diff options
-rw-r--r-- | src/providers/ad/ad_subdomains.c | 2 | ||||
-rw-r--r-- | src/providers/ipa/ipa_sudo_async.c | 4 | ||||
-rw-r--r-- | src/providers/krb5/krb5_child.c | 2 | ||||
-rw-r--r-- | src/providers/ldap/sdap.c | 2 | ||||
-rw-r--r-- | src/responder/common/responder_cache_req.c | 4 | ||||
-rw-r--r-- | src/responder/ifp/ifp_groups.c | 2 | ||||
-rw-r--r-- | src/responder/pam/pam_LOCAL_domain.c | 36 | ||||
-rw-r--r-- | src/responder/sudo/sudosrv_get_sudorules.c | 2 | ||||
-rw-r--r-- | src/tests/cmocka/test_negcache.c | 2 | ||||
-rw-r--r-- | src/tests/common_dom.c | 4 | ||||
-rw-r--r-- | src/util/sss_semanage.c | 2 |
11 files changed, 31 insertions, 31 deletions
diff --git a/src/providers/ad/ad_subdomains.c b/src/providers/ad/ad_subdomains.c index 4bdd2a7ad..1aee92cab 100644 --- a/src/providers/ad/ad_subdomains.c +++ b/src/providers/ad/ad_subdomains.c @@ -1055,7 +1055,7 @@ static void ad_subdomains_get_slave_domain_done(struct tevent_req *req) ctx->reply_count, ctx->reply, ctx->root_domain_attrs, &nsubdoms, &subdoms); if (ret != EOK) { - DEBUG(SSSDBG_OP_FAILURE, ("Cannot process subdomain list\n")); + DEBUG(SSSDBG_OP_FAILURE, "Cannot process subdomain list\n"); tevent_req_error(req, ret); return; } diff --git a/src/providers/ipa/ipa_sudo_async.c b/src/providers/ipa/ipa_sudo_async.c index 79e69ce96..1e14fdd57 100644 --- a/src/providers/ipa/ipa_sudo_async.c +++ b/src/providers/ipa/ipa_sudo_async.c @@ -415,7 +415,7 @@ ipa_sudo_fetch_send(TALLOC_CTX *mem_ctx, req = tevent_req_create(mem_ctx, &state, struct ipa_sudo_fetch_state); if (req == NULL) { - DEBUG(SSSDBG_CRIT_FAILURE, ("tevent_req_create() failed\n")); + DEBUG(SSSDBG_CRIT_FAILURE, "tevent_req_create() failed\n"); return NULL; } @@ -872,7 +872,7 @@ ipa_sudo_refresh_send(TALLOC_CTX *mem_ctx, req = tevent_req_create(mem_ctx, &state, struct ipa_sudo_refresh_state); if (req == NULL) { - DEBUG(SSSDBG_CRIT_FAILURE, ("tevent_req_create() failed\n")); + DEBUG(SSSDBG_CRIT_FAILURE, "tevent_req_create() failed\n"); return NULL; } diff --git a/src/providers/krb5/krb5_child.c b/src/providers/krb5/krb5_child.c index fff6a0a0c..3157e38af 100644 --- a/src/providers/krb5/krb5_child.c +++ b/src/providers/krb5/krb5_child.c @@ -172,7 +172,7 @@ static void revert_changepw_options(krb5_get_init_creds_opt *options) kerr = set_lifetime_options(options); if (kerr != 0) { - DEBUG(SSSDBG_OP_FAILURE, ("set_lifetime_options failed.\n")); + DEBUG(SSSDBG_OP_FAILURE, "set_lifetime_options failed.\n"); } } diff --git a/src/providers/ldap/sdap.c b/src/providers/ldap/sdap.c index 686f72666..9a56d7a14 100644 --- a/src/providers/ldap/sdap.c +++ b/src/providers/ldap/sdap.c @@ -227,7 +227,7 @@ int sdap_extend_map_with_list(TALLOC_CTX *mem_ctx, ret = split_on_separator(mem_ctx, extra_attrs, ',', true, true, &extra_attrs_list, NULL); if (ret != EOK) { - DEBUG(SSSDBG_OP_FAILURE, ("Failed to parse server list!