diff options
author | Christian Göttsche <cgzones@googlemail.com> | 2020-03-17 17:04:02 +0100 |
---|---|---|
committer | Christian Göttsche <cgzones@googlemail.com> | 2020-03-23 19:40:34 +0100 |
commit | 831ec39946667289bbb4475f00ddcfa30ee3db8b (patch) | |
tree | 282212b5fd7408debe6c891008ba11ea89bc5e7c /modules | |
parent | 50f0b621eb56871e568583521bfe9084f28bb4b4 (diff) | |
download | pam-831ec39946667289bbb4475f00ddcfa30ee3db8b.tar.gz pam-831ec39946667289bbb4475f00ddcfa30ee3db8b.tar.bz2 pam-831ec39946667289bbb4475f00ddcfa30ee3db8b.zip |
pam_selinux: fix indentation
Diffstat (limited to 'modules')
-rw-r--r-- | modules/pam_selinux/pam_selinux.c | 10 |
1 files changed, 5 insertions, 5 deletions
diff --git a/modules/pam_selinux/pam_selinux.c b/modules/pam_selinux/pam_selinux.c index f8348503..d0e1cf50 100644 --- a/modules/pam_selinux/pam_selinux.c +++ b/modules/pam_selinux/pam_selinux.c @@ -239,11 +239,11 @@ config_context (pam_handle_t *pamh, const char *defaultcon, int use_current_rang goto fail_set; context_free(new_context); - /* we have to check that this user is allowed to go into the - range they have specified ... role is tied to an seuser, so that'll - be checked at setexeccon time */ - if (mls_enabled && - selinux_check_access(defaultcon, newcon, "context", "contains", NULL) != 0) { + /* we have to check that this user is allowed to go into the + range they have specified ... role is tied to an seuser, so that'll + be checked at setexeccon time */ + if (mls_enabled && + selinux_check_access(defaultcon, newcon, "context", "contains", NULL) != 0) { pam_syslog(pamh, LOG_NOTICE, "Security context %s is not allowed for %s", defaultcon, newcon); send_audit_message(pamh, 0, defaultcon, newcon); |