1 .\" Copyright (c) 1988, 1991, 1993
2 .\" The Regents of the University of California. All rights reserved.
4 .\" Redistribution and use in source and binary forms, with or without
5 .\" modification, are permitted provided that the following conditions
7 .\" 1. Redistributions of source code must retain the above copyright
8 .\" notice, this list of conditions and the following disclaimer.
9 .\" 2. Redistributions in binary form must reproduce the above copyright
10 .\" notice, this list of conditions and the following disclaimer in the
11 .\" documentation and/or other materials provided with the distribution.
12 .\" 3. All advertising materials mentioning features or use of this software
13 .\" must display the following acknowledgement:
14 .\" This product includes software developed by the University of
15 .\" California, Berkeley and its contributors.
16 .\" 4. Neither the name of the University nor the names of its contributors
17 .\" may be used to endorse or promote products derived from this software
18 .\" without specific prior written permission.
20 .\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
21 .\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22 .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23 .\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
24 .\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25 .\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26 .\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27 .\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28 .\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29 .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
32 .\" From: @(#)getpwent.3 8.2 (Berkeley) 12/11/93
35 .Dd September 20, 1994
45 .Nd password database operations
47 .Fd #include <sys/types.h>
52 .Fn getpwnam "const char *login"
54 .Fn getpwuid "uid_t uid"
56 .Fn setpassent "int stayopen"
63 operate on the password database file
67 Each entry in the database is defined by the structure
72 .Bd -literal -offset indent
74 char *pw_name; /* user name */
75 char *pw_passwd; /* encrypted password */
76 uid_t pw_uid; /* user uid */
77 gid_t pw_gid; /* user gid */
78 time_t pw_change; /* password change time */
79 char *pw_class; /* user access class */
80 char *pw_gecos; /* Honeywell login info */
81 char *pw_dir; /* home directory */
82 char *pw_shell; /* default shell */
83 time_t pw_expire; /* account expiration */
84 int pw_fields; /* internal: fields filled in */
92 search the password database for the given login name or user uid,
93 respectively, always returning the first one encountered.
98 sequentially reads the password database and is intended for programs
99 that wish to process the complete list of users.
104 accomplishes two purposes.
107 to ``rewind'' to the beginning of the database.
110 is non-zero, file descriptors are left open, significantly speeding
111 up subsequent accesses for all of the routines.
112 (This latter functionality is unnecessary for
114 as it doesn't close its file descriptors by default.)
116 It is dangerous for long-running programs to keep the file descriptors
117 open as the database will become out of date if it is updated while the
125 with an argument of zero.
130 closes any open files.
132 These routines have been written to ``shadow'' the password file, e.g.
133 allow only certain programs to have access to the encrypted password.
134 If the process which calls them has an effective uid of 0, the encrypted
135 password will be returned, otherwise, the password field of the returned
136 structure will point to the string
138 .Sh YP/NIS INTERACTION
141 password database is enabled, the
145 functions use the YP maps
148 .Dq Li passwd.byuid ,
149 respectively, if the requested password entry is not found in the
152 function will step through the YP map
154 if the entire map is enabled as described in
162 return a valid pointer to a passwd structure on success
163 and a null pointer if end-of-file is reached or an error occurs.
166 function returns 0 on failure and 1 on success.
172 have no return value.
174 .Bl -tag -width /etc/master.passwd -compact
176 The insecure password database file
178 The secure password database file
179 .It Pa /etc/master.passwd
180 The current password file
182 A Version 7 format password file
199 functions appeared in
206 The historic function
208 which allowed the specification of alternate password databases,
209 has been deprecated and is no longer available.
216 leave their results in an internal static object and return
217 a pointer to that object. Subsequent calls to
219 will modify the same object.