Bigger patch for (partial) tinylogin integration
- Made a new dir loginutils - Moved all applets from pwd_grp to loginutils - Added new applets su.c login.c to loginutils - Made a new dir libpwdgrp - Moved everything from pwd_grp/libpwd_grp there - Added shadow.c to libpwdgrp - Removed dir pwd_grp - Added usage strings for login and su to usage.h - Changed main Makefile to reflect the dir rearrangements [Parts of this patch may overlap with my other two patches]
This commit is contained in:
parent
ea1a63a201
commit
1fca558799
4
Makefile
4
Makefile
@ -22,8 +22,8 @@ include $(TOPDIR).config
|
||||
include $(TOPDIR)Rules.mak
|
||||
SUBDIRS:=applets archival archival/libunarchive console-tools \
|
||||
editors fileutils findutils init miscutils modutils networking \
|
||||
procps pwd_grp pwd_grp/libpwd_grp shell shellutils sysklogd \
|
||||
textutils util-linux libbb
|
||||
procps loginutils shell shellutils sysklogd \
|
||||
textutils util-linux libbb libpwdgrp
|
||||
|
||||
all: do-it-all
|
||||
|
||||
|
@ -978,6 +978,15 @@
|
||||
#define logger_example_usage \
|
||||
"$ logger "hello"\n"
|
||||
|
||||
#define login_trivial_usage \
|
||||
"[OPTION]... [username] [ENV=VAR ...]"
|
||||
#define login_full_usage \
|
||||
"Begin a new session on the system\n\n" \
|
||||
"Options:\n" \
|
||||
"\t-f\tDo not authenticate (user already authenticated)\n" \
|
||||
"\t-h\tName of the remote host for this login.\n" \
|
||||
"\t-p\tPreserve environment."
|
||||
|
||||
#define logname_trivial_usage \
|
||||
""
|
||||
#define logname_full_usage \
|
||||
@ -1570,6 +1579,13 @@
|
||||
"\n\t-g\t\tprint in stty-readable form" \
|
||||
"\n\t[SETTING]\tsee manpage"
|
||||
|
||||
#define su_trivial_usage \
|
||||
"[OPTION]... [-] [username]"
|
||||
#define su_full_usage \
|
||||
"Change user id or become root.\n" \
|
||||
"Options:\n" \
|
||||
"\t-p\tPreserve environment"
|
||||
|
||||
#define swapoff_trivial_usage \
|
||||
"[OPTION] [DEVICE]"
|
||||
#define swapoff_full_usage \
|
||||
|
30
libpwdgrp/Makefile
Normal file
30
libpwdgrp/Makefile
Normal file
@ -0,0 +1,30 @@
|
||||
# Makefile for busybox
|
||||
#
|
||||
# Copyright (C) 1999-2002 Erik Andersen <andersee@debian.org>
|
||||
#
|
||||
# This program is free software; you can redistribute it and/or modify
|
||||
# it under the terms of the GNU General Public License as published by
|
||||
# the Free Software Foundation; either version 2 of the License, or
|
||||
# (at your option) any later version.
|
||||
#
|
||||
# This program is distributed in the hope that it will be useful,
|
||||
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
||||
# General Public License for more details.
|
||||
#
|
||||
# You should have received a copy of the GNU General Public License
|
||||
# along with this program; if not, write to the Free Software
|
||||
# Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
|
||||
#
|
||||
|
||||
TOPDIR:= ../
|
||||
LIBPWDGRP_DIR:=./
|
||||
include $(TOPDIR).config
|
||||
include $(TOPDIR)Rules.mak
|
||||
include Makefile.in
|
||||
all: $(libraries-y)
|
||||
-include $(TOPDIR).depend
|
||||
|
||||
clean:
|
||||
rm -f *.o *.a $(AR_TARGET)
|
||||
|
35
libpwdgrp/Makefile.in
Normal file
35
libpwdgrp/Makefile.in
Normal file
@ -0,0 +1,35 @@
|
||||
# Makefile for busybox
|
||||
#
|
||||
# Copyright (C) 1999-2002 Erik Andersen <andersee@debian.org>
|
||||
#
|
||||
# This program is free software; you can redistribute it and/or modify
|
||||
# it under the terms of the GNU General Public License as published by
|
||||
# the Free Software Foundation; either version 2 of the License, or
|
||||
# (at your option) any later version.
|
||||
#
|
||||
# This program is distributed in the hope that it will be useful,
|
||||
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
||||
# General Public License for more details.
|
||||
#
|
||||
# You should have received a copy of the GNU General Public License
|
||||
# along with this program; if not, write to the Free Software
|
||||
# Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
|
||||
#
|
||||
|
||||
LIBPWDGRP_AR:=libpwdgrp.a
|
||||
ifndef $(LIBPWDGRP_DIR)
|
||||
LIBPWDGRP_DIR:=$(TOPDIR)libpwdgrp/
|
||||
endif
|
||||
|
||||
LIBPWDGRP-y:=
|
||||
LIBPWDGRP-$(CONFIG_USE_BB_PWD_GRP) += __getgrent.o __getgrent.o __getpwent.o\
|
||||
fgetgrent.o fgetpwent.o getgrgid.o getgrnam.o getpw.o getpwnam.o \
|
||||
getpwuid.o grent.o initgroups.o putpwent.o pwent.o setgroups.o
|
||||
LIBPWDGRP-$(CONFIG_USE_BB_SHADOW) += shadow.o
|
||||
|
||||
libraries-y+=$(LIBPWDGRP_DIR)$(LIBPWDGRP_AR)
|
||||
|
||||
$(LIBPWDGRP_DIR)$(LIBPWDGRP_AR): $(patsubst %,$(LIBPWDGRP_DIR)%, $(LIBPWDGRP-y))
|
||||
$(AR) -ro $@ $(patsubst %,$(LIBPWDGRP_DIR)%, $(LIBPWDGRP-y))
|
||||
|
204
libpwdgrp/__getgrent.c
Normal file
204
libpwdgrp/__getgrent.c
Normal file
@ -0,0 +1,204 @@
|
||||
/*
|
||||
* __getgrent.c - This file is part of the libc-8086/grp package for ELKS,
|
||||
* Copyright (C) 1995, 1996 Nat Friedman <ndf@linux.mit.edu>.
|
||||
*
|
||||
* This library is free software; you can redistribute it and/or
|
||||
* modify it under the terms of the GNU Library General Public
|
||||
* License as published by the Free Software Foundation; either
|
||||
* version 2 of the License, or (at your option) any later version.
|
||||
*
|
||||
* This library is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
||||
* Library General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU Library General Public
|
||||
* License along with this library; if not, write to the Free
|
||||
* Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
|
||||
*
|
||||
*/
|
||||
|
||||
#include "busybox.h"
|
||||
|
||||
#include <unistd.h>
|
||||
#include <stdlib.h>
|
||||
#include <string.h>
|
||||
#include "grp.h"
|
||||
|
||||
/*
|
||||
* Define GR_SCALE_DYNAMIC if you want grp to dynamically scale its read buffer
|
||||
* so that lines of any length can be used. On very very small systems,
|
||||
* you may want to leave this undefined becasue it will make the grp functions
|
||||
* somewhat larger (because of the inclusion of malloc and the code necessary).
|
||||
* On larger systems, you will want to define this, because grp will _not_
|
||||
* deal with long lines gracefully (they will be skipped).
|
||||
*/
|
||||
#undef GR_SCALE_DYNAMIC
|
||||
|
||||
#ifndef GR_SCALE_DYNAMIC
|
||||
/*
|
||||
* If scaling is not dynamic, the buffers will be statically allocated, and
|
||||
* maximums must be chosen. GR_MAX_LINE_LEN is the maximum number of
|
||||
* characters per line in the group file. GR_MAX_MEMBERS is the maximum
|
||||
* number of members of any given group.
|
||||
*/
|
||||
#define GR_MAX_LINE_LEN 128
|
||||
/* GR_MAX_MEMBERS = (GR_MAX_LINE_LEN-(24+3+6))/9 */
|
||||
#define GR_MAX_MEMBERS 11
|
||||
|
||||
#endif /* !GR_SCALE_DYNAMIC */
|
||||
|
||||
|
||||
/*
|
||||
* Define GR_DYNAMIC_GROUP_LIST to make initgroups() dynamically allocate
|
||||
* space for it's GID array before calling setgroups(). This is probably
|
||||
* unnecessary scalage, so it's undefined by default.
|
||||
*/
|
||||
#undef GR_DYNAMIC_GROUP_LIST
|
||||
|
||||
#ifndef GR_DYNAMIC_GROUP_LIST
|
||||
/*
|
||||
* GR_MAX_GROUPS is the size of the static array initgroups() uses for
|
||||
* its static GID array if GR_DYNAMIC_GROUP_LIST isn't defined.
|
||||
*/
|
||||
#define GR_MAX_GROUPS 64
|
||||
|
||||
#endif /* !GR_DYNAMIC_GROUP_LIST */
|
||||
|
||||
|
||||
/*
|
||||
* This is the core group-file read function. It behaves exactly like
|
||||
* getgrent() except that it is passed a file descriptor. getgrent()
|
||||
* is just a wrapper for this function.
|
||||
*/
|
||||
struct group *__getgrent(int grp_fd)
|
||||
{
|
||||
#ifndef GR_SCALE_DYNAMIC
|
||||
static char line_buff[GR_MAX_LINE_LEN];
|
||||
static char *members[GR_MAX_MEMBERS];
|
||||
#else
|
||||
static char *line_buff = NULL;
|
||||
static char **members = NULL;
|
||||
short line_index;
|
||||
short buff_size;
|
||||
#endif
|
||||
static struct group group;
|
||||
register char *ptr;
|
||||
char *field_begin;
|
||||
short member_num;
|
||||
char *endptr;
|
||||
int line_len;
|
||||
|
||||
|
||||
/* We use the restart label to handle malformatted lines */
|
||||
restart:
|
||||
#ifdef GR_SCALE_DYNAMIC
|
||||
line_index = 0;
|
||||
buff_size = 256;
|
||||
#endif
|
||||
|
||||
#ifndef GR_SCALE_DYNAMIC
|
||||
/* Read the line into the static buffer */
|
||||
if ((line_len = read(grp_fd, line_buff, GR_MAX_LINE_LEN)) <= 0)
|
||||
return NULL;
|
||||
field_begin = strchr(line_buff, '\n');
|
||||
if (field_begin != NULL)
|
||||
lseek(grp_fd, (long) (1 + field_begin - (line_buff + line_len)),
|
||||
SEEK_CUR);
|
||||
else { /* The line is too long - skip it :-\ */
|
||||
|
||||
do {
|
||||
if ((line_len = read(grp_fd, line_buff, GR_MAX_LINE_LEN)) <= 0)
|
||||
return NULL;
|
||||
} while (!(field_begin = strchr(line_buff, '\n')));
|
||||
lseek(grp_fd, (long) ((field_begin - line_buff) - line_len + 1),
|
||||
SEEK_CUR);
|
||||
goto restart;
|
||||
}
|
||||
if (*line_buff == '#' || *line_buff == ' ' || *line_buff == '\n' ||
|
||||
*line_buff == '\t')
|
||||
goto restart;
|
||||
*field_begin = '\0';
|
||||
|
||||
#else /* !GR_SCALE_DYNAMIC */
|
||||
line_buff = realloc(line_buff, buff_size);
|
||||
while (1) {
|
||||
if ((line_len = read(grp_fd, line_buff + line_index,
|
||||
buff_size - line_index)) <= 0)
|
||||
return NULL;
|
||||
field_begin = strchr(line_buff, '\n');
|
||||
if (field_begin != NULL) {
|
||||
lseek(grp_fd,
|
||||
(long) (1 + field_begin -
|
||||
(line_len + line_index + line_buff)), SEEK_CUR);
|
||||
*field_begin = '\0';
|
||||
if (*line_buff == '#' || *line_buff == ' '
|
||||
|| *line_buff == '\n' || *line_buff == '\t')
|
||||
goto restart;
|
||||
break;
|
||||
} else { /* Allocate some more space */
|
||||
|
||||
line_index = buff_size;
|
||||
buff_size += 256;
|
||||
line_buff = realloc(line_buff, buff_size);
|
||||
}
|
||||
}
|
||||
#endif /* GR_SCALE_DYNAMIC */
|
||||
|
||||
/* Now parse the line */
|
||||
group.gr_name = line_buff;
|
||||
ptr = strchr(line_buff, ':');
|
||||
if (ptr == NULL)
|
||||
goto restart;
|
||||
*ptr++ = '\0';
|
||||
|
||||
group.gr_passwd = ptr;
|
||||
ptr = strchr(ptr, ':');
|
||||
if (ptr == NULL)
|
||||
goto restart;
|
||||
*ptr++ = '\0';
|
||||
|
||||
field_begin = ptr;
|
||||
ptr = strchr(ptr, ':');
|
||||
if (ptr == NULL)
|
||||
goto restart;
|
||||
*ptr++ = '\0';
|
||||
|
||||
group.gr_gid = (gid_t) strtoul(field_begin, &endptr, 10);
|
||||
if (*endptr != '\0')
|
||||
goto restart;
|
||||
|
||||
member_num = 0;
|
||||
field_begin = ptr;
|
||||
|
||||
#ifndef GR_SCALE_DYNAMIC
|
||||
while ((ptr = strchr(ptr, ',')) != NULL) {
|
||||
*ptr = '\0';
|
||||
ptr++;
|
||||
members[member_num] = field_begin;
|
||||
field_begin = ptr;
|
||||
member_num++;
|
||||
}
|
||||
if (*field_begin == '\0')
|
||||
members[member_num] = NULL;
|
||||
else {
|
||||
members[member_num] = field_begin;
|
||||
members[member_num + 1] = NULL;
|
||||
}
|
||||
#else /* !GR_SCALE_DYNAMIC */
|
||||
if (members != NULL)
|
||||
free(members);
|
||||
members = (char **) malloc((member_num + 1) * sizeof(char *));
|
||||
for ( ; field_begin && *field_begin != '\0'; field_begin = ptr) {
|
||||
if ((ptr = strchr(field_begin, ',')) != NULL)
|
||||
*ptr++ = '\0';
|
||||
members[member_num++] = field_begin;
|
||||
members = (char **) realloc(members,
|
||||
(member_num + 1) * sizeof(char *));
|
||||
}
|
||||
members[member_num] = NULL;
|
||||
#endif /* GR_SCALE_DYNAMIC */
|
||||
|
||||
group.gr_mem = members;
|
||||
return &group;
|
||||
}
|
115
libpwdgrp/__getpwent.c
Normal file
115
libpwdgrp/__getpwent.c
Normal file
@ -0,0 +1,115 @@
|
||||
/*
|
||||
* __getpwent.c - This file is part of the libc-8086/pwd package for ELKS,
|
||||
* Copyright (C) 1995, 1996 Nat Friedman <ndf@linux.mit.edu>.
