summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorFrederic Peters <fpeters@entrouvert.com>2004-10-27 17:02:18 +0000
committerFrederic Peters <fpeters@entrouvert.com>2004-10-27 17:02:18 +0000
commit66cc2630b4fffa95b4ab07a733a688b61dd68088 (patch)
tree5a08a2ea1c827326a159f307d37a08b7e4f68bd9
parent3b050c9fa567d5e767d1755b16a0c4f8302476d9 (diff)
removal of \n at end of error messages
-rw-r--r--lasso/id-ff/defederation.c10
-rw-r--r--lasso/id-ff/federation.c4
-rw-r--r--lasso/id-ff/identity.c4
-rw-r--r--lasso/id-ff/lecp.c38
-rw-r--r--lasso/id-ff/login.c12
-rw-r--r--lasso/id-ff/logout.c10
-rw-r--r--lasso/id-ff/name_registration.c4
-rw-r--r--lasso/id-ff/profile.c6
-rw-r--r--lasso/id-ff/provider.c4
-rw-r--r--lasso/id-ff/server.c6
-rw-r--r--lasso/id-ff/session.c4
-rw-r--r--lasso/xml/errors.c54
-rw-r--r--lasso/xml/tools.c12
13 files changed, 84 insertions, 84 deletions
diff --git a/lasso/id-ff/defederation.c b/lasso/id-ff/defederation.c
index 2f42778e..3ed3307f 100644
--- a/lasso/id-ff/defederation.c
+++ b/lasso/id-ff/defederation.c
@@ -122,7 +122,7 @@ lasso_defederation_build_notification_msg(LassoDefederation *defederation)
}
if (profile->msg_url == NULL) {
- message(G_LOG_LEVEL_CRITICAL, "Invalid http method\n");
+ message(G_LOG_LEVEL_CRITICAL, "Invalid http method");
return LASSO_PROFILE_ERROR_INVALID_HTTP_METHOD;
}
@@ -371,7 +371,7 @@ lasso_defederation_validate_notification(LassoDefederation *defederation)
remote_provider = g_hash_table_lookup(profile->server->providers,
profile->remote_providerID);
if (remote_provider == NULL) {
- message(G_LOG_LEVEL_CRITICAL, "Provider not found\n");
+ message(G_LOG_LEVEL_CRITICAL, "Provider not found");
return -1;
}
@@ -417,7 +417,7 @@ lasso_defederation_validate_notification(LassoDefederation *defederation)
}
if (lasso_federation_verify_nameIdentifier(federation, nameIdentifier) == FALSE) {
- message(G_LOG_LEVEL_CRITICAL, "No name identifier for %s\n",
+ message(G_LOG_LEVEL_CRITICAL, "No name identifier for %s",
profile->remote_providerID);
return -1;
}
@@ -450,7 +450,7 @@ dispose(GObject *object)
return;
}
defederation->private->dispose_has_run = TRUE;
- debug("Defederation object 0x%x disposed ...\n", defederation);
+ debug("Defederation object 0x%x disposed ...", defederation);
G_OBJECT_CLASS(parent_class)->dispose(object);
}
@@ -459,7 +459,7 @@ static void
finalize(GObject *object)
{
LassoDefederation *defederation = LASSO_DEFEDERATION(object);
- debug("Defederation object 0x%x finalized ...\n", defederation);
+ debug("Defederation object 0x%x finalized ...", defederation);
g_free (defederation->private);
G_OBJECT_CLASS(parent_class)->finalize(object);
}
diff --git a/lasso/id-ff/federation.c b/lasso/id-ff/federation.c
index 8f57ad59..3f376264 100644
--- a/lasso/id-ff/federation.c
+++ b/lasso/id-ff/federation.c
@@ -207,7 +207,7 @@ dispose(GObject *object)
}
federation->private->dispose_has_run = TRUE;
- debug("Federation object 0x%x disposed ...\n", federation);
+ debug("Federation object 0x%x disposed ...", federation);
/* unref reference counted objects */
lasso_node_destroy(LASSO_NODE(federation->local_nameIdentifier));
@@ -220,7 +220,7 @@ static void
finalize(GObject *object)
{
LassoFederation *federation = LASSO_FEDERATION(object);
- debug("Federation object 0x%x finalized ...\n", federation);
+ debug("Federation object 0x%x finalized ...", federation);
g_free(federation->remote_providerID);
g_free(federation->private);
diff --git a/lasso/id-ff/identity.c b/lasso/id-ff/identity.c
index 82508eab..e4ae6f64 100644
--- a/lasso/id-ff/identity.c
+++ b/lasso/id-ff/identity.c
@@ -136,7 +136,7 @@ dispose(GObject *object)
}
identity->private->dispose_has_run = TRUE;
- debug("Identity object 0x%x disposed ...\n", identity);
+ debug("Identity object 0x%x disposed ...", identity);
/* XXX: here or in finalize ?