\n")); + DEBUG(SSSDBG_OP_FAILURE, "Failed to parse server list!\n"); return ret; } diff --git a/src/responder/common/responder_cache_req.c b/src/responder/common/responder_cache_req.c index 42faf1fa6..a8f846c96 100644 --- a/src/responder/common/responder_cache_req.c +++ b/src/responder/common/responder_cache_req.c @@ -920,7 +920,7 @@ static struct tevent_req *cache_req_cache_send(TALLOC_CTX *mem_ctx, req = tevent_req_create(mem_ctx, &state, struct cache_req_cache_state); if (req == NULL) { - DEBUG(SSSDBG_CRIT_FAILURE, ("tevent_req_create() failed\n")); + DEBUG(SSSDBG_CRIT_FAILURE, "tevent_req_create() failed\n"); return NULL; } @@ -1160,7 +1160,7 @@ struct tevent_req *cache_req_send(TALLOC_CTX *mem_ctx, req = tevent_req_create(mem_ctx, &state, struct cache_req_state); if (req == NULL) { - DEBUG(SSSDBG_CRIT_FAILURE, ("tevent_req_create() failed\n")); + DEBUG(SSSDBG_CRIT_FAILURE, "tevent_req_create() failed\n"); return NULL; } diff --git a/src/responder/ifp/ifp_groups.c b/src/responder/ifp/ifp_groups.c index 0164eecdc..363598843 100644 --- a/src/responder/ifp/ifp_groups.c +++ b/src/responder/ifp/ifp_groups.c @@ -497,7 +497,7 @@ static struct tevent_req *resolv_ghosts_send(TALLOC_CTX *mem_ctx, req = tevent_req_create(mem_ctx, &state, struct resolv_ghosts_state); if (req == NULL) { - DEBUG(SSSDBG_CRIT_FAILURE, ("tevent_req_create() failed\n")); + DEBUG(SSSDBG_CRIT_FAILURE, "tevent_req_create() failed\n"); return NULL; } diff --git a/src/responder/pam/pam_LOCAL_domain.c b/src/responder/pam/pam_LOCAL_domain.c index 4b076146c..0e41a68eb 100644 --- a/src/responder/pam/pam_LOCAL_domain.c +++ b/src/responder/pam/pam_LOCAL_domain.c @@ -75,22 +75,22 @@ static void do_successful_login(struct LOCAL_request *lreq) int ret; lreq->mod_attrs = sysdb_new_attrs(lreq); - NULL_CHECK_OR_JUMP(lreq->mod_attrs, ("sysdb_new_attrs failed.\n"), + NULL_CHECK_OR_JUMP(lreq->mod_attrs, "sysdb_new_attrs failed.\n", lreq->error, ENOMEM, done); ret = sysdb_attrs_add_long(lreq->mod_attrs, SYSDB_LAST_LOGIN, (long)time(NULL)); - NEQ_CHECK_OR_JUMP(ret, EOK, ("sysdb_attrs_add_long failed.\n"), + NEQ_CHECK_OR_JUMP(ret, EOK, "sysdb_attrs_add_long failed.\n", lreq->error, ret, done); ret = sysdb_attrs_add_long(lreq->mod_attrs, SYSDB_FAILED_LOGIN_ATTEMPTS, 0L); - NEQ_CHECK_OR_JUMP(ret, EOK, ("sysdb_attrs_add_long failed.\n"), + NEQ_CHECK_OR_JUMP(ret, EOK, "sysdb_attrs_add_long failed.\n", lreq->error, ret, done); ret = sysdb_set_user_attr(lreq->domain, lreq->preq->pd->user, lreq->mod_attrs, SYSDB_MOD_REP); - NEQ_CHECK_OR_JUMP(ret, EOK, ("sysdb_set_user_attr failed.\n"), + NEQ_CHECK_OR_JUMP(ret, EOK, "sysdb_set_user_attr failed.\n", lreq->error, ret, done); done: @@ -109,12 +109,12 @@ static void do_failed_login(struct LOCAL_request *lreq) pd->response_delay = 3; lreq->mod_attrs = sysdb_new_attrs(lreq); - NULL_CHECK_OR_JUMP(lreq->mod_attrs, ("sysdb_new_attrs failed.