diff options
| author | Frederic Peters <fpeters@entrouvert.com> | 2004-10-27 17:02:18 +0000 |
|---|---|---|
| committer | Frederic Peters <fpeters@entrouvert.com> | 2004-10-27 17:02:18 +0000 |
| commit | 66cc2630b4fffa95b4ab07a733a688b61dd68088 (patch) | |
| tree | 5a08a2ea1c827326a159f307d37a08b7e4f68bd9 | |
| parent | 3b050c9fa567d5e767d1755b16a0c4f8302476d9 (diff) | |
removal of \n at end of error messages
| -rw-r--r-- | lasso/id-ff/defederation.c | 10 | ||||
| -rw-r--r-- | lasso/id-ff/federation.c | 4 | ||||
| -rw-r--r-- | lasso/id-ff/identity.c | 4 | ||||
| -rw-r--r-- | lasso/id-ff/lecp.c | 38 | ||||
| -rw-r--r-- | lasso/id-ff/login.c | 12 | ||||
| -rw-r--r-- | lasso/id-ff/logout.c | 10 | ||||
| -rw-r--r-- | lasso/id-ff/name_registration.c | 4 | ||||
| -rw-r--r-- | lasso/id-ff/profile.c | 6 | ||||
| -rw-r--r-- | lasso/id-ff/provider.c | 4 | ||||
| -rw-r--r-- | lasso/id-ff/server.c | 6 | ||||
| -rw-r--r-- | lasso/id-ff/session.c | 4 | ||||
| -rw-r--r-- | lasso/xml/errors.c | 54 | ||||
| -rw-r--r-- | lasso/xml/tools.c | 12 |
13 files changed, 84 insertions, 84 deletions
diff --git a/lasso/id-ff/defederation.c b/lasso/id-ff/defederation.c index 2f42778e..3ed3307f 100644 --- a/lasso/id-ff/defederation.c +++ b/lasso/id-ff/defederation.c @@ -122,7 +122,7 @@ lasso_defederation_build_notification_msg(LassoDefederation *defederation) } if (profile->msg_url == NULL) { - message(G_LOG_LEVEL_CRITICAL, "Invalid http method\n"); + message(G_LOG_LEVEL_CRITICAL, "Invalid http method"); return LASSO_PROFILE_ERROR_INVALID_HTTP_METHOD; } @@ -371,7 +371,7 @@ lasso_defederation_validate_notification(LassoDefederation *defederation) remote_provider = g_hash_table_lookup(profile->server->providers, profile->remote_providerID); if (remote_provider == NULL) { - message(G_LOG_LEVEL_CRITICAL, "Provider not found\n"); + message(G_LOG_LEVEL_CRITICAL, "Provider not found"); return -1; } @@ -417,7 +417,7 @@ lasso_defederation_validate_notification(LassoDefederation *defederation) } if (lasso_federation_verify_nameIdentifier(federation, nameIdentifier) == FALSE) { - message(G_LOG_LEVEL_CRITICAL, "No name identifier for %s\n", + message(G_LOG_LEVEL_CRITICAL, "No name identifier for %s", profile->remote_providerID); return -1; } @@ -450,7 +450,7 @@ dispose(GObject *object) return; } defederation->private->dispose_has_run = TRUE; - debug("Defederation object 0x%x disposed ...\n", defederation); + debug("Defederation object 0x%x disposed ...", defederation); G_OBJECT_CLASS(parent_class)->dispose(object); } @@ -459,7 +459,7 @@ static void finalize(GObject *object) { LassoDefederation *defederation = LASSO_DEFEDERATION(object); - debug("Defederation object 0x%x finalized ...\n", defederation); + debug("Defederation object 0x%x finalized ...", defederation); g_free (defederation->private); G_OBJECT_CLASS(parent_class)->finalize(object); } diff --git a/lasso/id-ff/federation.c b/lasso/id-ff/federation.c index 8f57ad59..3f376264 100644 --- a/lasso/id-ff/federation.c +++ b/lasso/id-ff/federation.c @@ -207,7 +207,7 @@ dispose(GObject *object) } federation->private->dispose_has_run = TRUE; - debug("Federation object 0x%x disposed ...