/*
- * $Id: uams_dhx_pam.c,v 1.21 2002-02-05 20:42:04 srittau Exp $
+ * $Id: uams_dhx_pam.c,v 1.22 2002-09-29 23:30:20 sibaz Exp $
*
* Copyright (c) 1990,1993 Regents of The University of Michigan.
* Copyright (c) 1999 Adrian Sun (asun@u.washington.edu)
if (num_msg < 1) {
/* Log Entry */
- LOG(log_info, logtype_default, "uams_dhx_pam.c :PAM DHX Conversation Err -- %s",
+ LOG(log_info, logtype_uams, "uams_dhx_pam.c :PAM DHX Conversation Err -- %s",
strerror(errno));
/* Log Entry */
return PAM_CONV_ERR;
if (!reply) {
/* Log Entry */
- LOG(log_info, logtype_default, "uams_dhx_pam.c :PAM DHX Conversation Err -- %s",
+ LOG(log_info, logtype_uams, "uams_dhx_pam.c :PAM DHX Conversation Err -- %s",
strerror(errno));
/* Log Entry */
return PAM_CONV_ERR;
case PAM_PROMPT_ECHO_ON:
if (!(string = COPY_STRING(PAM_username))) {
/* Log Entry */
- LOG(log_info, logtype_default, "uams_dhx_pam.c :PAM: username failure -- %s",
+ LOG(log_info, logtype_uams, "uams_dhx_pam.c :PAM: username failure -- %s",
strerror(errno));
/* Log Entry */
goto pam_fail_conv;
case PAM_PROMPT_ECHO_OFF:
if (!(string = COPY_STRING(PAM_password))) {
/* Log Entry */
- LOG(log_info, logtype_default, "uams_dhx_pam.c :PAM: passwd failure: --: %s",
+ LOG(log_info, logtype_uams, "uams_dhx_pam.c :PAM: passwd failure: --: %s",
strerror(errno));
/* Log Entry */
goto pam_fail_conv;
case PAM_ERROR_MSG:
default:
/* Log Entry */
- LOG(log_info, logtype_default, "uams_dhx_pam.c :PAM: Binary_Prompt -- %s",
+ LOG(log_info, logtype_uams, "uams_dhx_pam.c :PAM: Binary_Prompt -- %s",
strerror(errno));
/* Log Entry */
goto pam_fail_conv;
*resp = reply;
/* Log Entry */
- LOG(log_info, logtype_default, "uams_dhx_pam.c :PAM: PAM Success -- %s",
+ LOG(log_info, logtype_uams, "uams_dhx_pam.c :PAM: PAM Success -- %s",
strerror(errno));
/* Log Entry */
return PAM_SUCCESS;
}
free(reply);
/* Log Entry */
- LOG(log_info, logtype_default, "uams_dhx_pam.c :PAM DHX Conversation Err -- %s",
+ LOG(log_info, logtype_uams, "uams_dhx_pam.c :PAM DHX Conversation Err -- %s",
strerror(errno));
/* Log Entry */
return PAM_CONV_ERR;
/* get the client's public key */
if (!(bn = BN_bin2bn(ibuf, KEYSIZE, NULL))) {
/* Log Entry */
- LOG(log_info, logtype_default, "uams_dhx_pam.c :PAM No Public Key -- %s",
+ LOG(log_info, logtype_uams, "uams_dhx_pam.c :PAM No Public Key -- %s",
strerror(errno));
/* Log Entry */
return AFPERR_PARAM;
if (!(gbn = BN_bin2bn(&g, sizeof(g), NULL))) {
BN_clear_free(bn);
/* Log Entry */
- LOG(log_info, logtype_default, "uams_dhx_pam.c :PAM No Primes: GBN -- %s",
+ LOG(log_info, logtype_uams, "uams_dhx_pam.c :PAM No Primes: GBN -- %s",
strerror(errno));
/* Log Entry */
return AFPERR_PARAM;
BN_free(gbn);
BN_clear_free(bn);
/* Log Entry */
- LOG(log_info, logtype_default, "uams_dhx_pam.c :PAM No Primes: PBN -- %s",
+ LOG(log_info, logtype_uams, "uams_dhx_pam.c :PAM No Primes: PBN -- %s",
strerror(errno));
/* Log Entry */
return AFPERR_PARAM;
BN_free(gbn);
BN_clear_free(bn);
/* Log Entry */
- LOG(log_info, logtype_default, "uams_dhx_pam.c :PAM DH was equal to DH_New... Go figure... -- %s",
+ LOG(log_info, logtype_uams, "uams_dhx_pam.c :PAM DH was equal to DH_New... Go figure... -- %s",
