summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
-rw-r--r--src/providers/ad/ad_subdomains.c2
-rw-r--r--src/providers/ipa/ipa_sudo_async.c4
-rw-r--r--src/providers/krb5/krb5_child.c2
-rw-r--r--src/providers/ldap/sdap.c2
-rw-r--r--src/responder/common/responder_cache_req.c4
-rw-r--r--src/responder/ifp/ifp_groups.c2
-rw-r--r--src/responder/pam/pam_LOCAL_domain.c36
-rw-r--r--src/responder/sudo/sudosrv_get_sudorules.c2
-rw-r--r--src/tests/cmocka/test_negcache.c2
-rw-r--r--src/tests/common_dom.c4
-rw-r--r--src/util/sss_semanage.c2
11 files changed, 31 insertions, 31 deletions
diff --git a/src/providers/ad/ad_subdomains.c b/src/providers/ad/ad_subdomains.c
index 4bdd2a7ad..1aee92cab 100644
--- a/src/providers/ad/ad_subdomains.c
+++ b/src/providers/ad/ad_subdomains.c
@@ -1055,7 +1055,7 @@ static void ad_subdomains_get_slave_domain_done(struct tevent_req *req)
ctx->reply_count, ctx->reply,
ctx->root_domain_attrs, &nsubdoms, &subdoms);
if (ret != EOK) {
- DEBUG(SSSDBG_OP_FAILURE, ("Cannot process subdomain list\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "Cannot process subdomain list\n");
tevent_req_error(req, ret);
return;
}
diff --git a/src/providers/ipa/ipa_sudo_async.c b/src/providers/ipa/ipa_sudo_async.c
index 79e69ce96..1e14fdd57 100644
--- a/src/providers/ipa/ipa_sudo_async.c
+++ b/src/providers/ipa/ipa_sudo_async.c
@@ -415,7 +415,7 @@ ipa_sudo_fetch_send(TALLOC_CTX *mem_ctx,
req = tevent_req_create(mem_ctx, &state,
struct ipa_sudo_fetch_state);
if (req == NULL) {
- DEBUG(SSSDBG_CRIT_FAILURE, ("tevent_req_create() failed\n"));
+ DEBUG(SSSDBG_CRIT_FAILURE, "tevent_req_create() failed\n");
return NULL;
}
@@ -872,7 +872,7 @@ ipa_sudo_refresh_send(TALLOC_CTX *mem_ctx,
req = tevent_req_create(mem_ctx, &state, struct ipa_sudo_refresh_state);
if (req == NULL) {
- DEBUG(SSSDBG_CRIT_FAILURE, ("tevent_req_create() failed\n"));
+ DEBUG(SSSDBG_CRIT_FAILURE, "tevent_req_create() failed\n");
return NULL;
}
diff --git a/src/providers/krb5/krb5_child.c b/src/providers/krb5/krb5_child.c
index fff6a0a0c..3157e38af 100644
--- a/src/providers/krb5/krb5_child.c
+++ b/src/providers/krb5/krb5_child.c
@@ -172,7 +172,7 @@ static void revert_changepw_options(krb5_get_init_creds_opt *options)
kerr = set_lifetime_options(options);
if (kerr != 0) {
- DEBUG(SSSDBG_OP_FAILURE, ("set_lifetime_options failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "set_lifetime_options failed.\n");
}
}
diff --git a/src/providers/ldap/sdap.c b/src/providers/ldap/sdap.c
index 686f72666..9a56d7a14 100644
--- a/src/providers/ldap/sdap.c
+++ b/src/providers/ldap/sdap.c
@@ -227,7 +227,7 @@ int sdap_extend_map_with_list(TALLOC_CTX *mem_ctx,
ret = split_on_separator(mem_ctx, extra_attrs, ',', true, true,
&extra_attrs_list, NULL);
if (ret != EOK) {
