summaryrefslogtreecommitdiff
path: root/usr/src/lib/passwdutil/switch_utils.c
diff options
context:
space:
mode:
authorstevel@tonic-gate <none@none>2005-06-14 00:00:00 -0700
committerstevel@tonic-gate <none@none>2005-06-14 00:00:00 -0700
commit7c478bd95313f5f23a4c958a745db2134aa03244 (patch)
treec871e58545497667cbb4b0a4f2daf204743e1fe7 /usr/src/lib/passwdutil/switch_utils.c
downloadillumos-gate-7c478bd95313f5f23a4c958a745db2134aa03244.tar.gz
OpenSolaris Launch
Diffstat (limited to 'usr/src/lib/passwdutil/switch_utils.c')
-rw-r--r--usr/src/lib/passwdutil/switch_utils.c996
1 files changed, 996 insertions, 0 deletions
diff --git a/usr/src/lib/passwdutil/switch_utils.c b/usr/src/lib/passwdutil/switch_utils.c
new file mode 100644
index 0000000000..9a1e2d6219
--- /dev/null
+++ b/usr/src/lib/passwdutil/switch_utils.c
@@ -0,0 +1,996 @@
+/*
+ * CDDL HEADER START
+ *
+ * The contents of this file are subject to the terms of the
+ * Common Development and Distribution License, Version 1.0 only
+ * (the "License"). You may not use this file except in compliance
+ * with the License.
+ *
+ * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
+ * or http://www.opensolaris.org/os/licensing.
+ * See the License for the specific language governing permissions
+ * and limitations under the License.
+ *
+ * When distributing Covered Code, include this CDDL HEADER in each
+ * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
+ * If applicable, add the following below this CDDL HEADER, with the
+ * fields enclosed by brackets "[]" replaced with your own identifying
+ * information: Portions Copyright [yyyy] [name of copyright owner]
+ *
+ * CDDL HEADER END
+ */
+/*
+ * Copyright 2005 Sun Microsystems, Inc. All rights reserved.
+ * Use is subject to license terms.
+ */
+
+#pragma ident "%Z%%M% %I% %E% SMI"
+
+#include <sys/types.h>
+#include <nsswitch.h>
+#include <stdlib.h>
+#include <stdio.h>
+#include <string.h>
+#include <syslog.h>
+#include <stdlib.h>
+#include <unistd.h>
+
+#include "ns_sldap.h"
+#include <nss_dbdefs.h>
+#include <nsswitch.h>
+#include <pwd.h>
+#include <shadow.h>
+#include <rpcsvc/nis.h>
+
+#include "passwdutil.h"
+
+static struct passwd *nisplus_getpw_from_master(const char *, char *);
+static struct spwd *nisplus_getsp_from_master(const char *, char *);
+
+/*
+ * name_to_int(rep)
+ *
+ * Translate the repository to a bitmask.
+ * if we don't recognise the repository name, we return REP_ERANGE
+ */
+int
+name_to_int(char *rep_name)
+{
+ int result = REP_ERANGE;
+
+ if (strcmp(rep_name, "files") == 0)
+ result = REP_FILES;
+ else if (strcmp(rep_name, "nis") == 0)
+ result = REP_NIS;
+ else if (strcmp(rep_name, "nisplus") == 0)
+ result = REP_NISPLUS;
+ else if (strcmp(rep_name, "ldap") == 0)
+ result = REP_LDAP;
+ else if (strcmp(rep_name, "compat") == 0) {
+ struct __nsw_switchconfig *cfg;
+ enum __nsw_parse_err pserr;
+
+ cfg = __nsw_getconfig("passwd_compat", &pserr);
+ if (cfg == NULL) {
+ result = REP_FILES | REP_NIS;
+ } else {
+ if (strcmp(cfg->lookups->service_name, "nisplus") == 0)
+ result = REP_FILES | REP_NISPLUS;
+ else if (strcmp(cfg->lookups->service_name, "ldap") ==
+ 0)
+ result = REP_FILES | REP_LDAP;
+ else
+ result = REP_ERANGE;
+ __nsw_freeconfig(cfg);
+ }
+ }
+
+ return (result);
+}
+
+/*
+ * Figure out which repository we use in compat mode.
