if (use_first_pass)
try_first_pass = 0;
- if (logmask && LOG_MASK(LOG_DEBUG))
+ if (logmask & LOG_MASK(LOG_DEBUG))
pam_afs_syslog(LOG_DEBUG, PAMAFS_OPTIONS, nowarn, use_first_pass,
try_first_pass, ignore_uid, ignore_uid_id,
refresh_token, set_token, dont_fork, use_klog);
RET(PAM_USER_UNKNOWN);
}
- if (logmask && LOG_MASK(LOG_DEBUG))
+ if (logmask & LOG_MASK(LOG_DEBUG))
pam_afs_syslog(LOG_DEBUG, PAMAFS_USERNAMEDEBUG, user);
/*
RET(PAM_AUTH_ERR);
}
password = NULL; /* In case it isn't already NULL */
- if (logmask && LOG_MASK(LOG_DEBUG))
+ if (logmask & LOG_MASK(LOG_DEBUG))
pam_afs_syslog(LOG_DEBUG, PAMAFS_NOFIRSTPASS, user);
} else if (password[0] == '\0') {
/* Actually we *did* get one but it was empty. */
pam_afs_syslog(LOG_INFO, PAMAFS_NILPASSWORD, user);
RET(PAM_NEW_AUTHTOK_REQD);
} else {
- if (logmask && LOG_MASK(LOG_DEBUG))
+ if (logmask & LOG_MASK(LOG_DEBUG))
pam_afs_syslog(LOG_DEBUG, PAMAFS_GOTPASS, user);
got_authtok = 1;
}
#ifdef AFS_KERBEROS_ENV
ktc_newpag();
#endif
- if (logmask && LOG_MASK(LOG_DEBUG))
+ if (logmask & LOG_MASK(LOG_DEBUG))
syslog(LOG_DEBUG, "New PAG created in pam_authenticate()");
}
i = do_klog(user, password, "00:00:01", cell_ptr);
ktc_ForgetAllTokens();
}
- if (logmask && LOG_MASK(LOG_DEBUG))
+ if (logmask & LOG_MASK(LOG_DEBUG))
syslog(LOG_DEBUG, "do_klog returned %d", i);
auth_ok = i ? 0 : 1;
} else {
- if (logmask && LOG_MASK(LOG_DEBUG))
+ if (logmask & LOG_MASK(LOG_DEBUG))
syslog(LOG_DEBUG, "forking ...");
cpid = fork();
if (cpid <= 0) { /* The child process */
- if (logmask && LOG_MASK(LOG_DEBUG))
+ if (logmask & LOG_MASK(LOG_DEBUG))
syslog(LOG_DEBUG, "in child");
if (refresh_token || set_token)
code = ka_UserAuthenticateGeneral(KA_USERAUTH_VERSION, (char *)user, /* kerberos name */
} else {
auth_ok = 1;
}
- if (logmask && LOG_MASK(LOG_DEBUG))
+ if (logmask & LOG_MASK(LOG_DEBUG))
syslog(LOG_DEBUG, "child: auth_ok=%d", auth_ok);
if (cpid == 0)
exit(auth_ok);
} else {
do {
- if (logmask && LOG_MASK(LOG_DEBUG))
+ if (logmask & LOG_MASK(LOG_DEBUG))
syslog(LOG_DEBUG, "in parent, waiting ...");
rcpid = waitpid(cpid, &status, 0);
} while ((rcpid == -1) && (errno == EINTR));
} else {
auth_ok = 0;
}
- if (logmask && LOG_MASK(LOG_DEBUG))
+ if (logmask & LOG_MASK(LOG_DEBUG))
syslog(LOG_DEBUG, "parent: auth_ok=%d", auth_ok);
}
}
pam_afs_syslog(LOG_ERR, PAMAFS_PAMERROR, errno);
}
} else { /* dont_fork, used by httpd */
- if (logmask && LOG_MASK(LOG_DEBUG))
+ if (logmask & LOG_MASK(LOG_DEBUG))
syslog(LOG_DEBUG, "dont_fork");
if (refresh_token || set_token)
code = ka_UserAuthenticateGeneral(KA_USERAUTH_VERSION, (char *)user, /* kerberos name */
(char *)password, /* password */
0, /* spare 2 */
&reason /* error string */ );
- if (logmask && LOG_MASK(LOG_DEBUG))
+ if (logmask & LOG_MASK(LOG_DEBUG))
syslog(LOG_DEBUG, "dont_fork, code = %d", code);
if (code) {
pam_afs_syslog(LOG_ERR, PAMAFS_LOGIN_FAILED, user, reason);
} else {
auth_ok = 1;
}
- if (logmask && LOG_MASK(LOG_DEBUG))
+ if (logmask & LOG_MASK(LOG_DEBUG))
syslog(LOG_DEBUG, "dont_fork: auth_ok=%d", auth_ok);
}
(void)pam_set_item(pamh, PAM_AUTHTOK, password);
}
- if (logmask && LOG_MASK(LOG_DEBUG))
+ if (logmask & LOG_MASK(LOG_DEBUG))
syslog(LOG_DEBUG, "leaving auth: auth_ok=%d", auth_ok);
if (code == KANOENT)
RET(PAM_USER_UNKNOWN);
if (use_first_pass)
try_first_pass = 0;
- if (logmask && LOG_MASK(LOG_DEBUG)) {
+ if (logmask & LOG_MASK(LOG_DEBUG)) {
pam_afs_syslog(LOG_DEBUG, PAMAFS_OPTIONS, nowarn, use_first_pass,
try_first_pass);
