summaryrefslogtreecommitdiff
path: root/man/shadow.3.xml
blob: b4c3e93e9b1b287e7664082dec0d370a0f597fc9 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
<?xml version="1.0" encoding="UTF-8"?>
<!--
   Copyright (c) 1989 - 1993, Julianne Frances Haugh
   Copyright (c) 2007 - 2008, Nicolas François
   All rights reserved.
  
   Redistribution and use in source and binary forms, with or without
   modification, are permitted provided that the following conditions
   are met:
   1. Redistributions of source code must retain the above copyright
      notice, this list of conditions and the following disclaimer.
   2. Redistributions in binary form must reproduce the above copyright
      notice, this list of conditions and the following disclaimer in the
      documentation and/or other materials provided with the distribution.
   3. The name of the copyright holders or contributors may not be used to
      endorse or promote products derived from this software without
      specific prior written permission.
  
   THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
   ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
   LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
   PARTICULAR PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE COPYRIGHT
   HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
   SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
   LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
   DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
   THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
   (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
   OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-->
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook V4.5//EN"
  "http://www.oasis-open.org/docbook/xml/4.5/docbookx.dtd" [
<!-- SHADOW-CONFIG-HERE -->
]>
<refentry id='shadow.3'>
  <!--  $Id: shadow.3.xml 3742 2012-05-25 11:45:21Z nekral-guest $ -->
  <refentryinfo>
    <author>
      <firstname>Julianne Frances</firstname>
      <surname>Haugh</surname>
      <contrib>Creation, 1989</contrib>
    </author>
    <author>
      <firstname>Thomas</firstname>
      <surname>Kłoczko</surname>
      <email>kloczek@pld.org.pl</email>
      <contrib>shadow-utils maintainer, 2000 - 2007</contrib>
    </author>
    <author>
      <firstname>Nicolas</firstname>
      <surname>François</surname>
      <email>nicolas.francois@centraliens.net</email>
      <contrib>shadow-utils maintainer, 2007 - now</contrib>
    </author>
  </refentryinfo>
  <refmeta>
    <refentrytitle>shadow</refentrytitle>
    <manvolnum>3</manvolnum>
    <refmiscinfo class="sectdesc">Library Calls</refmiscinfo>
    <refmiscinfo class="source">shadow-utils</refmiscinfo>
    <refmiscinfo class="version">&SHADOW_UTILS_VERSION;</refmiscinfo>
  </refmeta>
  <refnamediv id='name'>
    <refname>shadow</refname>
    <refname>getspnam</refname>
    <refpurpose>encrypted password file routines</refpurpose>
  </refnamediv>

  <refsect1 id='syntax'>
    <title>SYNTAX</title>
    <para>
      <emphasis>#include &lt;shadow.h&gt;</emphasis>
    </para>

    <para>
      <emphasis>struct spwd *getspent();</emphasis>
    </para>

    <para>
      <emphasis>struct spwd *getspnam(char</emphasis> <emphasis
      remap='I'>*name</emphasis><emphasis>);</emphasis>
    </para>

    <para>
      <emphasis>void setspent();</emphasis>
    </para>

    <para>
      <emphasis>void endspent();</emphasis>
    </para>

    <para>
      <emphasis>struct spwd *fgetspent(FILE</emphasis> <emphasis
      remap='I'>*fp</emphasis><emphasis>);</emphasis>
    </para>

    <para>
      <emphasis>struct spwd *sgetspent(char</emphasis> <emphasis
      remap='I'>*cp</emphasis><emphasis>);</emphasis>
    </para>

    <para>
      <emphasis>int putspent(struct spwd</emphasis> <emphasis
      remap='I'>*p,</emphasis> <emphasis>FILE</emphasis> <emphasis
      remap='I'>*fp</emphasis><emphasis>);</emphasis>
    </para>

