1398a5aebSmckusick /*
2398a5aebSmckusick * Copyright (c) 1990 Jan-Simon Pendry
3398a5aebSmckusick * Copyright (c) 1990 Imperial College of Science, Technology & Medicine
4*4092c5ccSbostic * Copyright (c) 1990, 1993
5*4092c5ccSbostic * The Regents of the University of California. All rights reserved.
6398a5aebSmckusick *
7398a5aebSmckusick * This code is derived from software contributed to Berkeley by
8398a5aebSmckusick * Jan-Simon Pendry at Imperial College, London.
9398a5aebSmckusick *
10398a5aebSmckusick * %sccs.include.redist.c%
11398a5aebSmckusick *
12*4092c5ccSbostic * @(#)info_passwd.c 8.1 (Berkeley) 06/06/93
13c626267eSpendry *
14cc0207dcSpendry * $Id: info_passwd.c,v 5.2.2.1 1992/02/09 15:08:33 jsp beta $
15c626267eSpendry *
16398a5aebSmckusick */
17398a5aebSmckusick
18398a5aebSmckusick /*
19398a5aebSmckusick * Get info from password "file"
20398a5aebSmckusick *
21398a5aebSmckusick * This is experimental and probably doesn't
22398a5aebSmckusick * do what you expect.
23398a5aebSmckusick */
24398a5aebSmckusick
25398a5aebSmckusick #include "am.h"
26398a5aebSmckusick
27398a5aebSmckusick #ifdef HAS_PASSWD_MAPS
28398a5aebSmckusick #include <pwd.h>
29398a5aebSmckusick
30398a5aebSmckusick #define PASSWD_MAP "/etc/passwd"
31398a5aebSmckusick
32398a5aebSmckusick /*
33398a5aebSmckusick * Nothing to probe - check the map name is PASSWD_MAP.
34398a5aebSmckusick */
358a89c22cSpendry int passwd_init P((char *map, time_t *tp));
passwd_init(map,tp)368a89c22cSpendry int passwd_init(map, tp)
37398a5aebSmckusick char *map;
388a89c22cSpendry time_t *tp;
39398a5aebSmckusick {
408a89c22cSpendry *tp = 0;
41398a5aebSmckusick return strcmp(map, PASSWD_MAP) == 0 ? 0 : ENOENT;
42398a5aebSmckusick }
43398a5aebSmckusick
44398a5aebSmckusick
45398a5aebSmckusick /*
46398a5aebSmckusick * Grab the entry via the getpwname routine
47398a5aebSmckusick * Modify time is ignored by passwd - XXX
48398a5aebSmckusick */
498a89c22cSpendry int passwd_search P((mnt_map *m, char *map, char *key, char **pval, time_t *tp));
passwd_search(m,map,key,pval,tp)50398a5aebSmckusick int passwd_search(m, map, key, pval, tp)
51398a5aebSmckusick mnt_map *m;
52398a5aebSmckusick char *map;
53398a5aebSmckusick char *key;
54398a5aebSmckusick char **pval;
55398a5aebSmckusick time_t *tp;
56398a5aebSmckusick {
57398a5aebSmckusick char *dir = 0;
58398a5aebSmckusick struct passwd *pw;
59398a5aebSmckusick if (strcmp(key, "/defaults") == 0) {
60398a5aebSmckusick *pval = strdup("type:=nfs");
61398a5aebSmckusick return 0;
62398a5aebSmckusick }
63398a5aebSmckusick
64398a5aebSmckusick pw = getpwnam(key);
65398a5aebSmckusick if (pw) {
66398a5aebSmckusick /*
67398a5aebSmckusick * We chop the home directory up as follows:
68398a5aebSmckusick * /anydir/dom1/dom2/dom3/user
69398a5aebSmckusick *
70398a5aebSmckusick * and return
71398a5aebSmckusick * rfs:=/anydir/dom3;rhost:=dom3.dom2.dom1;sublink:=user
72398a5aebSmckusick *
73398a5aebSmckusick * This allows cross-domain entries in your passwd file.
74398a5aebSmckusick * ... but forget about security!
75398a5aebSmckusick */
76398a5aebSmckusick char *user;
77398a5aebSmckusick char *p, *q;
78398a5aebSmckusick char val[MAXPATHLEN];
79398a5aebSmckusick char rhost[MAXHOSTNAMELEN];
80398a5aebSmckusick dir = strdup(pw->pw_dir);
81398a5aebSmckusick /*
82398a5aebSmckusick * Find user name. If no / then Invalid...
83398a5aebSmckusick */
84398a5aebSmckusick user = strrchr(dir, '/');
85398a5aebSmckusick if (!user)
86398a5aebSmckusick goto enoent;
87398a5aebSmckusick *user++ = '\0';
88398a5aebSmckusick /*
89398a5aebSmckusick * Find start of host "path". If no / then Invalid...
90398a5aebSmckusick */
91398a5aebSmckusick p = strchr(dir+1, '/');
92398a5aebSmckusick if (!p)
93398a5aebSmckusick goto enoent;
94398a5aebSmckusick *p++ = '\0';
95398a5aebSmckusick /*
96398a5aebSmckusick * At this point, p is dom1/dom2/dom3
97398a5aebSmckusick * Copy, backwards, into rhost replacing
98398a5aebSmckusick * / with .
99398a5aebSmckusick */
100398a5aebSmckusick rhost[0] = '\0';
101398a5aebSmckusick do {
102398a5aebSmckusick q = strrchr(p, '/');
103398a5aebSmckusick if (q) {
104398a5aebSmckusick strcat(rhost, q + 1);
105398a5aebSmckusick strcat(rhost, ".");
106398a5aebSmckusick *q = '\0';
107398a5aebSmckusick } else {
108398a5aebSmckusick strcat(rhost, p);
109398a5aebSmckusick }
110398a5aebSmckusick } while (q);
111398a5aebSmckusick /*
112398a5aebSmckusick * Sanity check
113398a5aebSmckusick */
114398a5aebSmckusick if (*rhost == '\0' || *user == '\0' || *dir == '\0')
115398a5aebSmckusick goto enoent;
116398a5aebSmckusick /*
117398a5aebSmckusick * Make up return string
118398a5aebSmckusick */
119398a5aebSmckusick q = strchr(rhost, '.');
120398a5aebSmckusick if (q)
121398a5aebSmckusick *q = '\0';
122398a5aebSmckusick sprintf(val, "rfs:=%s/%s;rhost:=%s;sublink:=%s;fs:=${autodir}%s",
123398a5aebSmckusick dir, rhost, rhost, user, pw->pw_dir);
124398a5aebSmckusick if (q)
125398a5aebSmckusick *q = '.';
126398a5aebSmckusick *pval = strdup(val);
127398a5aebSmckusick return 0;
128398a5aebSmckusick }
129398a5aebSmckusick
130398a5aebSmckusick enoent:
131398a5aebSmckusick if (dir)
132398a5aebSmckusick free(dir);
133398a5aebSmckusick
134398a5aebSmckusick return ENOENT;
135398a5aebSmckusick }
136398a5aebSmckusick #endif /* HAS_PASSWD_MAPS */
137