* g_hash_table_destroy(identity->federations); */
@@ -149,7 +149,7 @@ finalize(GObject *object)
{
LassoIdentity *identity = LASSO_IDENTITY(object);
- debug("Identity object 0x%x finalized ...\n", identity);
+ debug("Identity object 0x%x finalized ...", identity);
identity->private = NULL;
G_OBJECT_CLASS(parent_class)->finalize(object);
}
diff --git a/lasso/id-ff/lecp.c b/lasso/id-ff/lecp.c
index 8f3d2623..90913ab7 100644
--- a/lasso/id-ff/lecp.c
+++ b/lasso/id-ff/lecp.c
@@ -44,12 +44,12 @@ lasso_lecp_build_authn_request_envelope_msg(LassoLecp *lecp)
assertionConsumerServiceURL = lasso_provider_get_metadata_one(
LASSO_PROVIDER(profile->server), "AssertionConsumerServiceURL");
if (assertionConsumerServiceURL == NULL) {
- message(G_LOG_LEVEL_CRITICAL, "AssertionConsumerServiceURL not found\n");
+ message(G_LOG_LEVEL_CRITICAL, "AssertionConsumerServiceURL not found");
return -1;
}
if (profile->request == NULL) {
- message(G_LOG_LEVEL_CRITICAL, "AuthnRequest not found\n");
+ message(G_LOG_LEVEL_CRITICAL, "AuthnRequest not found");
return -1;
}
@@ -60,7 +60,7 @@ lasso_lecp_build_authn_request_envelope_msg(LassoLecp *lecp)
assertionConsumerServiceURL);
#endif
if (lecp->authnRequestEnvelope == NULL) {
- message(G_LOG_LEVEL_CRITICAL, "Error while building AuthnRequestEnvelope\n");
+ message(G_LOG_LEVEL_CRITICAL, "Error while building AuthnRequestEnvelope");
return -1;
}
@@ -68,7 +68,7 @@ lasso_lecp_build_authn_request_envelope_msg(LassoLecp *lecp)
profile->msg_body = lasso_node_export(lecp->authnRequestEnvelope);
#endif
if (profile->msg_body == NULL) {
- message(G_LOG_LEVEL_CRITICAL, "Error while exporting the AuthnRequestEnvelope to POST msg\n");
+ message(G_LOG_LEVEL_CRITICAL, "Error while exporting the AuthnRequestEnvelope to POST msg");
return -1;
}
@@ -108,7 +108,7 @@ lasso_lecp_build_authn_request_msg(LassoLecp *lecp,
profile->msg_url = lasso_provider_get_metadata_one(remote_provider, "SingleSignOnServiceURL");
profile->msg_body = lasso_node_export_to_soap(profile->request);
if (profile->msg_body == NULL) {
- message(G_LOG_LEVEL_CRITICAL, "Error while building the AuthnRequest SOAP message\n");
+ message(G_LOG_LEVEL_CRITICAL, "Error while building the AuthnRequest SOAP message");
return -1;
}
@@ -125,12 +125,12 @@ lasso_lecp_build_authn_response_msg(LassoLecp *lecp)
profile = LASSO_PROFILE(lecp);
profile->msg_url = g_strdup(lecp->assertionConsumerServiceURL);
if (profile->msg_url == NULL) {
- message(G_LOG_LEVEL_CRITICAL, "AssertionConsumerServiceURL not found\n");
+ message(G_LOG_LEVEL_CRITICAL, "AssertionConsumerServiceURL not found");
return -1;
}
profile->msg_body = lasso_node_export_to_base64(profile->response);
if (profile->msg_body == NULL) {
- message(G_LOG_LEVEL_CRITICAL, "AuthnResponse Base64 msg not found\n");
+ message(G_LOG_LEVEL_CRITICAL, "AuthnResponse Base64 msg not found");
return -1;
}
@@ -156,13 +156,13 @@ lasso_lecp_build_authn_response_envelope_msg(LassoLecp *lecp,
profile = LASSO_PROFILE(lecp);
if (LASSO_IS_LIB_AUTHN_RESPONSE(profile->response) == FALSE) {
