X-Git-Url: https://git.cameronkatri.com/pw-darwin.git/blobdiff_plain/426e563240560fdb07f0f3cac364bf1071ccc231..1b5065c251cfbf3b8a8f40c23b0a71b8365092a4:/libc/gen/pw_scan.c diff --git a/libc/gen/pw_scan.c b/libc/gen/pw_scan.c index 9db291d..e785511 100644 --- a/libc/gen/pw_scan.c +++ b/libc/gen/pw_scan.c @@ -31,13 +31,11 @@ * SUCH DAMAGE. */ -#ifndef lint -#if 0 +#if defined(LIBC_SCCS) && !defined(lint) static char sccsid[] = "@(#)pw_scan.c 8.3 (Berkeley) 4/2/94"; -#endif -static const char rcsid[] = - "$FreeBSD$"; -#endif /* not lint */ +#endif /* LIBC_SCCS and not lint */ +#include +__FBSDID("$FreeBSD$"); /* * This module is used to "verify" password entries by chpass(1) and @@ -59,12 +57,11 @@ static const char rcsid[] = /* * Some software assumes that IDs are short. We should emit warnings - * for id's which can not be stored in a short, but we are more liberal + * for id's which cannot be stored in a short, but we are more liberal * by default, warning for IDs greater than USHRT_MAX. * - * If pw_big_ids_warning is anything other than -1 on entry to pw_scan() - * it will be set based on the existance of PW_SCAN_BIG_IDS in the - * environment. + * If pw_big_ids_warning is -1 on entry to pw_scan(), it will be set based + * on the existence of PW_SCAN_BIG_IDS in the environment. */ static int pw_big_ids_warning = -1; @@ -73,7 +70,7 @@ __pw_scan(char *bp, struct passwd *pw, int flags) { uid_t id; int root; - char *p, *sh; + char *ep, *p, *sh; if (pw_big_ids_warning == -1) pw_big_ids_warning = getenv("PW_SCAN_BIG_IDS") == NULL ? 1 : 0; @@ -101,12 +98,17 @@ __pw_scan(char *bp, struct passwd *pw, int flags) return (0); } } - id = strtoul(p, (char **)NULL, 10); + id = strtoul(p, &ep, 10); if (errno == ERANGE) { if (flags & _PWSCAN_WARN) warnx("%s > max uid value (%lu)", p, ULONG_MAX); return (0); } + if (*ep != '\0') { + if (flags & _PWSCAN_WARN) + warnx("%s uid is incorrect", p); + return (0); + } if (root && id) { if (flags & _PWSCAN_WARN) warnx("root uid should be 0"); @@ -122,12 +124,24 @@ __pw_scan(char *bp, struct passwd *pw, int flags) goto fmt; if (p[0]) pw->pw_fields |= _PWF_GID; - id = strtoul(p, (char **)NULL, 10); + else { + if (pw->pw_name[0] != '+' && pw->pw_name[0] != '-') { + if (flags & _PWSCAN_WARN) + warnx("no gid for user %s", pw->pw_name); + return (0); + } + } + id = strtoul(p, &ep, 10); if (errno == ERANGE) { if (flags & _PWSCAN_WARN) warnx("%s > max gid value (%lu)", p, ULONG_MAX); return (0); } + if (*ep != '\0') { + if (flags & _PWSCAN_WARN) + warnx("%s gid is incorrect", p); + return (0); + } if (flags & _PWSCAN_WARN && pw_big_ids_warning && id > USHRT_MAX) { warnx("%s > recommended max gid value (%u)", p, USHRT_MAX); /* return (0); This should not be fatal! */