|
||||
*
|
||||
* This library is free software; you can redistribute it and/or
|
||||
* modify it under the terms of the GNU Library General Public
|
||||
* License as published by the Free Software Foundation; either
|
||||
* version 2 of the License, or (at your option) any later version.
|
||||
*
|
||||
* This library is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
||||
* Library General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU Library General Public
|
||||
* License along with this library; if not, write to the Free
|
||||
* Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
|
||||
*
|
||||
*/
|
||||
|
||||
#include "busybox.h"
|
||||
|
||||
#include <stdlib.h>
|
||||
#include <unistd.h>
|
||||
#include <string.h>
|
||||
#include <fcntl.h>
|
||||
#include "pwd.h"
|
||||
|
||||
#define PWD_BUFFER_SIZE 256
|
||||
|
||||
/* This isn't as flash as my previous version -- it doesn't dynamically
|
||||
scale down the gecos on too-long lines, but it also makes fewer syscalls,
|
||||
so it's probably nicer. Write me if you want the old version. Maybe I
|
||||
should include it as a build-time option... ?
|
||||
-Nat <ndf@linux.mit.edu> */
|
||||
|
||||
struct passwd *__getpwent(int pwd_fd)
|
||||
{
|
||||
static char line_buff[PWD_BUFFER_SIZE];
|
||||
static struct passwd passwd;
|
||||
char *field_begin;
|
||||
char *endptr;
|
||||
char *gid_ptr=NULL;
|
||||
char *uid_ptr=NULL;
|
||||
int line_len;
|
||||
int i;
|
||||
|
||||
/* We use the restart label to handle malformatted lines */
|
||||
restart:
|
||||
/* Read the passwd line into the static buffer using a minimal of
|
||||
syscalls. */
|
||||
if ((line_len = read(pwd_fd, line_buff, PWD_BUFFER_SIZE)) <= 0)
|
||||
return NULL;
|
||||
field_begin = strchr(line_buff, '\n');
|
||||
if (field_begin != NULL)
|
||||
lseek(pwd_fd, (long) (1 + field_begin - (line_buff + line_len)),
|
||||
SEEK_CUR);
|
||||
else { /* The line is too long - skip it. :-\ */
|
||||
|
||||
do {
|
||||
if ((line_len = read(pwd_fd, line_buff, PWD_BUFFER_SIZE)) <= 0)
|
||||
return NULL;
|
||||
} while (!(field_begin = strchr(line_buff, '\n')));
|
||||
lseek(pwd_fd, (long) (field_begin - line_buff) - line_len + 1,
|
||||
SEEK_CUR);
|
||||
goto restart;
|
||||
}
|
||||
if (*line_buff == '#' || *line_buff == ' ' || *line_buff == '\n' ||
|
||||
*line_buff == '\t')
|
||||
goto restart;
|
||||
*field_begin = '\0';
|
||||
|
||||
/* We've read the line; now parse it. */
|
||||
field_begin = line_buff;
|
||||
for (i = 0; i < 7; i++) {
|
||||
switch (i) {
|
||||
case 0:
|
||||
passwd.pw_name = field_begin;
|
||||
break;
|
||||
case 1:
|
||||
passwd.pw_passwd = field_begin;
|
||||
break;
|
||||
case 2:
|
||||
uid_ptr = field_begin;
|
||||
break;
|
||||
case 3:
|
||||
gid_ptr = field_begin;
|
||||
break;
|
||||
case 4:
|
||||
passwd.pw_gecos = field_begin;
|
||||
break;
|
||||
case 5:
|
||||
passwd.pw_dir = field_begin;
|
||||
break;
|
||||
case 6:
|
||||
passwd.pw_shell = field_begin;
|
||||
break;
|
||||
}
|
||||
if (i < 6) {
|
||||
field_begin = strchr(field_begin, ':');
|
||||
if (field_begin == NULL)
|
||||
goto restart;
|
||||
*field_begin++ = '\0';
|
||||
}
|
||||
}
|
||||
passwd.pw_gid = (gid_t) strtoul(gid_ptr, &endptr, 10);
|
||||
if (*endptr != '\0')
|
||||
goto restart;
|
||||
|
||||
passwd.pw_uid = (uid_t) strtoul(uid_ptr, &endptr, 10);
|
||||
if (*endptr != '\0')
|
||||
goto restart;
|
||||
|
||||
return &passwd;
|
||||
}
|
35
libpwdgrp/fgetgrent.c
Normal file
35
libpwdgrp/fgetgrent.c
Normal file
@ -0,0 +1,35 @@
|
||||
/*
|
||||
* fgetgrent.c - This file is part of the libc-8086/grp package for ELKS,
|
||||
* Copyright (C) 1995, 1996 Nat Friedman <ndf@linux.mit.edu>.
|
||||
*
|
||||
* This library is free software; you can redistribute it and/or
|
||||
* modify it under the terms of the GNU Library General Public
|
||||
* License as published by the Free Software Foundation; either
|
||||
* version 2 of the License, or (at your option) any later version.
|
||||
*
|
||||
* This library is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
||||
* Library General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU Library General Public
|
||||
* License along with this library; if not, write to the Free
|
||||
* Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
|
||||
*
|
||||
*/
|
||||
|
||||
#include "busybox.h"
|
||||
|
||||
#include <stdio.h>
|
||||
#include <errno.h>
|
||||
#include "grp.h"
|
||||
|
||||
struct group *fgetgrent(FILE * file)
|
||||
{
|
||||
if (file == NULL) {
|
||||
errno = EINTR;
|
||||
return NULL;
|
||||
}
|
||||
|
||||
return __getgrent(fileno(file));
|
||||
}
|
35
libpwdgrp/fgetpwent.c
Normal file
35
libpwdgrp/fgetpwent.c
Normal file
@ -0,0 +1,35 @@
|
||||
/*
|
||||
* fgetpwent.c - This file is part of the libc-8086/pwd package for ELKS,
|
||||
* Copyright (C) 1995, 1996 Nat Friedman <ndf@linux.mit.edu>.
|
||||
*
|
||||
* This library is free software; you can redistribute it and/or
|
||||
* modify it under the terms of the GNU Library General Public
|
||||
* License as published by the Free Software Foundation; either
|
||||
* version 2 of the License, or (at your option) any later version.
|
||||
*
|
||||
* This library is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
||||
* Library General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU Library General Public
|
||||
* License along with this library; if not, write to the Free
|
||||
* Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
|
||||
*
|
||||
*/
|
||||
|
||||
#include "busybox.h"
|
||||
|
||||
#include <errno.h>
|
||||
#include <stdio.h>
|
||||
#include "pwd.h"
|
||||
|
||||
struct passwd *fgetpwent(FILE * file)
|
||||
{
|
||||
if (file == NULL) {
|
||||
errno = EINTR;
|
||||
return NULL;
|
||||
}
|
||||
|
||||
return __getpwent(fileno(file));
|
||||
}
|
44
libpwdgrp/getgrgid.c
Normal file
44
libpwdgrp/getgrgid.c
Normal file
@ -0,0 +1,44 @@
|
||||
/*
|
||||
* getgrgid.c - This file is part of the libc-8086/grp package for ELKS,
|
||||
* Copyright (C) 1995, 1996 Nat Friedman <ndf@linux.mit.edu>.
|
||||
*
|
||||
* This library is free software; you can redistribute it and/or
|
||||
* modify it under the terms of the GNU Library General Public
|
||||
* License as published by the Free Software Foundation; either
|
||||
* version 2 of the License, or (at your option) any later version.
|
||||
*
|
||||
* This library is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
||||
* Library General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU Library General Public
|
||||
* License along with this library; if not, write to the Free
|
||||
* Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
|
||||
*
|
||||
*/
|
||||
|
||||
#include "busybox.h"
|
||||
|
||||
#include <sys/types.h>
|
||||
#include <unistd.h>
|
||||
#include <fcntl.h>
|
||||
#include "grp.h"
|
||||
|
||||
struct group *getgrgid(const gid_t gid)
|
||||
{
|
||||
struct group *group;
|
||||
int grp_fd;
|
||||
|
||||
if ((grp_fd = open("/etc/group", O_RDONLY)) < 0)
|
||||
return NULL;
|
||||
|
||||
while ((group = __getgrent(grp_fd)) != NULL)
|
||||
if (group->gr_gid == gid) {
|
||||
close(grp_fd);
|
||||
return group;
|
||||
}
|
||||
|
||||
close(grp_fd);
|
||||
return NULL;
|
||||
}
|
50
libpwdgrp/getgrnam.c
Normal file
50
libpwdgrp/getgrnam.c
Normal file
@ -0,0 +1,50 @@
|
||||
/*
|
||||
* getgrnam.c - This file is part of the libc-8086/grp package for ELKS,
|
||||
* Copyright (C) 1995, 1996 Nat Friedman <ndf@linux.mit.edu>.
|
||||
*
|
||||
* This library is free software; you can redistribute it and/or
|
||||
* modify it under the terms of the GNU Library General Public
|
||||
* License as published by the Free Software Foundation; either
|
||||
* version 2 of the License, or (at your option) any later version.
|
||||
*
|
||||
* This library is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
||||
* Library General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU Library General Public
|
||||
* License along with this library; if not, write to the Free
|
||||
* Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
|
||||
*
|
||||
*/
|
||||
|
||||
#include "busybox.h"
|
||||
|
||||
#include <unistd.h>
|
||||
#include <string.h>
|
||||
#include <errno.h>
|
||||
#include <fcntl.h>
|
||||
#include "grp.h"
|
||||
|
||||
struct group *getgrnam(const char *name)
|
||||
{
|
||||
int grp_fd;
|
||||
struct group *group;
|
||||
|
||||
if (name == NULL) {
|
||||
errno = EINVAL;
|
||||
return NULL;
|
||||
}
|
||||
|
||||
if ((grp_fd = open("/etc/group", O_RDONLY)) < 0)
|
||||
return NULL;
|
||||
|
||||
while ((group = __getgrent(grp_fd)) != NULL)
|
||||
if (!strcmp(group->gr_name, name)) {
|
||||
close(grp_fd);
|
||||
return group;
|
||||
}
|
||||
|
||||
close(grp_fd);
|
||||
return NULL;
|
||||
}
|
47
libpwdgrp/getpw.c
Normal file
47
libpwdgrp/getpw.c
Normal file
@ -0,0 +1,47 @@
|
||||
/*
|
||||
* getpw.c - This file is part of the libc-8086/pwd package for ELKS,
|
||||
* Copyright (C) 1995, 1996 Nat Friedman <ndf@linux.mit.edu>.
|
||||
*
|
||||
* This library is free software; you can redistribute it and/or
|
||||
* modify it under the terms of the GNU Library General Public
|
||||
* License as published by the Free Software Foundation; either
|
||||
* version 2 of the License, or (at your option) any later version.
|
||||
*
|
||||
* This library is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
||||
* Library General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU Library General Public
|
||||
* License along with this library; if not, write to the Free
|
||||
* Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
|
||||
*
|
||||
*/
|
||||
|
||||
#include "busybox.h"
|
||||
|
||||
#include <sys/types.h>
|
||||
#include <errno.h>
|
||||
#include <stdio.h>
|
||||
#include "pwd.h"
|
||||
|
||||
int getpw(uid_t uid, char *buf)
|
||||
{
|
||||
struct passwd *passwd;
|
||||
|
||||
if (buf == NULL) {
|
||||
errno = EINVAL;
|
||||
return -1;
|
||||
}
|
||||
if ((passwd = getpwuid(uid)) == NULL)
|
||||
return -1;
|
||||
|
||||
if (sprintf (buf, "%s:%s:%u:%u:%s:%s:%s", passwd->pw_name, passwd->pw_passwd,
|
||||
passwd->pw_gid, passwd->pw_uid, passwd->pw_gecos, passwd->pw_dir,
|
||||
passwd->pw_shell) < 0) {
|
||||
errno = ENOBUFS;
|
||||
return -1;
|
||||
}
|
||||
|
||||
return 0;
|
||||
}
|
51
libpwdgrp/getpwnam.c
Normal file
51
libpwdgrp/getpwnam.c
Normal file
@ -0,0 +1,51 @@
|
||||
/*
|
||||
* getpwnam.c - This file is part of the libc-8086/pwd package for ELKS,
|
||||
* Copyright (C) 1995, 1996 Nat Friedman <ndf@linux.mit.edu>.
|
||||
*
|
||||
* This library is free software; you can redistribute it and/or
|
||||
* modify it under the terms of the GNU Library General Public
|
||||
* License as published by the Free Software Foundation; either
|
||||
* version 2 of the License, or (at your option) any later version.
|
||||
*
|
||||
* This library is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
||||
* Library General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU Library General Public
|
||||
* License along with this library; if not, write to the Free
|
||||
* Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
|
||||
*
|
||||
*/
|
||||
|
||||
#include "busybox.h"
|
||||
|
||||
#include <unistd.h>
|
||||
#include <string.h>
|
||||
#include <errno.h>
|
||||
#include <fcntl.h>
|
||||
#include "pwd.h"
|
||||
|
||||
|
||||
struct passwd *getpwnam(const char *name)
|
||||
{
|
||||
int passwd_fd;
|
||||
struct passwd *passwd;
|
||||
|
||||
if (name == NULL) {
|
||||
errno = EINVAL;
|
||||
return NULL;
|
||||
}
|
||||
|
||||
if ((passwd_fd = open("/etc/passwd", O_RDONLY)) < 0)
|
||||
return NULL;
|
||||
|
||||
while ((passwd = __getpwent(passwd_fd)) != NULL)
|
||||
if (!strcmp(passwd->pw_name, name)) {
|
||||
close(passwd_fd);
|
||||
return passwd;
|
||||
}
|
||||
|
||||
close(passwd_fd);
|
||||
return NULL;
|
||||
}
|
44
libpwdgrp/getpwuid.c
Normal file
44
libpwdgrp/getpwuid.c
Normal file
@ -0,0 +1,44 @@
|
||||
/*
|
||||
* getpwuid.c - This file is part of the libc-8086/pwd package for ELKS,
|
||||
* Copyright (C) 1995, 1996 Nat Friedman <ndf@linux.mit.edu>.
|
||||
*
|
||||
* This library is free software; you can redistribute it and/or
|
||||
* modify it under the terms of the GNU Library General Public
|
||||
* License as published by the Free Software Foundation; either
|
||||
* version 2 of the License, or (at your option) any later version.
