summaryrefslogtreecommitdiff
path: root/server/passwd.c
diff options
context:
space:
mode:
Diffstat (limited to 'server/passwd.c')
-rw-r--r--server/passwd.c206
1 files changed, 206 insertions, 0 deletions
diff --git a/server/passwd.c b/server/passwd.c
new file mode 100644
index 0000000..11155a9
--- /dev/null
+++ b/server/passwd.c
@@ -0,0 +1,206 @@
+/*
+ Copyright (C) 1997-2005 Luke Howard
+ This file is part of the nss_ldap library.
+ Contributed by Luke Howard, <lukeh@padl.com>, 1997.
+
+ The nss_ldap library is free software; you can redistribute it and/or
+ modify it under the terms of the GNU Library General Public License as
+ published by the Free Software Foundation; either version 2 of the
+ License, or (at your option) any later version.
+
+ The nss_ldap library is distributed in the hope that it will be useful,
+ but WITHOUT ANY WARRANTY; without even the implied warranty of
+ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
+ Library General Public License for more details.
+
+ You should have received a copy of the GNU Library General Public
+ License along with the nss_ldap library; see the file COPYING.LIB. If not,
+ write to the Free Software Foundation, Inc., 59 Temple Place - Suite 330,
+ Boston, MA 02111-1307, USA.
+*/
+
+#include "config.h"
+
+#include <stdlib.h>
+#include <sys/types.h>
+#include <sys/param.h>
+#include <string.h>
+#include <pwd.h>
+#include <errno.h>
+#ifdef HAVE_LBER_H
+#include <lber.h>
+#endif
+#ifdef HAVE_LDAP_H
+#include <ldap.h>
+#endif
+#if defined(HAVE_THREAD_H)
+#include <thread.h>
+#elif defined(HAVE_PTHREAD_H)
+#include <pthread.h>
+#endif
+
+#include "ldap-nss.h"
+#include "util.h"
+
+static struct ent_context *pw_context = NULL;
+
+static inline enum nss_status _nss_ldap_assign_emptystring(
+ char **valptr, char **buffer, size_t * buflen)
+{
+ if (*buflen < 2)
+ return NSS_STATUS_TRYAGAIN;
+
+ *valptr = *buffer;
+
+ **valptr = '\0';
+
+ (*buffer)++;
+ (*buflen)--;
+
+ return NSS_STATUS_SUCCESS;
+}
+
+/* FIXME: make this non-static for now for testing purposes */
+enum nss_status _nss_ldap_parse_pw (LDAPMessage * e,
+ struct ldap_state * pvt,
+ void *result, char *buffer, size_t buflen)
+{
+ struct passwd *pw = (struct passwd *) result;
+ char *uid, *gid;
+ enum nss_status stat;
+ char tmpbuf[ sizeof( uid_t ) * 8 / 3 + 2 ];
+ size_t tmplen;
+ char *tmp;
+
+ tmpbuf[ sizeof(tmpbuf) - 1 ] = '\0';
+
+ if (_nss_ldap_oc_check (e, "shadowAccount") == NSS_STATUS_SUCCESS)
+ {
+ /* don't include password for shadowAccount */
+ if (buflen < 3)
+ return NSS_STATUS_TRYAGAIN;
+
+ pw->pw_passwd = buffer;
+ strcpy (buffer, "x");
+ buffer += 2;
+ buflen -= 2;
+ }
+ else
+ {
+ stat =
+ _nss_ldap_assign_userpassword (e, ATM (LM_PASSWD, userPassword),
+ &pw->pw_passwd, &buffer, &buflen);
+ if (stat != NSS_STATUS_SUCCESS)
+ return stat;
+ }
+
+ stat =
+ _nss_ldap_assign_attrval (e, ATM (LM_PASSWD, uid), &pw->pw_name, &buffer,
+ &buflen);