+ */
+int
+get_compat_mode(void)
+{
+ struct __nsw_switchconfig *cfg;
+ enum __nsw_parse_err pserr;
+ int result = REP_COMPAT_NIS;
+
+ if ((cfg = __nsw_getconfig("passwd_compat", &pserr)) != NULL) {
+ if (strcmp(cfg->lookups->service_name, "nisplus") == 0)
+ result = REP_COMPAT_NISPLUS;
+ else if (strcmp(cfg->lookups->service_name, "ldap") == 0)
+ result = REP_COMPAT_LDAP;
+ }
+ __nsw_freeconfig(cfg);
+
+ return (result);
+}
+
+/*
+ * get_ns(rep, accesstype)
+ *
+ * returns a bitmask of repositories to use based on either
+ * 1. the repository that is given as argument
+ * 2. the nsswitch.conf file
+ * 3. the type of access requested
+ *
+ * "accesstype" indicates whether we are reading from or writing to the
+ * repository. We need to know this since "compat" will translate into
+ * REP_NSS (the nss-switch) for READ access (needed to decode
+ * the black-magic '+' entries) but it translates into a bitmask
+ * on WRITE access.
+ *
+ * If we detect read-access in compat mode, we augment the result
+ * with one of REP_COMPAT_{NIS,NISPLUS,LDAP}. We need this in order to
+ * implement ATTR_REP_NAME in nss_getpwnam.
+ *
+ * A return value of REP_NOREP indicates an error.
+ */
+int
+get_ns(pwu_repository_t *rep, int accesstype)
+{
+ struct __nsw_switchconfig *conf = NULL;
+ enum __nsw_parse_err pserr;
+ struct __nsw_lookup *lkp;
+ struct __nsw_lookup *lkp2;
+ int result = REP_NOREP;
+
+ if (rep != PWU_DEFAULT_REP) {
+ result = name_to_int(rep->type);
+ return (result);
+ }
+
+ conf = __nsw_getconfig("passwd", &pserr);
+ if (conf == NULL) {
+ /*
+ * No config found. The user didn't supply a repository,
+ * so we try to change the password in the default
+ * repositories (files and nis) even though we cannot
+ * find the name service switch entry. (Backward compat)
+ */
+ syslog(LOG_ERR, "passwdutil.so: nameservice switch entry for "
+ "passwd not found.");
+ result = REP_FILES | REP_NIS;
+ return (result);
+ }
+
+ lkp = conf->lookups;
+
+ /*
+ * Supported nsswitch.conf can have a maximum of 2 repositories.
+ * If we encounter an unsupported nsswitch.conf, we return REP_NSS
+ * to fall back to the nsswitch backend.
+ */
+ if (conf->num_lookups == 1) {
+ /* files or compat */
+
+ if (strcmp(lkp->service_name, "files") == 0) {
+ result = name_to_int(lkp->service_name);
+ } else if (strcmp(lkp->service_name, "compat") == 0) {
+ if (accesstype == PWU_READ)
+ result = REP_NSS | get_compat_mode();
+ else
+ result = name_to_int(lkp->service_name);
+ } else
+ result = REP_NSS;
+
+ } else if (conf->num_lookups == 2) {
+ lkp2 = lkp->next;
+ if (strcmp(lkp->service_name, "files") == 0) {
+ result = REP_FILES;
+ if (strcmp(lkp2->service_name, "ldap") == 0)
+ result |= REP_LDAP;
+ else if (strcmp(lkp2->service_name, "nis") == 0)
+ result |= REP_NIS;
+ else if (strcmp(lkp2->service_name, "nisplus") == 0)
+ result |= REP_NISPLUS;
+ else
+ result = REP_NSS;
+ } else {
+ result = REP_NSS;
+ }
+ } else {
+ result = REP_NSS;
+ }
+
+ __nsw_freeconfig(conf);
+ return (result);
+}
+
+static void
+nss_ldap_passwd(p)
+ nss_db_params_t *p;
+{
+ p->name = NSS_DBNAM_PASSWD;
+ p->flags |= NSS_USE_DEFAULT_CONFIG;
+ p->default_config = "ldap";
+}
+
+static void
+nss_ldap_shadow(p)
+ nss_db_params_t *p;
+{
+ p->name = NSS_DBNAM_SHADOW;