- message(G_LOG_LEVEL_CRITICAL, "AuthnResponse not found\n");
+ message(G_LOG_LEVEL_CRITICAL, "AuthnResponse not found");
return -1;
}
provider = g_hash_table_lookup(profile->server->providers, profile->remote_providerID);
if (provider == NULL) {
- message(G_LOG_LEVEL_CRITICAL, "Provider %s not found\n", profile->remote_providerID);
+ message(G_LOG_LEVEL_CRITICAL, "Provider %s not found", profile->remote_providerID);
return -1;
}
@@ -179,7 +179,7 @@ lasso_lecp_build_authn_response_envelope_msg(LassoLecp *lecp,
assertionConsumerServiceURL = lasso_provider_get_metadata_one(
provider, "AssertionConsumerServiceURL");
if (assertionConsumerServiceURL == NULL) {
- message(G_LOG_LEVEL_CRITICAL, "AssertionConsumerServiceURL not found\n");
+ message(G_LOG_LEVEL_CRITICAL, "AssertionConsumerServiceURL not found");
return -1;
}
@@ -193,7 +193,7 @@ lasso_lecp_build_authn_response_envelope_msg(LassoLecp *lecp,
LASSO_PROFILE(lecp)->msg_body = lasso_node_export_to_soap(lecp->authnResponseEnvelope);
if (LASSO_PROFILE(lecp)->msg_body == NULL) {
- message(G_LOG_LEVEL_CRITICAL, "Error while exporting the AuthnResponseEnvelope to SOAP msg\n");
+ message(G_LOG_LEVEL_CRITICAL, "Error while exporting the AuthnResponseEnvelope to SOAP msg");
return -1;
}
@@ -226,7 +226,7 @@ lasso_lecp_process_authn_request_msg(LassoLecp *lecp,
g_return_val_if_fail(authn_request_msg!=NULL, -1);
if (authn_request_method != LASSO_HTTP_METHOD_SOAP) {
- message(G_LOG_LEVEL_CRITICAL, "Invalid authentication request method\n");
+ message(G_LOG_LEVEL_CRITICAL, "Invalid authentication request method");
return -1;
}
res = lasso_login_process_authn_request_msg(LASSO_LOGIN(lecp), authn_request_msg);
@@ -244,7 +244,7 @@ lasso_lecp_process_authn_request_envelope_msg(LassoLecp *lecp,
lecp->authnRequestEnvelope = lasso_authn_request_envelope_new_from_export(request_msg, LASSO_NODE_EXPORT_TYPE_XML);
#endif
if (lecp->authnRequestEnvelope == NULL) {
- message(G_LOG_LEVEL_CRITICAL, "Error while building the authentication request envelope\n");
+ message(G_LOG_LEVEL_CRITICAL, "Error while building the authentication request envelope");
return -1;
}
@@ -252,7 +252,7 @@ lasso_lecp_process_authn_request_envelope_msg(LassoLecp *lecp,
LASSO_PROFILE(lecp)->request = lasso_authn_request_envelope_get_authnRequest(LASSO_AUTHN_REQUEST_ENVELOPE(lecp->authnRequestEnvelope));
#endif
if (LASSO_PROFILE(lecp)->request == NULL) {
- message(G_LOG_LEVEL_CRITICAL, "AuthnRequest not found\n");
+ message(G_LOG_LEVEL_CRITICAL, "AuthnRequest not found");
return -1;
}
@@ -273,14 +273,14 @@ lasso_lecp_process_authn_response_envelope_msg(LassoLecp *lecp,
lecp->authnResponseEnvelope = lasso_lib_authn_response_envelope_new(NULL, NULL);
lasso_node_init_from_message(lecp->authnResponseEnvelope, response_msg);
if (lecp->authnResponseEnvelope == NULL) {
- message(G_LOG_LEVEL_CRITICAL, "Error while building AuthnResponseEnvelope\n");
+ message(G_LOG_LEVEL_CRITICAL, "Error while building AuthnResponseEnvelope");
return -1;
}
#if 0 /* XXX */
profile->response = lasso_authn_response_envelope_get_authnResponse(LASSO_AUTHN_RESPONSE_ENVELOPE(lecp->authnResponseEnvelope));
