141 lines
4.8 KiB
Groff
141 lines
4.8 KiB
Groff
.\"$Id: shadow.3,v 1.10 2003/05/01 18:17:39 kloczek Exp $
|
|
.\" Copyright 1989 - 1993, Julianne Frances Haugh
|
|
.\" All rights reserved.
|
|
.\"
|
|
.\" Redistribution and use in source and binary forms, with or without
|
|
.\" modification, are permitted provided that the following conditions
|
|
.\" are met:
|
|
.\" 1. Redistributions of source code must retain the above copyright
|
|
.\" notice, this list of conditions and the following disclaimer.
|
|
.\" 2. Redistributions in binary form must reproduce the above copyright
|
|
.\" notice, this list of conditions and the following disclaimer in the
|
|
.\" documentation and/or other materials provided with the distribution.
|
|
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
|
|
.\" may be used to endorse or promote products derived from this software
|
|
.\" without specific prior written permission.
|
|
.\"
|
|
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
|
|
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
|
|
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
.\" SUCH DAMAGE.
|
|
.TH SHADOW 3
|
|
.SH NAME
|
|
shadow \- encrypted password file routines
|
|
.SH SYNTAX
|
|
.B #include <shadow.h>
|
|
.PP
|
|
.B struct spwd *getspent();
|
|
.PP
|
|
.B struct spwd *getspnam(char
|
|
.IB *name );
|
|
.PP
|
|
.B void setspent();
|
|
.PP
|
|
.B void endspent();
|
|
.PP
|
|
.B struct spwd *fgetspent(FILE
|
|
.IB *fp );
|
|
.PP
|
|
.B struct spwd *sgetspent(char
|
|
.IB *cp );
|
|
.PP
|
|
.B int putspent(struct spwd
|
|
.I *p,
|
|
.B FILE
|
|
.IB *fp );
|
|
.PP
|
|
.B int lckpwdf();
|
|
.PP
|
|
.B int ulckpwdf();
|
|
.SH DESCRIPTION
|
|
.I shadow
|
|
manipulates the contents of the shadow password file,
|
|
\fI/etc/shadow\fR.
|
|
The structure in the \fI#include\fR file is
|
|
.sp
|
|
struct spwd {
|
|
.in +.5i
|
|
.br
|
|
char *sp_namp; /* user login name */
|
|
.br
|
|
char *sp_pwdp; /* encrypted password */
|
|
.br
|
|
long int sp_lstchg; /* last password change */
|
|
.br
|
|
long int sp_min; /* days until change allowed. */
|
|
.br
|
|
long int sp_max; /* days before change required */
|
|
.br
|
|
long int sp_warn; /* days warning for expiration */
|
|
.br
|
|
long int sp_inact; /* days before account inactive */
|
|
.br
|
|
long int sp_expire; /* date when account expires */
|
|
.br
|
|
unsigned long int sp_flag; /* reserved for future use */
|
|
.br
|
|
.in -.5i
|
|
}
|
|
.PP
|
|
The meanings of each field are
|
|
.sp
|
|
sp_namp \- pointer to null-terminated user name.
|
|
.br
|
|
sp_pwdp \- pointer to null-terminated password.
|
|
.br
|
|
sp_lstchg \- days since Jan 1, 1970 password was last changed.
|
|
.br
|
|
sp_min \- days before which password may not be changed.
|
|
.br
|
|
sp_max \- days after which password must be changed.
|
|
.br
|
|
sp_warn \- days before password is to expire that user is warned
|
|
of pending password expiration.
|
|
.br
|
|
sp_inact \- days after password expires that account is considered
|
|
inactive and disabled.
|
|
.br
|
|
sp_expire \- days since Jan 1, 1970 when account will be disabled.
|
|
.br
|
|
sp_flag \- reserved for future use.
|
|
.SH DESCRIPTION
|
|
\fBgetspent\fR, \fBgetspname\fR, \fBfgetspent\fR, and \fBsgetspent\fR each
|
|
return a pointer to a \fBstruct spwd\fR. \fBgetspent\fR returns the next
|
|
entry from the file, and \fBfgetspent\fR returns the next entry from the
|
|
given stream, which is assumed to be a file of the proper format.
|
|
\fBsgetspent\fR returns a pointer to a \fBstruct spwd\fR using the
|
|
provided string as input. \fBgetspnam\fR searches from the current position
|
|
in the file for an entry matching \fBname\fR.
|
|
.PP
|
|
\fBsetspent\fR and \fBendspent\fR may be used to begin and end,
|
|
respectively, access to the shadow password file.
|
|
.PP
|
|
The \fBlckpwdf\fR and \fBulckpwdf\fR routines should be used to insure
|
|
exclusive access to the \fI/etc/shadow\fR file. \fBlckpwdf\fR attempts to
|
|
acquire a lock using \fBpw_lock\fR for up to 15 seconds. It continues by
|
|
attempting to acquire a second lock using \fBspw_lock\fR for the remainder
|
|
of the initial 15 seconds. Should either attempt fail after a total of 15
|
|
seconds, \fBlckpwdf\fR returns -1. When both locks are acquired 0 is
|
|
returned.
|
|
.SH DIAGNOSTICS
|
|
Routines return NULL if no more entries are available or if an error occurs
|
|
during processing. Routines which have \fBint\fR as the return value return
|
|
0 for success and -1 for failure.
|
|
.SH CAVEATS
|
|
These routines may only be used by the super user as access to the shadow
|
|
password file is restricted.
|
|
.SH FILES
|
|
\fI/etc/shadow\fR \ - encrypted user passwords
|
|
.SH SEE ALSO
|
|
.BR getpwent (3),
|
|
.BR shadow (5)
|
|
.SH AUTHOR
|
|
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
|