+ p->config_name = NSS_DBNAM_PASSWD; /* Use config for "passwd" */
+ p->flags |= NSS_USE_DEFAULT_CONFIG;
+ p->default_config = "ldap";
+}
+
+
+#ifdef PAM_NIS
+static void
+nss_nis_passwd(p)
+ nss_db_params_t *p;
+{
+ p->name = NSS_DBNAM_PASSWD;
+ p->flags |= NSS_USE_DEFAULT_CONFIG;
+ p->default_config = "nis";
+}
+
+static void
+nss_nis_shadow(p)
+ nss_db_params_t *p;
+{
+ p->name = NSS_DBNAM_SHADOW;
+ p->config_name = NSS_DBNAM_PASSWD; /* Use config for "passwd" */
+ p->flags |= NSS_USE_DEFAULT_CONFIG;
+ p->default_config = "nis";
+}
+#endif /* PAM_NIS */
+
+
+static void
+nss_nisplus_passwd(p)
+ nss_db_params_t *p;
+{
+ p->name = NSS_DBNAM_PASSWD;
+ p->flags |= NSS_USE_DEFAULT_CONFIG;
+ p->default_config = "nisplus";
+}
+
+static void
+nss_nisplus_shadow(p)
+ nss_db_params_t *p;
+{
+ p->name = NSS_DBNAM_SHADOW;
+ p->config_name = NSS_DBNAM_PASSWD; /* Use config for "passwd" */
+ p->flags |= NSS_USE_DEFAULT_CONFIG;
+ p->default_config = "nisplus";
+}
+
+
+static char *
+gettok(nextpp)
+ char **nextpp;
+{
+ char *p = *nextpp;
+ char *q = p;
+ char c;
+
+ if (p == 0) {
+ return (0);
+ }
+ while ((c = *q) != '\0' && c != ':') {
+ q++;
+ }
+ if (c == '\0') {
+ *nextpp = 0;
+ } else {
+ *q++ = '\0';
+ *nextpp = q;
+ }
+ return (p);
+}
+
+/*
+ * Return values: 0 = success, 1 = parse error, 2 = erange ...
+ * The structure pointer passed in is a structure in the caller's space
+ * wherein the field pointers would be set to areas in the buffer if
+ * need be. instring and buffer should be separate areas.
+ */
+static int
+str2passwd(const char *instr, int lenstr, void *ent, char *buffer, int buflen)
+{
+ struct passwd *passwd = (struct passwd *)ent;
+ char *p, *next;
+ int black_magic; /* "+" or "-" entry */
+
+ if (lenstr + 1 > buflen) {
+ return (NSS_STR_PARSE_ERANGE);
+ }
+ /*
+ * We copy the input string into the output buffer and
+ * operate on it in place.
+ */
+ (void) memcpy(buffer, instr, lenstr);
+ buffer[lenstr] = '\0';
+
+ next = buffer;
+
+ passwd->pw_name = p = gettok(&next); /* username */
+ if (*p == '\0') {
+ /* Empty username; not allowed */
+ return (NSS_STR_PARSE_PARSE);
+ }
+ black_magic = (*p == '+' || *p == '-');
+ if (black_magic) {
+ passwd->pw_uid = UID_NOBODY;
+ passwd->pw_gid = GID_NOBODY;
+ /*
+ * pwconv tests pw_passwd and pw_age == NULL
+ */
+ passwd->pw_passwd = "";
+ passwd->pw_age = "";
+ /*
+ * the rest of the passwd entry is "optional"
+ */
+ passwd->pw_comment = "";
+ passwd->pw_gecos = "";
+ passwd->pw_dir = "";
+ passwd->pw_shell = "";
+ }
+
+ passwd->pw_passwd = p = gettok(&next); /* password */
+ if (p == 0) {
+ if (black_magic)
+ return (NSS_STR_PARSE_SUCCESS);
+ else
+ return (NSS_STR_PARSE_PARSE);
+ }
+ for (; *p != '\0'; p++) { /* age */
+ if (*p == ',') {
+ *p++ = '\0';
+ break;
+ }
+ }
+ passwd->pw_age = p;
+
+ p = next; /* uid */
+ if (p == 0 || *p == '\0') {
+ if (black_magic)
+ return (NSS_STR_PARSE_SUCCESS);
+ else
+ return (NSS_STR_PARSE_PARSE);
+ }
+ if (!black_magic) {
+ passwd->pw_uid = strtol(p, &next, 10);
+ if (next == p) {
+ /* uid field should be nonempty */
+ return (NSS_STR_PARSE_PARSE);
+ }
+ /*
+ * The old code (in 2.0 thru 2.5) would check
+ * for the uid being negative, or being greater
+ * than 60001 (the rfs limit). If it met either of
+ * these conditions, the uid was translated to 60001.