\n", federation); + debug("Federation object 0x%x disposed ...", federation); /* unref reference counted objects */ lasso_node_destroy(LASSO_NODE(federation->local_nameIdentifier)); @@ -220,7 +220,7 @@ static void finalize(GObject *object) { LassoFederation *federation = LASSO_FEDERATION(object); - debug("Federation object 0x%x finalized ...\n", federation); + debug("Federation object 0x%x finalized ...", federation); g_free(federation->remote_providerID); g_free(federation->private); diff --git a/lasso/id-ff/identity.c b/lasso/id-ff/identity.c index 82508eab..e4ae6f64 100644 --- a/lasso/id-ff/identity.c +++ b/lasso/id-ff/identity.c @@ -136,7 +136,7 @@ dispose(GObject *object) } identity->private->dispose_has_run = TRUE; - debug("Identity object 0x%x disposed ...\n", identity); + debug("Identity object 0x%x disposed ...", identity); /* XXX: here or in finalize ? * g_hash_table_destroy(identity->federations); */ @@ -149,7 +149,7 @@ finalize(GObject *object) { LassoIdentity *identity = LASSO_IDENTITY(object); - debug("Identity object 0x%x finalized ...\n", identity); + debug("Identity object 0x%x finalized ...", identity); identity->private = NULL; G_OBJECT_CLASS(parent_class)->finalize(object); } diff --git a/lasso/id-ff/lecp.c b/lasso/id-ff/lecp.c index 8f3d2623..90913ab7 100644 --- a/lasso/id-ff/lecp.c +++ b/lasso/id-ff/lecp.c @@ -44,12 +44,12 @@ lasso_lecp_build_authn_request_envelope_msg(LassoLecp *lecp) assertionConsumerServiceURL = lasso_provider_get_metadata_one( LASSO_PROVIDER(profile->server), "AssertionConsumerServiceURL"); if (assertionConsumerServiceURL == NULL) { - message(G_LOG_LEVEL_CRITICAL, "AssertionConsumerServiceURL not found\n"); + message(G_LOG_LEVEL_CRITICAL, "AssertionConsumerServiceURL not found"); return -1; } if (profile->request == NULL) { - message(G_LOG_LEVEL_CRITICAL, "AuthnRequest not found\n"); + message(G_LOG_LEVEL_CRITICAL, "AuthnRequest not found"); return -1; } @@ -60,7 +60,7 @@ lasso_lecp_build_authn_request_envelope_msg(LassoLecp *lecp) assertionConsumerServiceURL); #endif if (lecp->authnRequestEnvelope == NULL) { - message(G_LOG_LEVEL_CRITICAL, "Error while building AuthnRequestEnvelope\n"); + message(G_LOG_LEVEL_CRITICAL, "Error while building AuthnRequestEnvelope"); return -1; } @@ -68,7 +68,7 @@ lasso_lecp_build_authn_request_envelope_msg(LassoLecp *lecp) profile->msg_body = lasso_node_export(lecp->authnRequestEnvelope); #endif if (profile->msg_body == NULL) { - message(G_LOG_LEVEL_CRITICAL, "Error while exporting the AuthnRequestEnvelope to POST msg\n"); + message(G_LOG_LEVEL_CRITICAL, "Error while exporting the AuthnRequestEnvelope to POST msg"); return -1; } @@ -108,7 +108,7 @@ lasso_lecp_build_authn_request_msg(LassoLecp *lecp, profile->msg_url = lasso_provider_get_metadata_one(remote_provider, "SingleSignOnServiceURL"); profile->msg_body = lasso_node_export_to_soap(profile->request); if (profile->msg_body == NULL) { - message(G_LOG_LEVEL_CRITICAL, "Error while building the AuthnRequest SOAP message\n"); + message(G_LOG_LEVEL_CRITICAL, "Error while building the AuthnRequest SOAP message"); return -1; } @@ -125,12 +125,12 @@ lasso_lecp_build_authn_response_msg(LassoLecp *lecp) profile = LASSO_PROFILE(lecp); profile->msg_url = g_strdup(lecp->assertionConsumerServiceURL); if (profile->msg_url == NULL) { - message(G_LOG_LEVEL_CRITICAL, "AssertionConsumerServiceURL not found\n"); + message(G_LOG_LEVEL_CRITICAL, "AssertionConsumerServiceURL not found"); return -1; } profile->msg_body = lasso_node_export_to_base64(profile->response); if (profile->msg_body == NULL) { - message(G_LOG_LEVEL_CRITICAL, "AuthnResponse Base64 msg not found\n"); + message(G_LOG_LEVEL_CRITICAL, "AuthnResponse Base64 msg not found"); return -1; } @@ -156,13 +156,13 @@ lasso_lecp_build_authn_response_envelope_msg(LassoLecp *lecp, profile = LASSO_PROFILE(lecp); if (LASSO_IS_LIB_AUTHN_RESPONSE(profile->response) == FALSE) { - message(G_LOG_LEVEL_CRITICAL, "AuthnResponse not found\n"); + message(G_LOG_LEVEL_CRITICAL, "AuthnResponse not found"); return -1; } provider = g_hash_table_lookup(profile->server->providers, profile->remote_providerID); if (provider == NULL) { - message(G_LOG_LEVEL_CRITICAL, "Provider %s not found\n", profile->remote_providerID); + message(G_LOG_LEVEL_CRITICAL, "Provider %s not found", profile->remote_providerID); return -1; } @@ -179,7 +179,7 @@ lasso_lecp_build_authn_response_envelope_msg(LassoLecp *lecp, assertionConsumerServiceURL = lasso_provider_get_metadata_one( provider, "AssertionConsumerServiceURL"); if (assertionConsumerServiceURL == NULL) { - message(G_LOG_LEVEL_CRITICAL, "AssertionConsumerServiceURL not found\n"); + message(G_LOG_LEVEL_CRITICAL, "AssertionConsumerServiceURL not found"); return -1; } @@ -193,7 +193,7 @@ lasso_lecp_build_authn_response_envelope_msg(LassoLecp *lecp, LASSO_PROFILE(lecp)->msg_body = lasso_node_export_to_soap(lecp->authnResponseEnvelope); if (LASSO_PROFILE(lecp)->msg_body == NULL) { - message(G_LOG_LEVEL_CRITICAL, "Error while exporting the AuthnResponseEnvelope to SOAP msg\n"); + message(G_LOG_LEVEL_CRITICAL, "Error while exporting the AuthnResponseEnvelope to SOAP msg"); return -1; } @@ -226,7 +226,7 @@ lasso_lecp_process_authn_request_msg(LassoLecp *lecp, g_return_val_if_fail(authn_request_msg!=NULL, -1); if (authn_request_method != LASSO_HTTP_METHOD_SOAP) { - message(G_LOG_LEVEL_CRITICAL, "Invalid authentication request method\n"); + message(G_LOG_LEVEL_CRITICAL, "Invalid authentication request method"); return -1; } res = lasso_login_process_authn_request_msg(LASSO_LOGIN(lecp), authn_request_msg); @@ -244,7 +244,7 @@ lasso_lecp_process_authn_request_envelope_msg(LassoLecp *lecp, lecp->authnRequestEnvelope = lasso_authn_request_envelope_new_from_export(request_msg, LASSO_NODE_EXPORT_TYPE_XML); #endif if (lecp->authnRequestEnvelope == NULL) { - message(G_LOG_LEVEL_CRITICAL, "Error while building the authentication request envelope\n"); + message(G_LOG_LEVEL_CRITICAL, "Error while building the authentication request envelope"); return -1; } @@ -252,7 +252,7 @@ lasso_lecp_process_authn_request_envelope_msg(LassoLecp *lecp, LASSO_PROFILE(lecp)->request = lasso_authn_request_envelope_get_authnRequest(LASSO_AUTHN_REQUEST_ENVELOPE(lecp->authnRequestEnvelope)); #endif if (LASSO_PROFILE(lecp)->request == NULL) { - message(G_LOG_LEVEL_CRITICAL, "AuthnRequest not found\n"); + message(G_LOG_LEVEL_CRITICAL, "AuthnRequest not found"); return -1; } @@ -273,14 +273,14 @@ lasso_lecp_process_authn_response_envelope_msg(LassoLecp *lecp, lecp->authnResponseEnvelope = lasso_lib_authn_response_envelope_new(NULL, NULL); lasso_node_init_from_message(lecp->authnResponseEnvelope, response_msg); if (lecp->authnResponseEnvelope == NULL) { - message(G_LOG_LEVEL_CRITICAL, "Error while building AuthnResponseEnvelope\n"); + message(G_LOG_LEVEL_CRITICAL, "Error while building AuthnResponseEnvelope"); return -1; } #if 0 /* XXX */ profile->response = lasso_authn_response_envelope_get_authnResponse(LASSO_AUTHN_RESPONSE_ENVELOPE(lecp->authnResponseEnvelope)); if (profile->response == NULL) { - message(G_LOG_LEVEL_CRITICAL, "AuthnResponse not found\n"); + message(G_LOG_LEVEL_CRITICAL, "AuthnResponse not found"); return -1; } #endif @@ -289,7 +289,7 @@ lasso_lecp_process_authn_response_envelope_msg(LassoLecp *lecp, lecp->assertionConsumerServiceURL = lasso_authn_response_envelope_get_assertionConsumerServiceURL( LASSO_AUTHN_RESPONSE_ENVELOPE(lecp->authnResponseEnvelope)); if (lecp->assertionConsumerServiceURL == NULL){ - message(G_LOG_LEVEL_CRITICAL, "AssertionConsumerServiceURL not found\n"); + message(G_LOG_LEVEL_CRITICAL, "AssertionConsumerServiceURL not found"); return -1; } #endif @@ -311,7 +311,7 @@ lasso_lecp_destroy(LassoLecp *lecp) static void lasso_lecp_finalize(LassoLecp *lecp) { - debug("Lecp object 0x%x finalized ...\n", lecp); + debug("Lecp object 0x%x finalized ...", lecp); parent_class->finalize(G_OBJECT(lecp)); } @@ -369,7 +369,7 @@ lasso_lecp_new(LassoServer *server) lecp = g_object_new(LASSO_TYPE_LECP, NULL); if (LASSO_IS_SERVER(server)) { - debug("Add server to lecp object\n"); + debug("Add server to lecp object"); /* XXX LASSO_PROFILE(lecp)->server = lasso_server_copy(server); */ } diff --git a/lasso/id-ff/login.c b/lasso/id-ff/login.c index 57f88a58..c69a789b 100644 --- a/lasso/id-ff/login.c +++ b/lasso/id-ff/login.c @@ -166,7 +166,7 @@ lasso_login_must_ask_for_consent_private(LassoLogin *login) if (strcmp(nameIDPolicy, LASSO_LIB_NAMEID_POLICY_TYPE_FEDERATED) != 0 && strcmp(nameIDPolicy, LASSO_LIB_NAMEID_POLICY_TYPE_ANY) != 0) { - message(G_LOG_LEVEL_CRITICAL, "Unknown NameIDPolicy : %s\n", nameIDPolicy); + message(G_LOG_LEVEL_CRITICAL, "Unknown NameIDPolicy : %s", nameIDPolicy); /* we consider NameIDPolicy as empty (none value) if its value is unknown/invalid */ return TRUE; } @@ -200,7 +200,7 @@ lasso_login_must_ask_for_consent_private(LassoLogin *login) if (strcmp(consent, LASSO_LIB_CONSENT_INAPPLICABLE) == 0) return TRUE; - message(G_LOG_LEVEL_CRITICAL, "Unknown consent value : %s\n", consent); + message(G_LOG_LEVEL_CRITICAL, "Unknown consent value : %s", consent); /* we consider consent as empty if its value is unknown/invalid */ return TRUE; } @@ -867,7 +867,7 @@ lasso_login_build_response_msg(LassoLogin *login, gchar *remote_providerID) LASSO_PROFILE(login)->remote_providerID); if (assertion == NULL) { /* FIXME should this message output by lasso_session_get_assertion () ? */ - message(G_LOG_LEVEL_CRITICAL, "Assertion not found in session\n"); + message(G_LOG_LEVEL_CRITICAL, "Assertion not found in session"); } LASSO_SAMLP_RESPONSE(LASSO_PROFILE(login)->response)->Assertion = g_object_ref(assertion); @@ -1244,7 +1244,7 @@ lasso_login_process_request_msg(LassoLogin *login, gchar *request_msg) profile->request = lasso_node_new_from_soap(request_msg); /* XXX was: lasso_request_new_from_export(request_msg, LASSO_NODE_EXPORT_TYPE_SOAP); */ if (profile->request == NULL) { - message(G_LOG_LEVEL_CRITICAL, "Failed to rebuild samlp:Request with request message.