\n"), + NULL_CHECK_OR_JUMP(lreq->mod_attrs, "sysdb_new_attrs failed.\n", lreq->error, ENOMEM, done); ret = sysdb_attrs_add_long(lreq->mod_attrs, SYSDB_LAST_FAILED_LOGIN, (long)time(NULL)); - NEQ_CHECK_OR_JUMP(ret, EOK, ("sysdb_attrs_add_long failed.\n"), + NEQ_CHECK_OR_JUMP(ret, EOK, "sysdb_attrs_add_long failed.\n", lreq->error, ret, done); failedLoginAttempts = ldb_msg_find_attr_as_int(lreq->res->msgs[0], @@ -125,13 +125,13 @@ static void do_failed_login(struct LOCAL_request *lreq) ret = sysdb_attrs_add_long(lreq->mod_attrs, SYSDB_FAILED_LOGIN_ATTEMPTS, (long)failedLoginAttempts); - NEQ_CHECK_OR_JUMP(ret, EOK, ("sysdb_attrs_add_long failed.\n"), + NEQ_CHECK_OR_JUMP(ret, EOK, "sysdb_attrs_add_long failed.\n", lreq->error, ret, done); ret = sysdb_set_user_attr(lreq->domain, lreq->preq->pd->user, lreq->mod_attrs, SYSDB_MOD_REP); - NEQ_CHECK_OR_JUMP(ret, EOK, ("sysdb_set_user_attr failed.\n"), + NEQ_CHECK_OR_JUMP(ret, EOK, "sysdb_set_user_attr failed.\n", lreq->error, ret, done); done: @@ -175,32 +175,32 @@ static void do_pam_chauthtok(struct LOCAL_request *lreq) } ret = s3crypt_gen_salt(lreq, &salt); - NEQ_CHECK_OR_JUMP(ret, EOK, ("Salt generation failed.\n"), + NEQ_CHECK_OR_JUMP(ret, EOK, "Salt generation failed.\n", lreq->error, ret, done); DEBUG(SSSDBG_CONF_SETTINGS, "Using salt [%s]\n", salt); ret = s3crypt_sha512(lreq, password, salt, &new_hash); - NEQ_CHECK_OR_JUMP(ret, EOK, ("Hash generation failed.\n"), + NEQ_CHECK_OR_JUMP(ret, EOK, "Hash generation failed.\n", lreq->error, ret, done); DEBUG(SSSDBG_CONF_SETTINGS, "New hash [%s]\n", new_hash); lreq->mod_attrs = sysdb_new_attrs(lreq); - NULL_CHECK_OR_JUMP(lreq->mod_attrs, ("sysdb_new_attrs failed.\n"), + NULL_CHECK_OR_JUMP(lreq->mod_attrs, "sysdb_new_attrs failed.\n", lreq->error, ENOMEM, done); ret = sysdb_attrs_add_string(lreq->mod_attrs, SYSDB_PWD, new_hash); - NEQ_CHECK_OR_JUMP(ret, EOK, ("sysdb_attrs_add_string failed.\n"), + NEQ_CHECK_OR_JUMP(ret, EOK, "sysdb_attrs_add_string failed.\n", lreq->error, ret, done); ret = sysdb_attrs_add_long(lreq->mod_attrs, "lastPasswordChange", (long)time(NULL)); - NEQ_CHECK_OR_JUMP(ret, EOK, ("sysdb_attrs_add_long failed.\n"), + NEQ_CHECK_OR_JUMP(ret, EOK, "sysdb_attrs_add_long failed.\n", lreq->error, ret, done); ret = sysdb_set_user_attr(lreq->domain, lreq->preq->pd->user, lreq->mod_attrs, SYSDB_MOD_REP); - NEQ_CHECK_OR_JUMP(ret, EOK, ("sysdb_set_user_attr failed.\n"), + NEQ_CHECK_OR_JUMP(ret, EOK, "sysdb_set_user_attr failed.\n", lreq->error, ret, done); done: @@ -294,17 +294,17 @@ int LOCAL_pam_handler(struct pam_auth_req *preq) break; } ret = sss_authtok_get_password(pd->authtok, &password, NULL); - NEQ_CHECK_OR_JUMP(ret, EOK, ("Failed to get password.