|
||||
*
|
||||
* This library is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
||||
* Library General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU Library General Public
|
||||
* License along with this library; if not, write to the Free
|
||||
* Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
|
||||
*
|
||||
*/
|
||||
|
||||
#include "busybox.h"
|
||||
|
||||
#include <stdlib.h>
|
||||
#include <unistd.h>
|
||||
#include <fcntl.h>
|
||||
#include "pwd.h"
|
||||
|
||||
struct passwd *getpwuid(uid_t uid)
|
||||
{
|
||||
int passwd_fd;
|
||||
struct passwd *passwd;
|
||||
|
||||
if ((passwd_fd = open("/etc/passwd", O_RDONLY)) < 0)
|
||||
return NULL;
|
||||
|
||||
while ((passwd = __getpwent(passwd_fd)) != NULL)
|
||||
if (passwd->pw_uid == uid) {
|
||||
close(passwd_fd);
|
||||
return passwd;
|
||||
}
|
||||
|
||||
close(passwd_fd);
|
||||
return NULL;
|
||||
}
|
54
libpwdgrp/grent.c
Normal file
54
libpwdgrp/grent.c
Normal file
@ -0,0 +1,54 @@
|
||||
/*
|
||||
* grent.c - This file is part of the libc-8086/grp package for ELKS,
|
||||
* Copyright (C) 1995, 1996 Nat Friedman <ndf@linux.mit.edu>.
|
||||
*
|
||||
* This library is free software; you can redistribute it and/or
|
||||
* modify it under the terms of the GNU Library General Public
|
||||
* License as published by the Free Software Foundation; either
|
||||
* version 2 of the License, or (at your option) any later version.
|
||||
*
|
||||
* This library is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
||||
* Library General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU Library General Public
|
||||
* License along with this library; if not, write to the Free
|
||||
* Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
|
||||
*
|
||||
*/
|
||||
|
||||
/*
|
||||
* setgrent(), endgrent(), and getgrent() are mutually-dependent functions,
|
||||
* so they are all included in the same object file, and thus all linked
|
||||
* in together.
|
||||
*/
|
||||
|
||||
#include "busybox.h"
|
||||
|
||||
#include <unistd.h>
|
||||
#include <fcntl.h>
|
||||
#include "grp.h"
|
||||
|
||||
static int grp_fd = -1;
|
||||
|
||||
void setgrent(void)
|
||||
{
|
||||
if (grp_fd != -1)
|
||||
close(grp_fd);
|
||||
grp_fd = open("/etc/group", O_RDONLY);
|
||||
}
|
||||
|
||||
void endgrent(void)
|
||||
{
|
||||
if (grp_fd != -1)
|
||||
close(grp_fd);
|
||||
grp_fd = -1;
|
||||
}
|
||||
|
||||
struct group *getgrent(void)
|
||||
{
|
||||
if (grp_fd == -1)
|
||||
return NULL;
|
||||
return __getgrent(grp_fd);
|
||||
}
|
115
libpwdgrp/initgroups.c
Normal file
115
libpwdgrp/initgroups.c
Normal file
@ -0,0 +1,115 @@
|
||||
/*
|
||||
* initgroups.c - This file is part of the libc-8086/grp package for ELKS,
|
||||
* Copyright (C) 1995, 1996 Nat Friedman <ndf@linux.mit.edu>.
|
||||
*
|
||||
* This library is free software; you can redistribute it and/or
|
||||
* modify it under the terms of the GNU Library General Public
|
||||
* License as published by the Free Software Foundation; either
|
||||
* version 2 of the License, or (at your option) any later version.
|
||||
*
|
||||
* This library is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
||||
* Library General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU Library General Public
|
||||
* License along with this library; if not, write to the Free
|
||||
* Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
|
||||
*
|
||||
*/
|
||||
|
||||
#include "busybox.h"
|
||||
|
||||
#include <unistd.h>
|
||||
#include <string.h>
|
||||
#include <fcntl.h>
|
||||
#include "grp.h"
|
||||
|
||||
/*
|
||||
* Define GR_SCALE_DYNAMIC if you want grp to dynamically scale its read buffer
|
||||
* so that lines of any length can be used. On very very small systems,
|
||||
* you may want to leave this undefined becasue it will make the grp functions
|
||||
* somewhat larger (because of the inclusion of malloc and the code necessary).
|
||||
* On larger systems, you will want to define this, because grp will _not_
|
||||
* deal with long lines gracefully (they will be skipped).
|
||||
*/
|
||||
#undef GR_SCALE_DYNAMIC
|
||||
|
||||
#ifndef GR_SCALE_DYNAMIC
|
||||
/*
|
||||
* If scaling is not dynamic, the buffers will be statically allocated, and
|
||||
* maximums must be chosen. GR_MAX_LINE_LEN is the maximum number of
|
||||
* characters per line in the group file. GR_MAX_MEMBERS is the maximum
|
||||
* number of members of any given group.
|
||||
*/
|
||||
#define GR_MAX_LINE_LEN 128
|
||||
/* GR_MAX_MEMBERS = (GR_MAX_LINE_LEN-(24+3+6))/9 */
|
||||
#define GR_MAX_MEMBERS 11
|
||||
|
||||
#endif /* !GR_SCALE_DYNAMIC */
|
||||
|
||||
|
||||
/*
|
||||
* Define GR_DYNAMIC_GROUP_LIST to make initgroups() dynamically allocate
|
||||
* space for it's GID array before calling setgroups(). This is probably
|
||||
* unnecessary scalage, so it's undefined by default.
|
||||
*/
|
||||
#undef GR_DYNAMIC_GROUP_LIST
|
||||
|
||||
#ifndef GR_DYNAMIC_GROUP_LIST
|
||||
/*
|
||||
* GR_MAX_GROUPS is the size of the static array initgroups() uses for
|
||||
* its static GID array if GR_DYNAMIC_GROUP_LIST isn't defined.
|
||||
*/
|
||||
#define GR_MAX_GROUPS 64
|
||||
|
||||
#endif /* !GR_DYNAMIC_GROUP_LIST */
|
||||
|
||||
int initgroups(__const char *user, gid_t gid)
|
||||
{
|
||||
register struct group *group;
|
||||
|
||||
#ifndef GR_DYNAMIC_GROUP_LIST
|
||||
gid_t group_list[GR_MAX_GROUPS];
|
||||
#else
|
||||
gid_t *group_list = NULL;
|
||||
#endif
|
||||
register char **tmp_mem;
|
||||
int num_groups;
|
||||
int grp_fd;
|
||||
|
||||
|
||||
if ((grp_fd = open("/etc/group", O_RDONLY)) < 0)
|
||||
return -1;
|
||||
|
||||
num_groups = 0;
|
||||
#ifdef GR_DYNAMIC_GROUP_LIST
|
||||
group_list = (gid_t *) realloc(group_list, 1);
|
||||
#endif
|
||||
group_list[num_groups] = gid;
|
||||
#ifndef GR_DYNAMIC_GROUP_LIST
|
||||
while (num_groups < GR_MAX_GROUPS &&
|
||||
(group = __getgrent(grp_fd)) != NULL)
|
||||
#else
|
||||
while ((group = __getgrent(grp_fd)) != NULL)
|
||||
#endif
|
||||
{
|
||||
if (group->gr_gid != gid);
|
||||
{
|
||||
tmp_mem = group->gr_mem;
|
||||
while (*tmp_mem != NULL) {
|
||||
if (!strcmp(*tmp_mem, user)) {
|
||||
num_groups++;
|
||||
#ifdef GR_DYNAMIC_GROUP_LIST
|
||||
group_list = (gid_t *) realloc(group_list, num_groups *
|
||||
sizeof(gid_t *));
|
||||
#endif
|
||||
group_list[num_groups] = group->gr_gid;
|
||||
}
|
||||
tmp_mem++;
|
||||
}
|
||||
}
|
||||
}
|
||||
close(grp_fd);
|
||||
return setgroups(num_groups, group_list);
|
||||
}
|
39
libpwdgrp/putpwent.c
Normal file
39
libpwdgrp/putpwent.c
Normal file
@ -0,0 +1,39 @@
|
||||
/*
|
||||
* putpwent.c - This file is part of the libc-8086/pwd package for ELKS,
|
||||
* Copyright (C) 1995, 1996 Nat Friedman <ndf@linux.mit.edu>.
|
||||
*
|
||||
* This library is free software; you can redistribute it and/or
|
||||
* modify it under the terms of the GNU Library General Public
|
||||
* License as published by the Free Software Foundation; either
|
||||
* version 2 of the License, or (at your option) any later version.
|
||||
*
|
||||
* This library is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
||||
* Library General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU Library General Public
|
||||
* License along with this library; if not, write to the Free
|
||||
* Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
|
||||
*
|
||||
*/
|
||||
|
||||
#include "busybox.h"
|
||||
|
||||
#include <stdio.h>
|
||||
#include <errno.h>
|
||||
#include "pwd.h"
|
||||
|
||||
int putpwent(const struct passwd *passwd, FILE * f)
|
||||
{
|
||||
if (passwd == NULL || f == NULL) {
|
||||
errno = EINVAL;
|
||||
return -1;
|
||||
}
|
||||
if (fprintf (f, "%s:%s:%u:%u:%s:%s:%s\n", passwd->pw_name, passwd->pw_passwd,
|
||||
passwd->pw_gid, passwd->pw_uid, passwd->pw_gecos, passwd->pw_dir,
|
||||
passwd->pw_shell) < 0)
|
||||
return -1;
|
||||
|
||||
return 0;
|
||||
}
|
58
libpwdgrp/pwent.c
Normal file
58
libpwdgrp/pwent.c
Normal file
@ -0,0 +1,58 @@
|
||||
/*
|
||||
* pwent.c - This file is part of the libc-8086/pwd package for ELKS,
|
||||
* Copyright (C) 1995, 1996 Nat Friedman <ndf@linux.mit.edu>.
|
||||
*
|
||||
* This library is free software; you can redistribute it and/or
|
||||
* modify it under the terms of the GNU Library General Public
|
||||
* License as published by the Free Software Foundation; either
|
||||
* version 2 of the License, or (at your option) any later version.
|
||||
*
|
||||
* This library is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
||||
* Library General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU Library General Public
|
||||
* License along with this library; if not, write to the Free
|
||||
* Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
|
||||
*
|
||||
*/
|
||||
|
||||
#include "busybox.h"
|
||||
|
||||
#include <unistd.h>
|
||||
#include <stdlib.h>
|
||||
#include <errno.h>
|
||||
#include "pwd.h"
|
||||
#include <fcntl.h>
|
||||
|
||||
/*
|
||||
* setpwent(), endpwent(), and getpwent() are included in the same object
|
||||
* file, since one cannot be used without the other two, so it makes sense to
|
||||
* link them all in together.
|
||||
*/
|
||||
|
||||
/* file descriptor for the password file currently open */
|
||||
static int pw_fd = -1;
|
||||
|
||||
void setpwent(void)
|
||||
{
|
||||
if (pw_fd != -1)
|
||||
close(pw_fd);
|
||||
|
||||
pw_fd = open("/etc/passwd", O_RDONLY);
|
||||
}
|
||||
|
||||
void endpwent(void)
|
||||
{
|
||||
if (pw_fd != -1)
|
||||
close(pw_fd);
|
||||
pw_fd = -1;
|
||||
}
|
||||
|
||||
struct passwd *getpwent(void)
|
||||
{
|
||||
if (pw_fd != -1)
|
||||
return (__getpwent(pw_fd));
|
||||
return NULL;
|
||||
}
|
42
libpwdgrp/setgroups.c
Normal file
42
libpwdgrp/setgroups.c
Normal file
@ -0,0 +1,42 @@
|
||||
/* vi: set sw=4 ts=4: */
|
||||
/*
|
||||
* Taken from the set of syscalls for uClibc
|
||||
*
|
||||
* Copyright (C) 1999,2000,2001 by Erik Andersen <andersee@debian.org>
|
||||
* <andersen@lineo.com>, <andersee@debian.org>
|
||||
*
|
||||
* This program is free software; you can redistribute it and/or modify it
|
||||
* under the terms of the GNU Library General Public License as published by
|
||||
* the Free Software Foundation; either version 2 of the License, or (at your
|
||||
* option) any later version.
|
||||
*
|
||||
* This program is distributed in the hope that it will be useful, but WITHOUT
|
||||
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
||||
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU Library General Public License
|
||||
* for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU Library General Public License
|
||||
* along with this program; if not, write to the Free Software Foundation,
|
||||
* Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
|
||||
*
|
||||
*/
|
||||
|
||||
#include "busybox.h"
|
||||
|
||||
#include <errno.h>
|
||||
#include <unistd.h>
|
||||
#include <features.h>
|
||||
#include <sys/types.h>
|
||||
/* Kernel headers before 2.1.mumble need this on the Alpha to get
|
||||
_syscall* defined. */
|
||||
#define __LIBRARY__
|
||||
#include <sys/syscall.h>
|
||||
#if __GNU_LIBRARY__ < 5
|
||||
/* This is needed for libc5 */
|
||||
#include <asm/unistd.h>
|
||||
#endif
|
||||
#include "grp.h"
|
||||
|
||||
//#define __NR_setgroups 81
|
||||
_syscall2(int, setgroups, size_t, size, const gid_t *, list);
|
||||
|
302
libpwdgrp/shadow.c
Normal file
302
libpwdgrp/shadow.c
Normal file
@ -0,0 +1,302 @@
|
||||
/* vi: set sw=4 ts=4: */
|
||||
/*
|
||||
* Copyright 1989 - 1994, Julianne Frances Haugh
|
||||
* <jockgrrl@austin.rr.com>, <jfh@austin.ibm.com>
|
||||
* All rights reserved.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
* are met:
|
||||
* 1. Redistributions of source code must retain the above copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in the
|
||||
* documentation and/or other materials provided with the distribution.
|
||||
* 3. Neither the name of Julianne F. Haugh nor the names of its contributors
|
||||
* may be used to endorse or promote products derived from this software
|
||||
* without specific prior written permission.