if (profile->response == NULL) {
- message(G_LOG_LEVEL_CRITICAL, "AuthnResponse not found\n");
+ message(G_LOG_LEVEL_CRITICAL, "AuthnResponse not found");
return -1;
}
#endif
@@ -289,7 +289,7 @@ lasso_lecp_process_authn_response_envelope_msg(LassoLecp *lecp,
lecp->assertionConsumerServiceURL = lasso_authn_response_envelope_get_assertionConsumerServiceURL(
LASSO_AUTHN_RESPONSE_ENVELOPE(lecp->authnResponseEnvelope));
if (lecp->assertionConsumerServiceURL == NULL){
- message(G_LOG_LEVEL_CRITICAL, "AssertionConsumerServiceURL not found\n");
+ message(G_LOG_LEVEL_CRITICAL, "AssertionConsumerServiceURL not found");
return -1;
}
#endif
@@ -311,7 +311,7 @@ lasso_lecp_destroy(LassoLecp *lecp)
static void
lasso_lecp_finalize(LassoLecp *lecp)
{
- debug("Lecp object 0x%x finalized ...\n", lecp);
+ debug("Lecp object 0x%x finalized ...", lecp);
parent_class->finalize(G_OBJECT(lecp));
}
@@ -369,7 +369,7 @@ lasso_lecp_new(LassoServer *server)
lecp = g_object_new(LASSO_TYPE_LECP, NULL);
if (LASSO_IS_SERVER(server)) {
- debug("Add server to lecp object\n");
+ debug("Add server to lecp object");
/* XXX LASSO_PROFILE(lecp)->server = lasso_server_copy(server); */
}
diff --git a/lasso/id-ff/login.c b/lasso/id-ff/login.c
index 57f88a58..c69a789b 100644
--- a/lasso/id-ff/login.c
+++ b/lasso/id-ff/login.c
@@ -166,7 +166,7 @@ lasso_login_must_ask_for_consent_private(LassoLogin *login)
if (strcmp(nameIDPolicy, LASSO_LIB_NAMEID_POLICY_TYPE_FEDERATED) != 0 &&
strcmp(nameIDPolicy, LASSO_LIB_NAMEID_POLICY_TYPE_ANY) != 0) {
- message(G_LOG_LEVEL_CRITICAL, "Unknown NameIDPolicy : %s\n", nameIDPolicy);
+ message(G_LOG_LEVEL_CRITICAL, "Unknown NameIDPolicy : %s", nameIDPolicy);
/* we consider NameIDPolicy as empty (none value) if its value is unknown/invalid */
return TRUE;
}
@@ -200,7 +200,7 @@ lasso_login_must_ask_for_consent_private(LassoLogin *login)
if (strcmp(consent, LASSO_LIB_CONSENT_INAPPLICABLE) == 0)
return TRUE;
- message(G_LOG_LEVEL_CRITICAL, "Unknown consent value : %s\n", consent);
+ message(G_LOG_LEVEL_CRITICAL, "Unknown consent value : %s", consent);
/* we consider consent as empty if its value is unknown/invalid */
return TRUE;
}
@@ -867,7 +867,7 @@ lasso_login_build_response_msg(LassoLogin *login, gchar *remote_providerID)
LASSO_PROFILE(login)->remote_providerID);
if (assertion == NULL) {
/* FIXME should this message output by lasso_session_get_assertion () ? */
- message(G_LOG_LEVEL_CRITICAL, "Assertion not found in session\n");
+ message(G_LOG_LEVEL_CRITICAL, "Assertion not found in session");
}
LASSO_SAMLP_RESPONSE(LASSO_PROFILE(login)->response)->Assertion =
g_object_ref(assertion);
@@ -1244,7 +1244,7 @@ lasso_login_process_request_msg(LassoLogin *login, gchar *request_msg)
profile->request = lasso_node_new_from_soap(request_msg);
/* XXX was: lasso_request_new_from_export(request_msg, LASSO_NODE_EXPORT_TYPE_SOAP); */
if (profile->request == NULL) {
- message(G_LOG_LEVEL_CRITICAL, "Failed to rebuild samlp:Request with request message.\n");
