diff options
author | vorlon <vorlon@alioth.debian.org> | 2008-03-14 05:10:12 +0000 |
---|---|---|
committer | vorlon <vorlon@alioth.debian.org> | 2008-03-14 05:10:12 +0000 |
commit | ab42d481e555498a71032c8aa313b66bd8465883 (patch) | |
tree | f80d97f74475af1e764ec50be68adef55ebbf1a8 | |
parent | 8c1401bb5d5a6d17adda2361a66aca8011a413fe (diff) | |
download | samba-ab42d481e555498a71032c8aa313b66bd8465883.tar.gz |
revert inconsistent whitespace changes to patch
git-svn-id: svn://svn.debian.org/svn/pkg-samba/trunk/samba/debian@1764 fc4039ab-9d04-0410-8cac-899223bdd6b0
-rw-r--r-- | patches/smbpasswd-syslog.patch | 14 |
1 files changed, 7 insertions, 7 deletions
diff --git a/patches/smbpasswd-syslog.patch b/patches/smbpasswd-syslog.patch index 6c5f73cc0d..60ebbcfbab 100644 --- a/patches/smbpasswd-syslog.patch +++ b/patches/smbpasswd-syslog.patch @@ -319,7 +319,7 @@ Index: samba-3.0.28a/source/pam_smbpass/pam_smb_auth.c } if (on( SMB_DEBUG, ctrl )) { - _log_err( LOG_DEBUG, "username [%s] obtained", name ); -+ _log_err(pamh, LOG_DEBUG, "username [%s] obtained", name ); ++ _log_err(pamh, LOG_DEBUG, "username [%s] obtained", name); } if (geteuid() != 0) { @@ -328,7 +328,7 @@ Index: samba-3.0.28a/source/pam_smbpass/pam_smb_auth.c if (!initialize_password_db(True)) { - _log_err( LOG_ALERT, "Cannot access samba password database" ); -+ _log_err(pamh, LOG_ALERT, "Cannot access samba password database" ); ++ _log_err(pamh, LOG_ALERT, "Cannot access samba password database"); retval = PAM_AUTHINFO_UNAVAIL; AUTH_RETURN; } @@ -336,7 +336,7 @@ Index: samba-3.0.28a/source/pam_smbpass/pam_smb_auth.c sampass = samu_new( NULL ); if (!sampass) { - _log_err( LOG_ALERT, "Cannot talloc a samu struct" ); -+ _log_err(pamh, LOG_ALERT, "Cannot talloc a samu struct" ); ++ _log_err(pamh, LOG_ALERT, "Cannot talloc a samu struct"); retval = nt_status_to_pam(NT_STATUS_NO_MEMORY); AUTH_RETURN; } @@ -381,7 +381,7 @@ Index: samba-3.0.28a/source/pam_smbpass/pam_smb_acct.c in_client = True; - ctrl = set_ctrl( flags, argc, argv ); -+ ctrl = set_ctrl(pamh, flags, argc, argv ); ++ ctrl = set_ctrl(pamh, flags, argc, argv); /* get the username */ @@ -389,13 +389,13 @@ Index: samba-3.0.28a/source/pam_smbpass/pam_smb_acct.c if (retval != PAM_SUCCESS) { if (on( SMB_DEBUG, ctrl )) { - _log_err( LOG_DEBUG, "acct: could not identify user" ); -+ _log_err(pamh, LOG_DEBUG, "acct: could not identify user" ); ++ _log_err(pamh, LOG_DEBUG, "acct: could not identify user"); } return retval; } if (on( SMB_DEBUG, ctrl )) { - _log_err( LOG_DEBUG, "acct: username [%s] obtained", name ); -+ _log_err(pamh, LOG_DEBUG, "acct: username [%s] obtained", name ); ++ _log_err(pamh, LOG_DEBUG, "acct: username [%s] obtained", name); } if (geteuid() != 0) { @@ -404,7 +404,7 @@ Index: samba-3.0.28a/source/pam_smbpass/pam_smb_acct.c oldsig_handler = CatchSignal(SIGPIPE, SIGNAL_CAST SIG_IGN); if (!initialize_password_db(True)) { - _log_err( LOG_ALERT, "Cannot access samba password database" ); -+ _log_err(pamh, LOG_ALERT, "Cannot access samba password database" ); ++ _log_err(pamh, LOG_ALERT, "Cannot access samba password database"); CatchSignal(SIGPIPE, SIGNAL_CAST oldsig_handler); return PAM_AUTHINFO_UNAVAIL; } |