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
|
||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
* ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
|
||||
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
* SUCH DAMAGE.
|
||||
*/
|
||||
|
||||
/* TODO: fgetspent_r.c getspent_r.c getspnam_r.c sgetspent_r.c
|
||||
* lckpwdf ulckpwdf
|
||||
*/
|
||||
|
||||
#include "busybox.h"
|
||||
|
||||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
#include <string.h>
|
||||
#include <unistd.h>
|
||||
|
||||
#include "shadow.h"
|
||||
|
||||
static FILE *shadow;
|
||||
static char spwbuf[BUFSIZ];
|
||||
static struct spwd spwd;
|
||||
|
||||
#define FIELDS 9
|
||||
#define OFIELDS 5
|
||||
|
||||
/* setspent - initialize access to shadow text and DBM files */
|
||||
void setspent(void)
|
||||
{
|
||||
if (shadow) {
|
||||
rewind(shadow);
|
||||
} else {
|
||||
if ((shadow = fopen("/etc/shadow", "r")) == NULL)
|
||||
perror_msg_and_die("/etc/shadow");
|
||||
}
|
||||
}
|
||||
|
||||
/* endspent - terminate access to shadow text and DBM files */
|
||||
void endspent(void)
|
||||
{
|
||||
if (shadow)
|
||||
(void) fclose(shadow);
|
||||
shadow = (FILE *) 0;
|
||||
}
|
||||
|
||||
/* getspent - get a (struct spwd *) from the current shadow file */
|
||||
struct spwd *getspent(void)
|
||||
{
|
||||
if (!shadow)
|
||||
setspent();
|
||||
return (fgetspent(shadow));
|
||||
}
|
||||
|
||||
/* getspnam - get a shadow entry by name */
|
||||
struct spwd *getspnam(const char *name)
|
||||
{
|
||||
struct spwd *sp;
|
||||
|
||||
if (!name || !strlen(name))
|
||||
return NULL;
|
||||
|
||||
setspent();
|
||||
while ((sp = getspent()) != NULL) {
|
||||
if (strcmp(name, sp->sp_namp) == 0)
|
||||
break;
|
||||
}
|
||||
endspent();
|
||||
return (sp);
|
||||
}
|
||||
|
||||
|
||||
/* sgetspent - convert string in shadow file format to (struct spwd *) */
|
||||
/* returns NULL on error */
|
||||
struct spwd *sgetspent(const char *string)
|
||||
{
|
||||
char *fields[FIELDS];
|
||||
char *cp;
|
||||
char *cpp;
|
||||
int i;
|
||||
|
||||
/*
|
||||
* Copy string to local buffer. It has to be tokenized and we
|
||||
* have to do that to our private copy.
|
||||
*/
|
||||
|
||||
if (strlen(string) >= sizeof spwbuf)
|
||||
/* return 0; */
|
||||
return NULL;
|
||||
strcpy(spwbuf, string);
|
||||
|
||||
if ((cp = strrchr(spwbuf, '\n')))
|
||||
*cp = '\0';
|
||||
|
||||
/*
|
||||
* Tokenize the string into colon separated fields. Allow up to
|
||||
* FIELDS different fields.
|
||||
*/
|
||||
|
||||
for (cp = spwbuf, i = 0; *cp && i < FIELDS; i++) {
|
||||
fields[i] = cp;
|
||||
while (*cp && *cp != ':')
|
||||
cp++;
|
||||
|
||||
if (*cp)
|
||||
*cp++ = '\0';
|
||||
}
|
||||
|
||||
/*
|
||||
* It is acceptable for the last SVR4 field to be blank. This
|
||||
* results in the loop being terminated early. In which case,
|
||||
* we just make the last field be blank and be done with it.
|
||||
*/
|
||||
|
||||
if (i == (FIELDS - 1))
|
||||
fields[i++] = cp;
|
||||
|
||||
if ((cp && *cp) || (i != FIELDS && i != OFIELDS))
|
||||
/* return 0; */
|
||||
return NULL;
|
||||
|
||||
/*
|
||||
* Start populating the structure. The fields are all in
|
||||
* static storage, as is the structure we pass back. If we
|
||||
* ever see a name with '+' as the first character, we try
|
||||
* to turn on NIS processing.
|
||||
*/
|
||||
|
||||
spwd.sp_namp = fields[0];
|
||||
spwd.sp_pwdp = fields[1];
|
||||
|
||||
/*
|
||||
* Get the last changed date. For all of the integer fields,
|
||||
* we check for proper format. It is an error to have an
|
||||
* incorrectly formatted number, unless we are using NIS.
|
||||
*/
|
||||
|
||||
if ((spwd.sp_lstchg = strtol(fields[2], &cpp, 10)) == 0 && *cpp) {
|
||||
/* return 0; */
|
||||
return NULL;
|
||||
} else if (fields[2][0] == '\0')
|
||||
spwd.sp_lstchg = -1;
|
||||
|
||||
/*
|
||||
* Get the minimum period between password changes.
|
||||
*/
|
||||
|
||||
if ((spwd.sp_min = strtol(fields[3], &cpp, 10)) == 0 && *cpp) {
|
||||
/* return 0; */
|
||||
return NULL;
|
||||
} else if (fields[3][0] == '\0')
|
||||
spwd.sp_min = -1;
|
||||
|
||||
/*
|
||||
* Get the maximum number of days a password is valid.
|
||||
*/
|
||||
|
||||
if ((spwd.sp_max = strtol(fields[4], &cpp, 10)) == 0 && *cpp) {
|
||||
/* return 0; */
|
||||
return NULL;
|
||||
} else if (fields[4][0] == '\0')
|
||||
spwd.sp_max = -1;
|
||||
|
||||
/*
|
||||
* If there are only OFIELDS fields (this is a SVR3.2 /etc/shadow
|
||||
* formatted file), initialize the other field members to -1.
|
||||
*/
|
||||
|
||||
if (i == OFIELDS) {
|
||||
spwd.sp_warn = spwd.sp_inact = spwd.sp_expire = spwd.sp_flag = -1;
|
||||
|
||||
return &spwd;
|
||||
}
|
||||
|
||||
/*
|
||||
* The rest of the fields are mandatory for SVR4, but optional
|
||||
* for anything else. However, if one is present the others
|
||||
* must be as well.
|
||||
*/
|
||||
|
||||
/*
|
||||
* Get the number of days of password expiry warning.
|
||||
*/
|
||||
|
||||
if ((spwd.sp_warn = strtol(fields[5], &cpp, 10)) == 0 && *cpp) {
|
||||
/* return 0; */
|
||||
return NULL;
|
||||
} else if (fields[5][0] == '\0')
|
||||
spwd.sp_warn = -1;
|
||||
|
||||
/*
|
||||
* Get the number of days of inactivity before an account is
|
||||
* disabled.
|
||||
*/
|
||||
|
||||
if ((spwd.sp_inact = strtol(fields[6], &cpp, 10)) == 0 && *cpp) {
|
||||
/* return 0; */
|
||||
return NULL;
|
||||
} else if (fields[6][0] == '\0')
|
||||
spwd.sp_inact = -1;
|
||||
|
||||
/*
|
||||
* Get the number of days after the epoch before the account is
|
||||
* set to expire.
|
||||
*/
|
||||
|
||||
if ((spwd.sp_expire = strtol(fields[7], &cpp, 10)) == 0 && *cpp) {
|
||||
/* return 0; */
|
||||
return NULL;
|
||||
} else if (fields[7][0] == '\0')
|
||||
spwd.sp_expire = -1;
|
||||
|
||||
/*
|
||||
* This field is reserved for future use. But it isn't supposed
|
||||
* to have anything other than a valid integer in it.
|
||||
*/
|
||||
|
||||
if ((spwd.sp_flag = strtol(fields[8], &cpp, 10)) == 0 && *cpp) {
|
||||
/* return 0; */
|
||||
return NULL;
|
||||
} else if (fields[8][0] == '\0')
|
||||
spwd.sp_flag = -1;
|
||||
|
||||
return (&spwd);
|
||||
}
|
||||
|
||||
/* fgetspent - get an entry from an /etc/shadow formatted stream */
|
||||
struct spwd *fgetspent(FILE *fp)
|
||||
{
|
||||
char buf[BUFSIZ];
|
||||
char *cp;
|
||||
|
||||
if (!fp)
|
||||
/* return (0); */
|
||||
return NULL;
|
||||
|
||||
if (fgets(buf, sizeof buf, fp) != (char *) 0) {
|
||||
if ((cp = strchr(buf, '\n')))
|
||||
*cp = '\0';
|
||||
return (sgetspent(buf));
|
||||
}
|
||||
/* return 0; */
|
||||
return NULL;
|
||||
}
|
||||
|
||||
/*
|
||||
* putspent - put a (struct spwd *) into the (FILE *) you provide.
|
||||
*
|
||||
* this was described in shadow_.h but not implemented, so here
|
||||
* I go. -beppu
|
||||
*
|
||||
*/
|
||||
int putspent(const struct spwd *sp, FILE *fp)
|
||||
{
|
||||
int ret;
|
||||
|
||||
/* seek to end */
|
||||
ret = fseek(fp, 0, SEEK_END);
|
||||
if (ret == -1) {
|
||||
/* return -1; */
|
||||
return 1;
|
||||
}
|
||||
|
||||
/* powered by fprintf */
|
||||
fprintf(fp, "%s:%s:%ld:%ld:%ld:%ld:%ld:%ld:%s\n", sp->sp_namp, /* login name */
|
||||
sp->sp_pwdp, /* encrypted password */
|
||||
sp->sp_lstchg, /* date of last change */
|
||||
sp->sp_min, /* minimum number of days between changes */
|
||||
sp->sp_max, /* maximum number of days between changes */
|
||||
sp->sp_warn, /* number of days of warning before password expires */
|
||||
sp->sp_inact, /* number of days after password expires until
|
||||
the account becomes unusable */
|
||||
sp->sp_expire, /* days since 1/1/70 until account expires */
|
||||
"");
|
||||
return 0;
|
||||
}
|
||||
|
||||
|
30
loginutils/Makefile
Normal file
30
loginutils/Makefile
Normal file
@ -0,0 +1,30 @@
|
||||
# Makefile for busybox
|
||||
#
|
||||
# Copyright (C) 1999-2002 Erik Andersen <andersee@debian.org>
|
||||
#
|
||||
# This program is free software; you can redistribute it and/or modify
|
||||
# it under the terms of the GNU General Public License as published by
|
||||
# the Free Software Foundation; either version 2 of the License, or
|
||||
# (at your option) any later version.
|
||||
#
|
||||
# This program is distributed in the hope that it will be useful,
|
||||
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
||||
# General Public License for more details.
|
||||
#
|
||||
# You should have received a copy of the GNU General Public License
|
||||
# along with this program; if not, write to the Free Software
|
||||
# Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
|
||||
#
|
||||
|
||||
TOPDIR:= ../
|
||||
LOGINUTILS_DIR:=./
|
||||
include $(TOPDIR).config
|
||||
include $(TOPDIR)Rules.mak
|
||||
include Makefile.in
|
||||
all: $(libraries-y)
|
||||
-include $(TOPDIR).depend
|
||||
|
||||
clean:
|
||||
rm -f *.o *.a $(AR_TARGET)
|
||||
|
45
loginutils/Makefile.in
Normal file
45
loginutils/Makefile.in
Normal file
@ -0,0 +1,45 @@
|
||||
# Makefile for busybox
|
||||
#
|
||||
# Copyright (C) 1999-2002 Erik Andersen <andersee@debian.org>
|
||||
#
|
||||
# This program is free software; you can redistribute it and/or modify
|
||||
# it under the terms of the GNU General Public License as published by
|
||||
# the Free Software Foundation; either version 2 of the License, or
|
||||
# (at your option) any later version.
|
||||
#
|
||||
# This program is distributed in the hope that it will be useful,
|
||||
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
||||
# General Public License for more details.
|
||||
#
|
||||
# You should have received a copy of the GNU General Public License
|
||||
# along with this program; if not, write to the Free Software
|
||||
# Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
|
||||
#
|
||||
|
||||
LOGINUTILS_AR:=loginutils.a
|
||||
ifndef LOGINUTILS_DIR
|
||||
LOGINUTILS_DIR:=$(TOPDIR)loginutils/
|
||||
endif
|
||||
|
||||
LOGINUTILS-y:=
|
||||
LOGINUTILS-$(CONFIG_ADDGROUP) += addgroup.o
|
||||
LOGINUTILS-$(CONFIG_ADDUSER) += adduser.o
|
||||
LOGINUTILS-$(CONFIG_DELUSER) += deluser.o
|
||||
LOGINUTILS-$(CONFIG_GETTY) += getty.o
|
||||
LOGINUTILS-$(CONFIG_LOGIN) += login.o tinylogin.o
|
||||
LOGINUTILS-$(CONFIG_SU) += su.o tinylogin.o
|
||||
|
||||
libraries-y+=$(LOGINUTILS_DIR)$(LOGINUTILS_AR)
|
||||
|
||||
needcrypt-y:=
|
||||
needcrypt-$(CONFIG_LOGIN) := y
|
||||
needcrypt-$(CONFIG_SU) := y
|
||||
|
||||
ifeq ($(needcrypt-y),y)
|
||||
libraries-y +=-lcrypt
|
||||
endif
|
||||
|
||||
$(LOGINUTILS_DIR)$(LOGINUTILS_AR): $(patsubst %,$(LOGINUTILS_DIR)%, $(LOGINUTILS-y))
|
||||
$(AR) -ro $@ $(patsubst %,$(LOGINUTILS_DIR)%, $(LOGINUTILS-y))
|
||||
|
168
loginutils/addgroup.c
Normal file
168
loginutils/addgroup.c
Normal file
@ -0,0 +1,168 @@
|
||||
/* vi: set sw=4 ts=4: */
|
||||
/*
|
||||
* addgroup - add users to /etc/passwd and /etc/shadow
|
||||
*
|
||||
* Copyright (C) 1999 by Lineo, inc. and John Beppu
|
||||
* Copyright (C) 1999,2000,2001 by John Beppu <beppu@codepoet.org>
|
||||
*
|
||||
* This program is free software; you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License as published by
|
||||
* the Free Software Foundation; either version 2 of the License, or
|
||||
* (at your option) any later version.
