summaryrefslogtreecommitdiff
path: root/source3/utils/ntlm_auth.c
diff options
context:
space:
mode:
authorVolker Lendecke <vl@samba.org>2010-09-15 10:29:44 +0200
committerVolker Lendecke <vl@samba.org>2010-09-15 10:31:00 -0700
commit6400f3ee62108e3dd1e6c1013ccea9fb4b08d562 (patch)
treeff8eb12f133660fdfe1855ca5b65301074f17edc /source3/utils/ntlm_auth.c
parent301b60acc00b12a409a37f6cc17315f25fa49f86 (diff)
downloadsamba-6400f3ee62108e3dd1e6c1013ccea9fb4b08d562.tar.gz
samba-6400f3ee62108e3dd1e6c1013ccea9fb4b08d562.tar.bz2
samba-6400f3ee62108e3dd1e6c1013ccea9fb4b08d562.zip
s3: Fix some debug msgs in ntlm_auth
Diffstat (limited to 'source3/utils/ntlm_auth.c')
-rw-r--r--source3/utils/ntlm_auth.c16
1 files changed, 8 insertions, 8 deletions
diff --git a/source3/utils/ntlm_auth.c b/source3/utils/ntlm_auth.c
index 241dc56e60..82819cf145 100644
--- a/source3/utils/ntlm_auth.c
+++ b/source3/utils/ntlm_auth.c
@@ -817,7 +817,7 @@ static void manage_squid_ntlmssp_request(struct ntlm_auth_state *state,
NTSTATUS nt_status;
if (strlen(buf) < 2) {
- DEBUG(1, ("NTLMSSP query [%s] invalid", buf));
+ DEBUG(1, ("NTLMSSP query [%s] invalid\n", buf));
x_fprintf(x_stdout, "BH NTLMSSP query invalid\n");
return;
}
@@ -885,7 +885,7 @@ static void manage_squid_ntlmssp_request(struct ntlm_auth_state *state,
data_blob_free(&request);
return;
} else {
- DEBUG(1, ("NTLMSSP query [%s] invalid", buf));
+ DEBUG(1, ("NTLMSSP query [%s] invalid\n", buf));
x_fprintf(x_stdout, "BH NTLMSSP query invalid\n");
return;
}
@@ -952,7 +952,7 @@ static void manage_client_ntlmssp_request(struct ntlm_auth_state *state,
}
if (strlen(buf) < 2) {
- DEBUG(1, ("NTLMSSP query [%s] invalid", buf));
+ DEBUG(1, ("NTLMSSP query [%s] invalid\n", buf));
x_fprintf(x_stdout, "BH NTLMSSP query invalid\n");
return;
}
@@ -1043,7 +1043,7 @@ static void manage_client_ntlmssp_request(struct ntlm_auth_state *state,
data_blob_free(&request);
return;
} else {
- DEBUG(1, ("NTLMSSP query [%s] invalid", buf));
+ DEBUG(1, ("NTLMSSP query [%s] invalid\n", buf));
x_fprintf(x_stdout, "BH NTLMSSP query invalid\n");
return;
}
@@ -1215,7 +1215,7 @@ static void manage_gss_spnego_request(struct ntlm_auth_state *state,
char *reply_argument = NULL;
if (strlen(buf) < 2) {
- DEBUG(1, ("SPENGO query [%s] invalid", buf));
+ DEBUG(1, ("SPENGO query [%s] invalid\n", buf));
x_fprintf(x_stdout, "BH SPENGO query invalid\n");
return;
}
@@ -1225,7 +1225,7 @@ static void manage_gss_spnego_request(struct ntlm_auth_state *state,
} else if (strncmp(buf, "KK", 2) == 0) {
;
} else {
- DEBUG(1, ("SPENGO query [%s] invalid", buf));
+ DEBUG(1, ("SPENGO query [%s] invalid\n", buf));
x_fprintf(x_stdout, "BH SPENGO query invalid\n");
return;
}
@@ -1252,7 +1252,7 @@ static void manage_gss_spnego_request(struct ntlm_auth_state *state,
data_blob_free(&token);
if (len == -1) {
- DEBUG(1, ("GSS-SPNEGO query [%s] invalid", buf));
+ DEBUG(1, ("GSS-SPNEGO query [%s] invalid\n", buf));
x_fprintf(x_stdout, "BH GSS-SPNEGO query invalid\n");
return;
}
@@ -1264,7 +1264,7 @@ static void manage_gss_spnego_request(struct ntlm_auth_state *state,
if ( (request.negTokenInit.mechTypes == NULL) ||
(request.negTokenInit.mechTypes[0] == NULL) ) {
- DEBUG(1, ("Client did not offer any mechanism"));
+ DEBUG(1, ("Client did not offer any mechanism\n"));
x_fprintf(x_stdout, "BH Client did not offer any "
"mechanism\n");
return;