strerror(errno));
/* Log Entry */
return AFPERR_PARAM;
dh->g = gbn;
if (!DH_generate_key(dh) || (BN_num_bytes(dh->pub_key) > KEYSIZE)) {
/* Log Entry */
- LOG(log_info, logtype_default, "uams_dhx_pam.c :PAM: Err Generating Key -- Not enough Space? -- %s",
+ LOG(log_info, logtype_uams, "uams_dhx_pam.c :PAM: Err Generating Key -- Not enough Space? -- %s",
strerror(errno));
/* Log Entry */
goto pam_fail;
&i) < 0) {
*rbuflen = 0;
/* Log Entry */
- LOG(log_info, logtype_default, "uams_dhx_pam.c :PAM: Buffer Encryption Err. -- %s",
+ LOG(log_info, logtype_uams, "uams_dhx_pam.c :PAM: Buffer Encryption Err. -- %s",
strerror(errno));
/* Log Entry */
goto pam_fail;
(void *) &buf, NULL) < 0) {
*rbuflen = 0;
/* Log Entry */
- LOG(log_info, logtype_default, "uams_dhx_pam.c :PAM: Signature Retieval Failure -- %s",
+ LOG(log_info, logtype_uams, "uams_dhx_pam.c :PAM: Signature Retieval Failure -- %s",
strerror(errno));
/* Log Entry */
goto pam_fail;
BN_free(bn);
DH_free(dh);
/* Log Entry */
- LOG(log_info, logtype_default, "uams_dhx_pam.c :PAM: Fail - Cast Encryption -- %s",
+ LOG(log_info, logtype_uams, "uams_dhx_pam.c :PAM: Fail - Cast Encryption -- %s",
strerror(errno));
/* Log Entry */
return AFPERR_PARAM;
if (uam_afpserver_option(obj, UAM_OPTION_USERNAME, (void *) &buf,
&i) < 0) {
/* Log Entry */
- LOG(log_info, logtype_default, "uams_dhx_pam.c :PAM: uam_afpserver_option didn't meet uam_option_username -- %s",
+ LOG(log_info, logtype_uams, "uams_dhx_pam.c :PAM: uam_afpserver_option didn't meet uam_option_username -- %s",
strerror(errno));
/* Log Entry */
return AFPERR_PARAM;
len = (unsigned char) *ibuf++;
if ( len > i ) {
/* Log Entry */
- LOG(log_info, logtype_default, "uams_dhx_pam.c :PAM: Signature Retieval Failure -- %s",
+ LOG(log_info, logtype_uams, "uams_dhx_pam.c :PAM: Signature Retieval Failure -- %s",
strerror(errno));
/* Log Entry */
return( AFPERR_PARAM );
if (( dhxpwd = uam_getname(buf, i)) == NULL ) {
/* Log Entry */
- LOG(log_info, logtype_default, "uams_dhx_pam.c: unknown username");
+ LOG(log_info, logtype_uams, "uams_dhx_pam.c: unknown username");
/* Log Entry */
return AFPERR_PARAM;
}
PAM_username = buf;
- LOG(log_info, logtype_default, "dhx login: %s", buf);
+ LOG(log_info, logtype_uams, "dhx login: %s", buf);
return dhx_setup(obj, ibuf, ibuflen, rbuf, rbuflen);
}
memcpy(&sessid, ibuf, sizeof(sessid));
if (sessid != dhxhash(obj)) {
/* Log Entry */
- LOG(log_info, logtype_default, "uams_dhx_pam.c :PAM Session ID - DHXHash Mismatch -- %s",
+ LOG(log_info, logtype_uams, "uams_dhx_pam.c :PAM Session ID - DHXHash Mismatch -- %s",
strerror(errno));
/* Log Entry */
return AFPERR_PARAM;
if (uam_afpserver_option(obj, UAM_OPTION_CLIENTNAME,
(void *) &hostname, NULL) < 0)
{
- LOG(log_info, logtype_default, "uams_dhx_pam.c :PAM: unable to retrieve client hostname");
+ LOG(log_info, logtype_uams, "uams_dhx_pam.c :PAM: unable to retrieve client hostname");
hostname = NULL;
}
&pamh);
if (PAM_error != PAM_SUCCESS) {
/* Log Entry */
- LOG(log_info, logtype_default, "uams_dhx_pam.c :PAM: PAM_Error: %s",
+ LOG(log_info, logtype_uams, "uams_dhx_pam.c :PAM: PAM_Error: %s",
pam_strerror(pamh,PAM_error));