\n"); + message(G_LOG_LEVEL_CRITICAL, "Failed to rebuild samlp:Request with request message."); return LASSO_ERROR_UNDEFINED; } /* get AssertionArtifact */ @@ -1346,7 +1346,7 @@ dispose(GObject *object) } login->private->dispose_has_run = TRUE; - debug("Login object 0x%x disposed ...\n", login); + debug("Login object 0x%x disposed ...", login); /* unref reference counted objects */ @@ -1358,7 +1358,7 @@ finalize(GObject *object) { LassoLogin *login = LASSO_LOGIN(object); - debug("Login object 0x%x finalized ...\n", login); + debug("Login object 0x%x finalized ...", login); g_free(login->assertionArtifact); g_free(login->private); G_OBJECT_CLASS(parent_class)->finalize(object); diff --git a/lasso/id-ff/logout.c b/lasso/id-ff/logout.c index c2d2c0dd..072c4394 100644 --- a/lasso/id-ff/logout.c +++ b/lasso/id-ff/logout.c @@ -121,7 +121,7 @@ lasso_logout_build_request_msg(LassoLogout *logout) } if (profile->msg_url == NULL) { - message(G_LOG_LEVEL_CRITICAL, "Invalid http method\n"); + message(G_LOG_LEVEL_CRITICAL, "Invalid http method"); return LASSO_PROFILE_ERROR_INVALID_HTTP_METHOD; } @@ -195,7 +195,7 @@ lasso_logout_build_response_msg(LassoLogout *logout) profile->server->signature_method, profile->server->private_key); if ( (url == NULL) || (query == NULL) ) { - message(G_LOG_LEVEL_CRITICAL, "Url %s or query %s not found\n", url, query); + message(G_LOG_LEVEL_CRITICAL, "Url %s or query %s not found", url, query); ret = -1; goto done; } @@ -693,7 +693,7 @@ lasso_logout_validate_request(LassoLogout *logout) 0); } if (LASSO_IS_LIB_LOGOUT_RESPONSE(profile->response) == FALSE) { - message(G_LOG_LEVEL_CRITICAL, "Error while building response\n"); + message(G_LOG_LEVEL_CRITICAL, "Error while building response"); return -1; } @@ -892,7 +892,7 @@ dispose(GObject *object) } logout->private->dispose_has_run = TRUE; - debug("Logout object 0x%x disposed ...\n", logout); + debug("Logout object 0x%x disposed ...", logout); /* unref reference counted objects */ /* XXX @@ -907,7 +907,7 @@ static void finalize(GObject *object) { LassoLogout *logout = LASSO_LOGOUT(object); - debug("Logout object 0x%x finalized ...\n", logout); + debug("Logout object 0x%x finalized ...", logout); g_free(logout->initial_remote_providerID); g_free(logout->private); G_OBJECT_CLASS(parent_class)->finalize(object); diff --git a/lasso/id-ff/name_registration.c b/lasso/id-ff/name_registration.c index bdccff8a..9b9a42a0 100644 --- a/lasso/id-ff/name_registration.c +++ b/lasso/id-ff/name_registration.c @@ -102,7 +102,7 @@ lasso_name_registration_build_request_msg(LassoNameRegistration *name_registrati } if (profile->msg_url == NULL) { - message(G_LOG_LEVEL_CRITICAL, "Invalid http method\n"); + message(G_LOG_LEVEL_CRITICAL, "Invalid http method"); return LASSO_PROFILE_ERROR_INVALID_HTTP_METHOD; } @@ -582,7 +582,7 @@ init_from_xml(LassoNode *node, xmlNode *xmlnode) static void finalize(GObject *object) { - debug("Register Name Identifier object 0x%x finalized ...