2000-02-18 03:38:33 +08:00
|
|
|
/* passwd.cc: getpwnam () and friends
|
|
|
|
|
* child_info.h, cygheap.h, fhandler_clipboard.cc, fhandler_dsp.cc,
fhandler_floppy.cc, fhandler_mem.cc, fhandler_random.cc,
fhandler_tape.cc, fhandler_zero.cc, grp.cc, mmap.cc, passwd.cc,
pinfo.cc, pinfo.h, pipe.cc, sec_acl.cc, sec_helper.cc, security.cc,
security.h, thread.h, uinfo.cc, include/cygwin/acl.h: Fix copyright.
2002-02-10 21:50:13 +08:00
|
|
|
Copyright 1996, 1997, 1998, 2001, 2002 Red Hat, Inc.
|
2000-02-18 03:38:33 +08:00
|
|
|
|
|
|
|
This file is part of Cygwin.
|
|
|
|
|
|
|
|
This software is a copyrighted work licensed under the terms of the
|
|
|
|
Cygwin license. Please consult the file "CYGWIN_LICENSE" for
|
|
|
|
details. */
|
|
|
|
|
2000-08-03 00:28:18 +08:00
|
|
|
#include "winsup.h"
|
2000-02-18 03:38:33 +08:00
|
|
|
#include <stdlib.h>
|
|
|
|
#include <pwd.h>
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <errno.h>
|
2000-08-22 13:10:20 +08:00
|
|
|
#include "cygerrno.h"
|
2001-07-27 03:22:24 +08:00
|
|
|
#include "security.h"
|
2000-08-22 13:10:20 +08:00
|
|
|
#include "fhandler.h"
|
2001-08-07 16:56:22 +08:00
|
|
|
#include "path.h"
|
2001-10-01 12:10:07 +08:00
|
|
|
#include "dtable.h"
|
2000-08-12 13:35:42 +08:00
|
|
|
#include "pinfo.h"
|
2000-11-15 08:13:09 +08:00
|
|
|
#include "cygheap.h"
|
2000-09-08 00:23:51 +08:00
|
|
|
#include <sys/termios.h>
|
2001-09-10 00:52:37 +08:00
|
|
|
#include "pwdgrp.h"
|
2000-02-18 03:38:33 +08:00
|
|
|
|
|
|
|
/* Read /etc/passwd only once for better performance. This is done
|
|
|
|
on the first call that needs information from it. */
|
|
|
|
|
2001-09-06 11:39:18 +08:00
|
|
|
static struct passwd *passwd_buf; /* passwd contents in memory */
|
|
|
|
static int curr_lines;
|
|
|
|
static int max_lines;
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2001-09-10 00:52:37 +08:00
|
|
|
static pwdgrp_check passwd_state;
|
2001-08-07 16:56:22 +08:00
|
|
|
|
2000-02-18 03:38:33 +08:00
|
|
|
|
|
|
|
/* Position in the passwd cache */
|
|
|
|
#ifdef _MT_SAFE
|
2001-01-28 13:51:15 +08:00
|
|
|
#define pw_pos _reent_winsup ()->_pw_pos
|
2000-02-18 03:38:33 +08:00
|
|
|
#else
|
|
|
|
static int pw_pos = 0;
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/* Remove a : teminated string from the buffer, and increment the pointer */
|
|
|
|
static char *
|
|
|
|
grab_string (char **p)
|
|
|
|
{
|
|
|
|
char *src = *p;
|
|
|
|
char *res = src;
|
|
|
|
|
|
|
|
while (*src && *src != ':' && *src != '\n')
|
|
|
|
src++;
|