|
||||
*
|
||||
* This program is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
||||
* General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License
|
||||
* along with this program; if not, write to the Free Software
|
||||
* Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
|
||||
*
|
||||
*/
|
||||
|
||||
#include <errno.h>
|
||||
#include <fcntl.h>
|
||||
#include <stdarg.h>
|
||||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
#include <string.h>
|
||||
#include <sys/param.h>
|
||||
#include <sys/stat.h>
|
||||
#include <sys/types.h>
|
||||
#include <unistd.h>
|
||||
#include "busybox.h"
|
||||
#include "pwd.h"
|
||||
#include "grp.h"
|
||||
|
||||
#define GROUP_FILE "/etc/group"
|
||||
#define SHADOW_FILE "/etc/gshadow"
|
||||
|
||||
|
||||
/* structs __________________________ */
|
||||
|
||||
/* data _____________________________ */
|
||||
|
||||
/* defaults : should this be in an external file? */
|
||||
static const char default_passwd[] = "x";
|
||||
|
||||
|
||||
/* make sure gr_name isn't taken, make sure gid is kosher
|
||||
* return 1 on failure */
|
||||
static int group_study(const char *filename, struct group *g)
|
||||
{
|
||||
FILE *etc_group;
|
||||
gid_t desired;
|
||||
|
||||
struct group *grp;
|
||||
const int max = 65000;
|
||||
|
||||
etc_group = xfopen(filename, "r");
|
||||
|
||||
/* make sure gr_name isn't taken, make sure gid is kosher */
|
||||
desired = g->gr_gid;
|
||||
while ((grp = fgetgrent(etc_group))) {
|
||||
if ((strcmp(grp->gr_name, g->gr_name)) == 0) {
|
||||
error_msg_and_die("%s: group already in use\n", g->gr_name);
|
||||
}
|
||||
if ((desired) && grp->gr_gid == desired) {
|
||||
error_msg_and_die("%d: gid has already been allocated\n",
|
||||
desired);
|
||||
}
|
||||
if ((grp->gr_gid > g->gr_gid) && (grp->gr_gid < max)) {
|
||||
g->gr_gid = grp->gr_gid;
|
||||
}
|
||||
}
|
||||
fclose(etc_group);
|
||||
|
||||
/* gid */
|
||||
if (desired) {
|
||||
g->gr_gid = desired;
|
||||
} else {
|
||||
g->gr_gid++;
|
||||
}
|
||||
/* return 1; */
|
||||
return 0;
|
||||
}
|
||||
|
||||
/* append a new user to the passwd file */
|
||||
static int addgroup(const char *filename, char *group, gid_t gid)
|
||||
{
|
||||
FILE *etc_group;
|
||||
|
||||
#ifdef CONFIG_FEATURE_SHADOWPASSWDS
|
||||
FILE *etc_gshadow;
|
||||
char *gshadow = SHADOW_FILE;
|
||||
#endif
|
||||
|
||||
struct group gr;
|
||||
|
||||
/* group:passwd:gid:userlist */
|
||||
static const char entryfmt[] = "%s:%s:%d:%s\n";
|
||||
|
||||
/* make sure gid and group haven't already been allocated */
|
||||
gr.gr_gid = gid;
|
||||
gr.gr_name = group;
|
||||
if (group_study(filename, &gr))
|
||||
return 1;
|
||||
|
||||
/* add entry to group */
|
||||
etc_group = xfopen(filename, "a");
|
||||
|
||||
fprintf(etc_group, entryfmt, group, default_passwd, gr.gr_gid, "");
|
||||
fclose(etc_group);
|
||||
|
||||
|
||||
#ifdef CONFIG_FEATURE_SHADOWPASSWDS
|
||||
/* add entry to gshadow if necessary */
|
||||
if (access(gshadow, F_OK|W_OK) == 0) {
|
||||
etc_gshadow = xfopen(gshadow, "a");
|
||||
fprintf(etc_gshadow, "%s:!::\n", group);
|
||||
fclose(etc_gshadow);
|
||||
}
|
||||
#endif
|
||||
|
||||
/* return 1; */
|
||||
return 0;
|
||||
}
|
||||
|
||||
/*
|
||||
* addgroup will take a login_name as its first parameter.
|
||||
*
|
||||
* gid
|
||||
*
|
||||
* can be customized via command-line parameters.
|
||||
* ________________________________________________________________________ */
|
||||
int addgroup_main(int argc, char **argv)
|
||||
{
|
||||
int opt;
|
||||
char *group;
|
||||
gid_t gid = 0;
|
||||
|
||||
/* get remaining args */
|
||||
while ((opt = getopt (argc, argv, "g:")) != -1)
|
||||
switch (opt) {
|
||||
case 'g':
|
||||
gid = strtol(optarg, NULL, 10);
|
||||
break;
|
||||
default:
|
||||
show_usage();
|
||||
break;
|
||||
}
|
||||
|
||||
if (optind >= argc) {
|
||||
show_usage();
|
||||
} else {
|
||||
group = argv[optind];
|
||||
}
|
||||
|
||||
if (geteuid() != 0) {
|
||||
error_msg_and_die
|
||||
("Only root may add a group to the system.");
|
||||
}
|
||||
|
||||
/* werk */
|
||||
return addgroup(GROUP_FILE, group, gid);
|
||||
}
|
||||
|
||||
/* $Id: addgroup.c,v 1.1 2002/06/04 20:45:05 sandman Exp $ */
|
352
loginutils/adduser.c
Normal file
352
loginutils/adduser.c
Normal file
@ -0,0 +1,352 @@
|
||||
/* vi: set sw=4 ts=4: */
|
||||
/*
|
||||
* adduser - add users to /etc/passwd and /etc/shadow
|
||||
*
|
||||
* Copyright (C) 1999 by Lineo, inc. and John Beppu
|
||||
* Copyright (C) 1999,2000,2001 by John Beppu <beppu@codepoet.org>
|
||||
*
|
||||
* This program is free software; you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License as published by
|
||||
* the Free Software Foundation; either version 2 of the License, or
|
||||
* (at your option) any later version.
|
||||
*
|
||||
* This program is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
||||
* General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License
|
||||
* along with this program; if not, write to the Free Software
|
||||
* Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
|
||||
*
|
||||
*/
|
||||
|
||||
#include <errno.h>
|
||||
#include <fcntl.h>
|
||||
#include <stdarg.h>
|
||||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
#include <string.h>
|
||||
#include <time.h>
|
||||
#include <unistd.h>
|
||||
#include <sys/param.h>
|
||||
#include <sys/stat.h>
|
||||
#include <sys/types.h>
|
||||
#include "busybox.h"
|
||||
#include "pwd.h"
|
||||
#include "grp.h"
|
||||
|
||||
#define PASSWD_FILE "/etc/passwd"
|
||||
#define SHADOW_FILE "/etc/shadow"
|
||||
|
||||
|
||||
/* structs __________________________ */
|
||||
|
||||
typedef struct {
|
||||
uid_t u;
|
||||
gid_t g;
|
||||
} Id;
|
||||
|
||||
/* data _____________________________ */
|
||||
|
||||
/* defaults : should this be in an external file? */
|
||||
static const char default_passwd[] = "x";
|
||||
static const char default_gecos[] = "Linux User,,,";
|
||||
static const char default_home_prefix[] = "/home";
|
||||
static const char default_shell[] = "/bin/sh";
|
||||
|
||||
#ifdef CONFIG_FEATURE_SHADOWPASSWDS
|
||||
|
||||
#include "shadow.h"
|
||||
|
||||
/* shadow in use? */
|
||||
static int shadow_enabled = 0;
|
||||
#endif
|
||||
|
||||
/* remix */
|
||||
/* EDR recoded such that the uid may be passed in *p */
|
||||
static int passwd_study(const char *filename, struct passwd *p)
|
||||
{
|
||||
struct passwd *pw;
|
||||
FILE *passwd;
|
||||
|
||||
const int min = 500;
|
||||
const int max = 65000;
|
||||
|
||||
passwd = wfopen(filename, "r");
|
||||
if (!passwd)
|
||||
return 4;
|
||||
|
||||
/* EDR if uid is out of bounds, set to min */
|
||||
if ((p->pw_uid > max) || (p->pw_uid < min))
|
||||
p->pw_uid = min;
|
||||
|
||||
/* stuff to do:
|
||||
* make sure login isn't taken;
|
||||
* find free uid and gid;
|
||||
*/
|
||||
while ((pw = fgetpwent(passwd))) {
|
||||
if (strcmp(pw->pw_name, p->pw_name) == 0) {
|
||||
/* return 0; */
|
||||
return 1;
|
||||
}
|
||||
if ((pw->pw_uid >= p->pw_uid) && (pw->pw_uid < max)
|
||||
&& (pw->pw_uid >= min)) {
|
||||
p->pw_uid = pw->pw_uid + 1;
|
||||
}
|
||||
}
|
||||
|
||||
/* EDR check for an already existing gid */
|
||||
while (getgrgid(p->pw_uid) != NULL)
|
||||
p->pw_uid++;
|
||||
|
||||
/* EDR also check for an existing group definition */
|
||||
if (getgrnam(p->pw_name) != NULL)
|
||||
return 3;
|
||||
|
||||
/* EDR bounds check */
|
||||
if ((p->pw_uid > max) || (p->pw_uid < min))
|
||||
return 2;
|
||||
|
||||
/* EDR create new gid always = uid */
|
||||
p->pw_gid = p->pw_uid;
|
||||
|
||||
/* return 1; */
|
||||
return 0;
|
||||
}
|
||||
|
||||
static void addgroup_wrapper(const char *login, gid_t gid)
|
||||
{
|
||||
int argc = 3;
|
||||
const char *argv0_save;
|
||||
char group_id[8];
|
||||
char group_name[32];
|
||||
char *argv[] = { group_name, "-g", group_id };
|
||||
|
||||
argv0_save = applet_name;
|
||||
applet_name = "addgroup";
|
||||
safe_strncpy(group_name, login, 32);
|
||||
sprintf(group_id, "%d", gid);
|
||||
addgroup_main(argc, argv);
|
||||
applet_name = argv0_save;
|
||||
}
|
||||
|
||||
static void passwd_wrapper(const char *login)
|
||||
{
|
||||
static const char prog[] = "passwd";
|
||||
execlp(prog, prog, login, NULL);
|
||||
error_msg_and_die("Failed to execute 'passwd', you must set the password for '%s' manually", login);
|
||||
}
|
||||
|
||||
#ifdef CONFIG_FEATURE_SHADOWPASSWDS
|
||||
/*
|
||||
* pwd_to_spwd - create entries for new spwd structure
|
||||
*
|
||||
* pwd_to_spwd() creates a new (struct spwd) containing the
|
||||
* information in the pointed-to (struct passwd).
|
||||
*/
|
||||
#define DAY (24L*3600L)
|
||||
#define WEEK (7*DAY)
|
||||
#define SCALE DAY
|
||||
static struct spwd *pwd_to_spwd(const struct passwd *pw)
|
||||
{
|
||||
static struct spwd sp;
|
||||
|
||||
/*
|
||||
* Nice, easy parts first. The name and passwd map directly
|
||||
* from the old password structure to the new one.
|
||||
*/
|
||||
sp.sp_namp = pw->pw_name;
|
||||
sp.sp_pwdp = pw->pw_passwd;
|
||||
|
||||
/*
|
||||
* Defaults used if there is no pw_age information.
|
||||
*/
|
||||
sp.sp_min = 0;
|
||||
sp.sp_max = (10000L * DAY) / SCALE;
|
||||
sp.sp_lstchg = time((time_t *) 0) / SCALE;
|
||||
|
||||
/*
|
||||
* These fields have no corresponding information in the password
|
||||
* file. They are set to uninitialized values.
|
||||
*/
|
||||
sp.sp_warn = -1;
|
||||
sp.sp_expire = -1;
|
||||
sp.sp_inact = -1;
|
||||
sp.sp_flag = -1;
|
||||
|
||||
return &sp;
|
||||
}
|
||||
#endif
|
||||
|
||||
/* putpwent(3) remix */
|
||||
static int adduser(const char *filename, struct passwd *p)
|
||||
{
|
||||
FILE *passwd;
|
||||
int r;
|
||||
#ifdef CONFIG_FEATURE_SHADOWPASSWDS
|
||||
FILE *shadow;
|
||||
struct spwd *sp;
|
||||
#endif
|
||||
|
||||
/* make sure everything is kosher and setup uid && gid */
|
||||
passwd = wfopen(filename, "a");
|
||||
if (passwd == NULL) {
|
||||
/* return -1; */
|
||||
return 1;
|
||||
}
|
||||
fseek(passwd, 0, SEEK_END);
|
||||
|
||||
/* if (passwd_study(filename, p) == 0) { */
|
||||
r = passwd_study(filename, p);
|
||||
if (r) {
|
||||
if (r == 1)
|
||||
error_msg("%s: login already in use", p->pw_name);
|
||||
else if (r == 2)
|
||||
error_msg("illegal uid or no uids left");
|
||||
else if (r == 3)
|
||||
error_msg("group name %s already in use", p->pw_name);
|
||||
else
|
||||
error_msg("generic error.");
|
||||
/* return -1; */
|
||||
return 1;
|
||||
}
|
||||
|
||||
/* add to passwd */
|
||||
if (putpwent(p, passwd) == -1) {
|
||||
/* return -1; */
|
||||
return 1;
|
||||
}
|
||||
fclose(passwd);
|
||||
|
||||
#ifdef CONFIG_FEATURE_SHADOWPASSWDS
|
||||
/* add to shadow if necessary */
|
||||
if (shadow_enabled) {
|
||||
shadow = wfopen(SHADOW_FILE, "a");
|
||||
if (shadow == NULL) {
|
||||
/* return -1; */
|
||||
return 1;
|
||||
}
|
||||
fseek(shadow, 0, SEEK_END);
|
||||
sp = pwd_to_spwd(p);
|
||||
sp->sp_max = 99999; /* debianish */
|
||||
sp->sp_warn = 7;
|
||||
fprintf(shadow, "%s:!:%ld:%ld:%ld:%ld:::\n",
|
||||
sp->sp_namp, sp->sp_lstchg, sp->sp_min, sp->sp_max,
|
||||
sp->sp_warn);
|
||||
fclose(shadow);
|
||||
}
|
||||
#endif
|
||||
|
||||
/* add to group */
|
||||
/* addgroup should be responsible for dealing w/ gshadow */
|
||||
addgroup_wrapper(p->pw_name, p->pw_gid);
|
||||
|
||||
/* Clear the umask for this process so it doesn't
|
||||
* * screw up the permissions on the mkdir and chown. */
|
||||
umask(0);
|
||||
|
||||
/* mkdir */
|
||||
if (mkdir(p->pw_dir, 0755)) {
|
||||
perror_msg("%s", p->pw_dir);
|
||||
}
|
||||
/* Set the owner and group so it is owned by the new user. */
|
||||
if (chown(p->pw_dir, p->pw_uid, p->pw_gid)) {
|
||||
perror_msg("%s", p->pw_dir);
|
||||
}
|
||||
/* Now fix up the permissions to 2755. Can't do it before now
|
||||
* since chown will clear the setgid bit */
|
||||
if (chmod(p->pw_dir, 02755)) {
|
||||
perror_msg("%s", p->pw_dir);
|
||||
}
|
||||
/* interactively set passwd */
|
||||
passwd_wrapper(p->pw_name);
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
|
||||
/* return current uid (root is always uid == 0, right?) */
|
||||
static inline uid_t i_am_not_root(void)
|
||||
{
|
||||
return geteuid();
|
||||
}
|
||||
|
||||
/*
|
||||
* adduser will take a login_name as its first parameter.
|
||||
*
|
||||
* home
|
||||
* shell
|
||||
* gecos
|
||||
*
|
||||
* can be customized via command-line parameters.