+ if (stat != NSS_STATUS_SUCCESS)
+ return stat;
+
+ tmp = tmpbuf;
+ tmplen = sizeof (tmpbuf) - 1;
+ stat =
+ _nss_ldap_assign_attrval (e, AT (uidNumber), &uid, &tmp, &tmplen);
+ if (stat != NSS_STATUS_SUCCESS)
+ return stat;
+ pw->pw_uid = (*uid == '\0') ? UID_NOBODY : (uid_t) atol (uid);
+
+ tmp = tmpbuf;
+ tmplen = sizeof (tmpbuf) - 1;
+ stat =
+ _nss_ldap_assign_attrval (e, ATM (LM_PASSWD, gidNumber), &gid, &tmp,
+ &tmplen);
+ if (stat != NSS_STATUS_SUCCESS)
+ return stat;
+ pw->pw_gid = (*gid == '\0') ? GID_NOBODY : (gid_t) atol (gid);
+
+ stat =
+ _nss_ldap_assign_attrval (e, AT (gecos), &pw->pw_gecos, &buffer,
+ &buflen);
+ if (stat != NSS_STATUS_SUCCESS)
+ {
+ pw->pw_gecos = NULL;
+ stat =
+ _nss_ldap_assign_attrval (e, ATM (LM_PASSWD, cn), &pw->pw_gecos,
+ &buffer, &buflen);
+ if (stat != NSS_STATUS_SUCCESS)
+ return stat;
+ }
+
+ stat =
+ _nss_ldap_assign_attrval (e, AT (homeDirectory), &pw->pw_dir, &buffer,
+ &buflen);
+ if (stat != NSS_STATUS_SUCCESS)
+ (void) _nss_ldap_assign_emptystring (&pw->pw_dir, &buffer, &buflen);
+
+ stat =
+ _nss_ldap_assign_attrval (e, AT (loginShell), &pw->pw_shell, &buffer,
+ &buflen);
+ if (stat != NSS_STATUS_SUCCESS)
+ (void) _nss_ldap_assign_emptystring (&pw->pw_shell, &buffer, &buflen);
+
+#ifdef HAVE_PASSWD_PW_CHANGE
+ tmp = NULL;
+ stat =
+ _nss_ldap_assign_attrval (e, AT (shadowMax), &tmp, &buffer, &buflen);
+ pw->pw_change = (stat == NSS_STATUS_SUCCESS) ? atol(tmp) * (24*60*60) : 0;
+
+ if (pw->pw_change > 0)
+ {
+ tmp = NULL;
+ stat =
+ _nss_ldap_assign_attrval (e, AT (shadowLastChange), &tmp, &buffer,
+ &buflen);
+ if (stat == NSS_STATUS_SUCCESS)
+ pw->pw_change += atol(tmp);
+ else
+ pw->pw_change = 0;
+ }
+#endif /* HAVE_PASSWD_PW_CHANGE */
+
+#ifdef HAVE_PASSWD_PW_EXPIRE
+ tmp = NULL;
+ stat =
+ _nss_ldap_assign_attrval (e, AT (shadowExpire), &tmp, &buffer, &buflen);
+ pw->pw_expire = (stat == NSS_STATUS_SUCCESS) ? atol(tmp) * (24*60*60) : 0;
+#endif /* HAVE_PASSWD_PW_EXPIRE */
+
+ return NSS_STATUS_SUCCESS;
+}
+
+enum nss_status _nss_ldap_getpwnam_r(const char *name,
+ struct passwd *result,
+ char *buffer,size_t buflen,int *errnop)
+{
+ LOOKUP_NAME (name, result, buffer, buflen, errnop, _nss_ldap_filt_getpwnam,
+ LM_PASSWD, _nss_ldap_parse_pw, LDAP_NSS_BUFLEN_DEFAULT);
+}
+
+enum nss_status _nss_ldap_getpwuid_r(uid_t uid,
+ struct passwd *result,
+ char *buffer,size_t buflen,int *errnop)
+{
+ LOOKUP_NUMBER (uid, result, buffer, buflen, errnop, _nss_ldap_filt_getpwuid,
+ LM_PASSWD, _nss_ldap_parse_pw, LDAP_NSS_BUFLEN_DEFAULT);
+}
+
+enum nss_status _nss_ldap_setpwent(void)
+{
+ LOOKUP_SETENT (pw_context);
+}
+
+enum nss_status _nss_ldap_getpwent_r(struct passwd *result,
+ char *buffer,size_t buflen,int *errnop)
+{
+ LOOKUP_GETENT (pw_context, result, buffer, buflen, errnop,
+ _nss_ldap_filt_getpwent, LM_PASSWD, _nss_ldap_parse_pw,
+ LDAP_NSS_BUFLEN_DEFAULT);
+}
+
+enum nss_status _nss_ldap_endpwent(void)
+{
+ LOOKUP_ENDENT (pw_context);
+}