+ *
+ * Now we just check for negative uids; anything else
+ * is administrative policy
+ */
+ if (passwd->pw_uid < 0)
+ passwd->pw_uid = UID_NOBODY;
+ }
+ if (*next++ != ':') {
+ if (black_magic)
+ p = gettok(&next);
+ else
+ return (NSS_STR_PARSE_PARSE);
+ }
+ p = next; /* gid */
+ if (p == 0 || *p == '\0') {
+ if (black_magic)
+ return (NSS_STR_PARSE_SUCCESS);
+ else
+ return (NSS_STR_PARSE_PARSE);
+ }
+ if (!black_magic) {
+ passwd->pw_gid = strtol(p, &next, 10);
+ if (next == p) {
+ /* gid field should be nonempty */
+ return (NSS_STR_PARSE_PARSE);
+ }
+ /*
+ * gid should be non-negative; anything else
+ * is administrative policy.
+ */
+ if (passwd->pw_gid < 0)
+ passwd->pw_gid = GID_NOBODY;
+ }
+ if (*next++ != ':') {
+ if (black_magic)
+ p = gettok(&next);
+ else
+ return (NSS_STR_PARSE_PARSE);
+ }
+
+ passwd->pw_gecos = passwd->pw_comment = p = gettok(&next);
+ if (p == 0) {
+ if (black_magic)
+ return (NSS_STR_PARSE_SUCCESS);
+ else
+ return (NSS_STR_PARSE_PARSE);
+ }
+
+ passwd->pw_dir = p = gettok(&next);
+ if (p == 0) {
+ if (black_magic)
+ return (NSS_STR_PARSE_SUCCESS);
+ else
+ return (NSS_STR_PARSE_PARSE);
+ }
+
+ passwd->pw_shell = p = gettok(&next);
+ if (p == 0) {
+ if (black_magic)
+ return (NSS_STR_PARSE_SUCCESS);
+ else
+ return (NSS_STR_PARSE_PARSE);
+ }
+
+ /* Better not be any more fields... */
+ if (next == 0) {
+ /* Successfully parsed and stored */
+ return (NSS_STR_PARSE_SUCCESS);
+ }
+ return (NSS_STR_PARSE_PARSE);
+}
+
+typedef const char *constp;
+
+/*
+ * Return value 1 means success and more input, 0 means error or no more
+ */
+static int
+getfield(nextp, limit, uns, valp)
+ constp *nextp;
+ constp limit;
+ int uns;
+ void *valp;
+{
+ constp p = *nextp;
+ char *endfield;
+ char numbuf[12]; /* Holds -2^31 and trailing ':' */
+ int len;
+ long x;
+ unsigned long ux;
+
+ if (p == 0 || p >= limit) {
+ return (0);
+ }
+ if (*p == ':') {
+ p++;
+ *nextp = p;
+ return (p < limit);
+ }
+ if ((len = limit - p) > sizeof (numbuf) - 1) {
+ len = sizeof (numbuf) - 1;
+ }
+ /*
+ * We want to use strtol() and we have a readonly non-zero-terminated
+ * string, so first we copy and terminate the interesting bit.
+ * Ugh. (It's convenient to terminate with a colon rather than \0).
