aboutsummaryrefslogtreecommitdiff
path: root/modules/pam_selinux/pam_selinux.c
diff options
context:
space:
mode:
authorSteve Langasek <steve.langasek@ubuntu.com>2019-01-03 21:06:54 -0800
committerSteve Langasek <vorlon@debian.org>2019-01-08 21:51:58 -0800
commit3a4dfe474b63e2133aa190862149646eca2e3bda (patch)
treeadd0a0f60e1fecb5b7383fc3edbbc16a91a48a7b /modules/pam_selinux/pam_selinux.c
parent25743de9cb930e134fa533a21ec29fd28c75f26c (diff)
parentf3c0273b7bd2d7fdcac3fe3604cedd82afc57f49 (diff)
downloadpam-3a4dfe474b63e2133aa190862149646eca2e3bda.tar.gz
pam-3a4dfe474b63e2133aa190862149646eca2e3bda.tar.bz2
pam-3a4dfe474b63e2133aa190862149646eca2e3bda.zip
merge upstream version 1.1.3
Diffstat (limited to 'modules/pam_selinux/pam_selinux.c')
-rw-r--r--modules/pam_selinux/pam_selinux.c14
1 files changed, 2 insertions, 12 deletions
diff --git a/modules/pam_selinux/pam_selinux.c b/modules/pam_selinux/pam_selinux.c
index c6f887a6..64fabafd 100644
--- a/modules/pam_selinux/pam_selinux.c
+++ b/modules/pam_selinux/pam_selinux.c
@@ -540,16 +540,6 @@ static security_context_t ttyn_context=NULL; /* The current context of ttyn dev
static int selinux_enabled=0;
static char *ttyn=NULL;
-/* Tell the user that access has been granted. */
-static void
-verbose_message(pam_handle_t *pamh, char *msg, int debug)
-{
- if (debug)
- pam_syslog(pamh, LOG_NOTICE, msg);
-
- pam_info (pamh, "%s", msg);
-}
-
PAM_EXTERN int
pam_sm_authenticate(pam_handle_t *pamh UNUSED, int flags UNUSED,
int argc UNUSED, const char **argv UNUSED)
@@ -726,7 +716,7 @@ pam_sm_open_session(pam_handle_t *pamh, int flags UNUSED,
char msg[PATH_MAX];
snprintf(msg, sizeof(msg),
_("Security Context %s Assigned"), user_context);
- verbose_message(pamh, msg, debug);
+ send_text(pamh, msg, debug);
}
if (ret) {
pam_syslog(pamh, LOG_ERR,
@@ -747,7 +737,7 @@ pam_sm_open_session(pam_handle_t *pamh, int flags UNUSED,
char msg[PATH_MAX];
snprintf(msg, sizeof(msg),
_("Key Creation Context %s Assigned"), user_context);
- verbose_message(pamh, msg, debug);
+ send_text(pamh, msg, debug);
}
if (ret) {
pam_syslog(pamh, LOG_ERR,