ccc340f5aa
of .Nm when referencing funciton names.
218 lines
5.9 KiB
Groff
218 lines
5.9 KiB
Groff
.\" Copyright (c) 1988, 1991, 1993
|
|
.\" The Regents of the University of California. All rights reserved.
|
|
.\"
|
|
.\" Redistribution and use in source and binary forms, with or without
|
|
.\" modification, are permitted provided that the following conditions
|
|
.\" are met:
|
|
.\" 1. Redistributions of source code must retain the above copyright
|
|
.\" notice, this list of conditions and the following disclaimer.
|
|
.\" 2. Redistributions in binary form must reproduce the above copyright
|
|
.\" notice, this list of conditions and the following disclaimer in the
|
|
.\" documentation and/or other materials provided with the distribution.
|
|
.\" 3. All advertising materials mentioning features or use of this software
|
|
.\" must display the following acknowledgement:
|
|
.\" This product includes software developed by the University of
|
|
.\" California, Berkeley and its contributors.
|
|
.\" 4. Neither the name of the University nor the names of its contributors
|
|
.\" may be used to endorse or promote products derived from this software
|
|
.\" without specific prior written permission.
|
|
.\"
|
|
.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
|
|
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
|
|
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
.\" SUCH DAMAGE.
|
|
.\"
|
|
.\" From: @(#)getpwent.3 8.2 (Berkeley) 12/11/93
|
|
.\"
|
|
.Dd September 20, 1994
|
|
.Dt GETPWENT 3
|
|
.Os
|
|
.Sh NAME
|
|
.Nm getpwent ,
|
|
.Nm getpwnam ,
|
|
.Nm getpwuid ,
|
|
.Nm setpassent ,
|
|
.Nm setpwent ,
|
|
.Nm endpwent
|
|
.Nd password database operations
|
|
.Sh SYNOPSIS
|
|
.Fd #include <sys/types.h>
|
|
.Fd #include <pwd.h>
|
|
.Ft struct passwd *
|
|
.Fn getpwent void
|
|
.Ft struct passwd *
|
|
.Fn getpwnam "const char *login"
|
|
.Ft struct passwd *
|
|
.Fn getpwuid "uid_t uid"
|
|
.Ft int
|
|
.Fn setpassent "int stayopen"
|
|
.Ft int
|
|
.Fn setpwent void
|
|
.Ft void
|
|
.Fn endpwent void
|
|
.Sh DESCRIPTION
|
|
These functions
|
|
operate on the password database file
|
|
which is described
|
|
in
|
|
.Xr passwd 5 .
|
|
Each entry in the database is defined by the structure
|
|
.Ar passwd
|
|
found in the include
|
|
file
|
|
.Aq Pa pwd.h :
|
|
.Bd -literal -offset indent
|
|
struct passwd {
|
|
char *pw_name; /* user name */
|
|
char *pw_passwd; /* encrypted password */
|
|
uid_t pw_uid; /* user uid */
|
|
gid_t pw_gid; /* user gid */
|
|
time_t pw_change; /* password change time */
|
|
char *pw_class; /* user access class */
|
|
char *pw_gecos; /* Honeywell login info */
|
|
char *pw_dir; /* home directory */
|
|
char *pw_shell; /* default shell */
|
|
time_t pw_expire; /* account expiration */
|
|
};
|
|
.Ed
|
|
.Pp
|
|
The functions
|
|
.Fn getpwnam
|
|
and
|
|
.Fn getpwuid
|
|
search the password database for the given login name or user uid,
|
|
respectively, always returning the first one encountered.
|
|
.Pp
|
|
The
|
|
.Fn getpwent
|
|
function
|
|
sequentially reads the password database and is intended for programs
|
|
that wish to process the complete list of users.
|
|
.Pp
|
|
The
|
|
.Fn setpassent
|
|
function
|
|
accomplishes two purposes.
|
|
First, it causes
|
|
.Fn getpwent
|
|
to ``rewind'' to the beginning of the database.