+ */
+ if ((endfield = memccpy(numbuf, p, ':', len)) == 0) {
+ if (len != limit - p) {
+ /* Error -- field is too big to be a legit number */
+ return (0);
+ }
+ numbuf[len] = ':';
+ p = limit;
+ } else {
+ p += (endfield - numbuf);
+ }
+ if (uns) {
+ ux = strtoul(numbuf, &endfield, 10);
+ if (*endfield != ':') {
+ /* Error -- expected <integer><colon> */
+ return (0);
+ }
+ *((unsigned int *)valp) = (unsigned int)ux;
+ } else {
+ x = strtol(numbuf, &endfield, 10);
+ if (*endfield != ':') {
+ /* Error -- expected <integer><colon> */
+ return (0);
+ }
+ *((int *)valp) = (int)x;
+ }
+ *nextp = p;
+ return (p < limit);
+}
+
+/*
+ * str2spwd() -- convert a string to a shadow passwd entry. The parser is
+ * more liberal than the passwd or group parsers; since it's legitimate
+ * for almost all the fields here to be blank, the parser lets one omit
+ * any number of blank fields at the end of the entry. The acceptable
+ * forms for '+' and '-' entries are the same as those for normal entries.
+ * === Is this likely to do more harm than good?
+ *
+ * Return values: 0 = success, 1 = parse error, 2 = erange ...
+ * The structure pointer passed in is a structure in the caller's space
+ * wherein the field pointers would be set to areas in the buffer if
+ * need be. instring and buffer should be separate areas.
+ */
+int
+str2spwd(instr, lenstr, ent, buffer, buflen)
+ const char *instr;
+ int lenstr;
+ void *ent; /* really (struct spwd *) */
+ char *buffer;
+ int buflen;
+{
+ struct spwd *shadow = (struct spwd *)ent;
+ const char *p = instr, *limit;
+ char *bufp;
+ int lencopy, black_magic;
+
+ limit = p + lenstr;
+ if ((p = memchr(instr, ':', lenstr)) == 0 ||
+ ++p >= limit ||
+ (p = memchr(p, ':', limit - p)) == 0) {
+ lencopy = lenstr;
+ p = 0;
+ } else {
+ lencopy = p - instr;
+ p++;
+ }
+ if (lencopy + 1 > buflen) {
+ return (NSS_STR_PARSE_ERANGE);
+ }
+ (void) memcpy(buffer, instr, lencopy);
+ buffer[lencopy] = 0;
+
+ black_magic = (*instr == '+' || *instr == '-');
+ shadow->sp_namp = bufp = buffer;
+ shadow->sp_pwdp = 0;
+ shadow->sp_lstchg = -1;
+ shadow->sp_min = -1;
+ shadow->sp_max = -1;
+ shadow->sp_warn = -1;
+ shadow->sp_inact = -1;
+ shadow->sp_expire = -1;
+ shadow->sp_flag = 0;
+
+ if ((bufp = strchr(bufp, ':')) == 0) {
+ if (black_magic)
+ return (NSS_STR_PARSE_SUCCESS);
+ else
+ return (NSS_STR_PARSE_PARSE);
+ }
+ *bufp++ = '\0';
+
+ shadow->sp_pwdp = bufp;
+ if (instr == 0) {
+ if ((bufp = strchr(bufp, ':')) == 0) {
+ if (black_magic)
+ return (NSS_STR_PARSE_SUCCESS);
+ else
+ return (NSS_STR_PARSE_PARSE);
+ }
+ *bufp++ = '\0';
+ p = bufp;
+ } /* else p was set when we copied name and passwd into the buffer */
+
+ if (!getfield(&p, limit, 0, &shadow->sp_lstchg))
+ return (NSS_STR_PARSE_SUCCESS);
+ if (!getfield(&p, limit, 0, &shadow->sp_min))
+ return (NSS_STR_PARSE_SUCCESS);
+ if (!getfield(&p, limit, 0, &shadow->sp_max))
+ return (NSS_STR_PARSE_SUCCESS);
+ if (!getfield(&p, limit, 0, &shadow->sp_warn))
+ return (NSS_STR_PARSE_SUCCESS);
+ if (!getfield(&p, limit, 0, &shadow->sp_inact))