+ message(G_LOG_LEVEL_CRITICAL, "Failed to rebuild samlp:Request with request message.");
return LASSO_ERROR_UNDEFINED;
}
/* get AssertionArtifact */
@@ -1346,7 +1346,7 @@ dispose(GObject *object)
}
login->private->dispose_has_run = TRUE;
- debug("Login object 0x%x disposed ...\n", login);
+ debug("Login object 0x%x disposed ...", login);
/* unref reference counted objects */
@@ -1358,7 +1358,7 @@ finalize(GObject *object)
{
LassoLogin *login = LASSO_LOGIN(object);
- debug("Login object 0x%x finalized ...\n", login);
+ debug("Login object 0x%x finalized ...", login);
g_free(login->assertionArtifact);
g_free(login->private);
G_OBJECT_CLASS(parent_class)->finalize(object);
diff --git a/lasso/id-ff/logout.c b/lasso/id-ff/logout.c
index c2d2c0dd..072c4394 100644
--- a/lasso/id-ff/logout.c
+++ b/lasso/id-ff/logout.c
@@ -121,7 +121,7 @@ lasso_logout_build_request_msg(LassoLogout *logout)
}
if (profile->msg_url == NULL) {
- message(G_LOG_LEVEL_CRITICAL, "Invalid http method\n");
+ message(G_LOG_LEVEL_CRITICAL, "Invalid http method");
return LASSO_PROFILE_ERROR_INVALID_HTTP_METHOD;
}
@@ -195,7 +195,7 @@ lasso_logout_build_response_msg(LassoLogout *logout)
profile->server->signature_method,
profile->server->private_key);
if ( (url == NULL) || (query == NULL) ) {
- message(G_LOG_LEVEL_CRITICAL, "Url %s or query %s not found\n", url, query);
+ message(G_LOG_LEVEL_CRITICAL, "Url %s or query %s not found", url, query);
ret = -1;
goto done;
}
@@ -693,7 +693,7 @@ lasso_logout_validate_request(LassoLogout *logout)
0);
}
if (LASSO_IS_LIB_LOGOUT_RESPONSE(profile->response) == FALSE) {
- message(G_LOG_LEVEL_CRITICAL, "Error while building response\n");
+ message(G_LOG_LEVEL_CRITICAL, "Error while building response");
return -1;
}
@@ -892,7 +892,7 @@ dispose(GObject *object)
}
logout->private->dispose_has_run = TRUE;
- debug("Logout object 0x%x disposed ...\n", logout);
+ debug("Logout object 0x%x disposed ...", logout);
/* unref reference counted objects */
/* XXX
@@ -907,7 +907,7 @@ static void
finalize(GObject *object)
{
LassoLogout *logout = LASSO_LOGOUT(object);
- debug("Logout object 0x%x finalized ...\n", logout);
+ debug("Logout object 0x%x finalized ...", logout);
g_free(logout->initial_remote_providerID);
g_free(logout->private);
G_OBJECT_CLASS(parent_class)->finalize(object);
diff --git a/lasso/id-ff/name_registration.c b/lasso/id-ff/name_registration.c
index bdccff8a..9b9a42a0 100644
--- a/lasso/id-ff/name_registration.c
+++ b/lasso/id-ff/name_registration.c
@@ -102,7 +102,7 @@ lasso_name_registration_build_request_msg(LassoNameRegistration *name_registrati
}
if (profile->msg_url == NULL) {
- message(G_LOG_LEVEL_CRITICAL, "Invalid http method\n");
+ message(G_LOG_LEVEL_CRITICAL, "Invalid http method");
return LASSO_PROFILE_ERROR_INVALID_HTTP_METHOD;
}
@@ -582,7 +582,7 @@ init_from_xml(LassoNode *node, xmlNode *xmlnode)
static void
finalize(GObject *object)
{
- debug("Register Name Identifier object 0x%x finalized ...\n");
+ debug("Register Name Identifier object 0x%x finalized ...");
G_OBJECT_CLASS(parent_class)->finalize(object);
}
