File: [local] / src / usr.bin / passwd / Attic / yp_passwd.c (download)
Revision 1.31, Thu Nov 6 05:35:56 2008 UTC (15 years, 7 months ago) by djm
Branch: MAIN
CVS Tags: OPENBSD_4_6_BASE, OPENBSD_4_6, OPENBSD_4_5_BASE, OPENBSD_4_5 Changes since 1.30: +19 -17 lines
-Wall -Wshadow clean, no binary change
|
/* $OpenBSD: yp_passwd.c,v 1.31 2008/11/06 05:35:56 djm Exp $ */
/*
* Copyright (c) 1988 The Regents of the University of California.
* All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
* 3. Neither the name of the University nor the names of its contributors
* may be used to endorse or promote products derived from this software
* without specific prior written permission.
*
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
* SUCH DAMAGE.
*/
#ifndef lint
/*static const char sccsid[] = "from: @(#)yp_passwd.c 1.0 2/2/93";*/
static const char rcsid[] = "$OpenBSD: yp_passwd.c,v 1.31 2008/11/06 05:35:56 djm Exp $";
#endif /* not lint */
#ifdef YP
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <unistd.h>
#include <netdb.h>
#include <time.h>
#include <pwd.h>
#include <err.h>
#include <errno.h>
#include <ctype.h>
#include <login_cap.h>
#include <rpc/rpc.h>
#include <rpcsvc/yp_prot.h>
#include <rpcsvc/ypclnt.h>
#define passwd yp_passwd_rec
#include <rpcsvc/yppasswd.h>
#undef passwd
#ifndef _PASSWORD_LEN
#define _PASSWORD_LEN PASS_MAX
#endif
extern int pwd_gensalt(char *, int, login_cap_t *, char);
extern int pwd_check(login_cap_t *, char *);
extern int pwd_gettries(login_cap_t *);
extern void kbintr(int);
int yp_passwd(char *);
char *ypgetnewpasswd(struct passwd *, login_cap_t *, char **);
struct passwd *ypgetpwnam(char *, int);
struct passwd *interpret(struct passwd *, char *, int);
char *domain;
static int
pw_error(char *name, int error, int eval)
{
if (error) {
if (name)
warn("%s", name);
else
warn(NULL);
}
warnx("YP passwd database: unchanged.");
exit(eval);
}
int
yp_passwd(char *username)
{
struct yppasswd yppwd;
int r, rpcport, status, secure=0;
struct passwd *pw;
struct timeval tv;
login_cap_t *lc;
CLIENT *client;
char *master;
uid_t uid;
/*
* Get local domain
*/
if ((r = yp_get_default_domain(&domain)) != 0) {
warnx("can't get local YP domain. Reason: %s",
yperr_string(r));
return (1);
}
/*
* Find the host for the passwd map; it should be running
* the daemon.
*/
if ((r = yp_master(domain, "master.passwd.byname", &master)) == 0) {
secure=1;
} else if ((r = yp_master(domain, "passwd.byname", &master)) != 0) {
warnx("can't find the master YP server. Reason: %s",
yperr_string(r));
return (1);
}
/*
* Ask the portmapper for the port of the daemon.
*/
if ((rpcport = getrpcport(master, YPPASSWDPROG,
YPPASSWDPROC_UPDATE, IPPROTO_UDP)) == 0) {
warnx("master YP server not running yppasswd daemon.");
warnx("Can't change password.");
return (1);
}
/*
* Be sure the port is privileged
*/
if (rpcport >= IPPORT_RESERVED) {
warnx("yppasswd daemon is on an invalid port.");
return (1);
}
/* Get user's login identity */
if (!(pw = ypgetpwnam(username, secure))) {
warnx("unknown user %s.", username);
return (1);
}
if ((lc = login_getclass(pw->pw_class)) == NULL) {
warnx("unable to get login class for user %s.", username);
return (1);
}
uid = getuid();
if (uid && uid != pw->pw_uid) {
warnx("you may only change your own password: %s",
strerror(EACCES));
return (1);
}
/* prompt for new password */
yppwd.newpw.pw_passwd = ypgetnewpasswd(pw, lc, &yppwd.oldpass);
/* tell rpc.yppasswdd */
yppwd.newpw.pw_name = pw->pw_name;
yppwd.newpw.pw_uid = pw->pw_uid;
yppwd.newpw.pw_gid = pw->pw_gid;
yppwd.newpw.pw_gecos = pw->pw_gecos;
yppwd.newpw.pw_dir = pw->pw_dir;
yppwd.newpw.pw_shell = pw->pw_shell;
