xref: /original-bsd/old/mkpasswd/mkpasswd.c (revision a76afa45)
1 /*
2  * Copyright (c) 1980, 1983 Regents of the University of California.
3  * All rights reserved.
4  *
5  * Redistribution and use in source and binary forms are permitted
6  * provided that the above copyright notice and this paragraph are
7  * duplicated in all such forms and that any documentation,
8  * advertising materials, and other materials related to such
9  * distribution and use acknowledge that the software was developed
10  * by the University of California, Berkeley.  The name of the
11  * University may not be used to endorse or promote products derived
12  * from this software without specific prior written permission.
13  * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR
14  * IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
15  * WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
16  */
17 
18 #ifndef lint
19 char copyright[] =
20 "@(#) Copyright (c) 1980, 1983 Regents of the University of California.\n\
21  All rights reserved.\n";
22 #endif /* not lint */
23 
24 #ifndef lint
25 static char sccsid[] = "@(#)mkpasswd.c	5.4 (Berkeley) 02/22/89";
26 #endif /* not lint */
27 
28 #include <sys/param.h>
29 #include <sys/file.h>
30 #include <ndbm.h>
31 #include <pwd.h>
32 #include <stdio.h>
33 
34 static FILE *_pw_fp;
35 static struct passwd _pw_passwd;
36 static off_t offset;
37 
38 #define	MAXLINELENGTH	1024
39 static char line[MAXLINELENGTH];
40 
41 /*
42  * Mkpasswd does two things -- use the ``arg'' file to create ``arg''.{pag,dir}
43  * for ndbm, and, if the -p flag is on, create a password file in the original
44  * format.  It doesn't use the getpwent(3) routines because it has to figure
45  * out offsets for the encrypted passwords to put in the dbm files.  One other
46  * problem is that, since the addition of shadow passwords, getpwent(3) has to
47  * use the dbm databases rather than simply scanning the actual file.  This
48  * required the addition of a flag field to the dbm database to distinguish
49  * between a record keyed by name, and one keyed by uid.
50  */
51 
52 main(argc, argv)
53 	int argc;
54 	char **argv;
55 {
56 	extern int errno, optind;
57 	register char *flag, *p, *t;
58 	register int makeold;
59 	FILE *oldfp;
60 	DBM *dp;
61 	datum key, content;
62 	int ch;
63 	char buf[8192], nbuf[50], *strerror();
64 
65 	makeold = 0;
66 	while ((ch = getopt(argc, argv, "pv")) != EOF)
67 		switch(ch) {
68 		case 'p':			/* create ``password.orig'' */
69 			makeold = 1;
70 			/* FALLTHROUGH */
71 		case 'v':			/* backward compatible */
72 			break;
73 		case '?':
74 		default:
75 			usage();
76 		}
77 	argc -= optind;
78 	argv += optind;
79 
80 	if (argc != 1)
81 		usage();
82 
83 	if (!(_pw_fp = fopen(*argv, "r"))) {
84 		(void)fprintf(stderr,
85 		    "mkpasswd: %s: can't open for reading.\n", *argv);
86 		exit(1);
87 	}
88 
89 	rmall(*argv);
90 	(void)umask(0);
91 
92 	/* open old password format file, dbm files */
93 	if (makeold) {
94 		int oldfd;
95 
96 		(void)sprintf(buf, "%s.orig", *argv);
97 		if ((oldfd = open(buf, O_WRONLY|O_CREAT|O_EXCL, 0644)) < 0) {
98 			(void)fprintf(stderr, "mkpasswd: %s: %s\n", buf,
99 			    strerror(errno));
100 			exit(1);
101 		}
102 		if (!(oldfp = fdopen(oldfd, "w"))) {
103 			(void)fprintf(stderr, "mkpasswd: %s: fdopen failed.\n",
104 			    buf);
105 			exit(1);
106 		}
107 	}
108 	if (!(dp = dbm_open(*argv, O_WRONLY|O_CREAT|O_EXCL, 0644))) {
109 		(void)fprintf(stderr, "mkpasswd: %s: %s\n", *argv,
