diff options
author | Volker Lendecke <vl@samba.org> | 2010-09-15 10:29:44 +0200 |
---|---|---|
committer | Volker Lendecke <vl@samba.org> | 2010-09-15 10:31:00 -0700 |
commit | 6400f3ee62108e3dd1e6c1013ccea9fb4b08d562 (patch) | |
tree | ff8eb12f133660fdfe1855ca5b65301074f17edc | |
parent | 301b60acc00b12a409a37f6cc17315f25fa49f86 (diff) | |
download | samba-6400f3ee62108e3dd1e6c1013ccea9fb4b08d562.tar.gz samba-6400f3ee62108e3dd1e6c1013ccea9fb4b08d562.tar.bz2 samba-6400f3ee62108e3dd1e6c1013ccea9fb4b08d562.zip |
s3: Fix some debug msgs in ntlm_auth
-rw-r--r-- | source3/utils/ntlm_auth.c | 16 |
1 files changed, 8 insertions, 8 deletions
diff --git a/source3/utils/ntlm_auth.c b/source3/utils/ntlm_auth.c index 241dc56e60..82819cf145 100644 --- a/source3/utils/ntlm_auth.c +++ b/source3/utils/ntlm_auth.c @@ -817,7 +817,7 @@ static void manage_squid_ntlmssp_request(struct ntlm_auth_state *state, NTSTATUS nt_status; if (strlen(buf) < 2) { - DEBUG(1, ("NTLMSSP query [%s] invalid", buf)); + DEBUG(1, ("NTLMSSP query [%s] invalid\n", buf)); x_fprintf(x_stdout, "BH NTLMSSP query invalid\n"); return; } @@ -885,7 +885,7 @@ static void manage_squid_ntlmssp_request(struct ntlm_auth_state *state, data_blob_free(&request); return; } else { - DEBUG(1, ("NTLMSSP query [%s] invalid", buf)); + DEBUG(1, ("NTLMSSP query [%s] invalid\n", buf)); x_fprintf(x_stdout, "BH NTLMSSP query invalid\n"); return; } @@ -952,7 +952,7 @@ static void manage_client_ntlmssp_request(struct ntlm_auth_state *state, } if (strlen(buf) < 2) { - DEBUG(1, ("NTLMSSP query [%s] invalid", buf)); + DEBUG(1, ("NTLMSSP query [%s] invalid\n", buf)); x_fprintf(x_stdout, "BH NTLMSSP query invalid\n"); return; } @@ -1043,7 +1043,7 @@ static void manage_client_ntlmssp_request(struct ntlm_auth_state *state, data_blob_free(&request); return; } else { - DEBUG(1, ("NTLMSSP query [%s] invalid", buf)); + DEBUG(1, ("NTLMSSP query [%s] invalid\n", buf)); x_fprintf(x_stdout, "BH NTLMSSP query invalid\n"); return; } @@ -1215,7 +1215,7 @@ static void manage_gss_spnego_request(struct ntlm_auth_state *state, char *reply_argument = NULL; if (strlen(buf) < 2) { - DEBUG(1, ("SPENGO query [%s] invalid", buf)); + DEBUG(1, ("SPENGO query [%s] invalid\n", buf)); x_fprintf(x_stdout, "BH SPENGO query invalid\n"); return; } @@ -1225,7 +1225,7 @@ static void manage_gss_spnego_request(struct ntlm_auth_state *state, } else if (strncmp(buf, "KK", 2) == 0) { ; } else { - DEBUG(1, ("SPENGO query [%s] invalid", buf)); + DEBUG(1, ("SPENGO query [%s] invalid\n", buf)); x_fprintf(x_stdout, "BH SPENGO query invalid\n"); return; } @@ -1252,7 +1252,7 @@ static void manage_gss_spnego_request(struct ntlm_auth_state *state, data_blob_free(&token); if (len == -1) { - DEBUG(1, ("GSS-SPNEGO query [%s] invalid", buf)); + DEBUG(1, ("GSS-SPNEGO query [%s] invalid\n", buf)); x_fprintf(x_stdout, "BH GSS-SPNEGO query invalid\n"); return; } @@ -1264,7 +1264,7 @@ static void manage_gss_spnego_request(struct ntlm_auth_state *state, if ( (request.negTokenInit.mechTypes == NULL) || (request.negTokenInit.mechTypes[0] == NULL) ) { - DEBUG(1, ("Client did not offer any mechanism")); + DEBUG(1, ("Client did not offer any mechanism\n")); x_fprintf(x_stdout, "BH Client did not offer any " "mechanism\n"); return; |