- DEBUG(SSSDBG_OP_FAILURE, ("Failed to parse server list!\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "Failed to parse server list!\n");
return ret;
}
diff --git a/src/responder/common/responder_cache_req.c b/src/responder/common/responder_cache_req.c
index 42faf1fa6..a8f846c96 100644
--- a/src/responder/common/responder_cache_req.c
+++ b/src/responder/common/responder_cache_req.c
@@ -920,7 +920,7 @@ static struct tevent_req *cache_req_cache_send(TALLOC_CTX *mem_ctx,
req = tevent_req_create(mem_ctx, &state, struct cache_req_cache_state);
if (req == NULL) {
- DEBUG(SSSDBG_CRIT_FAILURE, ("tevent_req_create() failed\n"));
+ DEBUG(SSSDBG_CRIT_FAILURE, "tevent_req_create() failed\n");
return NULL;
}
@@ -1160,7 +1160,7 @@ struct tevent_req *cache_req_send(TALLOC_CTX *mem_ctx,
req = tevent_req_create(mem_ctx, &state, struct cache_req_state);
if (req == NULL) {
- DEBUG(SSSDBG_CRIT_FAILURE, ("tevent_req_create() failed\n"));
+ DEBUG(SSSDBG_CRIT_FAILURE, "tevent_req_create() failed\n");
return NULL;
}
diff --git a/src/responder/ifp/ifp_groups.c b/src/responder/ifp/ifp_groups.c
index 0164eecdc..363598843 100644
--- a/src/responder/ifp/ifp_groups.c
+++ b/src/responder/ifp/ifp_groups.c
@@ -497,7 +497,7 @@ static struct tevent_req *resolv_ghosts_send(TALLOC_CTX *mem_ctx,
req = tevent_req_create(mem_ctx, &state, struct resolv_ghosts_state);
if (req == NULL) {
- DEBUG(SSSDBG_CRIT_FAILURE, ("tevent_req_create() failed\n"));
+ DEBUG(SSSDBG_CRIT_FAILURE, "tevent_req_create() failed\n");
return NULL;
}
diff --git a/src/responder/pam/pam_LOCAL_domain.c b/src/responder/pam/pam_LOCAL_domain.c
index 4b076146c..0e41a68eb 100644
--- a/src/responder/pam/pam_LOCAL_domain.c
+++ b/src/responder/pam/pam_LOCAL_domain.c
@@ -75,22 +75,22 @@ static void do_successful_login(struct LOCAL_request *lreq)
int ret;
lreq->mod_attrs = sysdb_new_attrs(lreq);
- NULL_CHECK_OR_JUMP(lreq->mod_attrs, ("sysdb_new_attrs failed.\n"),
+ NULL_CHECK_OR_JUMP(lreq->mod_attrs, "sysdb_new_attrs failed.\n",
lreq->error, ENOMEM, done);
ret = sysdb_attrs_add_long(lreq->mod_attrs,
SYSDB_LAST_LOGIN, (long)time(NULL));
- NEQ_CHECK_OR_JUMP(ret, EOK, ("sysdb_attrs_add_long failed.\n"),
+ NEQ_CHECK_OR_JUMP(ret, EOK, "sysdb_attrs_add_long failed.\n",
lreq->error, ret, done);
ret = sysdb_attrs_add_long(lreq->mod_attrs, SYSDB_FAILED_LOGIN_ATTEMPTS, 0L);
- NEQ_CHECK_OR_JUMP(ret, EOK, ("sysdb_attrs_add_long failed.\n"),
+ NEQ_CHECK_OR_JUMP(ret, EOK, "sysdb_attrs_add_long failed.\n",
lreq->error, ret, done);
ret = sysdb_set_user_attr(lreq->domain,
lreq->preq->pd->user,
lreq->mod_attrs, SYSDB_MOD_REP);
- NEQ_CHECK_OR_JUMP(ret, EOK, ("sysdb_set_user_attr failed.\n"),
+ NEQ_CHECK_OR_JUMP(ret, EOK, "sysdb_set_user_attr failed.\n",
lreq->error, ret, done);
done:
@@ -109,12 +109,12 @@ static void do_failed_login(struct LOCAL_request *lreq)
pd->response_delay = 3;