|
|
|
|
|
|
|
if (*src == ':')
|
|
|
|
{
|
|
|
|
*src = 0;
|
|
|
|
src++;
|
|
|
|
}
|
|
|
|
*p = src;
|
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* same, for ints */
|
|
|
|
static int
|
|
|
|
grab_int (char **p)
|
|
|
|
{
|
|
|
|
char *src = *p;
|
2000-07-02 01:30:35 +08:00
|
|
|
int val = strtol (src, NULL, 10);
|
2000-02-18 03:38:33 +08:00
|
|
|
while (*src && *src != ':' && *src != '\n')
|
|
|
|
src++;
|
|
|
|
if (*src == ':')
|
|
|
|
src++;
|
|
|
|
*p = src;
|
|
|
|
return val;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Parse /etc/passwd line into passwd structure. */
|
|
|
|
void
|
|
|
|
parse_pwd (struct passwd &res, char *buf)
|
|
|
|
{
|
|
|
|
/* Allocate enough room for the passwd struct and all the strings
|
|
|
|
in it in one go */
|
|
|
|
size_t len = strlen (buf);
|
2002-06-05 19:10:15 +08:00
|
|
|
if (buf[--len] == '\r')
|
|
|
|
buf[len] = '\0';
|
|
|
|
|
|
|
|
res.pw_name = grab_string (&buf);
|
|
|
|
res.pw_passwd = grab_string (&buf);
|
|
|
|
res.pw_uid = grab_int (&buf);
|
|
|
|
res.pw_gid = grab_int (&buf);
|
2000-02-18 03:38:33 +08:00
|
|
|
res.pw_comment = 0;
|
2002-06-05 19:10:15 +08:00
|
|
|
res.pw_gecos = grab_string (&buf);
|
|
|
|
res.pw_dir = grab_string (&buf);
|
|
|
|
res.pw_shell = grab_string (&buf);
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Add one line from /etc/passwd into the password cache */
|
|
|
|
static void
|
|
|
|
add_pwd_line (char *line)
|
|
|
|
{
|
|
|
|
if (curr_lines >= max_lines)
|
|
|
|
{
|
|
|
|
max_lines += 10;
|
|
|
|
passwd_buf = (struct passwd *) realloc (passwd_buf, max_lines * sizeof (struct passwd));
|
|
|
|
}
|
|
|
|
parse_pwd (passwd_buf[curr_lines++], line);
|
|
|
|
}
|
|
|
|
|
2001-09-28 15:01:22 +08:00
|
|
|
class passwd_lock
|
|
|
|
{
|
2002-02-17 12:59:55 +08:00
|
|
|
bool armed;
|
|
|
|
static NO_COPY pthread_mutex_t mutex;
|
2001-09-28 15:01:22 +08:00
|
|
|
public:
|
2002-02-17 12:59:55 +08:00
|
|
|
passwd_lock (bool doit)
|
|
|
|
{
|
|
|
|
if (doit)
|
|
|
|
pthread_mutex_lock (&mutex);
|
|
|
|
armed = doit;
|
|
|
|
}
|
2001-09-28 15:23:18 +08:00
|
|
|
~passwd_lock ()
|
|
|
|
{
|
2002-02-17 12:59:55 +08:00
|
|
|
if (armed)
|
2001-09-28 15:23:18 +08:00
|
|
|
pthread_mutex_unlock (&mutex);
|
|
|
|
}
|
2001-09-28 15:01:22 +08:00
|
|
|
};
|
|
|
|
|
2002-02-17 12:59:55 +08:00
|
|
|
pthread_mutex_t NO_COPY passwd_lock::mutex = (pthread_mutex_t) PTHREAD_MUTEX_INITIALIZER;
|
|
|
|
|
2000-02-18 03:38:33 +08:00
|
|
|
/* Read in /etc/passwd and save contents in the password cache.
