X-Git-Url: https://arthur.barton.de/cgi-bin/gitweb.cgi?a=blobdiff_plain;f=etc%2Fafpd%2Fauth.c;h=b7f5aa5d37b62cfcc2f35cde4d663d2938168e60;hb=3c047583a192b6dad0938e4c7fbefcb92755b727;hp=9923ac4ee0a2c0ec204f32c946d43864be48def2;hpb=16d2aa6c8fb26418a16ae52a1cc969b15cbc8403;p=netatalk.git diff --git a/etc/afpd/auth.c b/etc/afpd/auth.c index 9923ac4e..b7f5aa5d 100644 --- a/etc/afpd/auth.c +++ b/etc/afpd/auth.c @@ -1,6 +1,4 @@ /* - * $Id: auth.c,v 1.64 2009-09-28 09:21:09 franklahm Exp $ - * * Copyright (c) 1990,1993 Regents of The University of Michigan. * All Rights Reserved. See COPYRIGHT. */ @@ -28,9 +26,6 @@ #include #include #include -#include -#include -#include #ifdef TRU64 #include @@ -41,17 +36,19 @@ extern void afp_get_cmdline( int *ac, char ***av ); #endif /* TRU64 */ -#include "globals.h" +#include +#include +#include +#include + #include "auth.h" #include "uam_auth.h" #include "switch.h" #include "status.h" #include "fork.h" -#ifdef HAVE_NFSv4_ACLS -#include "acls.h" -#endif -#ifdef HAVE_EXT_ATTRS #include "extattrs.h" +#ifdef HAVE_ACLS +#include "acls.h" #endif int afp_version = 11; @@ -76,15 +73,16 @@ int ngroups; * These numbers are scattered throughout the code. */ static struct afp_versions afp_versions[] = { +#ifndef NO_DDP { "AFPVersion 1.1", 11 }, { "AFPVersion 2.0", 20 }, { "AFPVersion 2.1", 21 }, +#endif /* ! NO_DDP */ { "AFP2.2", 22 }, -#ifdef AFP3x { "AFPX03", 30 }, { "AFP3.1", 31 }, - { "AFP3.2", 32 } -#endif + { "AFP3.2", 32 }, + { "AFP3.3", 33 } }; static struct uam_mod uam_modules = {NULL, NULL, &uam_modules, &uam_modules}; @@ -96,18 +94,30 @@ static struct uam_obj uam_changepw = {"", "", 0, {{NULL, NULL, NULL, NULL}}, &ua static struct uam_obj *afp_uam = NULL; -void status_versions( data ) - char *data; +void status_versions( char *data, const ASP asp, const DSI *dsi) { char *start = data; u_int16_t status; - int len, num, i; + int len, num, i, count = 0; memcpy(&status, start + AFPSTATUS_VERSOFF, sizeof(status)); num = sizeof( afp_versions ) / sizeof( afp_versions[ 0 ] ); + + for ( i = 0; i < num; i++ ) { +#ifndef NO_DDP + if ( !asp && (afp_versions[ i ].av_number <= 21)) continue; +#endif /* ! NO_DDP */ + if ( !dsi && (afp_versions[ i ].av_number >= 22)) continue; + count++; + } data += ntohs( status ); - *data++ = num; + *data++ = count; + for ( i = 0; i < num; i++ ) { +#ifndef NO_DDP + if ( !asp && (afp_versions[ i ].av_number <= 21)) continue; +#endif /* ! NO_DDP */ + if ( !dsi && (afp_versions[ i ].av_number >= 22)) continue; len = strlen( afp_versions[ i ].av_name ); *data++ = len; memcpy( data, afp_versions[ i ].av_name , len ); @@ -161,19 +171,15 @@ static int send_reply(const AFPObj *obj, const int err) return AFP_OK; } -static int afp_errpwdexpired(obj, ibuf, ibuflen, rbuf, rbuflen ) - AFPObj *obj _U_; - char *ibuf _U_, *rbuf _U_; - int ibuflen _U_, *rbuflen; +static int afp_errpwdexpired(AFPObj *obj _U_, char *ibuf _U_, size_t ibuflen _U_, + char *rbuf _U_, size_t *rbuflen) { *rbuflen = 0; return AFPERR_PWDEXPR; } -static int afp_null_nolog(obj, ibuf, ibuflen, rbuf, rbuflen ) - AFPObj *obj _U_; - char *ibuf _U_, *rbuf _U_; - int ibuflen _U_, *rbuflen; +static int afp_null_nolog(AFPObj *obj _U_, char *ibuf _U_, size_t ibuflen _U_, + char *rbuf _U_, size_t *rbuflen) { *rbuflen = 0; return( AFPERR_NOOP ); @@ -201,23 +207,25 @@ static int set_auth_switch(int expired) else { afp_switch = postauth_switch; switch (afp_version) { + + case 33: case 32: - uam_afpserver_action(AFP_SPOTLIGHT_PRIVATE, UAM_AFPSERVER_POSTAUTH, afp_null_nolog, NULL); - uam_afpserver_action(AFP_SYNCDIR, UAM_AFPSERVER_POSTAUTH, afp_syncdir, NULL); - uam_afpserver_action(AFP_SYNCFORK, UAM_AFPSERVER_POSTAUTH, afp_syncfork, NULL); -#ifdef HAVE_NFSv4_ACLS +#ifdef HAVE_ACLS uam_afpserver_action(AFP_GETACL, UAM_AFPSERVER_POSTAUTH, afp_getacl, NULL); uam_afpserver_action(AFP_SETACL, UAM_AFPSERVER_POSTAUTH, afp_setacl, NULL); uam_afpserver_action(AFP_ACCESS, UAM_AFPSERVER_POSTAUTH, afp_access, NULL); -#endif -#ifdef HAVE_EXT_ATTRS +#endif /* HAVE_ACLS */ uam_afpserver_action(AFP_GETEXTATTR, UAM_AFPSERVER_POSTAUTH, afp_getextattr, NULL); uam_afpserver_action(AFP_SETEXTATTR, UAM_AFPSERVER_POSTAUTH, afp_setextattr, NULL); uam_afpserver_action(AFP_REMOVEATTR, UAM_AFPSERVER_POSTAUTH, afp_remextattr, NULL); uam_afpserver_action(AFP_LISTEXTATTR, UAM_AFPSERVER_POSTAUTH, afp_listextattr, NULL); -#endif + case 31: + uam_afpserver_action(AFP_SYNCDIR, UAM_AFPSERVER_POSTAUTH, afp_syncdir, NULL); + uam_afpserver_action(AFP_SYNCFORK, UAM_AFPSERVER_POSTAUTH, afp_syncfork, NULL); + uam_afpserver_action(AFP_SPOTLIGHT_PRIVATE, UAM_AFPSERVER_POSTAUTH, afp_null_nolog, NULL); uam_afpserver_action(AFP_ENUMERATE_EXT2, UAM_AFPSERVER_POSTAUTH, afp_enumerate_ext2, NULL); + case 30: uam_afpserver_action(AFP_ENUMERATE_EXT, UAM_AFPSERVER_POSTAUTH, afp_enumerate_ext, NULL); uam_afpserver_action(AFP_BYTELOCK_EXT, UAM_AFPSERVER_POSTAUTH, afp_bytelock_ext, NULL); @@ -242,23 +250,36 @@ static int set_auth_switch(int expired) return AFP_OK; } +#define GROUPSTR_BUFSIZE 1024 +static const char *print_groups(int ngroups, gid_t *groups) +{ + static char groupsstr[GROUPSTR_BUFSIZE]; + int i; + char *s = groupsstr; + + if (ngroups == 0) + return "-"; + + for (i = 0; (i < ngroups) && (s < &groupsstr[GROUPSTR_BUFSIZE]); i++) { + s += snprintf(s, &groupsstr[GROUPSTR_BUFSIZE] - s, " %u", groups[i]); + } + + return groupsstr; +} + static int login(AFPObj *obj, struct passwd *pwd, void (*logout)(void), int expired) { #ifdef ADMIN_GRP int admin = 0; #endif /* ADMIN_GRP */ -#if 0 - set_processname("afpd"); -#endif - if ( pwd->pw_uid == 0 ) { /* don't allow root login */ LOG(log_error, logtype_afpd, "login: root login denied!" ); return AFPERR_NOTAUTH; } - LOG(log_info, logtype_afpd, "login %s (uid %d, gid %d) %s", pwd->pw_name, - pwd->pw_uid, pwd->pw_gid , afp_versions[afp_version_index].av_name); + LOG(log_note, logtype_afpd, "%s Login by %s", + afp_versions[afp_version_index].av_name, pwd->pw_name); #ifndef NO_DDP if (obj->proto == AFPPROTO_ASP) { @@ -327,9 +348,8 @@ static int login(AFPObj *obj, struct passwd *pwd, void (*logout)(void), int expi } #ifdef ADMIN_GRP -#ifdef DEBUG - LOG(log_info, logtype_afpd, "obj->options.admingid == %d", obj->options.admingid); -#endif /* DEBUG */ + LOG(log_debug, logtype_afpd, "obj->options.admingid == %d", obj->options.admingid); + if (obj->options.admingid != 0) { int i; for (i = 0; i < ngroups; i++) { @@ -341,7 +361,7 @@ static int login(AFPObj *obj, struct passwd *pwd, void (*logout)(void), int expi LOG(log_info, logtype_afpd, "admin login -- %s", pwd->pw_name ); } if (!admin) -#endif /* DEBUG */ +#endif /* ADMIN_GRP */ #ifdef TRU64 { struct DSI *dsi = obj->handle; @@ -384,17 +404,19 @@ static int login(AFPObj *obj, struct passwd *pwd, void (*logout)(void), int expi } #endif /* TRU64 */ - /* There's probably a better way to do this, but for now, we just - play root */ + LOG(log_debug, logtype_afpd, "login: supplementary groups: %s", print_groups(ngroups, groups)); + /* There's probably a better way to do this, but for now, we just play root */ #ifdef ADMIN_GRP - if (admin) uuid = 0; + if (admin) + uuid = 0; else #endif /* ADMIN_GRP */ uuid = pwd->pw_uid; set_auth_switch(expired); - + /* save our euid, we need it for preexec_close */ + obj->uid = geteuid(); obj->logout = logout; #ifdef FORCE_UIDGID @@ -406,25 +428,57 @@ static int login(AFPObj *obj, struct passwd *pwd, void (*logout)(void), int expi } /* ---------------------- */ -int afp_zzz (obj, ibuf, ibuflen, rbuf, rbuflen ) /* Function 122 */ - AFPObj *obj; - char *ibuf _U_, *rbuf; - unsigned int ibuflen _U_, *rbuflen; +int afp_zzz(AFPObj *obj, char *ibuf, size_t ibuflen, char *rbuf, size_t *rbuflen) { - u_int32_t retdata; + uint32_t data; + DSI *dsi = (DSI *)AFPobj->handle; *rbuflen = 0; + ibuf += 2; + ibuflen -= 2; + + if (ibuflen < 4) + return AFPERR_MISC; + memcpy(&data, ibuf, 4); /* flag */ + data = ntohl(data); + + /* + * Possible sleeping states: + * 1) normal sleep: DSI_SLEEPING (up to 10.3) + * 2) extended sleep: DSI_SLEEPING | DSI_EXTSLEEP (starting with 10.4) + */ - retdata = obj->options.sleep /120; - if (!retdata) { - retdata = 1; + if (data & AFPZZZ_EXT_WAKEUP) { + /* wakeup request from exetended sleep */ + if (dsi->flags & DSI_EXTSLEEP) { + LOG(log_note, logtype_afpd, "afp_zzz: waking up from extended sleep"); + dsi->flags &= ~(DSI_SLEEPING | DSI_EXTSLEEP); + } + } else { + /* sleep request */ + dsi->flags |= DSI_SLEEPING; + if (data & AFPZZZ_EXT_SLEEP) { + LOG(log_note, logtype_afpd, "afp_zzz: entering extended sleep"); + dsi->flags |= DSI_EXTSLEEP; + } else { + LOG(log_note, logtype_afpd, "afp_zzz: entering normal sleep"); + } } - *rbuflen = sizeof(retdata); - retdata = htonl(retdata); - memcpy(rbuf, &retdata, sizeof(retdata)); - if (obj->sleep) - obj->sleep(); - rbuf += sizeof(retdata); + + /* + * According to AFP 3.3 spec we should not return anything, + * but eg 10.5.8 server still returns the numbers of hours + * the server is keeping the sessino (ie max sleeptime). + */ + data = obj->options.sleep / 120; /* hours */ + if (!data) { + data = 1; + } + *rbuflen = sizeof(data); + data = htonl(data); + memcpy(rbuf, &data, sizeof(data)); + rbuf += sizeof(data); + return AFP_OK; } @@ -464,10 +518,10 @@ static int create_session_key(AFPObj *obj) /* ---------------------- */ -int afp_getsession(obj, ibuf, ibuflen, rbuf, rbuflen ) - AFPObj *obj; - char *ibuf, *rbuf; - unsigned int ibuflen, *rbuflen; +int afp_getsession( + AFPObj *obj, + char *ibuf, size_t ibuflen, + char *rbuf, size_t *rbuflen) { u_int16_t type; u_int32_t idlen = 0; @@ -479,6 +533,10 @@ int afp_getsession(obj, ibuf, ibuflen, rbuf, rbuflen ) *rbuflen = 0; tklen = 0; + if (ibuflen < 2 + sizeof(type)) { + return AFPERR_PARAM; + } + ibuf += 2; ibuflen -= 2; @@ -515,7 +573,7 @@ int afp_getsession(obj, ibuf, ibuflen, rbuf, rbuflen ) token = obj->sinfo.sessiontoken; } break; - case 3: /* Jaguar */ + case 3: case 4: if (ibuflen >= 8 ) { p = ibuf; @@ -528,7 +586,13 @@ int afp_getsession(obj, ibuf, ibuflen, rbuf, rbuflen ) if (ibuflen < idlen || idlen > (90-10)) { return AFPERR_PARAM; } - server_ipc_write(IPC_GETSESSION, idlen+8, p ); + if (!obj->sinfo.clientid) { + obj->sinfo.clientid = malloc(idlen + 8); + memcpy(obj->sinfo.clientid, p, idlen + 8); + obj->sinfo.clientid_len = idlen + 8; + } + if (ipc_child_write(obj->ipc_fd, IPC_GETSESSION, idlen+8, p) != 0) + return AFPERR_MISC; tklen = obj->sinfo.sessiontoken_len; token = obj->sinfo.sessiontoken; } @@ -558,13 +622,10 @@ int afp_getsession(obj, ibuf, ibuflen, rbuf, rbuflen ) } /* ---------------------- */ -int afp_disconnect(obj, ibuf, ibuflen, rbuf, rbuflen ) - AFPObj *obj _U_; - char *ibuf, *rbuf _U_; - int ibuflen _U_, *rbuflen; +int afp_disconnect(AFPObj *obj, char *ibuf, size_t ibuflen _U_, char *rbuf _U_, size_t *rbuflen) { + DSI *dsi = (DSI *)obj->handle; u_int16_t type; - u_int32_t tklen; pid_t token; int i; @@ -605,19 +666,45 @@ int afp_disconnect(obj, ibuf, ibuflen, rbuf, rbuflen ) } } - /* killed old session, not easy */ - server_ipc_write(IPC_KILLTOKEN, tklen, &token); - sleep(1); + LOG(log_note, logtype_afpd, "afp_disconnect: trying primary reconnect"); + dsi->flags |= DSI_RECONINPROG; - return AFPERR_SESSCLOS; /* was AFP_OK */ + /* Deactivate