pam_afs_syslog(LOG_DEBUG, PAMAFS_PAMERROR, flags);
RET(PAM_USER_UNKNOWN);
}
- if (logmask && LOG_MASK(LOG_DEBUG))
+ if (logmask & LOG_MASK(LOG_DEBUG))
pam_afs_syslog(LOG_DEBUG, PAMAFS_USERNAMEDEBUG, user);
/*
RET(PAM_AUTH_ERR);
}
password = NULL; /* In case it isn't already NULL */
- if (logmask && LOG_MASK(LOG_DEBUG))
+ if (logmask & LOG_MASK(LOG_DEBUG))
pam_afs_syslog(LOG_DEBUG, PAMAFS_NOFIRSTPASS, user);
} else if (password[0] == '\0') {
/* Actually we *did* get one but it was empty. */
pam_afs_syslog(LOG_INFO, PAMAFS_NILPASSWORD, user);
RET(PAM_NEW_AUTHTOK_REQD);
} else {
- if (logmask && LOG_MASK(LOG_DEBUG))
+ if (logmask & LOG_MASK(LOG_DEBUG))
pam_afs_syslog(LOG_DEBUG, PAMAFS_GOTPASS, user);
}
if (!(use_first_pass || try_first_pass)) {
}
}
- if (logmask && LOG_MASK(LOG_DEBUG))
+ if (logmask & LOG_MASK(LOG_DEBUG))
syslog(LOG_DEBUG,
"pam_afs_session_close: remain: %d, remainlifetime: %d, no_unlog: %d",
remain, remainlifetime, no_unlog);
}
if (!no_unlog && ktc_ForgetAllTokens())
return PAM_SESSION_ERR;
- if (logmask && LOG_MASK(LOG_DEBUG))
+ if (logmask & LOG_MASK(LOG_DEBUG))
syslog(LOG_DEBUG, "pam_afs_session_close: Session closed");
return PAM_SUCCESS;
}
if (use_first_pass)
try_first_pass = 0;
- if (logmask && LOG_MASK(LOG_DEBUG))
+ if (logmask & LOG_MASK(LOG_DEBUG))
pam_afs_syslog(LOG_DEBUG, PAMAFS_OPTIONS, nowarn, use_first_pass,
try_first_pass, ignore_uid, ignore_uid_id, 8, 8, 8, 8);
/* Try to get the user-interaction info, if available. */
errcode = pam_get_item(pamh, PAM_CONV, (PAM_CONST void **)&pam_convp);
if (errcode != PAM_SUCCESS) {
- if (logmask && LOG_MASK(LOG_DEBUG))
+ if (logmask & LOG_MASK(LOG_DEBUG))
pam_afs_syslog(LOG_DEBUG, PAMAFS_NO_USER_INT);
pam_convp = NULL;
}
#endif
if (flags & PAM_DELETE_CRED) {
- if (logmask && LOG_MASK(LOG_DEBUG))
+ if (logmask & LOG_MASK(LOG_DEBUG))
pam_afs_syslog(LOG_DEBUG, PAMAFS_DELCRED, user);
RET(PAM_SUCCESS);
} else if (flags & PAM_REINITIALIZE_CRED) {
- if (logmask && LOG_MASK(LOG_DEBUG))
+ if (logmask & LOG_MASK(LOG_DEBUG))
pam_afs_syslog(LOG_DEBUG, PAMAFS_REINITCRED, user);
RET(PAM_SUCCESS);
} else { /* flags are PAM_REFRESH_CRED, PAM_ESTABLISH_CRED, unknown */
- if (logmask && LOG_MASK(LOG_DEBUG))
+ if (logmask & LOG_MASK(LOG_DEBUG))
pam_afs_syslog(LOG_DEBUG, PAMAFS_ESTABCRED, user);
errcode = pam_get_data(pamh, pam_afs_lh, (const void **)&password);
RET(PAM_AUTH_ERR);
}
password = NULL; /* In case it isn't already NULL */
- if (logmask && LOG_MASK(LOG_DEBUG))
+ if (logmask & LOG_MASK(LOG_DEBUG))
pam_afs_syslog(LOG_DEBUG, PAMAFS_NOFIRSTPASS, user);
} else if (password[0] == '\0') {
/* Actually we *did* get one but it was empty. */
pam_afs_syslog(LOG_ERR, PAMAFS_PASSWD_REQ, user);
RET(PAM_NEW_AUTHTOK_REQD);
}
- if (logmask && LOG_MASK(LOG_DEBUG))
+ if (logmask & LOG_MASK(LOG_DEBUG))
pam_afs_syslog(LOG_DEBUG, PAMAFS_NILPASSWORD, user);
} else {
- if (logmask && LOG_MASK(LOG_DEBUG))
+ if (logmask & LOG_MASK(LOG_DEBUG))
pam_afs_syslog(LOG_DEBUG, PAMAFS_GOTPASS, user);
}
if (!(use_first_pass || try_first_pass)) {
RET(PAM_AUTH_ERR);
}
if (prompt_password[0] == '\0') {
- if (logmask && LOG_MASK(LOG_DEBUG))
+ if (logmask & LOG_MASK(LOG_DEBUG))
pam_afs_syslog(LOG_DEBUG, PAMAFS_NILPASSWORD);
RET(PAM_NEW_AUTHTOK_REQD);
}
* pam_sm_authenticate() or if it was destroyed by the application
*/
if ((!refresh_token) && (getPAG() == -1)) {
- if (logmask && LOG_MASK(LOG_DEBUG))
+ if (logmask & LOG_MASK(LOG_DEBUG))
syslog(LOG_DEBUG, "New PAG created in pam_setcred()");
setpag();
#ifdef AFS_KERBEROS_ENV