|
2000-07-26 19:48:38 +08:00
|
|
|
This sets passwd_state to loaded or emulated so functions in this file can
|
|
|
|
tell that /etc/passwd has been read in or will be emulated. */
|
2000-06-25 01:37:52 +08:00
|
|
|
void
|
2000-02-18 03:38:33 +08:00
|
|
|
read_etc_passwd ()
|
|
|
|
{
|
2002-06-05 19:10:15 +08:00
|
|
|
static pwdgrp_read pr;
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2002-06-05 19:10:15 +08:00
|
|
|
/* A mutex is ok for speed here - pthreads will use critical sections not
|
|
|
|
* mutexes for non-shared mutexes in the future. Also, this function will
|
|
|
|
* at most be called once from each thread, after that the passwd_state
|
|
|
|
* test will succeed */
|
|
|
|
passwd_lock here (cygwin_finished_initializing);
|
|
|
|
|
|
|
|
/* if we got blocked by the mutex, then etc_passwd may have been processed */
|
|
|
|
if (passwd_state != uninitialized)
|
|
|
|
return;
|
|
|
|
|
|
|
|
if (passwd_state != initializing)
|
|
|
|
{
|
|
|
|
passwd_state = initializing;
|
|
|
|
if (pr.open ("/etc/passwd"))
|
|
|
|
{
|
|
|
|
char *line;
|
|
|
|
while ((line = pr.gets ()) != NULL)
|
|
|
|
if (strlen (line))
|
|
|
|
add_pwd_line (line);
|
|
|
|
|
2002-09-22 11:38:57 +08:00
|
|
|
passwd_state.set_last_modified (pr.get_fhandle (), pr.get_fname ());
|
2002-06-05 19:10:15 +08:00
|
|
|
passwd_state = loaded;
|
|
|
|
pr.close ();
|
|
|
|
debug_printf ("Read /etc/passwd, %d lines", curr_lines);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2002-06-05 19:56:56 +08:00
|
|
|
static char linebuf[1024];
|
|
|
|
|
|
|
|
if (wincap.has_security ())
|
|
|
|
{
|
|
|
|
HANDLE ptok;
|
|
|
|
cygsid tu, tg;
|
|
|
|
DWORD siz;
|
|
|
|
|
2002-06-19 23:27:27 +08:00
|
|
|
if (OpenProcessToken (hMainProc, TOKEN_QUERY, &ptok))
|
2002-09-30 23:17:44 +08:00
|
|
|
{
|
2002-06-05 19:56:56 +08:00
|
|
|
if (GetTokenInformation (ptok, TokenUser, &tu, sizeof tu,
|
2002-09-30 23:17:44 +08:00
|
|
|
&siz)
|
2002-06-05 19:56:56 +08:00
|
|
|
&& GetTokenInformation (ptok, TokenPrimaryGroup, &tg,
|
|
|
|
sizeof tg, &siz))
|
|
|
|
{
|
|
|
|
char strbuf[100];
|
|
|
|
snprintf (linebuf, sizeof (linebuf),
|
2002-06-05 23:43:49 +08:00
|
|
|
"%s::%lu:%lu:%s:%s:/bin/sh",
|
2002-06-05 19:56:56 +08:00
|
|
|
cygheap->user.name (),
|
2002-09-22 11:38:57 +08:00
|
|
|
*GetSidSubAuthority (tu,
|
2002-09-30 23:17:44 +08:00
|
|
|
*GetSidSubAuthorityCount(tu) - 1),
|
2002-09-22 11:38:57 +08:00
|
|
|
*GetSidSubAuthority (tg,
|
2002-09-30 23:17:44 +08:00
|
|
|
*GetSidSubAuthorityCount(tg) - 1),
|
2002-06-05 19:56:56 +08:00
|
|
|
tu.string (strbuf), getenv ("HOME") ?: "/");
|
|
|
|
debug_printf ("Emulating /etc/passwd: %s", linebuf);
|
|
|
|
add_pwd_line (linebuf);
|
|
|
|
passwd_state = emulated;
|
|
|
|
}
|
|
|
|
CloseHandle (ptok);
|
2002-09-30 23:17:44 +08:00
|
|
|
}
|