|
||||
* ________________________________________________________________________ */
|
||||
int adduser_main(int argc, char **argv)
|
||||
{
|
||||
int i = 0;
|
||||
char opt;
|
||||
const char *login;
|
||||
const char *gecos;
|
||||
const char *home = NULL;
|
||||
const char *shell;
|
||||
|
||||
struct passwd pw;
|
||||
|
||||
/* init */
|
||||
if (argc < 2) {
|
||||
show_usage();
|
||||
}
|
||||
gecos = default_gecos;
|
||||
shell = default_shell;
|
||||
|
||||
/* get args */
|
||||
while ((opt = getopt (argc, argv, "h:g:s:")) != -1)
|
||||
switch (opt) {
|
||||
case 'h':
|
||||
home = argv[++i];
|
||||
break;
|
||||
case 'g':
|
||||
gecos = argv[++i];
|
||||
break;
|
||||
case 's':
|
||||
shell = argv[++i];
|
||||
break;
|
||||
default:
|
||||
show_usage ();
|
||||
break;
|
||||
}
|
||||
|
||||
/* got root? */
|
||||
if (i_am_not_root()) {
|
||||
error_msg_and_die( "Only root may add a user or group to the system.");
|
||||
}
|
||||
|
||||
/* get login */
|
||||
if (optind >= argc) {
|
||||
error_msg_and_die( "no user specified");
|
||||
}
|
||||
login = argv[optind];
|
||||
|
||||
/* create string for $HOME if not specified already */
|
||||
if (!home) {
|
||||
home = concat_path_file(default_home_prefix, login);
|
||||
}
|
||||
#ifdef CONFIG_FEATURE_SHADOWPASSWDS
|
||||
/* is /etc/shadow in use? */
|
||||
shadow_enabled = (0 == access(SHADOW_FILE, F_OK));
|
||||
#endif
|
||||
|
||||
/* create a passwd struct */
|
||||
pw.pw_name = (char *)login;
|
||||
pw.pw_passwd = (char *)default_passwd;
|
||||
pw.pw_uid = 0;
|
||||
pw.pw_gid = 0;
|
||||
pw.pw_gecos = (char *)gecos;
|
||||
pw.pw_dir = (char *)home;
|
||||
pw.pw_shell = (char *)shell;
|
||||
|
||||
/* grand finale */
|
||||
return adduser(PASSWD_FILE, &pw);
|
||||
}
|
||||
|
||||
/* $Id: adduser.c,v 1.1 2002/06/04 20:45:05 sandman Exp $ */
|
25
loginutils/config.in
Normal file
25
loginutils/config.in
Normal file
@ -0,0 +1,25 @@
|
||||
#
|
||||
# For a description of the syntax of this configuration file,
|
||||
# see scripts/kbuild/config-language.txt.
|
||||
#
|
||||
|
||||
mainmenu_option next_comment
|
||||
comment 'Login/Password Management Utilities'
|
||||
|
||||
|
||||
bool 'addgroup' CONFIG_ADDGROUP
|
||||
bool 'adduser' CONFIG_ADDUSER
|
||||
bool 'deluser' CONFIG_DELUSER
|
||||
bool 'delgroup' CONFIG_DELUSER
|
||||
bool 'getty' CONFIG_GETTY
|
||||
bool 'login' CONFIG_LOGIN
|
||||
if [ "$CONFIG_LOGIN" = "y" ]; then
|
||||
bool ' Support for /etc/securetty' CONFIG_FEATURE_SECURETTY
|
||||
fi
|
||||
bool 'su' CONFIG_SU
|
||||
if [ "$CONFIG_ADDUSER" = "y" -o "$CONFIG_DELUSER" = "y" -o "$CONFIG_LOGIN" = "y" -o "$CONFIG_SU" = "y" ]; then
|
||||
bool 'Support for shadow passwords' CONFIG_FEATURE_SHADOWPASSWDS
|
||||
fi
|
||||
|
||||
endmenu
|
||||
|
183
loginutils/deluser.c
Normal file
183
loginutils/deluser.c
Normal file
@ -0,0 +1,183 @@
|
||||
/* vi: set sw=4 ts=4: */
|
||||
/*
|
||||
* deluser (remove lusers from the system ;) for TinyLogin
|
||||
*
|
||||
* Copyright (C) 1999 by Lineo, inc. and John Beppu
|
||||
* Copyright (C) 1999,2000,2001 by John Beppu <beppu@codepoet.org>
|
||||
*
|
||||
* This program is free software; you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License as published by
|
||||
* the Free Software Foundation; either version 2 of the License, or
|
||||
* (at your option) any later version.
|
||||
*
|
||||
* This program is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
||||
* General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License
|
||||
* along with this program; if not, write to the Free Software
|
||||
* Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
|
||||
*
|
||||
*/
|
||||
|
||||
#include <sys/stat.h>
|
||||
#include <unistd.h>
|
||||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
#include <string.h>
|
||||
#include "busybox.h"
|
||||
|
||||
#define PASSWD_FILE "/etc/passwd"
|
||||
#define GROUP_FILE "/etc/group"
|
||||
#define SHADOW_FILE "/etc/shadow"
|
||||
#define GSHADOW_FILE "/etc/gshadow"
|
||||
|
||||
|
||||
/* where to start and stop deletion */
|
||||
typedef struct {
|
||||
size_t start;
|
||||
size_t stop;
|
||||
} Bounds;
|
||||
|
||||
/* An interesting side-effect of boundary()'s
|
||||
* implementation is that the first user (typically root)
|
||||
* cannot be removed. Let's call it a feature. */
|
||||
static inline Bounds boundary(const char *buffer, const char *login)
|
||||
{
|
||||
char needle[256];
|
||||
char *start;
|
||||
char *stop;
|
||||
Bounds b;
|
||||
|
||||
snprintf(needle, 256, "\n%s:", login);
|
||||
needle[255] = 0;
|
||||
start = strstr(buffer, needle);
|
||||
if (!start) {
|
||||
b.start = 0;
|
||||
b.stop = 0;
|
||||
return b;
|
||||
}
|
||||
start++;
|
||||
|
||||
stop = index(start, '\n'); /* index is a BSD-ism */
|
||||
b.start = start - buffer;
|
||||
b.stop = stop - buffer;
|
||||
return b;
|
||||
}
|
||||
|
||||
/* grep -v ^login (except it only deletes the first match) */
|
||||
/* ...in fact, I think I'm going to simplify this later */
|
||||
static int del_line_matching(const char *login, const char *filename)
|
||||
{
|
||||
char *buffer;
|
||||
FILE *passwd;
|
||||
size_t len;
|
||||
Bounds b;
|
||||
struct stat statbuf;
|
||||
|
||||
/* load into buffer */
|
||||
passwd = fopen(filename, "r");
|
||||
if (!passwd) {
|
||||
return 1;
|
||||
}
|
||||
stat(filename, &statbuf);
|
||||
len = statbuf.st_size;
|
||||
buffer = (char *) malloc(len * sizeof(char));
|
||||
|
||||
if (!buffer) {
|
||||
fclose(passwd);
|
||||
return 1;
|
||||
}
|
||||
fread(buffer, len, sizeof(char), passwd);
|
||||
|
||||
fclose(passwd);
|
||||
|
||||
/* find the user to remove */
|
||||
b = boundary(buffer, login);
|
||||
if (b.stop == 0) {
|
||||
free(buffer);
|
||||
return 1;
|
||||
}
|
||||
|
||||
/* write the file w/o the user */
|
||||
passwd = fopen(filename, "w");
|
||||
if (!passwd) {
|
||||
return 1;
|
||||
}
|
||||
fwrite(buffer, (b.start - 1), sizeof(char), passwd);
|
||||
fwrite(&buffer[b.stop], (len - b.stop), sizeof(char), passwd);
|
||||
|
||||
fclose(passwd);
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
/* ________________________________________________________________________ */
|
||||
int delgroup_main(int argc, char **argv)
|
||||
{
|
||||
/* int successful; */
|
||||
int failure;
|
||||
|
||||
if (argc != 2) {
|
||||
show_usage();
|
||||
} else {
|
||||
|
||||
failure = del_line_matching(argv[1], GROUP_FILE);
|
||||
#ifdef CONFIG_FEATURE_SHADOWPASSWDS
|
||||
if (access(GSHADOW_FILE, W_OK) == 0) {
|
||||
/* EDR the |= works if the error is not 0, so he had it wrong */
|
||||
failure |= del_line_matching(argv[1], GSHADOW_FILE);
|
||||
}
|
||||
#endif /* CONFIG_FEATURE_SHADOWPASSWDS */
|
||||
/* if (!successful) { */
|
||||
if (failure) {
|
||||
error_msg_and_die("%s: Group could not be removed\n", argv[1]);
|
||||
}
|
||||
|
||||
}
|
||||
return (EXIT_SUCCESS);
|
||||
}
|
||||
|
||||
/* ________________________________________________________________________ */
|
||||
int deluser_main(int argc, char **argv)
|
||||
{
|
||||
/* int successful; */
|
||||
int failure;
|
||||
|
||||
if (argc != 2) {
|
||||
show_usage();
|
||||
} else {
|
||||
|
||||
failure = del_line_matching(argv[1], PASSWD_FILE);
|
||||
/* if (!successful) { */
|
||||
if (failure) {
|
||||
error_msg_and_die("%s: User could not be removed from %s\n",
|
||||
argv[1], PASSWD_FILE);
|
||||
}
|
||||
#ifdef CONFIG_FEATURE_SHADOWPASSWDS
|
||||
failure = del_line_matching(argv[1], SHADOW_FILE);
|
||||
/* if (!successful) { */
|
||||
if (failure) {
|
||||
error_msg_and_die("%s: User could not be removed from %s\n",
|
||||
argv[1], SHADOW_FILE);
|
||||
}
|
||||
failure = del_line_matching(argv[1], GSHADOW_FILE);
|
||||
/* if (!successful) { */
|
||||
if (failure) {
|
||||
error_msg_and_die("%s: User could not be removed from %s\n",
|
||||
argv[1], GSHADOW_FILE);
|
||||
}
|
||||
#endif /* CONFIG_FEATURE_SHADOWPASSWDS */
|
||||
failure = del_line_matching(argv[1], GROUP_FILE);
|
||||
/* if (!successful) { */
|
||||
if (failure) {
|
||||
error_msg_and_die("%s: User could not be removed from %s\n",
|
||||
argv[1], GROUP_FILE);
|
||||
}
|
||||
|
||||
}
|
||||
return (EXIT_SUCCESS);
|
||||
}
|
||||
|
||||
/* $Id: deluser.c,v 1.1 2002/06/04 20:45:05 sandman Exp $ */
|
1157
loginutils/getty.c
Normal file
1157
loginutils/getty.c
Normal file
File diff suppressed because it is too large
Load Diff
459
loginutils/login.c
Normal file
459
loginutils/login.c
Normal file
@ -0,0 +1,459 @@
|
||||
/* vi: set sw=4 ts=4: */
|
||||
#include <fcntl.h>
|
||||
#include <signal.h>
|
||||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
#include <string.h>
|
||||
#include <syslog.h>
|
||||
#include <termios.h>
|
||||
#include <unistd.h>
|
||||
#include <utmp.h>
|
||||
#include <sys/resource.h>
|
||||
#include <sys/stat.h>
|
||||
#include <sys/time.h>
|
||||
#include <sys/types.h>
|
||||
#include <ctype.h>
|
||||
#include <time.h>
|
||||
#include "busybox.h"
|
||||
|
||||
#include "pwd.h"
|
||||
#include "grp.h"
|
||||
|
||||
#ifdef CONFIG_FEATURE_SHADOWPASSWDS
|
||||
#include "shadow.h"
|
||||
#endif
|
||||
|
||||
#include "tinylogin.h"
|
||||
|
||||
// import from utmp.c
|
||||
static void checkutmp(int picky);
|
||||
static void setutmp(const char *name, const char *line);
|
||||
|
||||
// import from encrypt.c
|
||||
extern char *pw_encrypt(const char *clear, const char *salt);
|
||||
|
||||
|
||||
// login defines
|
||||
#define DEFAULT_USER "UNKNOWN"
|
||||
#define DEFAULT_PWD "!"