/* Log Entry */
goto logincont_err;
if (PAM_error == PAM_MAXTRIES)
err = AFPERR_PWDEXPR;
/* Log Entry */
- LOG(log_info, logtype_default, "uams_dhx_pam.c :PAM: PAM_Error: %s",
+ LOG(log_info, logtype_uams, "uams_dhx_pam.c :PAM: PAM_Error: %s",
pam_strerror(pamh, PAM_error));
/* Log Entry */
goto logincont_err;
err = AFPERR_PWDCHNG;
#endif
/* Log Entry */
- LOG(log_info, logtype_default, "uams_dhx_pam.c :PAM: PAM_Error: %s",
+ LOG(log_info, logtype_uams, "uams_dhx_pam.c :PAM: PAM_Error: %s",
pam_strerror(pamh, PAM_error));
/* Log Entry */
goto logincont_err;
PAM_error = pam_setcred(pamh, PAM_CRED_ESTABLISH);
if (PAM_error != PAM_SUCCESS) {
/* Log Entry */
- LOG(log_info, logtype_default, "uams_dhx_pam.c :PAM: PAM_Error: %s",
+ LOG(log_info, logtype_uams, "uams_dhx_pam.c :PAM: PAM_Error: %s",
pam_strerror(pamh, PAM_error));
/* Log Entry */
goto logincont_err;
PAM_error = pam_open_session(pamh, 0);
if (PAM_error != PAM_SUCCESS) {
/* Log Entry */
- LOG(log_info, logtype_default, "uams_dhx_pam.c :PAM: PAM_Error: %s",
+ LOG(log_info, logtype_uams, "uams_dhx_pam.c :PAM: PAM_Error: %s",
pam_strerror(pamh, PAM_error));
/* Log Entry */
goto logincont_err;
memset(rbuf, 0, PASSWDLEN); /* zero out the password */
*uam_pwd = dhxpwd;
/* Log Entry */
- LOG(log_info, logtype_default, "uams_dhx_pam.c :PAM: PAM Auth OK!");
+ LOG(log_info, logtype_uams, "uams_dhx_pam.c :PAM: PAM Auth OK!");
/* Log Entry */
return AFP_OK;
/* check out the session id */
if (sessid != dhxhash(obj)) {
/* Log Entry */
- LOG(log_info, logtype_default, "uams_dhx_pam.c :PAM: Session ID not Equal to DHX Hash -- %s",
+ LOG(log_info, logtype_uams, "uams_dhx_pam.c :PAM: Session ID not Equal to DHX Hash -- %s",
strerror(errno));
/* Log Entry */
return AFPERR_PARAM;
if (uam_afpserver_option(obj, UAM_OPTION_HOSTNAME,
(void *) &hostname, NULL) < 0) {
/* Log Entry */
- LOG(log_info, logtype_default, "uams_dhx_pam.c :PAM: Hostname Null?? -- %s",
+ LOG(log_info, logtype_uams, "uams_dhx_pam.c :PAM: Hostname Null?? -- %s",
strerror(errno));
/* Log Entry */
return AFPERR_MISC;
* get sent back an incremented random number. */
if (!(bn1 = BN_bin2bn(ibuf, KEYSIZE, NULL))) {
/* Log Entry */
- LOG(log_info, logtype_default, "uams_dhx_pam.c :PAM: Random Number Not the same or not incremented-- %s",
+ LOG(log_info, logtype_uams, "uams_dhx_pam.c :PAM: Random Number Not the same or not incremented-- %s",
strerror(errno));
/* Log Entry */
return AFPERR_PARAM;
if (!(bn2 = BN_bin2bn(randbuf, sizeof(randbuf), NULL))) {
BN_free(bn1);
/* Log Entry */
- LOG(log_info, logtype_default, "uams_dhx_pam.c :PAM: Random Number Not the same or not incremented -- %s",
+ LOG(log_info, logtype_uams, "uams_dhx_pam.c :PAM: Random Number Not the same or not incremented -- %s",
strerror(errno));
/* Log Entry */
return AFPERR_PARAM;
BN_free(bn2);
BN_free(bn1);
/* Log Entry */
- LOG(log_info, logtype_default, "uams_dhx_pam.c :PAM: Random Number did not Zero -- %s",
+ LOG(log_info, logtype_uams, "uams_dhx_pam.c :PAM: Random Number did not Zero -- %s",
strerror(errno));
/* Log Entry */
return AFPERR_PARAM;
if (!BN_is_one(bn3)) {
BN_free(bn3);
/* Log Entry */