\n"), - lreq->error, ret, done); + NEQ_CHECK_OR_JUMP(ret, EOK, "Failed to get password.\n", + lreq->error, ret, done); pwdhash = ldb_msg_find_attr_as_string(res->msgs[0], SYSDB_PWD, NULL); - NULL_CHECK_OR_JUMP(pwdhash, ("No password stored.\n"), + NULL_CHECK_OR_JUMP(pwdhash, "No password stored.\n", lreq->error, LDB_ERR_NO_SUCH_ATTRIBUTE, done); DEBUG(SSSDBG_CONF_SETTINGS, "user: [%s], password hash: [%s]\n", username, pwdhash); ret = s3crypt_sha512(lreq, password, pwdhash, &new_hash); - NEQ_CHECK_OR_JUMP(ret, EOK, ("nss_sha512_crypt failed.\n"), + NEQ_CHECK_OR_JUMP(ret, EOK, "nss_sha512_crypt failed.\n", lreq->error, ret, done); DEBUG(SSSDBG_CONF_SETTINGS, diff --git a/src/responder/sudo/sudosrv_get_sudorules.c b/src/responder/sudo/sudosrv_get_sudorules.c index 9095d77ba..0cf8c9be3 100644 --- a/src/responder/sudo/sudosrv_get_sudorules.c +++ b/src/responder/sudo/sudosrv_get_sudorules.c @@ -444,7 +444,7 @@ struct tevent_req *sudosrv_get_rules_send(TALLOC_CTX *mem_ctx, req = tevent_req_create(mem_ctx, &state, struct sudosrv_get_rules_state); if (req == NULL) { - DEBUG(SSSDBG_CRIT_FAILURE, ("tevent_req_create() failed\n")); + DEBUG(SSSDBG_CRIT_FAILURE, "tevent_req_create() failed\n"); return NULL; } diff --git a/src/tests/cmocka/test_negcache.c b/src/tests/cmocka/test_negcache.c index 8911774e3..322541769 100644 --- a/src/tests/cmocka/test_negcache.c +++ b/src/tests/cmocka/test_negcache.c @@ -83,7 +83,7 @@ mock_nctx(TALLOC_CTX *mem_ctx) err = sss_idmap_init(sss_idmap_talloc, nctx, sss_idmap_talloc_free, &nctx->idmap_ctx); if (err != IDMAP_SUCCESS) { - DEBUG(SSSDBG_FATAL_FAILURE, ("sss_idmap_init failed.\n")); + DEBUG(SSSDBG_FATAL_FAILURE, "sss_idmap_init failed.\n"); talloc_free(nctx); return NULL; } diff --git a/src/tests/common_dom.c b/src/tests/common_dom.c index 1d4800179..cda1cfb0e 100644 --- a/src/tests/common_dom.c +++ b/src/tests/common_dom.c @@ -39,7 +39,7 @@ mock_confdb(TALLOC_CTX *mem_ctx, tmp_ctx = talloc_new(NULL); if (tmp_ctx == NULL) { - DEBUG(SSSDBG_CRIT_FAILURE, ("talloc_new() failed\n")); + DEBUG(SSSDBG_CRIT_FAILURE, "talloc_new() failed\n"); return ENOMEM; } @@ -85,7 +85,7 @@ mock_confdb_domain(TALLOC_CTX *mem_ctx, tmp_ctx = talloc_new(NULL); if (tmp_ctx == NULL) { - DEBUG(SSSDBG_CRIT_FAILURE, ("talloc_new() failed\n")); + DEBUG(SSSDBG_CRIT_FAILURE, "talloc_new() failed\n"); return ENOMEM; } diff --git a/src/util/sss_semanage.c b/src/util/sss_semanage.c index d76677ee7..81068da98 100644 --- a/src/util/sss_semanage.c +++ b/src/util/sss_semanage.c @@ -203,7 +203,7 @@ static int sss_semanage_user_mod(semanage_handle_t *handle, ret = semanage_seuser_modify_local(handle, key, seuser); if (ret != 0) { DEBUG(SSSDBG_CRIT_FAILURE, - ("Could not modify login mapping for %s\n"), login_name); + "Could not modify login mapping for %s\n", login_name); ret = EIO; goto done; } |