\n"); + debug("Register Name Identifier object 0x%x finalized ..."); G_OBJECT_CLASS(parent_class)->finalize(object); } diff --git a/lasso/id-ff/profile.c b/lasso/id-ff/profile.c index 4c6dd28e..a9ed4d93 100644 --- a/lasso/id-ff/profile.c +++ b/lasso/id-ff/profile.c @@ -120,7 +120,7 @@ lasso_profile_get_request_type_from_soap_msg(const gchar *soap) type = LASSO_REQUEST_TYPE_LECP; } else { - message(G_LOG_LEVEL_WARNING, "Unkown node name : %s\n", name); + message(G_LOG_LEVEL_WARNING, "Unkown node name : %s", name); } xmlFreeDoc(doc); @@ -357,7 +357,7 @@ dispose(GObject *object) } profile->private->dispose_has_run = TRUE; - debug("Profile object 0x%x disposed ...\n", profile); + debug("Profile object 0x%x disposed ...", profile); /* XXX unref reference counted objects */ /* lasso_server_destroy(profile->server); @@ -376,7 +376,7 @@ finalize(GObject *object) { LassoProfile *profile = LASSO_PROFILE(object); - debug("Profile object 0x%x finalized ...\n", object); + debug("Profile object 0x%x finalized ...", object); g_free(profile->nameIdentifier); g_free(profile->remote_providerID); diff --git a/lasso/id-ff/provider.c b/lasso/id-ff/provider.c index 69bce2b0..bbe901aa 100644 --- a/lasso/id-ff/provider.c +++ b/lasso/id-ff/provider.c @@ -305,7 +305,7 @@ dispose(GObject *object) } provider->private->dispose_has_run = TRUE; - debug("Provider object 0x%x disposed ...\n", provider); + debug("Provider object 0x%x disposed ...", provider); /* XXX: free hash tables (here or in finalize() below) ? */ @@ -317,7 +317,7 @@ finalize(GObject *object) { LassoProvider *provider = LASSO_PROVIDER(object); - debug("Provider object 0x%x finalized ...\n", provider); + debug("Provider object 0x%x finalized ...", provider); g_free(provider->public_key); g_free(provider->ca_cert_chain); diff --git a/lasso/id-ff/server.c b/lasso/id-ff/server.c index 9cf036e4..56b8df36 100644 --- a/lasso/id-ff/server.c +++ b/lasso/id-ff/server.c @@ -63,7 +63,7 @@ lasso_server_add_provider(LassoServer *server, LassoProviderRole role, provider = lasso_provider_new(role, metadata, public_key, ca_cert_chain); if (provider == NULL) { - message(G_LOG_LEVEL_CRITICAL, "Failed to add new provider.\n"); + message(G_LOG_LEVEL_CRITICAL, "Failed to add new provider."); return LASSO_SERVER_ERROR_ADD_PROVIDER_FAILED; } @@ -244,7 +244,7 @@ dispose(GObject *object) } server->private->dispose_has_run = TRUE; - debug("Server object 0x%x disposed ...\n", server); + debug("Server object 0x%x disposed ...", server); /* free allocated memory for providers array */ /* XXX */ @@ -257,7 +257,7 @@ finalize(GObject *object) { LassoServer *server = LASSO_SERVER(object); - debug("Server object 0x%x finalized ...\n", server); + debug("Server object 0x%x finalized ...", server); g_free(server->private_key); g_free(server->secret_key); diff --git a/lasso/id-ff/session.c b/lasso/id-ff/session.c index bac9a784..dbf180b3 100644 --- a/lasso/id-ff/session.c +++ b/lasso/id-ff/session.c @@ -195,7 +195,7 @@ dispose(GObject *object) } session->private->dispose_has_run = TRUE; - debug("Session object 0x%x disposed ...