|
||||
#define DEFAULT_SHELL "/bin/sh"
|
||||
#define TIMEOUT 60
|
||||
#define FAIL_DELAY 3
|
||||
#define MOTD_FILE "/etc/motd"
|
||||
#define NOLOGIN_FILE "/etc/nologin"
|
||||
#define SECURETTY_FILE "/etc/securetty"
|
||||
|
||||
/* Stuff global to this file */
|
||||
struct utmp utent;
|
||||
|
||||
|
||||
static int check_nologin ( int amroot );
|
||||
|
||||
#if defined CONFIG_FEATURE_SECURETTY
|
||||
static int check_tty ( const char *tty );
|
||||
|
||||
#else
|
||||
static inline int check_tty ( const char *tty ) { return 1; }
|
||||
|
||||
#endif
|
||||
|
||||
static int is_my_tty ( const char *tty );
|
||||
static const char *login_prompt ( void );
|
||||
static void motd ( void );
|
||||
static void set_env(int argc, char *const *argv);
|
||||
|
||||
|
||||
static void alarm_handler ( int sig )
|
||||
{
|
||||
error_msg ( "\nLogin timed out after %d seconds.\n", TIMEOUT );
|
||||
exit ( EXIT_SUCCESS );
|
||||
}
|
||||
|
||||
|
||||
extern int login_main(int argc, char **argv)
|
||||
{
|
||||
char tty[BUFSIZ];
|
||||
char full_tty[200];
|
||||
char fromhost[512];
|
||||
char *tmp;
|
||||
int amroot;
|
||||
int flag;
|
||||
int failed;
|
||||
int count=0;
|
||||
struct passwd *pw, pw_copy;
|
||||
|
||||
int opt_preserve = 0;
|
||||
int opt_fflag = 0;
|
||||
char *opt_host = 0;
|
||||
const char *username = 0;
|
||||
int alarmstarted = 0;
|
||||
|
||||
amroot = ( getuid ( ) == 0 );
|
||||
signal ( SIGALRM, alarm_handler );
|
||||
|
||||
if (( argc > 1 ) && ( TIMEOUT > 0 )) {
|
||||
alarm ( TIMEOUT );
|
||||
alarmstarted = 1;
|
||||
}
|
||||
|
||||
while (( flag = getopt(argc, argv, "f:h:p")) != EOF ) {
|
||||
switch ( flag ) {
|
||||
case 'p':
|
||||
printf ( "PRESERVE\n" );
|
||||
opt_preserve = 1;
|
||||
break;
|
||||
case 'f':
|
||||
/*
|
||||
* username must be a seperate token
|
||||
* (-f root, *NOT* -froot). --marekm
|
||||
*/
|
||||
if ( optarg != argv[optind-1] )
|
||||
show_usage ( );
|
||||
|
||||
if ( !amroot ) /* Auth bypass only if real UID is zero */
|
||||
error_msg_and_die ( "login: -f permission denied\n" );
|
||||
|
||||
printf ( "USERNAME: %s\n", optarg );
|
||||
|
||||
username = optarg;
|
||||
opt_fflag = 1;
|
||||
break;
|
||||
case 'h':
|
||||
opt_host = optarg;
|
||||
break;
|
||||
default:
|
||||
show_usage ( );
|
||||
}
|
||||
}
|
||||
|
||||
if ( optind < argc ) // got a username
|
||||
username = argv [optind++];
|
||||
|
||||
if ( !isatty ( 0 ) || !isatty ( 1 ) || !isatty ( 2 ))
|
||||
return EXIT_FAILURE; /* Must be a terminal */
|
||||
|
||||
checkutmp ( !amroot );
|
||||
|
||||
tmp = ttyname ( 0 );
|
||||
if ( tmp && ( strncmp ( tmp, "/dev/", 5 ) == 0 ))
|
||||
safe_strncpy ( tty, tmp + 5, sizeof( tty ));
|
||||
else
|
||||
safe_strncpy ( tty, "UNKNOWN", sizeof( tty ));
|
||||
|
||||
if ( amroot )
|
||||
memset ( utent.ut_host, 0, sizeof utent.ut_host );
|
||||
|
||||
if ( opt_host ) {
|
||||
safe_strncpy ( utent.ut_host, opt_host, sizeof( utent. ut_host ));
|
||||
|
||||
snprintf ( fromhost, sizeof( fromhost ) - 1, " on `%.100s' from `%.200s'", tty, opt_host );
|
||||
}
|
||||
else
|
||||
snprintf ( fromhost, sizeof( fromhost ) - 1, " on `%.100s'", tty );
|
||||
|
||||
openlog ( "login", LOG_PID | LOG_CONS | LOG_NOWAIT, LOG_AUTH );
|
||||
|
||||
while ( 1 ) {
|
||||
failed = 0;
|
||||
|
||||
if ( !username || !username[0] )
|
||||
username = login_prompt ( );
|
||||
|
||||
if ( !alarmstarted && ( TIMEOUT > 0 )) {
|
||||
alarm ( TIMEOUT );
|
||||
alarmstarted = 1;
|
||||
}
|
||||
|
||||
if (!( pw = getpwnam ( username ))) {
|
||||
pw_copy. pw_name = DEFAULT_USER;
|
||||
pw_copy. pw_passwd = DEFAULT_PWD;
|
||||
pw_copy. pw_shell = DEFAULT_SHELL;
|
||||
opt_fflag = 0;
|
||||
failed = 1;
|
||||
} else
|
||||
pw_copy = *pw;
|
||||
|
||||
pw = &pw_copy;
|
||||
|
||||
if (( pw-> pw_passwd [0] == '!' ) || ( pw-> pw_passwd[0] == '*' ))
|
||||
failed = 1;
|
||||
|
||||
if ( opt_fflag ) {
|
||||
opt_fflag = 0;
|
||||
goto auth_ok;
|
||||
}
|
||||
|
||||
if (( pw-> pw_uid == 0 ) && ( !check_tty ( tty )))
|
||||
failed = 1;
|
||||
|
||||
/* Don't check the password if password entry is empty (!) */
|
||||
if ( !pw-> pw_passwd[0] )
|
||||
goto auth_ok;
|
||||
|
||||
/* authorization takes place here */
|
||||
if ( correct_password ( pw ))
|
||||
goto auth_ok;
|
||||
|
||||
syslog ( LOG_WARNING, "invalid password for `%s'%s\n", pw-> pw_name, fromhost);
|
||||
failed = 1;
|
||||
|
||||
auth_ok:
|
||||
if ( !failed)
|
||||
break;
|
||||
|
||||
{ // delay next try
|
||||
time_t start, now;
|
||||
|
||||
time ( &start );
|
||||
now = start;
|
||||
while ( difftime ( now, start ) < FAIL_DELAY) {
|
||||
sleep ( FAIL_DELAY );
|
||||
time ( &now );
|
||||
}
|
||||
}
|
||||
|
||||
puts("Login incorrect");
|
||||
if ( ++count == 3 )
|
||||
return EXIT_FAILURE;
|
||||
}
|
||||
|
||||
alarm ( 0 );
|
||||
if ( check_nologin ( pw-> pw_uid == 0 ))
|
||||
return EXIT_FAILURE;
|
||||
|
||||
setutmp ( username, tty );
|
||||
if ( *tty != '/' )
|
||||
snprintf ( full_tty, sizeof( full_tty ) - 1, "/dev/%s", tty);
|
||||
else
|
||||
safe_strncpy ( full_tty, tty, sizeof( full_tty ) - 1 );
|
||||
|
||||
if ( !is_my_tty ( full_tty ))
|
||||
syslog ( LOG_ERR, "unable to determine TTY name, got %s\n", full_tty );
|
||||
|
||||
/* Try these, but don't complain if they fail
|
||||
* (for example when the root fs is read only) */
|
||||
chown ( full_tty, pw-> pw_uid, pw-> pw_gid );
|
||||
chmod ( full_tty, 0600 );
|
||||
|
||||
change_identity ( pw );
|
||||
setup_environment ( pw-> pw_shell, 1, !opt_preserve, pw );
|
||||
|
||||
motd ( );
|
||||
signal ( SIGALRM, SIG_DFL ); /* default alarm signal */
|
||||
|
||||
if ( pw-> pw_uid == 0 )
|
||||
syslog ( LOG_INFO, "root login %s\n", fromhost );
|
||||
|
||||
run_shell ( pw-> pw_shell, 1, 0, 0 ); /* exec the shell finally. */
|
||||
|
||||
return EXIT_FAILURE;
|
||||
}
|
||||
|
||||
|
||||
|
||||
static const char *login_prompt ( void )
|
||||
{
|
||||
char buf [1024];
|
||||
char *sp, *ep;
|
||||
|
||||
gethostname ( buf, sizeof( buf ));
|
||||
printf ( "\nBusyBox on %s login: ", buf );
|
||||
fflush ( stdout );
|
||||
|
||||
if ( !fgets ( buf, sizeof( buf ) - 1, stdin ))
|
||||
return 0;
|
||||
|
||||
if ( !strchr ( buf, '\n' ));
|
||||
return 0;
|
||||
|
||||
for ( sp = buf; isspace ( *sp ); sp++ ) { }
|
||||
for ( ep = sp; isgraph ( *ep ); ep++ ) { }
|
||||
|
||||
*ep = 0;
|
||||
return sp;
|
||||
}
|
||||
|
||||
|
||||
static int check_nologin ( int amroot )
|
||||
{
|
||||
if ( access ( NOLOGIN_FILE, F_OK ) == 0 ) {
|
||||
FILE *fp;
|
||||
int c;
|
||||
|
||||
if (( fp = fopen ( NOLOGIN_FILE, "r" ))) {
|
||||
while (( c = getc ( fp )) != EOF )
|
||||
putchar (( c == '\n' ) ? '\r' : c );
|
||||
|
||||
fflush ( stdout );
|
||||
fclose ( fp );
|
||||
} else {
|
||||
puts ( "\r\nSystem closed for routine maintenance.\r" );
|
||||
}
|
||||
if ( !amroot )
|
||||
return 1;
|
||||
|
||||
puts ( "\r\n[Disconnect bypassed -- root login allowed.]\r" );
|
||||
}
|
||||
return 0;
|
||||
}
|
||||
|
||||
#ifdef CONFIG_FEATURE_SECURETTY
|
||||
|
||||
static int check_tty ( const char *tty )
|
||||
{
|
||||
FILE *fp;
|
||||
int i;
|
||||
char buf[BUFSIZ];
|
||||
|
||||
if (( fp = fopen ( SECURETTY_FILE, "r" ))) {
|
||||
while ( fgets ( buf, sizeof( buf ) - 1, fp )) {
|
||||
for ( i = xstrlen( buf ) - 1; i >= 0; --i ) {
|
||||
if ( !isspace ( buf[i] ))
|
||||
break;
|
||||
}
|
||||
buf[++i] = '\0';
|
||||
if (( buf [0] == '\0' ) || ( buf [0] == '#' ))
|
||||
continue;
|
||||
|
||||
if ( strcmp ( buf, tty ) == 0 ) {
|
||||
fclose ( fp );
|
||||
return 1;
|
||||
}
|
||||
}
|
||||
fclose(fp);
|
||||
return 0;
|
||||
}
|
||||
else {
|
||||
syslog ( LOG_WARNING, "cannot open securetty file.\n" );
|
||||
return 1;
|
||||
}
|
||||
}
|
||||
|
||||
#endif
|
||||
|
||||
/* returns 1 if true */
|
||||
static int is_my_tty ( const char *tty )
|
||||
{
|
||||
struct stat by_name, by_fd;
|
||||
|
||||
if ( stat ( tty, &by_name ) || fstat ( 0, &by_fd ))
|
||||
return 0;
|
||||
|
||||
if ( by_name. st_rdev != by_fd. st_rdev )
|
||||
return 0;
|
||||
else
|
||||
return 1;
|
||||
}
|
||||
|
||||
|
||||
static void motd ( )
|
||||
{
|
||||
FILE *fp;
|
||||
register int c;
|
||||
|
||||
if (( fp = fopen ( MOTD_FILE, "r" ))) {
|
||||
while (( c = getc ( fp )) != EOF )
|
||||
putchar ( c );
|
||||
fclose ( fp );
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
// vv Taken from tinylogin utmp.c vv
|
||||
|
||||
#define _WTMP_FILE "/var/log/wtmp"
|
||||
|
||||
#define NO_UTENT \
|
||||
"No utmp entry. You must exec \"login\" from the lowest level \"sh\""
|
||||
#define NO_TTY \
|
||||
"Unable to determine your tty name."
|
||||
|
||||
/*
|
||||
* checkutmp - see if utmp file is correct for this process
|
||||
*
|
||||
* System V is very picky about the contents of the utmp file
|
||||
* and requires that a slot for the current process exist.
|
||||
* The utmp file is scanned for an entry with the same process
|
||||
* ID. If no entry exists the process exits with a message.
|
||||
*
|
||||
* The "picky" flag is for network and other logins that may
|
||||
* use special flags. It allows the pid checks to be overridden.
|
||||
* This means that getty should never invoke login with any
|
||||
* command line flags.
|
||||
*/
|
||||
|
||||
static void checkutmp(int picky)
|
||||
{
|
||||
char *line;
|
||||
struct utmp *ut;
|
||||
pid_t pid = getpid();
|
||||
|
||||
setutent();
|
||||
|
||||
/* First, try to find a valid utmp entry for this process. */
|
||||
while ((ut = getutent()))
|
||||
if (ut->ut_pid == pid && ut->ut_line[0] && ut->ut_id[0] &&
|
||||
(ut->ut_type == LOGIN_PROCESS || ut->ut_type == USER_PROCESS))
|
||||
break;
|
||||
|
||||
/* If there is one, just use it, otherwise create a new one. */
|
||||
if (ut) {
|
||||
utent = *ut;
|
||||
} else {
|
||||
if (picky) {
|
||||
puts(NO_UTENT);
|
||||
exit(1);
|
||||
}
|
||||
line = ttyname(0);
|
||||
if (!line) {
|
||||
puts(NO_TTY);
|
||||
exit(1);
|
||||
}
|
||||
if (strncmp(line, "/dev/", 5) == 0)
|
||||
line += 5;
|
||||
memset((void *) &utent, 0, sizeof utent);
|
||||
utent.ut_type = LOGIN_PROCESS;
|
||||
utent.ut_pid = pid;
|
||||
strncpy(utent.ut_line, line, sizeof utent.ut_line);
|
||||
/* XXX - assumes /dev/tty?? */
|
||||
strncpy(utent.ut_id, utent.ut_line + 3, sizeof utent.ut_id);
|
||||
strncpy(utent.ut_user, "LOGIN", sizeof utent.ut_user);
|
||||
time(&utent.ut_time);
|
||||
}
|
||||
}
|
||||
|
||||
#if __GNU_LIBRARY__ < 5
|
||||
/*
|
||||
* Some systems already have updwtmp() and possibly updwtmpx(). Others
|
||||
* don't, so we re-implement these functions if necessary. --marekm
|
||||
*/
|
||||
static void updwtmp(const char *filename, const struct utmp *ut)
|
||||
{
|
||||
int fd;
|
||||
|
||||
fd = open(filename, O_APPEND | O_WRONLY, 0);
|
||||
if (fd >= 0) {
|
||||
write(fd, (const char *) ut, sizeof(*ut));
|
||||
close(fd);
|
||||
}
|
||||
}
|
||||
#endif
|
||||
|
||||
/*
|
||||
* setutmp - put a USER_PROCESS entry in the utmp file
|
||||
*
|
||||
* setutmp changes the type of the current utmp entry to
|
||||
* USER_PROCESS. the wtmp file will be updated as well.