diff --git a/lasso/id-ff/profile.c b/lasso/id-ff/profile.c
index 4c6dd28e..a9ed4d93 100644
--- a/lasso/id-ff/profile.c
+++ b/lasso/id-ff/profile.c
@@ -120,7 +120,7 @@ lasso_profile_get_request_type_from_soap_msg(const gchar *soap)
type = LASSO_REQUEST_TYPE_LECP;
}
else {
- message(G_LOG_LEVEL_WARNING, "Unkown node name : %s\n", name);
+ message(G_LOG_LEVEL_WARNING, "Unkown node name : %s", name);
}
xmlFreeDoc(doc);
@@ -357,7 +357,7 @@ dispose(GObject *object)
}
profile->private->dispose_has_run = TRUE;
- debug("Profile object 0x%x disposed ...\n", profile);
+ debug("Profile object 0x%x disposed ...", profile);
/* XXX unref reference counted objects */
/* lasso_server_destroy(profile->server);
@@ -376,7 +376,7 @@ finalize(GObject *object)
{
LassoProfile *profile = LASSO_PROFILE(object);
- debug("Profile object 0x%x finalized ...\n", object);
+ debug("Profile object 0x%x finalized ...", object);
g_free(profile->nameIdentifier);
g_free(profile->remote_providerID);
diff --git a/lasso/id-ff/provider.c b/lasso/id-ff/provider.c
index 69bce2b0..bbe901aa 100644
--- a/lasso/id-ff/provider.c
+++ b/lasso/id-ff/provider.c
@@ -305,7 +305,7 @@ dispose(GObject *object)
}
provider->private->dispose_has_run = TRUE;
- debug("Provider object 0x%x disposed ...\n", provider);
+ debug("Provider object 0x%x disposed ...", provider);
/* XXX: free hash tables (here or in finalize() below) ? */
@@ -317,7 +317,7 @@ finalize(GObject *object)
{
LassoProvider *provider = LASSO_PROVIDER(object);
- debug("Provider object 0x%x finalized ...\n", provider);
+ debug("Provider object 0x%x finalized ...", provider);
g_free(provider->public_key);
g_free(provider->ca_cert_chain);
diff --git a/lasso/id-ff/server.c b/lasso/id-ff/server.c
index 9cf036e4..56b8df36 100644
--- a/lasso/id-ff/server.c
+++ b/lasso/id-ff/server.c
@@ -63,7 +63,7 @@ lasso_server_add_provider(LassoServer *server, LassoProviderRole role,
provider = lasso_provider_new(role, metadata, public_key, ca_cert_chain);
if (provider == NULL) {
- message(G_LOG_LEVEL_CRITICAL, "Failed to add new provider.\n");
+ message(G_LOG_LEVEL_CRITICAL, "Failed to add new provider.");
return LASSO_SERVER_ERROR_ADD_PROVIDER_FAILED;
}
@@ -244,7 +244,7 @@ dispose(GObject *object)
}
server->private->dispose_has_run = TRUE;
- debug("Server object 0x%x disposed ...\n", server);
+ debug("Server object 0x%x disposed ...", server);
/* free allocated memory for providers array */
/* XXX */
@@ -257,7 +257,7 @@ finalize(GObject *object)
{
LassoServer *server = LASSO_SERVER(object);
- debug("Server object 0x%x finalized ...\n", server);
+ debug("Server object 0x%x finalized ...", server);
g_free(server->private_key);
g_free(server->secret_key);
diff --git a/lasso/id-ff/session.c b/lasso/id-ff/session.c
index bac9a784..dbf180b3 100644
--- a/lasso/id-ff/session.c
+++ b/lasso/id-ff/session.c
@@ -195,7 +195,7 @@ dispose(GObject *object)
}
session->private->dispose_has_run = TRUE;
- debug("Session object 0x%x disposed ...\n", session);
+ debug("Session object 0x%x disposed ...", session);
/* XXX: here or not ?
