diff options
author | Lee Duncan <lduncan@suse.com> | 2015-03-16 09:17:03 -0700 |
---|---|---|
committer | Mike Christie <michaelc@cs.wisc.edu> | 2015-04-03 15:44:22 -0500 |
commit | a277d3138761db1adffbe7c5ea0059aa4b4facc3 (patch) | |
tree | d0e556914b37b61f2223469308cb0d75944b44c5 /usr/auth.c | |
parent | 006270c0f9a1fa1e78574a7eaa04bb9ae1ef62b6 (diff) | |
download | open-iscsi-a277d3138761db1adffbe7c5ea0059aa4b4facc3.tar.gz |
Remove duplicate newlines in log messages.
Cleanup log messages, some of which had
newlines and some of which did not, as
the logging system already adds a newline
to the end of log messges.
No functional changes, though one log
message was also slightly corrected.
Diffstat (limited to 'usr/auth.c')
-rw-r--r-- | usr/auth.c | 12 |
1 files changed, 6 insertions, 6 deletions
@@ -109,13 +109,13 @@ acl_chap_auth_request(struct iscsi_acl *client, char *username, unsigned int id, /* the expected credentials are in the session */ if (session->username_in == NULL) { log_error("failing authentication, no incoming username " - "configured to authenticate target %s\n", + "configured to authenticate target %s", session->target_name); return AUTH_STATUS_FAIL; } if (strcmp(username, session->username_in) != 0) { log_error("failing authentication, received incorrect " - "username from target %s\n", session->target_name); + "username from target %s", session->target_name); return AUTH_STATUS_FAIL; } @@ -123,7 +123,7 @@ acl_chap_auth_request(struct iscsi_acl *client, char *username, unsigned int id, (session->password_in == NULL) || (session->password_in[0] == '\0')) { log_error("failing authentication, no incoming password " - "configured to authenticate target %s\n", + "configured to authenticate target %s", session->target_name); return AUTH_STATUS_FAIL; } @@ -132,7 +132,7 @@ acl_chap_auth_request(struct iscsi_acl *client, char *username, unsigned int id, if (rsp_length != sizeof(verify_data)) { log_error("failing authentication, received incorrect " - "CHAP response length %u from target %s\n", + "CHAP response length %u from target %s", rsp_length, session->target_name); return AUTH_STATUS_FAIL; } @@ -154,13 +154,13 @@ acl_chap_auth_request(struct iscsi_acl *client, char *username, unsigned int id, auth_md5_final(verify_data, &context); if (memcmp(response_data, verify_data, sizeof(verify_data)) == 0) { - log_debug(1, "initiator authenticated target %s\n", + log_debug(1, "initiator authenticated target %s", session->target_name); return AUTH_STATUS_PASS; } log_error("failing authentication, received incorrect CHAP " - "response from target %s\n", session->target_name); + "response from target %s", session->target_name); return AUTH_STATUS_FAIL; } |