    <para>
      <emphasis>int lckpwdf();</emphasis>
    </para>

    <para>
      <emphasis>int ulckpwdf();</emphasis>
    </para>
  </refsect1>

  <refsect1 id='description'>
    <title>DESCRIPTION</title>
    <para>
      <emphasis remap='I'>shadow</emphasis> manipulates the contents of the
      shadow password file, <filename>/etc/shadow</filename>. The structure
      in the <emphasis remap='I'>#include</emphasis> file is:
    </para>
    <programlisting>struct spwd {
      char		*sp_namp; /* user login name */
      char		*sp_pwdp; /* encrypted password */
      long int		sp_lstchg; /* last password change */
      long int		sp_min; /* days until change allowed. */
      long int		sp_max; /* days before change required */
      long int		sp_warn; /* days warning for expiration */
      long int		sp_inact; /* days before account inactive */
      long int		sp_expire; /* date when account expires */
      unsigned long int	sp_flag; /* reserved for future use */
}
    </programlisting>
    <para>The meanings of each field are:</para>
    <itemizedlist mark='bullet'>
      <listitem>
	<para>sp_namp - pointer to null-terminated user name</para>
      </listitem>
      <listitem>
	<para>sp_pwdp - pointer to null-terminated password</para>
      </listitem>
      <listitem>
	<para>sp_lstchg - days since Jan 1, 1970 password was last changed</para>
      </listitem>
      <listitem>
	<para>sp_min - days before which password may not be changed</para>
      </listitem>
      <listitem>
	<para>sp_max - days after which password must be changed</para>
      </listitem>
      <listitem>
	 <para>sp_warn - days before password is to expire that user is warned of
	   pending password expiration
	 </para>
      </listitem>
      <listitem>
	<para>sp_inact - days after password expires that account is considered
	  inactive and disabled
	</para>
      </listitem>
      <listitem>
	<para>sp_expire - days since Jan 1, 1970 when account will be disabled</para>
      </listitem>
      <listitem>
	<para>sp_flag - reserved for future use</para>
      </listitem>
    </itemizedlist>

  </refsect1>

  <refsect1 id='description2'>
    <title>DESCRIPTION</title>
    <para>
      <emphasis>getspent</emphasis>, <emphasis>getspname</emphasis>,
      <emphasis>fgetspent</emphasis>, and <emphasis>sgetspent</emphasis>
      each return a pointer to a <emphasis>struct spwd</emphasis>.
      <emphasis>getspent</emphasis> returns the next entry from the file,
      and <emphasis>fgetspent</emphasis> returns the next entry from the
      given stream, which is assumed to be a file of the proper format.
      <emphasis>sgetspent</emphasis> returns a pointer to a <emphasis>struct
      spwd</emphasis> using the provided string as input.
      <emphasis>getspnam</emphasis> searches from the current position in
      the file for an entry matching <emphasis>name</emphasis>.
    </para>

    <para>
      <emphasis>setspent</emphasis> and <emphasis>endspent</emphasis> may be
      used to begin and end, respectively, access to the shadow password
      file.
    </para>
    
    <para>
      The <emphasis>lckpwdf</emphasis> and <emphasis>ulckpwdf</emphasis>
      routines should be used to insure exclusive access to the
      <filename>/etc/shadow</filename> file.  <emphasis>lckpwdf</emphasis>
      attempts to acquire a lock using <emphasis>pw_lock</emphasis> for up
      to 15 seconds. It continues by attempting to acquire a second lock
      using <emphasis>spw_lock</emphasis> for the remainder of the initial
      15 seconds. Should either attempt fail after a total of 15 seconds,
      <emphasis>lckpwdf</emphasis> returns -1. When both locks are acquired
      0 is returned.
    </para>
  </refsect1>

  <refsect1 id='diagnostics'>
    <title>DIAGNOSTICS</title>
    <para>
      Routines return NULL if no more entries are available or if an error
      occurs during processing. Routines which have <emphasis>int</emphasis>
      as the return value return 0 for success and
      -1 for failure.
    </para>
  </refsect1>

  <refsect1 id='caveats'>
    <title>CAVEATS</title>
    <para>
      These routines may only be used by the superuser as access to the
      shadow password file is restricted.
    </para>
  </refsect1>

  <refsect1 id='files'>
    <title>FILES</title>
    <variablelist>
      <varlistentry>
	<term><filename>/etc/shadow</filename></term>
	<listitem>
	  <para>Secure user account information.</para>
	</listitem>
      </varlistentry>
    </variablelist>
  </refsect1>

  <refsect1 id='see_also'>
    <title>SEE ALSO</title>
    <para>
      <citerefentry>
	<refentrytitle>getpwent</refentrytitle><manvolnum>3</manvolnum>
      </citerefentry>,
      <citerefentry>
	<refentrytitle>shadow</refentrytitle><manvolnum>5</manvolnum>
      </citerefentry>.
    </para>
  </refsect1>
</refentry>