- LOG(log_info, logtype_default, "uams_dhx_pam.c :PAM: After Random Number not Zero, is it one more? -- %s",
+ LOG(log_info, logtype_uams, "uams_dhx_pam.c :PAM: After Random Number not Zero, is it one more? -- %s",
strerror(errno));
/* Log Entry */
return AFPERR_PARAM;
&lpamh);
if (PAM_error != PAM_SUCCESS) {
/* Log Entry */
- LOG(log_info, logtype_default, "uams_dhx_pam.c :PAM: Needless to say, PAM_error is != to PAM_SUCCESS -- %s",
+ LOG(log_info, logtype_uams, "uams_dhx_pam.c :PAM: Needless to say, PAM_error is != to PAM_SUCCESS -- %s",
strerror(errno));
/* Log Entry */
return AFPERR_PARAM;
/*
- * $Id: uams_dhx_passwd.c,v 1.15 2002-02-13 16:44:59 srittau Exp $
+ * $Id: uams_dhx_passwd.c,v 1.16 2002-09-29 23:30:20 sibaz Exp $
*
* Copyright (c) 1990,1993 Regents of The University of Michigan.
* Copyright (c) 1999 Adrian Sun (asun@u.washington.edu)
return AFPERR_PARAM;
}
- LOG(log_info, logtype_default, "dhx login: %s", name);
+ LOG(log_info, logtype_uams, "dhx login: %s", name);
if (uam_checkuser(dhxpwd) < 0)
return AFPERR_NOTAUTH;
#ifdef SHADOWPW
if (( sp = getspnam( dhxpwd->pw_name )) == NULL ) {
- LOG(log_info, logtype_default, "no shadow passwd entry for %s", name);
+ LOG(log_info, logtype_uams, "no shadow passwd entry for %s", name);
return AFPERR_NOTAUTH;
}
dhxpwd->pw_passwd = sp->sp_pwdp;
/*
- * $Id: uams_guest.c,v 1.9 2002-01-04 04:45:48 sibaz Exp $
+ * $Id: uams_guest.c,v 1.10 2002-09-29 23:30:20 sibaz Exp $
*
* (c) 2001 (see COPYING)
*/
char *guest, *username;
*rbuflen = 0;
- LOG(log_info, logtype_default, "login noauth" );
+ LOG(log_info, logtype_uams, "login noauth" );
if (uam_afpserver_option(obj, UAM_OPTION_GUEST, (void *) &guest,
NULL) < 0)
strcpy(username, guest);
if ((pwent = getpwnam(guest)) == NULL) {
- LOG(log_error, logtype_default, "noauth_login: getpwnam( %s ): %s",
+ LOG(log_error, logtype_uams, "noauth_login: getpwnam( %s ): %s",
guest, strerror(errno) );
return( AFPERR_BADUAM );
}
#ifdef AFS
if ( setpag() < 0 ) {
- LOG(log_error, logtype_default, "noauth_login: setpag: %s", strerror(errno) );
+ LOG(log_error, logtype_uams, "noauth_login: setpag: %s", strerror(errno) );
return( AFPERR_BADUAM );
}
#endif /* AFS */
*/
if ((p = strchr(data, '(' )) == NULL) {
- LOG(log_info, logtype_default,"Bad Login NoAuthUAM: username not found in string");
+ LOG(log_info, logtype_uams,"Bad Login NoAuthUAM: username not found in string");
free(data);
return(-1);
}
p++;
if ((q = strchr(data, ')' )) == NULL) {
- LOG(log_info, logtype_default,"Bad Login NoAuthUAM: username not found in string");
+ LOG(log_info, logtype_uams,"Bad Login NoAuthUAM: username not found in string");
free(data);
return(-1);
}
free(data);
if (getpwnam(username) == NULL) {
- LOG(log_info, logtype_default, "Bad Login NoAuthUAM: %s: %s",
+ LOG(log_info, logtype_uams, "Bad Login NoAuthUAM: %s: %s",
username, strerror(errno) );
return(-1);
}
/* Login successful */
append(out, loginok, strlen(loginok));
- LOG(log_info, logtype_default, "Login NoAuthUAM: %s", username);
+ LOG(log_info, logtype_uams, "Login NoAuthUAM: %s", username);
return(0);
}
/*
- * $Id: uams_pam.c,v 1.11 2002-01-04 04:45:48 sibaz Exp $
+ * $Id: uams_pam.c,v 1.12 2002-09-29 23:30:20 sibaz Exp $