tickle timer */ + const struct itimerval none = {{0, 0}, {0, 0}}; + setitimer(ITIMER_REAL, &none, NULL); + + /* check for old session, possibly transfering session from here to there */ + if (ipc_child_write(obj->ipc_fd, IPC_DISCOLDSESSION, tklen, &token) != 0) + goto exit; + /* write uint16_t DSI request ID */ + if (writet(obj->ipc_fd, &dsi->header.dsi_requestID, 2, 0, 2) != 2) { + LOG(log_error, logtype_afpd, "afp_disconnect: couldn't send DSI request ID"); + goto exit; + } + /* now send our connected AFP client socket */ + if (send_fd(obj->ipc_fd, dsi->socket) != 0) + goto exit; + /* Now see what happens: either afpd master sends us SIGTERM because our session */ + /* has been transfered to a old disconnected session, or we continue */ + sleep(5); + + if (!(dsi->flags & DSI_RECONINPROG)) { /* deleted in SIGTERM handler */ + /* Reconnect succeeded, we exit now after sleeping some more */ + sleep(2); /* sleep some more to give the recon. session time */ + LOG(log_note, logtype_afpd, "afp_disconnect: primary reconnect succeeded"); + exit(0); + } + +exit: + /* Reinstall tickle timer */ + setitimer(ITIMER_REAL, &dsi->timer, NULL); + + LOG(log_error, logtype_afpd, "afp_disconnect: primary reconnect failed"); + return AFPERR_MISC; } /* ---------------------- */ -static int get_version(obj, ibuf, ibuflen, len) - AFPObj *obj; - char *ibuf; - int ibuflen; - int len; +static int get_version(AFPObj *obj, char *ibuf, size_t ibuflen, size_t len) { int num,i; @@ -648,20 +735,18 @@ static int get_version(obj, ibuf, ibuflen, len) } /* ---------------------- */ -int afp_login(obj, ibuf, ibuflen, rbuf, rbuflen ) - AFPObj *obj; - char *ibuf, *rbuf; - int ibuflen, *rbuflen; +int afp_login(AFPObj *obj, char *ibuf, size_t ibuflen, char *rbuf, size_t *rbuflen) { struct passwd *pwd = NULL; - int len, i; + size_t len; + int i; *rbuflen = 0; if ( nologin & 1) return send_reply(obj, AFPERR_SHUTDOWN ); - if (ibuflen <= 1) + if (ibuflen < 2) return send_reply(obj, AFPERR_BADVERS ); ibuf++; @@ -672,12 +757,12 @@ int afp_login(obj, ibuf, ibuflen, rbuf, rbuflen ) if (i) return send_reply(obj, i ); + if (ibuflen <= len) + return send_reply(obj, AFPERR_BADUAM); + ibuf += len; ibuflen -= len; - if (ibuflen <= 1) - return send_reply(obj, AFPERR_BADUAM); - len = (unsigned char) *ibuf++; ibuflen--; @@ -701,13 +786,10 @@ int afp_login(obj, ibuf, ibuflen, rbuf, rbuflen ) } /* ---------------------- */ -int afp_login_ext(obj, ibuf, ibuflen, rbuf, rbuflen ) - AFPObj *obj; - char *ibuf, *rbuf; - unsigned int ibuflen, *rbuflen; +int afp_login_ext(AFPObj *obj, char *ibuf, size_t ibuflen, char *rbuf, size_t *rbuflen) { struct passwd *pwd = NULL; - unsigned int len; + size_t len; int i; char type; u_int16_t len16; @@ -718,7 +800,7 @@ int afp_login_ext(obj, ibuf, ibuflen, rbuf, rbuflen ) if ( nologin & 1) return send_reply(obj, AFPERR_SHUTDOWN ); - if (ibuflen <= 4) + if (ibuflen < 5) return send_reply(obj, AFPERR_BADVERS ); ibuf++; @@ -733,12 +815,12 @@ int afp_login_ext(obj, ibuf, ibuflen, rbuf, rbuflen ) if (i) return send_reply(obj, i ); + if (ibuflen <= len) + return send_reply(obj, AFPERR_BADUAM); + ibuf += len; ibuflen -= len; - if (ibuflen <= 1) - return send_reply(obj, AFPERR_BADUAM); - len = (unsigned char) *ibuf; ibuf++; ibuflen--; @@ -756,7 +838,7 @@ int afp_login_ext(obj, ibuf, ibuflen, rbuf, rbuflen ) return send_reply(obj, AFPERR_BADUAM); } /* user name */ - if (len <= 1 +sizeof(len16)) + if (ibuflen <= 1 +sizeof(len16)) return send_reply(obj, AFPERR_PARAM); type = *ibuf; username = ibuf; @@ -831,15 +913,12 @@ int afp_login_ext(obj, ibuf, ibuflen, rbuf, rbuflen ) } /* ---------------------- */ -int afp_logincont(obj, ibuf, ibuflen, rbuf, rbuflen) - AFPObj *obj; - char *ibuf, *rbuf; - int ibuflen, *rbuflen; +int afp_logincont(AFPObj *obj, char *ibuf, size_t ibuflen, char *rbuf, size_t *rbuflen) { struct passwd *pwd = NULL; int err; - if ( afp_uam == NULL || afp_uam->u.uam_login.logincont == NULL ) { + if ( afp_uam == NULL || afp_uam->u.uam_login.logincont == NULL || ibuflen < 2 ) { *rbuflen = 0; return send_reply(obj, AFPERR_NOTAUTH ); } @@ -854,14 +933,15 @@ int afp_logincont(obj, ibuf, ibuflen, rbuf, rbuflen) } -int afp_logout(obj, ibuf, ibuflen, rbuf, rbuflen) - AFPObj *obj; - char *ibuf _U_, *rbuf _U_; - int ibuflen _U_, *rbuflen _U_; +int afp_logout(AFPObj *obj, char *ibuf _U_, size_t ibuflen _U_, char *rbuf _U_, size_t *rbuflen) { - LOG(log_info, logtype_afpd, "logout %s", obj->username); + DSI *dsi = (DSI *)(obj->handle); + + LOG(log_note, logtype_afpd, "AFP logout by %s", obj->username); + of_close_all_forks(); close_all_vol(); - obj->exit(0); + dsi->flags = DSI_AFP_LOGGED_OUT; + *rbuflen = 0; return AFP_OK; } @@ -872,10 +952,7 @@ int afp_logout(obj, ibuf, ibuflen, rbuf, rbuflen) * to work. this also does a little pre-processing before it hands * it off to the uam. */ -int afp_changepw(obj, ibuf, ibuflen, rbuf, rbuflen ) - AFPObj *obj; - char *ibuf, *rbuf; - int ibuflen, *rbuflen; +int afp_changepw(AFPObj *obj, char *ibuf, size_t ibuflen, char *rbuf, size_t *rbuflen) { char username[MACFILELEN + 1], *start = ibuf; struct uam_obj *uam; @@ -928,6 +1005,9 @@ int afp_changepw(obj, ibuf, ibuflen, rbuf, rbuflen ) return AFPERR_PARAM; /* send it off to the uam. we really don't use ibuflen right now. */ + if (ibuflen < (size_t)(ibuf - start)) + return AFPERR_PARAM; + ibuflen -= (ibuf - start); ret = uam->u.uam_changepw(obj, username, pwd, ibuf, ibuflen, rbuf, rbuflen); @@ -942,14 +1022,12 @@ int afp_changepw(obj, ibuf, ibuflen, rbuf, rbuflen ) /* FPGetUserInfo */ -int afp_getuserinfo(obj, ibuf, ibuflen, rbuf, rbuflen ) - AFPObj *obj _U_; - char *ibuf, *rbuf; - int ibuflen _U_, *rbuflen; +int afp_getuserinfo(AFPObj *obj _U_, char *ibuf, size_t ibuflen _U_, char *rbuf, size_t *rbuflen) { u_int8_t thisuser; u_int32_t id; u_int16_t bitmap; + char *bitmapp; LOG(log_debug, logtype_afpd, "begin afp_getuserinfo:"); @@ -968,8 +1046,9 @@ int afp_getuserinfo(obj, ibuf, ibuflen, rbuf, rbuflen ) if ((bitmap & USERIBIT_ALL) != bitmap) return AFPERR_BITMAP; - /* copy the bitmap back to reply buffer */ + /* remember place where we store the possibly modified bitmap later */ memcpy(rbuf, ibuf, sizeof(bitmap)); + bitmapp = rbuf; rbuf += sizeof(bitmap); *rbuflen = sizeof(bitmap); @@ -988,29 +1067,27 @@ int afp_getuserinfo(obj, ibuf, ibuflen, rbuf, rbuflen ) *rbuflen += sizeof(id); } -#ifdef HAVE_NFSv4_ACLS if (bitmap & USERIBIT_UUID) { - int ret; - uuid_t uuid; - char *uuidstring; - - if ( ! (obj->options.flags & OPTION_UUID)) - return AFPERR_BITMAP; - LOG(log_debug, logtype_afpd, "afp_getuserinfo: get UUID for \'%s\'", obj->username); - ret = getuuidfromname( obj->username, UUID_USER, uuid); - if (ret != 0) { - LOG(log_info, logtype_afpd, "afp_getuserinfo: error getting UUID !"); - return AFPERR_NOITEM; - } - if (0 == (uuid_bin2string( uuid, &uuidstring))) { - LOG(log_debug, logtype_afpd, "afp_getuserinfo: got UUID: %s", uuidstring); - free(uuidstring); + if ( ! (obj->options.flags & OPTION_UUID)) { + bitmap &= ~USERIBIT_UUID; + bitmap = htons(bitmap); + memcpy(bitmapp, &bitmap, sizeof(bitmap)); + } else { + LOG(log_debug, logtype_afpd, "afp_getuserinfo: get UUID for \'%s\'", obj->username); + int ret; + atalk_uuid_t uuid; + ret = getuuidfromname( obj->username, UUID_USER, uuid); + if (ret != 0) { + LOG(log_info, logtype_afpd, "afp_getuserinfo: error getting UUID !"); + return AFPERR_NOITEM; + } + LOG(log_debug, logtype_afpd, "afp_getuserinfo: got UUID: %s", uuid_bin2string(uuid)); + + memcpy(rbuf, uuid, UUID_BINSIZE); + rbuf += UUID_BINSIZE; + *rbuflen += UUID_BINSIZE; } - memcpy(rbuf, uuid, UUID_BINSIZE); - rbuf += UUID_BINSIZE; - *rbuflen += UUID_BINSIZE; } -#endif LOG(log_debug, logtype_afpd, "END afp_getuserinfo:"); return AFP_OK; @@ -1082,9 +1159,9 @@ int auth_load(const char *path, const char *list) if (stat(name, &st) == 0) { if ((mod = uam_load(name, p))) { uam_attach(&uam_modules, mod); - LOG(log_info, logtype_afpd, "uam: %s loaded", p); + LOG(log_debug, logtype_afpd, "uam: %s loaded", p); } else { - LOG(log_info, logtype_afpd, "uam: %s load failure",p); + LOG(log_error, logtype_afpd, "uam: %s load failure",p); } } else { LOG(log_info, logtype_afpd, "uam: uam not found (status=%d)", stat(name, &st)); @@ -1096,7 +1173,7 @@ int auth_load(const char *path, const char *list) } /* get rid of all of the uams */ -void auth_unload() +void auth_unload(void) { struct uam_mod *mod, *prev, *start = &uam_modules;