2002-06-05 19:56:56 +08:00
|
|
|
}
|
|
|
|
if (passwd_state != emulated)
|
|
|
|
{
|
|
|
|
snprintf (linebuf, sizeof (linebuf), "%s::%u:%u::%s:/bin/sh",
|
|
|
|
cygheap->user.name (), (unsigned) DEFAULT_UID,
|
|
|
|
(unsigned) DEFAULT_GID, getenv ("HOME") ?: "/");
|
|
|
|
debug_printf ("Emulating /etc/passwd: %s", linebuf);
|
|
|
|
add_pwd_line (linebuf);
|
|
|
|
passwd_state = emulated;
|
|
|
|
}
|
2002-06-05 19:10:15 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
}
|
2001-04-19 05:10:15 +08:00
|
|
|
|
2001-09-28 15:01:22 +08:00
|
|
|
return;
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Cygwin internal */
|
2001-04-19 05:10:15 +08:00
|
|
|
/* If this ever becomes non-reentrant, update all the getpw*_r functions */
|
2000-02-18 03:38:33 +08:00
|
|
|
static struct passwd *
|
2002-05-29 23:04:29 +08:00
|
|
|
search_for (__uid32_t uid, const char *name)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
|
|
|
struct passwd *res = 0;
|
|
|
|
struct passwd *default_pw = 0;
|
|
|
|
|
|
|
|
for (int i = 0; i < curr_lines; i++)
|
|
|
|
{
|
|
|
|
res = passwd_buf + i;
|
|
|
|
if (res->pw_uid == DEFAULT_UID)
|
2000-09-03 12:16:35 +08:00
|
|
|
default_pw = res;
|
2000-02-18 03:38:33 +08:00
|
|
|
/* on Windows NT user names are case-insensitive */
|
|
|
|
if (name)
|
|
|
|
{
|
|
|
|
if (strcasematch (name, res->pw_name))
|
|
|
|
return res;
|
|
|
|
}
|
2002-05-29 23:04:29 +08:00
|
|
|
else if (uid == (__uid32_t) res->pw_uid)
|
2000-02-18 03:38:33 +08:00
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
2000-07-26 19:48:38 +08:00
|
|
|
/* Return default passwd entry if passwd is emulated or it's a
|
|
|
|
request for the current user. */
|
|
|
|
if (passwd_state != loaded
|
2000-09-05 01:52:42 +08:00
|
|
|
|| (!name && uid == myself->uid)
|
2001-01-28 13:51:15 +08:00
|
|
|
|| (name && strcasematch (name, cygheap->user.name ())))
|
2000-07-26 19:48:38 +08:00
|
|
|
return default_pw;
|
|
|
|
|
|
|
|
return NULL;
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
|
2000-02-21 13:20:38 +08:00
|
|
|
extern "C" struct passwd *
|
2002-05-29 23:04:29 +08:00
|
|
|
getpwuid32 (__uid32_t uid)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
2001-04-19 05:10:15 +08:00
|
|
|
if (passwd_state <= initializing)
|
2001-01-28 13:51:15 +08:00
|
|
|
read_etc_passwd ();
|
2001-06-26 22:47:48 +08:00
|
|
|
|
2002-09-22 11:38:57 +08:00
|
|
|
pthread_testcancel ();
|
2000-02-18 03:38:33 +08:00
|
|
|
|
|
|
|
return search_for (uid, 0);
|
|
|
|
}
|
|
|
|
|
2002-05-29 23:04:29 +08:00
|
|
|
extern "C" struct passwd *
|
|
|
|
getpwuid (__uid16_t uid)
|
|
|
|
{
|
|
|
|
return getpwuid32 (uid16touid32 (uid));
|
|
|
|
}
|
|
|
|
|
2001-06-26 22:47:48 +08:00
|
|
|
extern "C" int
|
2002-05-29 23:04:29 +08:00
|
|
|