\n", session); + debug("Session object 0x%x disposed ...", session); /* XXX: here or not ? g_hash_table_destroy(session->assertions); @@ -210,7 +210,7 @@ finalize(GObject *object) { LassoSession *session = LASSO_SESSION(object); - debug("Session object 0x%x finalized ...\n", session); + debug("Session object 0x%x finalized ...", session); g_free(session->private); session->private = NULL; diff --git a/lasso/xml/errors.c b/lasso/xml/errors.c index 5fb7c327..0bc5117b 100644 --- a/lasso/xml/errors.c +++ b/lasso/xml/errors.c @@ -33,65 +33,65 @@ lasso_strerror(int error_code) { switch (error_code) { case LASSO_XML_ERROR_NODE_NOT_FOUND: - return "Unable to get '%s' child of '%s' element.\n"; + return "Unable to get '%s' child of '%s' element."; case LASSO_XML_ERROR_NODE_CONTENT_NOT_FOUND: - return "Unable to get content of '%s' element.\n"; + return "Unable to get content of '%s' element."; case LASSO_XML_ERROR_ATTR_NOT_FOUND: - return "Unable to get '%s' attribute of '%s' element.\n"; + return "Unable to get '%s' attribute of '%s' element."; case LASSO_XML_ERROR_ATTR_VALUE_NOT_FOUND: - return "Unable to get '%s' attribute value of '%s' element.\n"; + return "Unable to get '%s' attribute value of '%s' element."; case LASSO_DS_ERROR_SIGNATURE_NOT_FOUND: - return "Signature element not found in %s.\n"; + return "Signature element not found in %s."; case LASSO_DS_ERROR_INVALID_SIGNATURE: - return "The signature of %s is invalid.\n"; + return "The signature of %s is invalid."; case LASSO_DS_ERROR_CONTEXT_CREATION_FAILED: - return "Failed to create signature context.\n"; + return "Failed to create signature context."; case LASSO_DS_ERROR_PUBLIC_KEY_LOAD_FAILED: - return "Failed to load public key %s.\n"; + return "Failed to load public key %s."; case LASSO_DS_ERROR_PRIVATE_KEY_LOAD_FAILED: - return "Failed to load private key %s.\n"; + return "Failed to load private key %s."; case LASSO_DS_ERROR_CERTIFICATE_LOAD_FAILED: - return "Failed to load certificate %s.\n"; + return "Failed to load certificate %s."; case LASSO_DS_ERROR_SIGNATURE_FAILED: - return "Failed to sign the node %s.\n"; + return "Failed to sign the node %s."; case LASSO_DS_ERROR_KEYS_MNGR_CREATION_FAILED: - return "Failed to create keys manager.\n"; + return "Failed to create keys manager."; case LASSO_DS_ERROR_KEYS_MNGR_INIT_FAILED: - return "Failed to initialize keys manager.\n"; + return "Failed to initialize keys manager."; case LASSO_DS_ERROR_SIGNATURE_VERIFICATION_FAILED: - return "Failed to verify signature of %s.\n"; + return "Failed to verify signature of %s."; case LASSO_DS_ERROR_INVALID_SIGALG: - return "Invalid signature algorithm.\n"; + return "Invalid signature algorithm."; case LASSO_SERVER_ERROR_PROVIDER_NOT_FOUND: - return "Failed to get LassoProvider object with providerID %s in LassoServer object.