diff options
author | Todd C. Miller <millert@cvs.openbsd.org> | 1999-11-18 16:29:02 +0000 |
---|---|---|
committer | Todd C. Miller <millert@cvs.openbsd.org> | 1999-11-18 16:29:02 +0000 |
commit | fb80ef71abd0dd6084c3019b48dac8f8875e56c0 (patch) | |
tree | 4539c778e73c91703e2f3f76360d2533b49f5ac6 /usr.bin/sudo/getspwuid.c | |
parent | 0c0a1b78c4dcea75d3af81ff0cfc60a948a7ef39 (diff) |
sudo 1.6, now with a BSD license
Diffstat (limited to 'usr.bin/sudo/getspwuid.c')
-rw-r--r-- | usr.bin/sudo/getspwuid.c | 221 |
1 files changed, 221 insertions, 0 deletions
diff --git a/usr.bin/sudo/getspwuid.c b/usr.bin/sudo/getspwuid.c new file mode 100644 index 00000000000..6205aea1412 --- /dev/null +++ b/usr.bin/sudo/getspwuid.c @@ -0,0 +1,221 @@ +/* + * Copyright (c) 1996, 1998, 1999 Todd C. Miller <Todd.Miller@courtesan.com> + * All rights reserved. + * + * Redistribution and use in source and binary forms, with or without + * modification, are permitted provided that the following conditions + * are met: + * + * 1. Redistributions of source code must retain the above copyright + * notice, this list of conditions and the following disclaimer. + * + * 2. Redistributions in binary form must reproduce the above copyright + * notice, this list of conditions and the following disclaimer in the + * documentation and/or other materials provided with the distribution. + * + * 3. The name of the author may not be used to endorse or promote products + * derived from this software without specific prior written permission. + * + * 4. Products derived from this software may not be called "Sudo" nor + * may "Sudo" appear in their names without specific prior written + * permission from the author. + * + * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, + * INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY + * AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL + * THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, + * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, + * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; + * OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, + * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR + * OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF + * ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. + */ + +#include "config.h" + +#include <stdio.h> +#ifdef STDC_HEADERS +# include <stdlib.h> +#endif /* STDC_HEADERS */ +#ifdef HAVE_STRING_H +# include <string.h> +#endif /* HAVE_STRING_H */ +#ifdef HAVE_STRINGS_H +# include <strings.h> +#endif /* HAVE_STRINGS_H */ +#ifdef HAVE_UNISTD_H +# include <unistd.h> +#endif /* HAVE_UNISTD_H */ +#include <sys/types.h> +#include <sys/stat.h> +#include <sys/param.h> +#include <pwd.h> +#ifdef HAVE_GETSPNAM +# include <shadow.h> +#endif /* HAVE_GETSPNAM */ +#ifdef HAVE_GETPRPWNAM +# ifdef __hpux +# undef MAXINT +# include <hpsecurity.h> +# else +# include <sys/security.h> +# endif /* __hpux */ +# include <prot.h> +#endif /* HAVE_GETPRPWNAM */ +#ifdef HAVE_GETPWANAM +# include <sys/label.h> +# include <sys/audit.h> +# include <pwdadj.h> +#endif /* HAVE_GETPWANAM */ +#ifdef HAVE_GETAUTHUID +# include <auth.h> +#endif /* HAVE_GETAUTHUID */ + +#include "sudo.h" + +#ifndef lint +static const char rcsid[] = "$Sudo: getspwuid.c,v 1.55 