|
|
Additionally, if
|
|
.Fa stayopen
|
|
is non-zero, file descriptors are left open, significantly speeding
|
|
up subsequent accesses for all of the routines.
|
|
(This latter functionality is unnecessary for
|
|
.Fn getpwent
|
|
as it doesn't close its file descriptors by default.)
|
|
.Pp
|
|
It is dangerous for long-running programs to keep the file descriptors
|
|
open as the database will become out of date if it is updated while the
|
|
program is running.
|
|
.Pp
|
|
The
|
|
.Fn setpwent
|
|
function
|
|
is identical to
|
|
.Fn setpassent
|
|
with an argument of zero.
|
|
.Pp
|
|
The
|
|
.Fn endpwent
|
|
function
|
|
closes any open files.
|
|
.Pp
|
|
These routines have been written to ``shadow'' the password file, e.g.
|
|
allow only certain programs to have access to the encrypted password.
|
|
If the process which calls them has an effective uid of 0, the encrypted
|
|
password will be returned, otherwise, the password field of the returned
|
|
structure will point to the string
|
|
.Ql * .
|
|
.Sh YP/NIS INTERACTION
|
|
When the
|
|
.Xr yp 4
|
|
password database is enabled, the
|
|
.Fn getpwnam
|
|
and
|
|
.Fn getpwuid
|
|
functions use the YP maps
|
|
.Dq Li passwd.byname
|
|
and
|
|
.Dq Li passwd.byuid ,
|
|
respectively, if the requested password entry is not found in the
|
|
local database. The
|
|
.Fn getpwent
|
|
function will step through the YP map
|
|
.Dq Li passwd.byname
|
|
if the entire map is enabled as described in
|
|
.Xr passwd 5 .
|
|
.Sh RETURN VALUES
|
|
The functions
|
|
.Fn getpwent ,
|
|
.Fn getpwnam ,
|
|
and
|
|
.Fn getpwuid ,
|
|
return a valid pointer to a passwd structure on success
|
|
and a null pointer if end-of-file is reached or an error occurs.
|
|
The functions
|
|
.Fn setpassent
|
|
and
|
|
.Fn setpwent
|
|
return 0 on failure and 1 on success.
|
|
The
|
|
.Fn endpwent
|
|
function
|
|
has no return value.
|
|
.Sh FILES
|
|
.Bl -tag -width /etc/master.passwd -compact
|
|
.It Pa /etc/pwd.db
|
|
The insecure password database file
|
|
.It Pa /etc/spwd.db
|
|
The secure password database file
|
|
.It Pa /etc/master.passwd
|
|
The current password file
|
|
.It Pa /etc/passwd
|
|
A Version 7 format password file
|
|
.El
|
|
.Sh SEE ALSO
|
|
.Xr getlogin 2 ,
|
|
.Xr getgrent 3 ,
|
|
.Xr yp 4 ,
|
|
.Xr passwd 5 ,
|
|
.Xr pwd_mkdb 8 ,
|
|
.Xr vipw 8
|
|
.Sh HISTORY
|
|
The
|
|
.Fn getpwent ,
|
|
.Fn getpwnam ,
|
|
.Fn getpwuid ,
|
|
.Fn setpwent,
|
|
and
|
|
.Fn endpwent
|
|
functions appeared in
|
|
.At v7 .
|
|
The
|
|
.Fn setpassent
|
|
function appeared in
|
|
.Bx 4.3 Reno .
|
|
.Sh COMPATIBILITY
|
|
The historic function
|
|
.Xr setpwfile 3 ,
|
|
which allowed the specification of alternate password databases,
|
|
has been deprecated and is no longer available.
|
|
.Sh BUGS
|
|
The functions
|
|
.Fn getpwent ,
|
|
.Fn getpwnam ,
|
|
and
|
|
.Fn getpwuid ,
|
|
leave their results in an internal static object and return
|
|
a pointer to that object. Subsequent calls to
|
|
the same function
|
|
will modify the same object.
|