\n"; + return "Failed to get LassoProvider object with providerID %s in LassoServer object."; case LASSO_LOGOUT_ERROR_UNSUPPORTED_PROFILE: - return "Unsupported logout protocol profile\n"; + return "Unsupported logout protocol profile"; case LASSO_PROFILE_ERROR_INVALID_QUERY: - return "Invalid URL query\n"; + return "Invalid URL query"; case LASSO_PROFILE_ERROR_INVALID_POST_MSG: - return "Invalid POST message\n"; + return "Invalid POST message"; case LASSO_PROFILE_ERROR_INVALID_SOAP_MSG: - return "Invalid SOAP message\n"; + return "Invalid SOAP message"; case LASSO_PROFILE_ERROR_MISSING_REQUEST: - return "Missing request\n"; + return "Missing request"; case LASSO_PROFILE_ERROR_INVALID_HTTP_METHOD: - return "Invalid HTTP method\n"; + return "Invalid HTTP method"; case LASSO_PROFILE_ERROR_INVALID_PROTOCOLPROFILE: - return "Invalid protocol profile\n"; + return "Invalid protocol profile"; case LASSO_PARAM_ERROR_BAD_TYPE_OR_NULL_OBJ: - return "An object type provided as parameter is invalid or object is NULL.\n"; + return "An object type provided as parameter is invalid or object is NULL."; case LASSO_PARAM_ERROR_INVALID_VALUE: - return "A parameter value is invalid.\n"; + return "A parameter value is invalid."; case LASSO_PARAM_ERROR_CHECK_FAILED: - return "The error return location should be either NULL or contains a NULL error.\n"; + return "The error return location should be either NULL or contains a NULL error."; case LASSO_LOGIN_ERROR_INVALID_NAMEIDPOLICY: - return "Invalid NameIDPolicy in lib:AuthnRequest: %s\n"; + return "Invalid NameIDPolicy in lib:AuthnRequest: %s"; default: return g_strdup_printf("Undefined error code %d.", error_code); diff --git a/lasso/xml/tools.c b/lasso/xml/tools.c index 6e3bd327..66e7946e 100644 --- a/lasso/xml/tools.c +++ b/lasso/xml/tools.c @@ -169,7 +169,7 @@ lasso_get_pem_file_type(const gchar *pem_file) bio = BIO_new_file(pem_file, "rb"); if (bio == NULL) { - message(G_LOG_LEVEL_CRITICAL, "Failed to open %s pem file\n", + message(G_LOG_LEVEL_CRITICAL, "Failed to open %s pem file", pem_file); return -1; } @@ -221,7 +221,7 @@ lasso_get_public_key_from_pem_cert_file(const gchar *pem_cert_file) /* load pem certificate from file */ fd = fopen(pem_cert_file, "r"); if (fd == NULL) { - message(G_LOG_LEVEL_CRITICAL, "Failed to open %s pem certificate file\n", + message(G_LOG_LEVEL_CRITICAL, "Failed to open %s pem certificate file", pem_cert_file); return NULL; } @@ -229,7 +229,7 @@ lasso_get_public_key_from_pem_cert_file(const gchar *pem_cert_file) pem_cert = PEM_read_X509(fd, NULL, NULL, NULL); fclose(fd); if (pem_cert == NULL) { - message(G_LOG_LEVEL_CRITICAL, "Failed to read X509 certificate\n"); + message(G_LOG_LEVEL_CRITICAL, "Failed to read X509 certificate"); return NULL; } @@ -242,7 +242,7 @@ lasso_get_public_key_from_pem_cert_file(const gchar *pem_cert_file) } else { message(G_LOG_LEVEL_CRITICAL, - "Failed to get the public key in the X509 certificate\n"); + "Failed to get the public key in the X509 certificate"); } X509_free(pem_cert); @@ -366,7 +366,7 @@ lasso_query_sign(xmlChar *query, bio = BIO_new_file(private_key_file, "rb"); if (bio == NULL) { - message(G_LOG_LEVEL_CRITICAL, "Failed to open %s private key file\n", + message(G_LOG_LEVEL_CRITICAL, "Failed to open %s private key file", private_key_file); return NULL; } @@ -388,7 +388,7 @@ lasso_query_sign(xmlChar *query, /* build buffer digest */ digest = lasso_sha1(new_query); if (digest == NULL) { - message(G_LOG_LEVEL_CRITICAL, "Failed to build the buffer digest\n"); + message(G_LOG_LEVEL_CRITICAL, "Failed to build the buffer digest"); goto done; } |