*
* Copyright (c) 1990,1993 Regents of The University of Michigan.
* Copyright (c) 1999 Adrian Sun (asun@u.washington.edu)
if (uam_afpserver_option(obj, UAM_OPTION_CLIENTNAME,
(void *) &hostname, NULL) < 0)
{
- LOG(log_info, logtype_default, "uams_pam.c :PAM: unable to retrieve client hostname");
+ LOG(log_info, logtype_uams, "uams_pam.c :PAM: unable to retrieve client hostname");
hostname = NULL;
}
return AFPERR_PARAM;
}
- LOG(log_info, logtype_default, "cleartext login: %s", username);
+ LOG(log_info, logtype_uams, "cleartext login: %s", username);
PAM_username = username;
PAM_password = ibuf; /* Set these things up for the conv function */
/* Parse input for username in () */
if ((p = strchr(data, '(' )) == NULL) {
- LOG(log_info, logtype_default,"Bad Login ClearTxtUAM: username not found in string");
+ LOG(log_info, logtype_uams,"Bad Login ClearTxtUAM: username not found in string");
free(data);
return(-1);
}
p++;
if ((q = strstr(data, ") (" )) == NULL) {
- LOG(log_info, logtype_default,"Bad Login ClearTxtUAM: username not found in string");
+ LOG(log_info, logtype_uams,"Bad Login ClearTxtUAM: username not found in string");
free(data);
return(-1);
}
/* Parse input for password in next () */
p = q + 3;
if ((q = strrchr(data, ')' )) == NULL) {
- LOG(log_info, logtype_default,"Bad Login ClearTxtUAM: password not found in string");
+ LOG(log_info, logtype_uams,"Bad Login ClearTxtUAM: password not found in string");
free(data);
return(-1);
}
PAM_error = pam_start("netatalk", username, &PAM_conversation,
&pamh);
if (PAM_error != PAM_SUCCESS) {
- LOG(log_info, logtype_default, "Bad Login ClearTxtUAM: %s: %s",
+ LOG(log_info, logtype_uams, "Bad Login ClearTxtUAM: %s: %s",
username, pam_strerror(pamh, PAM_error));
pam_end(pamh, PAM_error);
pamh = NULL;
pam_set_item(pamh, PAM_RHOST, hostname);
PAM_error = pam_authenticate(pamh,0);
if (PAM_error != PAM_SUCCESS) {
- LOG(log_info, logtype_default, "Bad Login ClearTxtUAM: %s: %s",
+ LOG(log_info, logtype_uams, "Bad Login ClearTxtUAM: %s: %s",
username, pam_strerror(pamh, PAM_error));
pam_end(pamh, PAM_error);
pamh = NULL;
PAM_error = pam_acct_mgmt(pamh, 0);
if (PAM_error != PAM_SUCCESS) {
- LOG(log_info, logtype_default, "Bad Login ClearTxtUAM: %s: %s",
+ LOG(log_info, logtype_uams, "Bad Login ClearTxtUAM: %s: %s",
username, pam_strerror(pamh, PAM_error));
pam_end(pamh, PAM_error);
pamh = NULL;
PAM_error = pam_open_session(pamh, 0);
if (PAM_error != PAM_SUCCESS) {
- LOG(log_info, logtype_default, "Bad Login ClearTxtUAM: %s: %s",
+ LOG(log_info, logtype_uams, "Bad Login ClearTxtUAM: %s: %s",
username, pam_strerror(pamh, PAM_error));
pam_end(pamh, PAM_error);
pamh = NULL;
/* Login successful, but no need to hang onto it,
so logout immediately */
append(out, loginok, strlen(loginok));
- LOG(log_info, logtype_default, "Login ClearTxtUAM: %s", username);
+ LOG(log_info, logtype_uams, "Login ClearTxtUAM: %s", username);
pam_close_session(pamh, 0);
pam_end(pamh, 0);
pamh = NULL;
/*
- * $Id: uams_passwd.c,v 1.17 2002-02-13 18:26:31 srittau Exp $
+ * $Id: uams_passwd.c,v 1.18 2002-09-29 23:30:20 sibaz Exp $
*
* Copyright (c) 1990,1993 Regents of The University of Michigan.