+ return (NSS_STR_PARSE_SUCCESS);
+ if (!getfield(&p, limit, 0, &shadow->sp_expire))
+ return (NSS_STR_PARSE_SUCCESS);
+ if (!getfield(&p, limit, 1, &shadow->sp_flag))
+ return (NSS_STR_PARSE_SUCCESS);
+ if (p != limit) {
+ /* Syntax error -- garbage at end of line */
+ return (NSS_STR_PARSE_PARSE);
+ }
+ return (NSS_STR_PARSE_SUCCESS);
+}
+
+static nss_XbyY_buf_t *buffer;
+static DEFINE_NSS_DB_ROOT(db_root);
+
+#define GETBUF() \
+ NSS_XbyY_ALLOC(&buffer, sizeof (struct passwd), NSS_BUFLEN_PASSWD)
+
+#pragma fini(endutilpwent)
+
+static void
+endutilpwent(void)
+{
+ NSS_XbyY_FREE(&buffer);
+ nss_delete(&db_root);
+}
+
+struct passwd *
+getpwnam_from(const char *name, pwu_repository_t *rep, int reptype)
+{
+ nss_XbyY_buf_t *b = GETBUF();
+ nss_XbyY_args_t arg;
+
+ if (b == 0)
+ return (0);
+
+ NSS_XbyY_INIT(&arg, b->result, b->buffer, b->buflen, str2passwd);
+ arg.key.name = name;
+
+ switch (reptype) {
+ case REP_LDAP:
+ (void) nss_search(&db_root, nss_ldap_passwd,
+ NSS_DBOP_PASSWD_BYNAME, &arg);
+ break;
+ case REP_NISPLUS:
+ if (rep && rep->scope)
+ return (nisplus_getpw_from_master(name, rep->scope));
+
+ (void) nss_search(&db_root, nss_nisplus_passwd,
+ NSS_DBOP_PASSWD_BYNAME, &arg);
+ break;
+#ifdef PAM_NIS
+ case REP_NIS:
+ (void) nss_search(&db_root, nss_nis_passwd,
+ NSS_DBOP_PASSWD_BYNAME, &arg);
+ break;
+#endif
+ default:
+ return (NULL);
+ }
+
+ return (struct passwd *)NSS_XbyY_FINI(&arg);
+}
+
+/*ARGSUSED*/
+struct passwd *
+getpwuid_from(uid_t uid, pwu_repository_t *rep, int reptype)
+{
+ nss_XbyY_buf_t *b = GETBUF();
+ nss_XbyY_args_t arg;
+
+ if (b == 0)
+ return (0);
+
+ NSS_XbyY_INIT(&arg, b->result, b->buffer, b->buflen, str2passwd);
+ arg.key.uid = uid;
+
+ switch (reptype) {
+ case REP_LDAP:
+ (void) nss_search(&db_root, nss_ldap_passwd,
+ NSS_DBOP_PASSWD_BYUID, &arg);
+ break;
+ case REP_NISPLUS:
+ (void) nss_search(&db_root, nss_nisplus_passwd,
+ NSS_DBOP_PASSWD_BYUID, &arg);
+ break;
+#ifdef PAM_NIS
+ case REP_NIS:
+ (void) nss_search(&db_root, nss_nis_passwd,
+ NSS_DBOP_PASSWD_BYUID, &arg);
+ break;
+#endif
+ default:
+ return (NULL);
+ }
+
+ return (struct passwd *)NSS_XbyY_FINI(&arg);
+}
+
+static nss_XbyY_buf_t *spbuf;
+static DEFINE_NSS_DB_ROOT(spdb_root);
+
+#define GETSPBUF() \
+ NSS_XbyY_ALLOC(&spbuf, sizeof (struct spwd), NSS_BUFLEN_SHADOW)
+
+#pragma fini(endutilspent)
+
+static void
+endutilspent(void)
+{
+ NSS_XbyY_FREE(&spbuf);
+ nss_delete(&spdb_root);
+}
+
+struct spwd *
+getspnam_from(const char *name, pwu_repository_t *rep, int reptype)
+{
+ nss_XbyY_buf_t *b = GETSPBUF();
+ nss_XbyY_args_t arg;
+
+ if (b == 0)
+ return (0);
+
+ NSS_XbyY_INIT(&arg, b->result, b->buffer, b->buflen, str2spwd);
+ arg.key.name = name;
+ switch (reptype) {
+ case REP_LDAP:
+ (void) nss_search(&spdb_root, nss_ldap_shadow,
+ NSS_DBOP_SHADOW_BYNAME, &arg);
+ break;
+ case REP_NISPLUS:
+ if (rep && rep->scope)
+ return (nisplus_getsp_from_master(name, rep->scope));
+
+ (void) nss_search(&spdb_root, nss_nisplus_shadow,
+ NSS_DBOP_SHADOW_BYNAME, &arg);
+ break;
+#ifdef PAM_NIS
+ case REP_NIS:
+ (void) nss_search(&spdb_root, nss_nis_shadow,
+ NSS_DBOP_SHADOW_BYNAME, &arg);
+ break;
+#endif
+ default:
+ return (NULL);
+ }
+ return (struct spwd *)NSS_XbyY_FINI(&arg);
+}
+
+
+static nis_result *
+nisplus_match(const char *name, char *domain, char *buf, int len)
+{
+ int n;
+ int flags;
+ nis_result *res;
+ nis_object *object;
+
+ n = snprintf(buf, len, "[name=%s],passwd.org_dir.%s", name, domain);
+ if (n >= len) {
+ syslog(LOG_ERR, "nisplus_match: name too long");
+ return (NULL);
+ }
+ if (buf[n-1] != '.') {
+ if (n == len-1) {
+ syslog(LOG_ERR, "nisplus_match: name too long");
+ return (NULL);
+ }
+ buf[n++] = '.';
+ buf[n] = '\0';
+ }
+
+ flags = USE_DGRAM | FOLLOW_LINKS | FOLLOW_PATH | MASTER_ONLY;
+
+ res = nis_list(buf, flags, NULL, NULL);
+
+ if (res == NULL) {
+ syslog(LOG_ERR, "nisplus_match: nis_list returned NULL");
+ return (NULL);
+ }
+
+ if (NIS_RES_STATUS(res) != NIS_SUCCESS || NIS_RES_NUMOBJ(res) != 1) {
+ syslog(LOG_ERR, "nisplus_match: match failed: %s",
+ nis_sperrno(NIS_RES_STATUS(res)));
+ nis_freeresult(res);
+ return (NULL);
+ }
+
+ object = NIS_RES_OBJECT(res);
+
+ if (object->EN_data.en_cols.en_cols_len < 8) {
+ syslog(LOG_ERR, "nisplus_match: "
+ "not a valid passwd table entry for user %s", name);
+ nis_freeresult(res);
+ return (NULL);
+ }
+
+ return (res);
+}
+
+#define SAFE_STRDUP(dst, idx) \
+ if ((idx) <= 3 && ENTRY_VAL(nret, (idx)) == NULL) { \
+ syslog(LOG_ERR, \
+ "passwdutil: missing field from password entry"); \
+ goto error; \
+ } \
+ len = ENTRY_LEN(nret, (idx)); \
+ (dst) = malloc(len+1); \
+ if ((dst) == NULL) { \
+ syslog(LOG_ERR, "passwdutil: out of memory"); \
+ goto error; \
+ } \
+ (dst)[len] = '\0'; \
+ (void) strncpy((dst), \
+ ENTRY_VAL(nret, (idx)) ? ENTRY_VAL(nret, (idx)) : "", \
+ len);
+
+
+
+static struct passwd *
+nisplus_getpw_from_master(const char *name, char *domain)
+{
+ char lookup[NIS_MAXNAMELEN+1];
+ nis_result *res;
+ nis_object *nret;
+ int len;
+ char *p;
+ struct passwd *pw;
+
+ if ((pw = calloc(1, sizeof (*pw))) == NULL)
+ return (NULL);
+
+ res = nisplus_match(name, domain, lookup, sizeof (lookup));
+
+ if (res == NULL)
+ return (NULL);
+
+ nret = NIS_RES_OBJECT(res);
+
+ SAFE_STRDUP(pw->pw_name, 0);
+
+ if ((pw->pw_passwd = strdup("x")) == NULL) {
+ syslog(LOG_ERR, "passwdutil: out of memory");
+ goto error;
+ }
+
+ SAFE_STRDUP(p, 2);
+ pw->pw_uid = atoi(p);
+ free(p);
+
+ SAFE_STRDUP(p, 3);
+ pw->pw_gid = atoi(p);
+ free(p);
+
+ pw->pw_age = NULL;
+ pw->pw_comment = NULL;
+
+/*CONSTANTCONDITION*/
+ SAFE_STRDUP(pw->pw_gecos, 4);
+
+/*CONSTANTCONDITION*/
+ SAFE_STRDUP(pw->pw_dir, 5);
+
+/*CONSTANTCONDITION*/
+ SAFE_STRDUP(pw->pw_shell, 6);
+
+ nis_freeresult(res);
+
+ return (pw);
+
+error:
+ nis_freeresult(res);
+ if (pw->pw_name)
+ free(pw->pw_name);
+ if (pw->pw_passwd)
+ free(pw->pw_passwd);
+ if (pw->pw_gecos)
+ free(pw->pw_gecos);
+ if (pw->pw_dir)
+ free(pw->pw_dir);
+ if (pw->pw_shell)
+ free(pw->pw_shell);
+ free(pw);
+
+ return (NULL);
+}
+
+/*
+ * struct spwd * nisplus_getsp_from_master()
+ *
+ * Get the shadow structure from a NIS+ master.
