.\" Copyright (c) 2003 Andries Brouwer (aeb@cwi.nl) and
.\" Walter Harms (walter.harms@informatik.uni-oldenburg.de)
.\"
+.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
.\" Distributed under GPL
+.\" %%%LICENSE_END
.\"
-.TH GETSPNAM 3 2010-02-25 "GNU" "Linux Programmer's Manual"
+.TH GETSPNAM 3 2013-01-22 "GNU" "Linux Programmer's Manual"
.SH NAME
getspnam, getspnam_r, getspent, getspent_r, setspent, endspent,
fgetspent, fgetspent_r, sgetspent, sgetspent_r, putspent,
They are widely available.
.\" Also in libc5
.\" SUN doesn't have sgetspent()
-.SS "Reentrant versions"
+.SS Reentrant versions
Analogous to the reentrant functions for the password database, glibc
also has reentrant functions for the shadow password database.
The
struct spwd {
char *sp_namp; /* Login name */
char *sp_pwdp; /* Encrypted password */
- long sp_lstchg; /* Date of last change (measured
- in days since 1970-01-01 00:00:00 +0000 (UTC)) */
+ long sp_lstchg; /* Date of last change
+ (measured in days since
+ 1970-01-01 00:00:00 +0000 (UTC)) */
long sp_min; /* Min # of days between changes */
long sp_max; /* Max # of days between changes */
long sp_warn; /* # of days before password expires
to warn user to change it */
long sp_inact; /* # of days after password expires
until account is disabled */
- long sp_expire; /* Date when account expires (measured
- in days since 1970-01-01 00:00:00 +0000 (UTC)) */
+ long sp_expire; /* Date when account expires
+ (measured in days since
+ 1970-01-01 00:00:00 +0000 (UTC)) */
unsigned long sp_flag; /* Reserved */
};
.fi
.in
-.SH "RETURN VALUE"
+.SH RETURN VALUE
The functions that return a pointer return NULL if no more entries
are available or if an error occurs during processing.
The functions which have \fIint\fP as the return value return 0 for
In case of error, an error number is returned.
.SH ERRORS
.TP
+.B EACCES
+The caller does not have permission to access the shadow password file.
+.TP
.B ERANGE
Supplied buffer is too small.
.SH FILES
defines the constant
.B _PATH_SHADOW
to the pathname of the shadow password file.
-.SH "CONFORMING TO"
+.SH CONFORMING TO
The shadow password database and its associated API are
not specified in POSIX.1-2001.
However, many other systems provide a similar API.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR getgrnam (3),
.BR getpwnam (3),
.BR getpwnam_r (3),