lreq->mod_attrs = sysdb_new_attrs(lreq);
- NULL_CHECK_OR_JUMP(lreq->mod_attrs, ("sysdb_new_attrs failed.\n"),
+ NULL_CHECK_OR_JUMP(lreq->mod_attrs, "sysdb_new_attrs failed.\n",
lreq->error, ENOMEM, done);
ret = sysdb_attrs_add_long(lreq->mod_attrs,
SYSDB_LAST_FAILED_LOGIN, (long)time(NULL));
- NEQ_CHECK_OR_JUMP(ret, EOK, ("sysdb_attrs_add_long failed.\n"),
+ NEQ_CHECK_OR_JUMP(ret, EOK, "sysdb_attrs_add_long failed.\n",
lreq->error, ret, done);
failedLoginAttempts = ldb_msg_find_attr_as_int(lreq->res->msgs[0],
@@ -125,13 +125,13 @@ static void do_failed_login(struct LOCAL_request *lreq)
ret = sysdb_attrs_add_long(lreq->mod_attrs,
SYSDB_FAILED_LOGIN_ATTEMPTS,
(long)failedLoginAttempts);
- NEQ_CHECK_OR_JUMP(ret, EOK, ("sysdb_attrs_add_long failed.\n"),
+ NEQ_CHECK_OR_JUMP(ret, EOK, "sysdb_attrs_add_long failed.\n",
lreq->error, ret, done);
ret = sysdb_set_user_attr(lreq->domain,
lreq->preq->pd->user,
lreq->mod_attrs, SYSDB_MOD_REP);
- NEQ_CHECK_OR_JUMP(ret, EOK, ("sysdb_set_user_attr failed.\n"),
+ NEQ_CHECK_OR_JUMP(ret, EOK, "sysdb_set_user_attr failed.\n",
lreq->error, ret, done);
done:
@@ -175,32 +175,32 @@ static void do_pam_chauthtok(struct LOCAL_request *lreq)
}
ret = s3crypt_gen_salt(lreq, &salt);
- NEQ_CHECK_OR_JUMP(ret, EOK, ("Salt generation failed.\n"),
+ NEQ_CHECK_OR_JUMP(ret, EOK, "Salt generation failed.\n",
lreq->error, ret, done);
DEBUG(SSSDBG_CONF_SETTINGS, "Using salt [%s]\n", salt);
ret = s3crypt_sha512(lreq, password, salt, &new_hash);
- NEQ_CHECK_OR_JUMP(ret, EOK, ("Hash generation failed.\n"),
+ NEQ_CHECK_OR_JUMP(ret, EOK, "Hash generation failed.\n",
lreq->error, ret, done);
DEBUG(SSSDBG_CONF_SETTINGS, "New hash [%s]\n", new_hash);
lreq->mod_attrs = sysdb_new_attrs(lreq);
- NULL_CHECK_OR_JUMP(lreq->mod_attrs, ("sysdb_new_attrs failed.\n"),
+ NULL_CHECK_OR_JUMP(lreq->mod_attrs, "sysdb_new_attrs failed.\n",
lreq->error, ENOMEM, done);
ret = sysdb_attrs_add_string(lreq->mod_attrs, SYSDB_PWD, new_hash);
- NEQ_CHECK_OR_JUMP(ret, EOK, ("sysdb_attrs_add_string failed.\n"),
+ NEQ_CHECK_OR_JUMP(ret, EOK, "sysdb_attrs_add_string failed.\n",
lreq->error, ret, done);
ret = sysdb_attrs_add_long(lreq->mod_attrs,
"lastPasswordChange", (long)time(NULL));
- NEQ_CHECK_OR_JUMP(ret, EOK, ("sysdb_attrs_add_long failed.\n"),
+ NEQ_CHECK_OR_JUMP(ret, EOK, "sysdb_attrs_add_long failed.\n",
lreq->error, ret, done);
ret = sysdb_set_user_attr(lreq->domain,
lreq->preq->pd->user,
lreq->mod_attrs, SYSDB_MOD_REP);
- NEQ_CHECK_OR_JUMP(ret, EOK, ("sysdb_set_user_attr failed.\n"),
+ NEQ_CHECK_OR_JUMP(ret, EOK, "sysdb_set_user_attr failed.\n",
lreq->error, ret, done);
done:
@@ -294,17 +294,17 @@ int LOCAL_pam_handler(struct pam_auth_req *preq)
break;
}
ret = sss_authtok_get_password(pd->authtok, &password, NULL);
- NEQ_CHECK_OR_JUMP(ret, EOK, ("Failed to get password.\n"),
