpy (ent
->blacklist
.data
+ ent
->blacklist
.current
, name
);
886 ent
->blacklist
.current
+= namelen
+ 1;
892 /* Returns TRUE if ent->blacklist contains name, else FALSE. */
894 in_blacklist (const char *name
, int namelen
, ent_t
*ent
)
896 char buf
[namelen
+ 3];
899 if (ent
->blacklist
.data
== NULL
)
903 cp
= stpcpy (&buf
[1], name
);
906 return strstr (ent
->blacklist
.data
, buf
) != NULL
;