+ * This routine normally runs with EUID==0. This can cause trouble
+ * if the NIS+ tables are locked down so that only the owner can
+ * access the encrypted password. If we detect that scenario, we switch
+ * EUID to the owner of the record and refetch it.
+ */
+static struct spwd *
+nisplus_getsp_from_master(const char *name, char *domain)
+{
+ char lookup[NIS_MAXNAMELEN+1];
+ nis_result *res = NULL;
+ nis_object *nret = NULL;
+ int len;
+ struct spwd *spw;
+ char *shadow = NULL;
+ const char *p = NULL;
+ const char *limit;
+
+ res = nisplus_match(name, domain, lookup, sizeof (lookup));
+ if (res == NULL)
+ return (NULL);
+
+ nret = NIS_RES_OBJECT(res);
+
+ /*CONSTANTCONDITION*/
+ SAFE_STRDUP(shadow, 7);
+
+ /*
+ * If we got "*NP*" as password, try again with EUID set to
+ * the UID of the record-owner.
+ */
+ if (strncmp(shadow, "*NP*", 4) == 0) {
+ char *p;
+ uid_t owner_uid;
+ uid_t euid = geteuid();
+
+ SAFE_STRDUP(p, 2); /* record-owner field */
+ owner_uid = atoi(p);
+ free(p);
+
+ if (owner_uid != euid) {
+ /* re-obtain entry using owners EUID */
+ free(shadow);
+ nis_freeresult(res);
+
+ (void) seteuid(owner_uid);
+ res = nisplus_match(name, domain, lookup,
+ sizeof (lookup));
+ (void) seteuid(euid);
+
+ if (res == NULL)
+ return (NULL);
+ nret = NIS_RES_OBJECT(res);
+
+ /*CONSTANTCONDITION*/
+ SAFE_STRDUP(shadow, 7);
+ }
+ }
+
+ if ((spw = calloc(1, sizeof (*spw))) == NULL) {
+ nis_freeresult(res);
+ return (NULL);
+ }
+
+ SAFE_STRDUP(spw->sp_namp, 0);
+ SAFE_STRDUP(spw->sp_pwdp, 1);
+
+ nis_freeresult(res);
+
+ limit = shadow + strlen(shadow) + 1;
+ p = shadow;
+
+ spw->sp_lstchg = -1;
+ spw->sp_min = -1;
+ spw->sp_max = -1;
+ spw->sp_warn = -1;
+ spw->sp_inact = -1;
+ spw->sp_expire = -1;
+ spw->sp_flag = 0;
+
+ if (!getfield(&p, limit, 0, &spw->sp_lstchg))
+ goto out;
+
+ if (!getfield(&p, limit, 0, &spw->sp_min))
+ goto out;
+
+ if (!getfield(&p, limit, 0, &spw->sp_max))
+ goto out;
+
+ if (!getfield(&p, limit, 0, &spw->sp_warn))
+ goto out;
+
+ if (!getfield(&p, limit, 0, &spw->sp_inact))
+ goto out;
+
+ if (!getfield(&p, limit, 0, &spw->sp_expire))
+ goto out;
+
+ if (!getfield(&p, limit, 1, &spw->sp_flag))
+ goto out;
+
+ if (p != limit) {
+ syslog(LOG_ERR, "passwdutil: garbage at end of record");
+ goto error;
+ }
+
+out:
+ free(shadow);
+ return (spw);
+
+error:
+ if (spw->sp_namp)
+ free(spw->sp_namp);
+ if (spw->sp_pwdp)
+ free(spw->sp_pwdp);
+ free(spw);
+ if (shadow)
+ free(shadow);
+ return (NULL);
+}