1999/10/07 21:20:57 millert Exp $"; +#endif /* lint */ + +#ifndef STDC_HEADERS +extern char *getenv __P((const char *)); +#endif /* !STDC_HEADERS */ + +/* + * Global variables (yuck) + */ +#if defined(HAVE_GETPRPWNAM) && defined(__alpha) +int crypt_type = INT_MAX; +#endif /* HAVE_GETPRPWNAM && __alpha */ + + +/* + * Local functions not visible outside getspwuid.c + */ +static char *sudo_getshell __P((struct passwd *)); +static char *sudo_getepw __P((struct passwd *)); + + +/* + * Return the user's shell based on either the SHELL + * environment variable or the passwd(5) entry (in that order). + */ +static char * +sudo_getshell(pw) + struct passwd *pw; +{ + char *pw_shell; + + if ((pw_shell = getenv("SHELL")) == NULL) + pw_shell = pw->pw_shell; + +#ifdef _PATH_BSHELL + /* empty string "" means bourne shell */ + if (*pw_shell == '\0') + pw_shell = _PATH_BSHELL; +#endif /* _PATH_BSHELL */ + + return(pw_shell); +} + +/* + * Return the encrypted password for the user described by pw. If shadow + * passwords are in use, look in the shadow file. + */ +static char * +sudo_getepw(pw) + struct passwd *pw; +{ + + /* If there is a function to check for shadow enabled, use it... */ +#ifdef HAVE_ISCOMSEC + if (!iscomsec()) + return(pw->pw_passwd); +#endif /* HAVE_ISCOMSEC */ +#ifdef HAVE_ISSECURE + if (!issecure()) + return(pw->pw_passwd); +#endif /* HAVE_ISSECURE */ + +#ifdef HAVE_GETPRPWNAM + { + struct pr_passwd *spw; + + spw = getprpwnam(pw->pw_name); + if (spw != NULL && spw->ufld.fd_encrypt != NULL) { +# ifdef __alpha + crypt_type = spw->ufld.fd_oldcrypt; +# endif /* __alpha */ + return(spw->ufld.fd_encrypt); + } + } +#endif /* HAVE_GETPRPWNAM */ +#ifdef HAVE_GETSPNAM + { + struct spwd *spw; + + if ((spw = getspnam(pw->pw_name)) && spw->sp_pwdp) + return(spw->sp_pwdp); + } +#endif /* HAVE_GETSPNAM */ +#ifdef HAVE_GETSPWUID + { + struct s_passwd *spw; + + if ((spw = getspwuid(pw->pw_uid)) && spw->pw_passwd) + return(spw->pw_passwd); + } +#endif /* HAVE_GETSPWUID */ +#ifdef HAVE_GETPWANAM + { + struct passwd_adjunct *spw; + + if ((spw = getpwanam(pw->pw_name)) && spw->pwa_passwd) + return(spw->pwa_passwd); + } +#endif /* HAVE_GETPWANAM */ +#ifdef HAVE_GETAUTHUID + { + AUTHORIZATION *spw; + + if ((spw = getauthuid(pw->pw_uid)) && spw->a_password) + return(spw->a_password); + } +#endif /* HAVE_GETAUTHUID */ + + /* Fall back on normal password. */ + return(pw->pw_passwd); +} + +/* + * Dynamically allocate space for a struct password and the constituent parts + * that we care about. Fills in pw_passwd from shadow file if necessary. + */ +struct passwd * +sudo_getpwuid(uid) + uid_t uid; +{ + struct passwd *pw, *local_pw; + + if ((pw = getpwuid(uid)) == NULL) + return(NULL); + + /* Allocate space for a local copy of pw. */ + local_pw = (struct passwd *) emalloc(sizeof(struct passwd)); + + /* + * Copy the struct passwd and the interesting strings... + */ + (void) memcpy(local_pw, pw, sizeof(struct passwd)); + local_pw->pw_name = estrdup(pw->pw_name); + local_pw->pw_dir = estrdup(pw->pw_dir); + + /* pw_shell is a special case since we overide with $SHELL */ + local_pw->pw_shell = estrdup(sudo_getshell(pw)); + + /* pw_passwd gets a shadow password if applicable */ + local_pw->pw_passwd = estrdup(sudo_getepw(pw)); + + return(local_pw); +} |