1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
|
#!./perl
BEGIN {
chdir 't' if -d 't';
unshift @INC, "../lib" if -d "../lib";
eval { require Config; import Config; };
my $reason;
if ($Config{'i_pwd'} ne 'define') {
$reason = '$Config{i_pwd} undefined';
}
elsif (not -f "/etc/passwd" ) { # Play safe.
$reason = 'no /etc/passwd file';
}
if (not defined $where) { # Try NIS.
foreach my $ypcat (qw(/usr/bin/ypcat /bin/ypcat /etc/ypcat)) {
if (-x $ypcat &&
open(PW, "$ypcat passwd 2>/dev/null |") &&
defined(<PW>)) {
$where = "NIS passwd";
undef $reason;
last;
}
}
}
if (not defined $where) { # Try NetInfo.
foreach my $nidump (qw(/usr/bin/nidump)) {
if (-x $nidump &&
open(PW, "$nidump passwd . 2>/dev/null |") &&
defined(<PW>)) {
$where = "NetInfo passwd";
undef $reason;
last;
}
}
}
if (not defined $where) { # Try local.
my $PW = "/etc/passwd";
if (-f $PW && open(PW, $PW) && defined(<PW>)) {
$where = $PW;
undef $reason;
}
}
if ($reason) { # Give up.
print "1..0 # Skip: $reason\n";
exit 0;
}
}
# By now PW filehandle should be open and full of juicy password entries.
print "1..1\n";
# Go through at most this many users.
# (note that the first entry has been read away by now)
my $max = 25;
my $n = 0;
my $tst = 1;
my %perfect;
my %seen;
while (<PW>) {
chomp;
my @s = split /:/;
my ($name_s, $passwd_s, $uid_s, $gid_s, $gcos_s, $home_s, $shell_s) = @s;
next if /^\+/; # ignore NIS includes
if (@s) {
push @{ $seen{$name_s} }, $.;
} else {
warn "# Your $where line $. is empty.\n";
next;
}
last if $n == $max;
# In principle we could whine if @s != 7 but do we know enough
# of passwd file formats everywhere?
if (@s == 7) {
@n = getpwuid($uid_s);
# 'nobody' et al.
next unless @n;
my ($name,$passwd,$uid,$gid,$quota,$comment,$gcos,$home,$shell) = @n;
# Protect against one-to-many and many-to-one mappings.
if ($name_s ne $name) {
@n = getpwnam($name_s);
($name,$passwd,$uid,$gid,$quota,$comment,$gcos,$home,$shell) = @n;
next if $name_s ne $name;
}
$perfect{$name_s}++
if $name eq $name_s and
$uid eq $uid_s and
# Do not compare passwords: think shadow passwords.
$gid eq $gid_s and
$gcos eq $gcos_s and
$home eq $home_s and
$shell eq $shell_s;
}
$n++;
}
if (keys %perfect == 0) {
$max++;
print <<EOEX;
#
# The failure of op/pwent test is not necessarily serious.
# It may fail due to local password administration conventions.
# If you are for example using both NIS and local passwords,
# test failure is possible. Any distributed password scheme
# can cause such failures.
#
# What the pwent test is doing is that it compares the $max first
# entries of $where
# with the results of getpwuid() and getpwnam() call. If it finds no
# matches at all, it suspects something is wrong.
#
EOEX
print "not ";
$not = 1;
} else {
$not = 0;
}
print "ok ", $tst++;
print "\t# (not necessarily serious: run t/op/pwent.t by itself)" if $not;
print "\n";
close(PW);
|