getpwuid_r32 (__uid32_t uid, struct passwd *pwd, char *buffer, size_t bufsize, struct passwd **result)
|
2001-04-19 05:10:15 +08:00
|
|
|
{
|
|
|
|
*result = NULL;
|
|
|
|
|
|
|
|
if (!pwd || !buffer)
|
|
|
|
return ERANGE;
|
|
|
|
|
|
|
|
if (passwd_state <= initializing)
|
|
|
|
read_etc_passwd ();
|
|
|
|
|
2002-09-22 11:38:57 +08:00
|
|
|
pthread_testcancel ();
|
2001-04-21 22:23:47 +08:00
|
|
|
|
2001-04-19 05:10:15 +08:00
|
|
|
struct passwd *temppw = search_for (uid, 0);
|
|
|
|
|
|
|
|
if (!temppw)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
/* check needed buffer size. */
|
2001-04-25 05:45:20 +08:00
|
|
|
size_t needsize = strlen (temppw->pw_name) + strlen (temppw->pw_dir) +
|
2001-06-26 22:47:48 +08:00
|
|
|
strlen (temppw->pw_shell) + strlen (temppw->pw_gecos) +
|
2001-04-25 05:52:57 +08:00
|
|
|
strlen (temppw->pw_passwd) + 5;
|
2001-04-19 05:10:15 +08:00
|
|
|
if (needsize > bufsize)
|
|
|
|
return ERANGE;
|
|
|
|
|
|
|
|
/* make a copy of temppw */
|
|
|
|
*result = pwd;
|
|
|
|
pwd->pw_uid = temppw->pw_uid;
|
|
|
|
pwd->pw_gid = temppw->pw_gid;
|
|
|
|
pwd->pw_name = buffer;
|
2001-04-25 05:45:20 +08:00
|
|
|
pwd->pw_dir = pwd->pw_name + strlen (temppw->pw_name) + 1;
|
|
|
|
pwd->pw_shell = pwd->pw_dir + strlen (temppw->pw_dir) + 1;
|
|
|
|
pwd->pw_gecos = pwd->pw_shell + strlen (temppw->pw_shell) + 1;
|
2001-04-25 05:52:57 +08:00
|
|
|
pwd->pw_passwd = pwd->pw_gecos + strlen (temppw->pw_gecos) + 1;
|
2001-04-19 05:10:15 +08:00
|
|
|
strcpy (pwd->pw_name, temppw->pw_name);
|
|
|
|
strcpy (pwd->pw_dir, temppw->pw_dir);
|
|
|
|
strcpy (pwd->pw_shell, temppw->pw_shell);
|
2001-04-25 05:45:20 +08:00
|
|
|
strcpy (pwd->pw_gecos, temppw->pw_gecos);
|
2001-04-25 05:52:57 +08:00
|
|
|
strcpy (pwd->pw_passwd, temppw->pw_passwd);
|
2001-04-19 05:10:15 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2002-05-29 23:04:29 +08:00
|
|
|
extern "C" int
|
|
|
|
getpwuid_r (__uid16_t uid, struct passwd *pwd, char *buffer, size_t bufsize, struct passwd **result)
|
|
|
|
{
|
|
|
|
return getpwuid_r32 (uid16touid32 (uid), pwd, buffer, bufsize, result);
|
|
|
|
}
|
|
|
|
|
2000-02-21 13:20:38 +08:00
|
|
|
extern "C" struct passwd *
|
2000-02-18 03:38:33 +08:00
|
|
|
getpwnam (const char *name)
|
|
|
|
{
|
2001-04-19 05:10:15 +08:00
|
|
|
if (passwd_state <= initializing)
|
2001-01-28 13:51:15 +08:00
|
|
|
read_etc_passwd ();
|
2001-06-26 22:47:48 +08:00
|
|
|
|
2002-09-22 11:38:57 +08:00
|
|
|
pthread_testcancel ();
|
2000-02-18 03:38:33 +08:00
|
|
|
|
|
|
|
return search_for (0, name);
|
|
|
|
}
|
|
|
|
|
2001-04-19 05:10:15 +08:00
|
|
|
|
2001-06-26 22:47:48 +08:00
|
|
|
/* the max size buffer we can expect to
|
2001-04-19 05:10:15 +08:00
|
|
|
* use is returned via sysconf with _SC_GETPW_R_SIZE_MAX.
|
|
|
|
* This may need updating! - Rob Collins April 2001.