client = clnt_create(master, YPPASSWDPROG, YPPASSWDVERS, "udp");
if (client==NULL) {
warnx("cannot contact yppasswdd on %s: Reason: %s",
master, yperr_string(YPERR_YPBIND));
free(yppwd.newpw.pw_passwd);
return (YPERR_YPBIND);
}
client->cl_auth = authunix_create_default();
tv.tv_sec = 2;
tv.tv_usec = 0;
r = clnt_call(client, YPPASSWDPROC_UPDATE,
xdr_yppasswd, &yppwd, xdr_int, &status, tv);
if (r) {
printf("rpc to yppasswdd failed.\n");
free(yppwd.newpw.pw_passwd);
return (1);
} else if (status) {
printf("Couldn't change YP password.\n");
free(yppwd.newpw.pw_passwd);
return (1);
} else {
printf("The YP password has been changed on %s, "
"the master YP passwd server.\n", master);
free(yppwd.newpw.pw_passwd);
return (0);
}
}
char *
ypgetnewpasswd(struct passwd *pw, login_cap_t *lc, char **old_pass)
{
static char buf[_PASSWORD_LEN+1];
char salt[_PASSWORD_LEN];
sig_t saveint, savequit;
int tries, pwd_tries;
char *p;
saveint = signal(SIGINT, kbintr);
savequit = signal(SIGQUIT, kbintr);
printf("Changing YP password for %s.\n", pw->pw_name);
if (old_pass) {
*old_pass = NULL;
if (pw->pw_passwd[0]) {
p = getpass("Old password:");
if (p == NULL ||
strcmp(crypt(p, pw->pw_passwd), pw->pw_passwd)) {
errno = EACCES;
pw_error(NULL, 1, 1);
}
} else
p = "";
*old_pass = strdup(p);
if (*old_pass == NULL)
pw_error(NULL, 1, 1);
}
pwd_tries = pwd_gettries(lc);
for (buf[0] = '\0', tries = 0;;) {
p = getpass("New password:");
if (p == NULL || *p == '\0')
pw_error(NULL, 0, p == NULL ? 1 : 0);
if (strcmp(p, "s/key") == 0) {
printf("That password collides with a system feature. "
"Choose another.\n");
continue;
}
if ((tries++ < pwd_tries || pwd_tries == 0)
&& pwd_check(lc, p) == 0)
continue;
strlcpy(buf, p, sizeof buf);
p = getpass("Retype new password:");
if (p != NULL && strcmp(buf, p) == 0)
break;
(void)printf("Mismatch; try again, EOF to quit.\n");
}
if (!pwd_gensalt(salt, _PASSWORD_LEN, lc, 'y')) {
(void)printf("Couldn't generate salt.\n");
pw_error(NULL, 0, 0);
}
p = strdup(crypt(buf, salt));
if (p == NULL)
pw_error(NULL, 1, 1);
(void)signal(SIGINT, saveint);
(void)signal(SIGQUIT, savequit);
return (p);
}
static char *
pwskip(char *p)
{
while (*p && *p != ':' && *p != '\n')
++p;
if (*p)
*p++ = 0;
return (p);
}
struct passwd *
interpret(struct passwd *pwent, char *line, int secure)
{
char *p = line;
pwent->pw_passwd = "*";
pwent->pw_uid = 0;
pwent->pw_gid = 0;
pwent->pw_gecos = "";
pwent->pw_dir = "";
pwent->pw_shell = "";
pwent->pw_change = 0;
pwent->pw_expire = 0;
pwent->pw_class = "";
/* line without colon separators is no good, so ignore it */
if (!strchr(p, ':'))
return (NULL);
pwent->pw_name = p;
p = pwskip(p);
pwent->pw_passwd = p;
p = pwskip(p);
pwent->pw_uid = (uid_t)strtoul(p, NULL, 10);
p = pwskip(p);
pwent->pw_gid = (gid_t)strtoul(p, NULL, 10);
p = pwskip(p);
if ( secure == 1 ) {
pwent->pw_class = p;
p = pwskip(p);
pwent->pw_change = (time_t)strtoul(p, NULL, 10);
p = pwskip(p);
pwent->pw_expire = (time_t)strtoul(p, NULL, 10);
p = pwskip(p);
}
pwent->pw_gecos = p;
p = pwskip(p);
pwent->pw_dir = p;
p = pwskip(p);
pwent->pw_shell = p;
while (*p && *p != '\n')
p++;
*p = '\0';
return (pwent);
}
static char *__yplin;
struct passwd *
ypgetpwnam(char *nam, int secure)
{
static struct passwd pwent;
int reason, vallen;
char *val;
reason = yp_match(domain,
secure ? "master.passwd.byname" : "passwd.byname",
nam, strlen(nam), &val, &vallen);
switch (reason) {
case 0:
break;
default:
return (NULL);
}
val[vallen] = '\0';
if (__yplin)
free(__yplin);
__yplin = (char *)malloc(vallen + 1);
if (__yplin == NULL)
pw_error(NULL, 1, 1);
strlcpy(__yplin, val, vallen + 1);
free(val);
return (interpret(&pwent, __yplin, secure));
}
#endif /* YP */