- lreq->error, ret, done);
+ NEQ_CHECK_OR_JUMP(ret, EOK, "Failed to get password.\n",
+ lreq->error, ret, done);
pwdhash = ldb_msg_find_attr_as_string(res->msgs[0], SYSDB_PWD, NULL);
- NULL_CHECK_OR_JUMP(pwdhash, ("No password stored.\n"),
+ NULL_CHECK_OR_JUMP(pwdhash, "No password stored.\n",
lreq->error, LDB_ERR_NO_SUCH_ATTRIBUTE, done);
DEBUG(SSSDBG_CONF_SETTINGS,
"user: [%s], password hash: [%s]\n", username, pwdhash);
ret = s3crypt_sha512(lreq, password, pwdhash, &new_hash);
- NEQ_CHECK_OR_JUMP(ret, EOK, ("nss_sha512_crypt failed.\n"),
+ NEQ_CHECK_OR_JUMP(ret, EOK, "nss_sha512_crypt failed.\n",
lreq->error, ret, done);
DEBUG(SSSDBG_CONF_SETTINGS,
diff --git a/src/responder/sudo/sudosrv_get_sudorules.c b/src/responder/sudo/sudosrv_get_sudorules.c
index 9095d77ba..0cf8c9be3 100644
--- a/src/responder/sudo/sudosrv_get_sudorules.c
+++ b/src/responder/sudo/sudosrv_get_sudorules.c
@@ -444,7 +444,7 @@ struct tevent_req *sudosrv_get_rules_send(TALLOC_CTX *mem_ctx,
req = tevent_req_create(mem_ctx, &state, struct sudosrv_get_rules_state);
if (req == NULL) {
- DEBUG(SSSDBG_CRIT_FAILURE, ("tevent_req_create() failed\n"));
+ DEBUG(SSSDBG_CRIT_FAILURE, "tevent_req_create() failed\n");
return NULL;
}
diff --git a/src/tests/cmocka/test_negcache.c b/src/tests/cmocka/test_negcache.c
index 8911774e3..322541769 100644
--- a/src/tests/cmocka/test_negcache.c
+++ b/src/tests/cmocka/test_negcache.c
@@ -83,7 +83,7 @@ mock_nctx(TALLOC_CTX *mem_ctx)
err = sss_idmap_init(sss_idmap_talloc, nctx, sss_idmap_talloc_free,
&nctx->idmap_ctx);
if (err != IDMAP_SUCCESS) {
- DEBUG(SSSDBG_FATAL_FAILURE, ("sss_idmap_init failed.\n"));
+ DEBUG(SSSDBG_FATAL_FAILURE, "sss_idmap_init failed.\n");
talloc_free(nctx);
return NULL;
}
diff --git a/src/tests/common_dom.c b/src/tests/common_dom.c
index 1d4800179..cda1cfb0e 100644
--- a/src/tests/common_dom.c
+++ b/src/tests/common_dom.c
@@ -39,7 +39,7 @@ mock_confdb(TALLOC_CTX *mem_ctx,
tmp_ctx = talloc_new(NULL);
if (tmp_ctx == NULL) {
- DEBUG(SSSDBG_CRIT_FAILURE, ("talloc_new() failed\n"));
+ DEBUG(SSSDBG_CRIT_FAILURE, "talloc_new() failed\n");
return ENOMEM;
}
@@ -85,7 +85,7 @@ mock_confdb_domain(TALLOC_CTX *mem_ctx,
tmp_ctx = talloc_new(NULL);
if (tmp_ctx == NULL) {
- DEBUG(SSSDBG_CRIT_FAILURE, ("talloc_new() failed\n"));
+ DEBUG(SSSDBG_CRIT_FAILURE, "talloc_new() failed\n");
return ENOMEM;
}
diff --git a/src/util/sss_semanage.c b/src/util/sss_semanage.c
index d76677ee7..81068da98 100644
--- a/src/util/sss_semanage.c
+++ b/src/util/sss_semanage.c
@@ -203,7 +203,7 @@ static int sss_semanage_user_mod(semanage_handle_t *handle,
ret = semanage_seuser_modify_local(handle, key, seuser);
if (ret != 0) {
DEBUG(SSSDBG_CRIT_FAILURE,
- ("Could not modify login mapping for %s\n"), login_name);
+ "Could not modify login mapping for %s\n", login_name);
ret = EIO;
goto done;
}