g_hash_table_destroy(session->assertions);
@@ -210,7 +210,7 @@ finalize(GObject *object)
{
LassoSession *session = LASSO_SESSION(object);
- debug("Session object 0x%x finalized ...\n", session);
+ debug("Session object 0x%x finalized ...", session);
g_free(session->private);
session->private = NULL;
diff --git a/lasso/xml/errors.c b/lasso/xml/errors.c
index 5fb7c327..0bc5117b 100644
--- a/lasso/xml/errors.c
+++ b/lasso/xml/errors.c
@@ -33,65 +33,65 @@ lasso_strerror(int error_code)
{
switch (error_code) {
case LASSO_XML_ERROR_NODE_NOT_FOUND:
- return "Unable to get '%s' child of '%s' element.\n";
+ return "Unable to get '%s' child of '%s' element.";
case LASSO_XML_ERROR_NODE_CONTENT_NOT_FOUND:
- return "Unable to get content of '%s' element.\n";
+ return "Unable to get content of '%s' element.";
case LASSO_XML_ERROR_ATTR_NOT_FOUND:
- return "Unable to get '%s' attribute of '%s' element.\n";
+ return "Unable to get '%s' attribute of '%s' element.";
case LASSO_XML_ERROR_ATTR_VALUE_NOT_FOUND:
- return "Unable to get '%s' attribute value of '%s' element.\n";
+ return "Unable to get '%s' attribute value of '%s' element.";
case LASSO_DS_ERROR_SIGNATURE_NOT_FOUND:
- return "Signature element not found in %s.\n";
+ return "Signature element not found in %s.";
case LASSO_DS_ERROR_INVALID_SIGNATURE:
- return "The signature of %s is invalid.\n";
+ return "The signature of %s is invalid.";
case LASSO_DS_ERROR_CONTEXT_CREATION_FAILED:
- return "Failed to create signature context.\n";
+ return "Failed to create signature context.";
case LASSO_DS_ERROR_PUBLIC_KEY_LOAD_FAILED:
- return "Failed to load public key %s.\n";
+ return "Failed to load public key %s.";
case LASSO_DS_ERROR_PRIVATE_KEY_LOAD_FAILED:
- return "Failed to load private key %s.\n";
+ return "Failed to load private key %s.";
case LASSO_DS_ERROR_CERTIFICATE_LOAD_FAILED:
- return "Failed to load certificate %s.\n";
+ return "Failed to load certificate %s.";
case LASSO_DS_ERROR_SIGNATURE_FAILED:
- return "Failed to sign the node %s.\n";
+ return "Failed to sign the node %s.";
case LASSO_DS_ERROR_KEYS_MNGR_CREATION_FAILED:
- return "Failed to create keys manager.\n";
+ return "Failed to create keys manager.";
case LASSO_DS_ERROR_KEYS_MNGR_INIT_FAILED:
- return "Failed to initialize keys manager.\n";
+ return "Failed to initialize keys manager.";
case LASSO_DS_ERROR_SIGNATURE_VERIFICATION_FAILED:
- return "Failed to verify signature of %s.\n";
+ return "Failed to verify signature of %s.";
case LASSO_DS_ERROR_INVALID_SIGALG:
- return "Invalid signature algorithm.\n";
+ return "Invalid signature algorithm.";
case LASSO_SERVER_ERROR_PROVIDER_NOT_FOUND:
- return "Failed to get LassoProvider object with providerID %s in LassoServer object.\n";
+ return "Failed to get LassoProvider object with providerID %s in LassoServer object.";
case LASSO_LOGOUT_ERROR_UNSUPPORTED_PROFILE:
- return "Unsupported logout protocol profile\n";
+ return "Unsupported logout protocol profile";
case LASSO_PROFILE_ERROR_INVALID_QUERY:
- return "Invalid URL query\n";
+ return "Invalid URL query";
case LASSO_PROFILE_ERROR_INVALID_POST_MSG:
- return "Invalid POST message\n";
+ return "Invalid POST message";