* Copyright (c) 1999 Adrian Sun (asun@u.washington.edu)
return AFPERR_PARAM;
}
- LOG(log_info, logtype_default, "cleartext login: %s", username);
+ LOG(log_info, logtype_uams, "cleartext login: %s", username);
if (uam_checkuser(pwd) < 0) {
- LOG(log_info, logtype_default, "not a valid user");
+ LOG(log_info, logtype_uams, "not a valid user");
return AFPERR_NOTAUTH;
}
#ifdef SHADOWPW
if (( sp = getspnam( pwd->pw_name )) == NULL ) {
- LOG(log_info, logtype_default, "no shadow passwd entry for %s", username);
+ LOG(log_info, logtype_uams, "no shadow passwd entry for %s", username);
return AFPERR_NOTAUTH;
}
pwd->pw_passwd = sp->sp_pwdp;
#ifdef SHADOWPW
if (( sp = getspnam( pwd->pw_name )) == NULL ) {
- LOG(log_info, logtype_default, "no shadow passwd entry for %s", username);
+ LOG(log_info, logtype_uams, "no shadow passwd entry for %s", username);
return AFPERR_PARAM;
}
pwd->pw_passwd = sp->sp_pwdp;
/* Parse input for username in () */
if ((p = strchr(data, '(' )) == NULL) {
- LOG(log_info, logtype_default,"Bad Login ClearTxtUAM: username not found in string");
+ LOG(log_info, logtype_uams,"Bad Login ClearTxtUAM: username not found in string");
free(data);
return(-1);
}
p++;
if ((q = strstr(data, ") (" )) == NULL) {
- LOG(log_info, logtype_default,"Bad Login ClearTxtUAM: username not found in string");
+ LOG(log_info, logtype_uams,"Bad Login ClearTxtUAM: username not found in string");
free(data);
return(-1);
}
/* Parse input for password in next () */
p = q + 3;
if ((q = strrchr(data, ')' )) == NULL) {
- LOG(log_info, logtype_default,"Bad Login ClearTxtUAM: password not found in string");
+ LOG(log_info, logtype_uams,"Bad Login ClearTxtUAM: password not found in string");
free(data);
return(-1);
}
ulen = strlen(username);
if (( pwd = uam_getname(username, ulen)) == NULL ) {
- LOG(log_info, logtype_default, "Bad Login ClearTxtUAM: ( %s ) not found ",
+ LOG(log_info, logtype_uams, "Bad Login ClearTxtUAM: ( %s ) not found ",
username);
return(-1);
}
#ifdef SHADOWPW
if (( sp = getspnam( pwd->pw_name )) == NULL ) {
- LOG(log_info, logtype_default, "Bad Login ClearTxtUAM: no shadow passwd entry for %s",
+ LOG(log_info, logtype_uams, "Bad Login ClearTxtUAM: no shadow passwd entry for %s",
username);
return(-1);
}
#endif /* SHADOWPW */
if (!pwd->pw_passwd) {
- LOG(log_info, logtype_default, "Bad Login ClearTxtUAM: no password for %s",
+ LOG(log_info, logtype_uams, "Bad Login ClearTxtUAM: no password for %s",
username);
return(-1);
}
p = crypt(password, pwd->pw_passwd);
if (strcmp(p, pwd->pw_passwd) != 0) {
- LOG(log_info, logtype_default, "Bad Login ClearTxtUAM: %s: bad password", username);
+ LOG(log_info, logtype_uams, "Bad Login ClearTxtUAM: %s: bad password", username);
return(-1);
}
/* Login successful */
append(out, loginok, strlen(loginok));
- LOG(log_info, logtype_default, "Login ClearTxtUAM: %s", username);
+ LOG(log_info, logtype_uams, "Login ClearTxtUAM: %s", username);
return(0);
}
/*
- * $Id: uams_pgp.c,v 1.6 2002-01-04 04:45:48 sibaz Exp $
+ * $Id: uams_pgp.c,v 1.7 2002-09-29 23:30:20 sibaz Exp $
*
* Copyright (c) 1990,1993 Regents of The University of Michigan.