|
||||
*/
|
||||
|
||||
static void setutmp(const char *name, const char *line)
|
||||
{
|
||||
utent.ut_type = USER_PROCESS;
|
||||
strncpy(utent.ut_user, name, sizeof utent.ut_user);
|
||||
time(&utent.ut_time);
|
||||
/* other fields already filled in by checkutmp above */
|
||||
setutent();
|
||||
pututline(&utent);
|
||||
endutent();
|
||||
updwtmp(_WTMP_FILE, &utent);
|
||||
}
|
167
loginutils/su.c
Normal file
167
loginutils/su.c
Normal file
@ -0,0 +1,167 @@
|
||||
/* vi: set sw=4 ts=4: */
|
||||
|
||||
#include "busybox.h"
|
||||
|
||||
#include <fcntl.h>
|
||||
#include <signal.h>
|
||||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
#include <string.h>
|
||||
#include <syslog.h>
|
||||
#include <termios.h>
|
||||
#include <unistd.h>
|
||||
#include <utmp.h>
|
||||
#include <sys/resource.h>
|
||||
#include <sys/stat.h>
|
||||
#include <sys/time.h>
|
||||
#include <sys/types.h>
|
||||
#include <ctype.h>
|
||||
#include <time.h>
|
||||
|
||||
#include "pwd.h"
|
||||
#include "grp.h"
|
||||
|
||||
#include "tinylogin.h"
|
||||
|
||||
|
||||
|
||||
/* The shell to run if none is given in the user's passwd entry. */
|
||||
#define DEFAULT_SHELL "/bin/sh"
|
||||
#define DEFAULT_USER "root"
|
||||
|
||||
//#define SYSLOG_SUCCESS
|
||||
#define SYSLOG_FAILURE
|
||||
|
||||
|
||||
#if defined( SYSLOG_SUCCESS ) || defined( SYSLOG_FAILURE )
|
||||
/* Log the fact that someone has run su to the user given by PW;
|
||||
if SUCCESSFUL is nonzero, they gave the correct password, etc. */
|
||||
|
||||
static void log_su ( const struct passwd *pw, int successful )
|
||||
{
|
||||
const char *old_user, *tty;
|
||||
|
||||
#if !defined( SYSLOG_SUCESS )
|
||||
if ( successful )
|
||||
return;
|
||||
#endif
|
||||
#if !defined( SYSLOG_FAILURE )
|
||||
if ( !successful )
|
||||
return;
|
||||
#endif
|
||||
|
||||
if ( pw-> pw_uid ) // not to root -> ignored
|
||||
return;
|
||||
|
||||
/* The utmp entry (via getlogin) is probably the best way to identify
|
||||
the user, especially if someone su's from a su-shell. */
|
||||
old_user = getlogin ( );
|
||||
if ( !old_user ) {
|
||||
/* getlogin can fail -- usually due to lack of utmp entry. Resort to getpwuid. */
|
||||
struct passwd *pwd = getpwuid ( getuid ( ));
|
||||
old_user = ( pwd ? pwd-> pw_name : "" );
|
||||
}
|
||||
|
||||
tty = ttyname ( 2 );
|
||||
|
||||
openlog ( "su", 0, LOG_AUTH );
|
||||
syslog ( LOG_NOTICE, "%s%s on %s", successful ? "" : "FAILED SU ", old_user, tty ? tty : "none" );
|
||||
}
|
||||
#endif
|
||||
|
||||
|
||||
|
||||
int su_main ( int argc, char **argv )
|
||||
{
|
||||
int flag;
|
||||
int opt_preserve = 0;
|
||||
int opt_loginshell = 0;
|
||||
char *opt_shell = 0;
|
||||
char *opt_command = 0;
|
||||
char *opt_username = DEFAULT_USER;
|
||||
char **opt_args = 0;
|
||||
struct passwd *pw, pw_copy;
|
||||
|
||||
|
||||
while (( flag = getopt ( argc, argv, "c:lmps:" )) != -1 ) {
|
||||
switch ( flag ) {
|
||||
case 'c':
|
||||
opt_command = optarg;
|
||||
break;
|
||||
case 'm':
|
||||
case 'p':
|
||||
opt_preserve = 1;
|
||||
break;
|
||||
case 's':
|
||||
opt_shell = optarg;
|
||||
break;
|
||||
case 'l':
|
||||
opt_loginshell = 1;
|
||||
break;
|
||||
default:
|
||||
show_usage ( );
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
if (( optind < argc ) && ( argv [optind][0] == '-' ) && ( argv [optind][1] == 0 )) {
|
||||
opt_loginshell = 1;
|
||||
++optind;
|
||||
}
|
||||
|
||||
/* get user if specified */
|
||||
if ( optind < argc )
|
||||
opt_username = argv [optind++];
|
||||
|
||||
if ( optind < argc )
|
||||
opt_args = argv + optind;
|
||||
|
||||
|
||||
pw = getpwnam ( opt_username );
|
||||
if ( !pw )
|
||||
error_msg_and_die ( "user %s does not exist", opt_username );
|
||||
|
||||
/* Make sure pw->pw_shell is non-NULL. It may be NULL when NEW_USER
|
||||
is a username that is retrieved via NIS (YP), but that doesn't have
|
||||
a default shell listed. */
|
||||
if ( !pw-> pw_shell || !pw->pw_shell [0] )
|
||||
pw-> pw_shell = (char *) DEFAULT_SHELL;
|
||||
|
||||
/* Make a copy of the password information and point pw at the local
|
||||
copy instead. Otherwise, some systems (e.g. Linux) would clobber
|
||||
the static data through the getlogin call from log_su. */
|
||||
pw_copy = *pw;
|
||||
pw = &pw_copy;
|
||||
pw-> pw_name = xstrdup ( pw-> pw_name );
|
||||
pw-> pw_dir = xstrdup ( pw-> pw_dir );
|
||||
pw-> pw_shell = xstrdup ( pw-> pw_shell );
|
||||
|
||||
if (( getuid ( ) == 0 ) || correct_password ( pw ))
|
||||
log_su ( pw, 1 );
|
||||
else {
|
||||
log_su ( pw, 0 );
|
||||
error_msg_and_die ( "incorrect password" );
|
||||
}
|
||||
|
||||
if ( !opt_shell && opt_preserve )
|
||||
opt_shell = getenv ( "SHELL" );
|
||||
|
||||
if ( opt_shell && getuid ( ) && restricted_shell ( pw-> pw_shell ))
|
||||
{
|
||||
/* The user being su'd to has a nonstandard shell, and so is
|
||||
probably a uucp account or has restricted access. Don't
|
||||
compromise the account by allowing access with a standard
|
||||
shell. */
|
||||
fputs ( "using restricted shell\n", stderr );
|
||||
opt_shell = 0;
|
||||
}
|
||||
|
||||
if ( !opt_shell )
|
||||
opt_shell = xstrdup ( pw-> pw_shell );
|
||||
|
||||
change_identity ( pw );
|
||||
setup_environment ( opt_shell, opt_loginshell, !opt_preserve, pw );
|
||||
run_shell ( opt_shell, opt_loginshell, opt_command, opt_args );
|
||||
|
||||
return EXIT_FAILURE;
|
||||
}
|
209
loginutils/tinylogin.c
Normal file
209
loginutils/tinylogin.c
Normal file
@ -0,0 +1,209 @@
|
||||
/* vi: set sw=4 ts=4: */
|
||||
/*
|
||||
* Copyright 1989 - 1991, Julianne Frances Haugh <jockgrrl@austin.rr.com>
|
||||
* All rights reserved.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
* are met:
|
||||
* 1. Redistributions of source code must retain the above copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in the
|
||||
* documentation and/or other materials provided with the distribution.
|
||||
* 3. Neither the name of Julianne F. Haugh nor the names of its contributors
|
||||
* may be used to endorse or promote products derived from this software
|
||||
* without specific prior written permission.
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
|
||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
* ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
|
||||
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
* SUCH DAMAGE.
|
||||
*/
|
||||
|
||||
#include "busybox.h"
|
||||
|
||||
#include <stdio.h>
|
||||
#include <errno.h>
|
||||
#include <unistd.h>
|
||||
#include <string.h>
|
||||
#include <stdlib.h>
|
||||
#include <syslog.h>
|
||||
#include <ctype.h>
|
||||
|
||||
#include "pwd.h"
|
||||
#include "grp.h"
|
||||
|
||||
#ifdef CONFIG_FEATURE_SHADOWPASSWDS
|
||||
#include "shadow.h"
|
||||
#endif
|
||||
|
||||
#define DEFAULT_LOGIN_PATH "/bin:/usr/bin"
|
||||
#define DEFAULT_ROOT_LOGIN_PATH "/usr/sbin:/bin:/usr/bin:/sbin"
|
||||
|
||||
|
||||
static void xsetenv ( const char *key, const char *value )
|
||||
{
|
||||
if ( setenv ( key, value, 1 ))
|
||||
error_msg_and_die ( "out of memory" );
|
||||
}
|
||||
|
||||
/* Become the user and group(s) specified by PW. */
|
||||
|
||||
void change_identity ( const struct passwd *pw )
|
||||
{
|
||||
if ( initgroups ( pw-> pw_name, pw-> pw_gid ) == -1 )
|
||||
perror_msg_and_die ( "cannot set groups" );
|
||||
endgrent ( );
|
||||
|
||||
if ( setgid ( pw-> pw_gid ))
|
||||
perror_msg_and_die ( "cannot set group id" );
|
||||
if ( setuid ( pw->pw_uid ))
|
||||
perror_msg_and_die ( "cannot set user id" );
|
||||
}
|
||||
|
||||
/* Run SHELL, or DEFAULT_SHELL if SHELL is empty.
|
||||
If COMMAND is nonzero, pass it to the shell with the -c option.
|
||||
If ADDITIONAL_ARGS is nonzero, pass it to the shell as more
|
||||
arguments. */
|
||||
|
||||
void run_shell ( const char *shell, int loginshell, const char *command, const char **additional_args )
|
||||
{
|
||||
const char **args;
|
||||
int argno = 1;
|
||||
int additional_args_cnt = 0;
|
||||
|
||||
for ( args = additional_args; args && *args; args++ )
|
||||
additional_args_cnt++;
|
||||
|
||||
if ( additional_args )
|
||||
args = (const char **) xmalloc (sizeof (char *) * ( 4 + additional_args_cnt ));
|
||||
else
|
||||
args = (const char **) xmalloc (sizeof (char *) * 4 );
|
||||
|
||||
args [0] = get_last_path_component ( xstrdup ( shell ));
|
||||
|
||||
if ( loginshell ) {
|
||||
char *args0 = xmalloc ( xstrlen ( args [0] ) + 2 );
|
||||
args0 [0] = '-';
|
||||
strcpy ( args0 + 1, args [0] );
|
||||
args [0] = args0;
|
||||
}
|
||||
|
||||
if ( command ) {
|
||||
args [argno++] = "-c";
|
||||
args [argno++] = command;
|
||||
}
|
||||
if ( additional_args ) {
|
||||
for ( ; *additional_args; ++additional_args )
|
||||
args [argno++] = *additional_args;
|
||||
}
|
||||
args [argno] = 0;
|
||||
execv ( shell, (char **) args );
|
||||
perror_msg_and_die ( "cannot run %s", shell );
|
||||
}
|
||||
|
||||
/* Return 1 if SHELL is a restricted shell (one not returned by
|
||||
getusershell), else 0, meaning it is a standard shell. */
|
||||
|
||||
int restricted_shell ( const char *shell )
|
||||
{
|
||||
char *line;
|
||||
|
||||
setusershell ( );
|
||||
while (( line = getusershell ( ))) {
|
||||
if (( *line != '#' ) && ( strcmp ( line, shell ) == 0 ))
|
||||
break;
|
||||
}
|
||||
endusershell ( );
|
||||
return line ? 0 : 1;
|
||||
}
|
||||
|
||||
/* Update `environ' for the new shell based on PW, with SHELL being
|
||||
the value for the SHELL environment variable. */
|
||||
|
||||
void setup_environment ( const char *shell, int loginshell, int changeenv, const struct passwd *pw )
|
||||
{
|
||||
if ( loginshell ) {
|
||||
char *term;
|
||||
|
||||
/* Change the current working directory to be the home directory
|
||||
* of the user. It is a fatal error for this process to be unable
|
||||
* to change to that directory. There is no "default" home
|
||||
* directory.
|
||||
* Some systems default to HOME=/
|
||||
*/
|
||||
if ( chdir ( pw-> pw_dir )) {
|
||||
if ( chdir ( "/" )) {
|
||||
syslog ( LOG_WARNING, "unable to cd to %s' for user %s'\n", pw-> pw_dir, pw-> pw_name );
|
||||
error_msg_and_die ( "cannot cd to home directory or /" );
|
||||
}
|
||||
fputs ( "warning: cannot change to home directory\n", stderr );
|
||||
}
|
||||
|
||||
/* Leave TERM unchanged. Set HOME, SHELL, USER, LOGNAME, PATH.
|
||||
Unset all other environment variables. */
|
||||
term = getenv ("TERM");
|
||||
clearenv ( );
|
||||
if ( term )
|
||||
xsetenv ( "TERM", term );
|
||||
xsetenv ( "HOME", pw-> pw_dir );
|
||||
xsetenv ( "SHELL", shell );
|
||||
xsetenv ( "USER", pw-> pw_name );
|
||||
xsetenv ( "LOGNAME", pw-> pw_name );
|
||||
xsetenv ( "PATH", ( pw-> pw_uid ? DEFAULT_LOGIN_PATH : DEFAULT_ROOT_LOGIN_PATH ));
|
||||
}
|
||||
else if ( changeenv ) {
|
||||
/* Set HOME, SHELL, and if not becoming a super-user,
|
||||
USER and LOGNAME. */
|
||||
xsetenv ( "HOME", pw-> pw_dir );
|
||||
xsetenv ( "SHELL", shell );
|
||||
if ( pw-> pw_uid ) {
|
||||
xsetenv ( "USER", pw-> pw_name );
|
||||
xsetenv ( "LOGNAME", pw-> pw_name );
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
/* Ask the user for a password.
|
||||
Return 1 if the user gives the correct password for entry PW,
|
||||
0 if not. Return 1 without asking for a password if run by UID 0
|
||||
or if PW has an empty password. */
|
||||
|
||||
int correct_password ( const struct passwd *pw )
|
||||
{
|
||||
char *unencrypted, *encrypted, *correct;
|
||||
|
||||
#ifdef CONFIG_FEATURE_SHADOWPASSWDS
|
||||
if (( strcmp ( pw-> pw_passwd, "x" ) == 0 ) || ( strcmp ( pw-> pw_passwd, "*" ) == 0 )) {
|
||||
struct spwd *sp = getspnam ( pw-> pw_name );
|
||||
|
||||
if ( !sp )
|
||||
error_msg_and_die ( "no valid shadow password" );
|
||||
|
||||
correct = sp-> sp_pwdp;
|
||||
}
|
||||
else
|
||||
#endif
|
||||
correct = pw-> pw_passwd;
|
||||
|
||||
if ( correct == 0 || correct[0] == '\0' )
|
||||
return 1;
|
||||
|
||||
unencrypted = getpass ( "Password: " );
|
||||
if ( !unencrypted )
|
||||
{
|
||||
fputs ( "getpass: cannot open /dev/tty\n", stderr );
|
||||
return 0;
|
||||
}
|
||||
encrypted = crypt ( unencrypted, correct );
|
||||
memset ( unencrypted, 0, xstrlen ( unencrypted ));
|
||||
return ( strcmp ( encrypted, correct ) == 0 ) ? 1 : 0;
|
||||
}
|
10
loginutils/tinylogin.h
Normal file
10
loginutils/tinylogin.h
Normal file
@ -0,0 +1,10 @@
|
||||
#ifndef BB_LOGINUTILS_SHELL_H
|
||||
#define BB_LOGINUTILS_SHELL_H
|
||||
|
||||
extern void change_identity ( const struct passwd *pw );
|
||||
extern void run_shell ( const char *shell, int loginshell, const char *command, char **additional_args );
|
||||
extern int restricted_shell ( const char *shell );
|
||||
extern void setup_environment ( const char *shell, int loginshell, int changeenv, const struct passwd *pw );
|
||||
extern int correct_password ( const struct passwd *pw );
|
||||
|
||||
#endif
|
Loading…
Reference in New Issue
Block a user