diff options
-rw-r--r-- | libpam/pam_auth.c | 2 | ||||
-rw-r--r-- | modules/pam_env/pam_env.c | 6 |
2 files changed, 4 insertions, 4 deletions
diff --git a/libpam/pam_auth.c b/libpam/pam_auth.c index 1e7bc6e7..92ef1ae7 100644 --- a/libpam/pam_auth.c +++ b/libpam/pam_auth.c @@ -36,7 +36,7 @@ int pam_authenticate(pam_handle_t *pamh, int flags) if (retval != PAM_INCOMPLETE) { _pam_sanitize(pamh); _pam_await_timer(pamh, retval); /* if unsuccessful then wait now */ - D(("pam_authenticate exit")); + D(("exit")); } else { D(("will resume when ready")); } diff --git a/modules/pam_env/pam_env.c b/modules/pam_env/pam_env.c index 01c707fd..d675ae37 100644 --- a/modules/pam_env/pam_env.c +++ b/modules/pam_env/pam_env.c @@ -300,7 +300,7 @@ _assemble_line(FILE *f, char *buffer, int buf_len) for (;;) { if (used >= buf_len) { /* Overflow */ - D(("_assemble_line: overflow")); + D(("overflow")); return -1; } if (fgets(p, buf_len - used, f) == NULL) { @@ -313,11 +313,11 @@ _assemble_line(FILE *f, char *buffer, int buf_len) } } if (p[0] == '\0') { - D(("_assemble_line: corrupted or binary file")); + D(("corrupted or binary file")); return -1; } if (p[strlen(p)-1] != '\n' && !feof(f)) { - D(("_assemble_line: line too long")); + D(("line too long")); return -1; } |