6 eval {my @n = getpwuid 0; setpwent()};
7 if ($@ && $@ =~ /(The \w+ function is unimplemented)/) {
8 print "1..0 # Skip: $1\n";
11 eval { require Config; import Config; };
13 if ($Config{'i_pwd'} ne 'define') {
14 $reason = '$Config{i_pwd} undefined';
16 elsif (not -f "/etc/passwd" ) { # Play safe.
17 $reason = 'no /etc/passwd file';
20 if (not defined $where) { # Try NIS.
21 foreach my $ypcat (qw(/usr/bin/ypcat /bin/ypcat /etc/ypcat)) {
23 open(PW, "$ypcat passwd 2>/dev/null |") &&
25 $where = "NIS passwd";
32 if (not defined $where) { # Try NetInfo.
33 foreach my $nidump (qw(/usr/bin/nidump)) {
35 open(PW, "$nidump passwd . 2>/dev/null |") &&
37 $where = "NetInfo passwd";
44 if (not defined $where) { # Try local.
45 my $PW = "/etc/passwd";
46 if (-f $PW && open(PW, $PW) && defined(<PW>)) {
52 if ($reason) { # Give up.
53 print "1..0 # Skip: $reason\n";
58 # By now the PW filehandle should be open and full of juicy password entries.
62 # Go through at most this many users.
63 # (note that the first entry has been read away by now)
74 # LIMIT -1 so that users with empty shells don't fall off
75 my @s = split /:/, $_, -1;
76 my ($name_s, $passwd_s, $uid_s, $gid_s, $gcos_s, $home_s, $shell_s);
77 if ($^O eq 'darwin') {
78 ($name_s, $passwd_s, $uid_s, $gid_s, $gcos_s, $home_s, $shell_s) = @s[0,1,2,3,7,8,9];
80 ($name_s, $passwd_s, $uid_s, $gid_s, $gcos_s, $home_s, $shell_s) = @s;
82 next if /^\+/; # ignore NIS includes
84 push @{ $seen{$name_s} }, $.;
86 warn "# Your $where line $. is empty.\n";
94 # In principle we could whine if @s != 7 but do we know enough
95 # of passwd file formats everywhere?
96 if (@s == 7 || ($^O eq 'darwin' && @s == 10)) {
97 @n = getpwuid($uid_s);
100 my ($name,$passwd,$uid,$gid,$quota,$comment,$gcos,$home,$shell) = @n;
101 # Protect against one-to-many and many-to-one mappings.
102 if ($name_s ne $name) {
103 @n = getpwnam($name_s);
104 ($name,$passwd,$uid,$gid,$quota,$comment,$gcos,$home,$shell) = @n;
105 next if $name_s ne $name;
108 if $name eq $name_s and
110 # Do not compare passwords: think shadow passwords.
120 if (keys %perfect == 0) {
124 # The failure of op/pwent test is not necessarily serious.
125 # It may fail due to local password administration conventions.
126 # If you are for example using both NIS and local passwords,
127 # test failure is possible. Any distributed password scheme
128 # can cause such failures.
130 # What the pwent test is doing is that it compares the $max first
132 # with the results of getpwuid() and getpwnam() call. If it finds no
133 # matches at all, it suspects something is wrong.
142 print "\t# (not necessarily serious: run t/op/pwent.t by itself)" if $not;
145 # Test both the scalar and list contexts.
151 my $pw = scalar getpwent();
152 last unless defined $pw;
161 my ($pw) = (getpwent());
162 last unless defined $pw;
167 print "not " unless "@pw1" eq "@pw2";
168 print "ok ", $tst++, "\n";