1 .\" Copyright (c) 1989, 1991, 1993
2 .\" The Regents of the University of California. All rights reserved.
4 .\" Redistribution and use in source and binary forms, with or without
5 .\" modification, are permitted provided that the following conditions
7 .\" 1. Redistributions of source code must retain the above copyright
8 .\" notice, this list of conditions and the following disclaimer.
9 .\" 2. Redistributions in binary form must reproduce the above copyright
10 .\" notice, this list of conditions and the following disclaimer in the
11 .\" documentation and/or other materials provided with the distribution.
12 .\" 3. All advertising materials mentioning features or use of this software
13 .\" must display the following acknowledgement:
14 .\" This product includes software developed by the University of
15 .\" California, Berkeley and its contributors.
16 .\" 4. Neither the name of the University nor the names of its contributors
17 .\" may be used to endorse or promote products derived from this software
18 .\" without specific prior written permission.
20 .\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
21 .\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22 .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23 .\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
24 .\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25 .\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26 .\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27 .\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28 .\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29 .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
32 .\" From: @(#)getgrent.3 8.2 (Berkeley) 4/19/94
48 .Nd group database operations
56 .Fn getgrent_r "struct group *grp" "char *buffer" "size_t bufsize" "struct group **result"
58 .Fn getgrnam "const char *name"
60 .Fn getgrnam_r "const char *name" "struct group *grp" "char *buffer" "size_t bufsize" "struct group **result"
62 .Fn getgrgid "gid_t gid"
64 .Fn getgrgid_r "gid_t gid" "struct group *grp" "char *buffer" "size_t bufsize" "struct group **result"
66 .Fn setgroupent "int stayopen"
72 These functions operate on the group database file
77 Each line of the database is defined by the structure
82 .Bd -literal -offset indent
84 char *gr_name; /* group name */
85 char *gr_passwd; /* group password */
86 gid_t gr_gid; /* group id */
87 char **gr_mem; /* group members */
95 search the group database for the given group name pointed to by
97 or the group id pointed to by
99 respectively, returning the first one encountered.
101 names or group gids may result in undefined behavior.
106 sequentially reads the group database and is intended for programs
107 that wish to step through the complete list of groups.
114 are thread-safe versions of
120 The caller must provide storage for the results of the search in
128 When these functions are successful, the
130 argument will be filled-in, and a pointer to that argument will be
133 If an entry is not found or an error occurs,
138 These functions will open the group file for reading, if necessary.
143 opens the file, or rewinds it if it is already open.
146 is non-zero, file descriptors are left open, significantly speeding
147 functions subsequent calls.
148 This functionality is unnecessary for
150 as it does not close its file descriptors by default.
152 be noted that it is dangerous for long-running programs to use this
153 functionality as the group file may be updated.
160 with an argument of zero.
165 closes any open files.
172 return a pointer to a group structure on success or
174 if the entry is not found or if an error occurs.
175 If an error does occur,
178 Note that programs must explicitly set
180 to zero before calling any of these functions if they need to
181 distinguish between a non-existent entry and an error.
187 return 0 if no error occurred, or an error number to indicate failure.
188 It is not an error if a matching entry is not found.
193 and the return value is 0, no matching entry exists.)
199 return the value 1 if successful, otherwise the value
205 have no return value.
207 .Bl -tag -width /etc/group -compact
212 The historic function
214 which allowed the specification of alternate password databases, has
215 been deprecated and is no longer available.
219 .Xr nsswitch.conf 5 ,
234 function differs from that standard in that its return type is
269 leave their results in an internal static object and return
270 a pointer to that object.
273 will modify the same object.
282 are fairly useless in a networked environment and should be
283 avoided, if possible.
289 make no attempt to suppress duplicate information if multiple
290 sources are specified in
291 .Xr nsswitch.conf 5 .