110 		    strerror(errno));
111 		exit(1);
112 	}
113 
114 	content.dptr = buf;
115 	while (scanpw()) {
116 		/* create dbm entry */
117 		p = buf;
118 #define	COMPACT(e)	t = e; while (*p++ = *t++);
119 		COMPACT(_pw_passwd.pw_name);
120 		(void)sprintf(nbuf, "%ld", offset);
121 		COMPACT(nbuf);
122 		bcopy((char *)&_pw_passwd.pw_uid, p, sizeof(int));
123 		p += sizeof(int);
124 		bcopy((char *)&_pw_passwd.pw_gid, p, sizeof(int));
125 		p += sizeof(int);
126 		bcopy((char *)&_pw_passwd.pw_change, p, sizeof(time_t));
127 		p += sizeof(time_t);
128 		COMPACT(_pw_passwd.pw_class);
129 		COMPACT(_pw_passwd.pw_gecos);
130 		COMPACT(_pw_passwd.pw_dir);
131 		COMPACT(_pw_passwd.pw_shell);
132 		bcopy((char *)&_pw_passwd.pw_expire, p, sizeof(time_t));
133 		p += sizeof(time_t);
134 		flag = p;
135 		*p++ = _PW_KEYBYNAME;
136 		content.dsize = p - buf;
137 #ifdef debug
138 		(void)printf("store %s, uid %d\n", _pw_passwd.pw_name,
139 		    _pw_passwd.pw_uid);
140 #endif
141 		key.dptr = _pw_passwd.pw_name;
142 		key.dsize = strlen(_pw_passwd.pw_name);
143 		if (dbm_store(dp, key, content, DBM_INSERT) < 0)
144 			goto bad;
145 		key.dptr = (char *)&_pw_passwd.pw_uid;
146 		key.dsize = sizeof(int);
147 		*flag = _PW_KEYBYUID;
148 		if (dbm_store(dp, key, content, DBM_INSERT) < 0)
149 			goto bad;
150 
151 		/* create original format password file entry */
152 		if (!makeold)
153 			continue;
154 		fprintf(oldfp, "%s:*:%d:%d:%s:%s:%s\n", _pw_passwd.pw_name,
155 		    _pw_passwd.pw_uid, _pw_passwd.pw_gid, _pw_passwd.pw_gecos,
156 		    _pw_passwd.pw_dir, _pw_passwd.pw_shell);
157 	}
158 	dbm_close(dp);
159 	exit(0);
160 
161 bad:	(void)fprintf(stderr, "mkpasswd: dbm_store failed.\n");
162 	rmall(*argv);
163 	exit(1);
164 }
165 
166 rmall(fname)
167 	char *fname;
168 {
169 	register char *p;
170 	char buf[MAXPATHLEN], *strcpy();
171 
172 	for (p = strcpy(buf, fname); *p; ++p);
173 	bcopy(".pag", p, 5);
174 	(void)unlink(buf);
175 	bcopy(".dir", p, 5);
176 	(void)unlink(buf);
177 	bcopy(".orig", p, 6);
178 	(void)unlink(buf);
179 }
180 
181 usage()
182 {
183 	(void)fprintf(stderr, "usage: mkpasswd [-p] passwd_file\n");
184 	exit(1);
185 }
186 
187 /* from libc/gen/getpwent.c */
188 
189 static
190 scanpw()
191 {
192 	register char *cp;
193 	long atol(), ftell();
194 	char *fgets(), *strsep(), *index();
195 
196 	for (;;) {
197 		offset = ftell(_pw_fp);
198 		if (!(fgets(line, sizeof(line), _pw_fp)))
199 			return(0);
200 		/* skip lines that are too big */
201 		if (!index(line, '\n')) {
202 			int ch;
203 
204 			while ((ch = getc(_pw_fp)) != '\n' && ch != EOF)
205 				;
206 			continue;
207 		}
208 		_pw_passwd.pw_name = strsep(line, ":\n");
209 		_pw_passwd.pw_passwd = strsep((char *)NULL, ":\n");
210 		offset += _pw_passwd.pw_passwd - line;
211 		if (!(cp = strsep((char *)NULL, ":\n")))
212 			continue;
213 		_pw_passwd.pw_uid = atoi(cp);
214 		if (!(cp = strsep((char *)NULL, ":\n")))
215 			continue;
216 		_pw_passwd.pw_gid = atoi(cp);
217 		_pw_passwd.pw_class = strsep((char *)NULL, ":\n");
218 		if (!(cp = strsep((char *)NULL, ":\n")))
219 			continue;
220 		_pw_passwd.pw_change = atol(cp);
221 		if (!(cp = strsep((char *)NULL, ":\n")))
222 			continue;
223 		_pw_passwd.pw_expire = atol(cp);
224 		_pw_passwd.pw_gecos = strsep((char *)NULL, ":\n");
225 		_pw_passwd.pw_dir = strsep((char *)NULL, ":\n");
226 		_pw_passwd.pw_shell = strsep((char *)NULL, ":\n");
227 		return(1);
228 	}
229 	/* NOTREACHED */
230 }
231