* Copyright (c) 1999 Adrian Sun (asun@u.washington.edu)
return AFPERR_PARAM;
}
- LOG(log_info, logtype_default, "pgp login: %s", name);
+ LOG(log_info, logtype_uams, "pgp login: %s", name);
if (uam_checkuser(pgppwd) < 0)
return AFPERR_NOTAUTH;
/*
- * $Id: uams_randnum.c,v 1.10 2002-01-04 04:45:48 sibaz Exp $
+ * $Id: uams_randnum.c,v 1.11 2002-09-29 23:30:20 sibaz Exp $
*
* Copyright (c) 1990,1993 Regents of The University of Michigan.
* Copyright (c) 1999 Adrian Sun (asun@u.washington.edu)
int fd, i;
if ( (fd = open(path, (set) ? O_WRONLY : O_RDONLY)) < 0 ) {
- LOG(log_error, logtype_default, "Failed to open %s", path);
+ LOG(log_error, logtype_uams, "Failed to open %s", path);
return AFPERR_ACCESS;
}
if (!S_ISREG(st.st_mode) || (pwd->pw_uid != st.st_uid) ||
(pwd->pw_gid != st.st_gid) ||
(st.st_mode & ( S_IRWXG | S_IRWXO )) ) {
- LOG(log_info, logtype_default, "Insecure permissions found for %s.", path);
+ LOG(log_info, logtype_uams, "Insecure permissions found for %s.", path);
goto home_passwd_fail;
}
/* get the password */
if (set) {
if (write(fd, passwd, len) < 0) {
- LOG(log_error, logtype_default, "Failed to write to %s", path );
+ LOG(log_error, logtype_uams, "Failed to write to %s", path );
goto home_passwd_fail;
}
} else {
if (read(fd, passwd, len) < 0) {
- LOG(log_error, logtype_default, "Failed to read from %s", path );
+ LOG(log_error, logtype_uams, "Failed to read from %s", path );
goto home_passwd_fail;
}
off_t pos;
if ((fp = fopen(path, (set) ? "r+" : "r")) == NULL) {
- LOG(log_error, logtype_default, "Failed to open %s", path);
+ LOG(log_error, logtype_uams, "Failed to open %s", path);
return AFPERR_ACCESS;
}
if (strncmp(buf, pwd->pw_name, p - buf) == 0) {
p++;
if (*p == PASSWD_ILLEGAL) {
- LOG(log_info, logtype_default, "invalid password entry for %s", pwd->pw_name);
+ LOG(log_info, logtype_uams, "invalid password entry for %s", pwd->pw_name);
err = AFPERR_ACCESS;
goto afppasswd_done;
}
if (( randpwd = uam_getname(username, ulen)) == NULL )
return AFPERR_PARAM; /* unknown user */
- LOG(log_info, logtype_default, "randnum/rand2num login: %s", username);
+ LOG(log_info, logtype_uams, "randnum/rand2num login: %s", username);
if (uam_checkuser(randpwd) < 0)
return AFPERR_NOTAUTH;