case LASSO_PROFILE_ERROR_INVALID_SOAP_MSG:
- return "Invalid SOAP message\n";
+ return "Invalid SOAP message";
case LASSO_PROFILE_ERROR_MISSING_REQUEST:
- return "Missing request\n";
+ return "Missing request";
case LASSO_PROFILE_ERROR_INVALID_HTTP_METHOD:
- return "Invalid HTTP method\n";
+ return "Invalid HTTP method";
case LASSO_PROFILE_ERROR_INVALID_PROTOCOLPROFILE:
- return "Invalid protocol profile\n";
+ return "Invalid protocol profile";
case LASSO_PARAM_ERROR_BAD_TYPE_OR_NULL_OBJ:
- return "An object type provided as parameter is invalid or object is NULL.\n";
+ return "An object type provided as parameter is invalid or object is NULL.";
case LASSO_PARAM_ERROR_INVALID_VALUE:
- return "A parameter value is invalid.\n";
+ return "A parameter value is invalid.";
case LASSO_PARAM_ERROR_CHECK_FAILED:
- return "The error return location should be either NULL or contains a NULL error.\n";
+ return "The error return location should be either NULL or contains a NULL error.";
case LASSO_LOGIN_ERROR_INVALID_NAMEIDPOLICY:
- return "Invalid NameIDPolicy in lib:AuthnRequest: %s\n";
+ return "Invalid NameIDPolicy in lib:AuthnRequest: %s";
default:
return g_strdup_printf("Undefined error code %d.", error_code);
diff --git a/lasso/xml/tools.c b/lasso/xml/tools.c
index 6e3bd327..66e7946e 100644
--- a/lasso/xml/tools.c
+++ b/lasso/xml/tools.c
@@ -169,7 +169,7 @@ lasso_get_pem_file_type(const gchar *pem_file)
bio = BIO_new_file(pem_file, "rb");
if (bio == NULL) {
- message(G_LOG_LEVEL_CRITICAL, "Failed to open %s pem file\n",
+ message(G_LOG_LEVEL_CRITICAL, "Failed to open %s pem file",
pem_file);
return -1;
}
@@ -221,7 +221,7 @@ lasso_get_public_key_from_pem_cert_file(const gchar *pem_cert_file)
/* load pem certificate from file */
fd = fopen(pem_cert_file, "r");
if (fd == NULL) {
- message(G_LOG_LEVEL_CRITICAL, "Failed to open %s pem certificate file\n",
+ message(G_LOG_LEVEL_CRITICAL, "Failed to open %s pem certificate file",
pem_cert_file);
return NULL;
}
@@ -229,7 +229,7 @@ lasso_get_public_key_from_pem_cert_file(const gchar *pem_cert_file)
pem_cert = PEM_read_X509(fd, NULL, NULL, NULL);
fclose(fd);
if (pem_cert == NULL) {
- message(G_LOG_LEVEL_CRITICAL, "Failed to read X509 certificate\n");
+ message(G_LOG_LEVEL_CRITICAL, "Failed to read X509 certificate");
return NULL;
}
@@ -242,7 +242,7 @@ lasso_get_public_key_from_pem_cert_file(const gchar *pem_cert_file)
}
else {
message(G_LOG_LEVEL_CRITICAL,
- "Failed to get the public key in the X509 certificate\n");
+ "Failed to get the public key in the X509 certificate");
}
X509_free(pem_cert);
@@ -366,7 +366,7 @@ lasso_query_sign(xmlChar *query,
bio = BIO_new_file(private_key_file, "rb");
if (bio == NULL) {
- message(G_LOG_LEVEL_CRITICAL, "Failed to open %s private key file\n",
+ message(G_LOG_LEVEL_CRITICAL, "Failed to open %s private key file",
private_key_file);
return NULL;
}
@@ -388,7 +388,7 @@ lasso_query_sign(xmlChar *query,
/* build buffer digest */
digest = lasso_sha1(new_query);
if (digest == NULL) {
- message(G_LOG_LEVEL_CRITICAL, "Failed to build the buffer digest\n");
+ message(G_LOG_LEVEL_CRITICAL, "Failed to build the buffer digest");
goto done;
}