|
|
|
|
*/
|
|
|
|
extern "C" int
|
|
|
|
getpwnam_r (const char *nam, struct passwd *pwd, char *buffer, size_t bufsize, struct passwd **result)
|
|
|
|
{
|
|
|
|
*result = NULL;
|
|
|
|
|
|
|
|
if (!pwd || !buffer || !nam)
|
|
|
|
return ERANGE;
|
|
|
|
|
|
|
|
if (passwd_state <= initializing)
|
|
|
|
read_etc_passwd ();
|
|
|
|
|
2002-09-22 11:38:57 +08:00
|
|
|
pthread_testcancel ();
|
2001-04-21 22:23:47 +08:00
|
|
|
|
2001-04-19 05:10:15 +08:00
|
|
|
struct passwd *temppw = search_for (0, nam);
|
|
|
|
|
|
|
|
if (!temppw)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
/* check needed buffer size. */
|
2001-04-25 05:45:20 +08:00
|
|
|
size_t needsize = strlen (temppw->pw_name) + strlen (temppw->pw_dir) +
|
2001-06-26 22:47:48 +08:00
|
|
|
strlen (temppw->pw_shell) + strlen (temppw->pw_gecos) +
|
2001-04-25 05:52:57 +08:00
|
|
|
strlen (temppw->pw_passwd) + 5;
|
2001-04-19 05:10:15 +08:00
|
|
|
if (needsize > bufsize)
|
|
|
|
return ERANGE;
|
2001-06-26 22:47:48 +08:00
|
|
|
|
2001-04-19 05:10:15 +08:00
|
|
|
/* make a copy of temppw */
|
|
|
|
*result = pwd;
|
|
|
|
pwd->pw_uid = temppw->pw_uid;
|
|
|
|
pwd->pw_gid = temppw->pw_gid;
|
|
|
|
pwd->pw_name = buffer;
|
2001-04-25 05:45:20 +08:00
|
|
|
pwd->pw_dir = pwd->pw_name + strlen (temppw->pw_name) + 1;
|
|
|
|
pwd->pw_shell = pwd->pw_dir + strlen (temppw->pw_dir) + 1;
|
|
|
|
pwd->pw_gecos = pwd->pw_shell + strlen (temppw->pw_shell) + 1;
|
2001-04-25 05:52:57 +08:00
|
|
|
pwd->pw_passwd = pwd->pw_gecos + strlen (temppw->pw_gecos) + 1;
|
2001-04-19 05:10:15 +08:00
|
|
|
strcpy (pwd->pw_name, temppw->pw_name);
|
|
|
|
strcpy (pwd->pw_dir, temppw->pw_dir);
|
|
|
|
strcpy (pwd->pw_shell, temppw->pw_shell);
|
2001-04-25 05:45:20 +08:00
|
|
|
strcpy (pwd->pw_gecos, temppw->pw_gecos);
|
2001-04-25 05:52:57 +08:00
|
|
|
strcpy (pwd->pw_passwd, temppw->pw_passwd);
|
2001-04-19 05:10:15 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2000-02-21 13:20:38 +08:00
|
|
|
extern "C" struct passwd *
|
2000-02-18 03:38:33 +08:00
|
|
|
getpwent (void)
|
|
|
|
{
|
2001-04-19 05:10:15 +08:00
|
|
|
if (passwd_state <= initializing)
|
2001-01-28 13:51:15 +08:00
|
|
|
read_etc_passwd ();
|
2000-02-18 03:38:33 +08:00
|
|
|
|
|
|
|
if (pw_pos < curr_lines)
|
|
|
|
return passwd_buf + pw_pos++;
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2000-02-21 13:20:38 +08:00
|
|
|
extern "C" struct passwd *
|
* (child_info.h, cygheap.h, dcrt0.cc, dir.cc, fhandler.cc, fhandler.h,
fhandler_clipboard.cc, fhandler_disk_file.cc, fhandler_dsp.cc,
fhandler_floppy.cc, fhandler_mem.cc, fhandler_random.cc,
fhandler_tape.cc, fhandler_zero.cc, grp.cc, mmap.cc, passwd.cc,
pinfo.cc, pinfo.h, pipe.cc, sec_acl.cc, sec_helper.cc, security.cc,
security.h, spawn.cc, syscalls.cc, thread.h, uinfo.cc, winsup.h):
Change usage of uid_t to __uid16_t, gid_t to __gid16_t and
off_t to __off32_t throughout. Use INVALID_UID, INVALID_GID and
INVALID_SEEK instead casting -1 to the appropriate type.
* winsup.h: Define INVALID_UID, INVALID_GID and INVALID_SEEK.
* include/cygwin/acl.h: Define internal __aclent16_t and __aclent32_t
types. Don't declare acl functions when compiling Cygwin.
* include/cygwin/grp.h: Declare getgrgid() and getgrnam() with
correct types for internal usage.
2002-02-10 21:38:51 +08:00
|
|
|
getpwduid (__uid16_t)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2000-02-21 13:20:38 +08:00
|
|
|
extern "C" void
|
2000-02-18 03:38:33 +08:00
|
|
|
setpwent (void)
|
|
|
|
{
|
|
|
|
pw_pos = 0;
|
|
|
|
}
|
|
|
|
|
2000-02-21 13:20:38 +08:00
|
|
|
extern "C" void
|
2000-02-18 03:38:33 +08:00
|
|
|
endpwent (void)
|
|
|
|
{
|
|
|
|
pw_pos = 0;
|
|
|
|
}
|
|
|
|
|
2000-02-21 13:20:38 +08:00
|
|
|
extern "C" int
|
2000-02-18 03:38:33 +08:00
|
|
|
setpassent ()
|
|
|
|
{
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2001-04-25 17:43:25 +08:00
|
|
|
/* Internal function. ONLY USE THIS INTERNALLY, NEVER `getpwent'!!! */
|
|
|
|
struct passwd *
|
|
|
|
internal_getpwent (int pos)
|
|
|
|
{
|
|
|
|
if (passwd_state <= initializing)
|
|
|
|
read_etc_passwd ();
|
|
|
|
|
|
|
|
if (pos < curr_lines)
|
|
|
|
return passwd_buf + pos;
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2000-02-21 13:20:38 +08:00
|
|
|
extern "C" char *
|
2000-02-18 03:38:33 +08:00
|
|
|
getpass (const char * prompt)
|
|
|
|
{
|
|
|
|
#ifdef _MT_SAFE
|
2001-01-28 13:51:15 +08:00
|
|
|
char *pass=_reent_winsup ()->_pass;
|
2000-02-18 03:38:33 +08:00
|
|
|
#else
|
|
|
|
static char pass[_PASSWORD_LEN];
|
|
|
|
#endif
|
|
|
|
struct termios ti, newti;
|
|
|
|
|
2001-04-19 05:10:15 +08:00
|
|
|
if (passwd_state <= initializing)
|
2001-01-28 13:51:15 +08:00
|
|
|
read_etc_passwd ();
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2001-10-16 07:39:33 +08:00
|
|
|
cygheap_fdget fhstdin (0);
|
|
|
|
|
|
|
|
if (fhstdin < 0)
|
|
|
|
pass[0] = '\0';
|
2000-02-18 03:38:33 +08:00
|
|
|
else
|
|
|
|
{
|
|
|
|
fhstdin->tcgetattr (&ti);
|
|
|
|
newti = ti;
|
|
|
|
newti.c_lflag &= ~ECHO;
|
|
|
|
fhstdin->tcsetattr (TCSANOW, &newti);
|
|
|
|
fputs (prompt, stderr);
|
|
|
|
fgets (pass, _PASSWORD_LEN, stdin);
|
|
|
|
fprintf (stderr, "\n");
|
|
|
|
for (int i=0; pass[i]; i++)
|
|
|
|
if (pass[i] == '\r' || pass[i] == '\n')
|
|
|
|
pass[i] = '\0';
|
|
|
|
fhstdin->tcsetattr (TCSANOW, &ti);
|
|
|
|
}
|
|
|
|
return pass;
|
|
|
|
}
|