summaryrefslogtreecommitdiff
path: root/source3
diff options
context:
space:
mode:
authorTim Potter <tpot@samba.org>2002-03-11 23:59:20 +0000
committerTim Potter <tpot@samba.org>2002-03-11 23:59:20 +0000
commit40976c3bc606197c001ed497f8e9e5c2ad49056c (patch)
treed069910177870532a387648551ab8fd838befdeb /source3
parent87bba35a62479e4ad81ee62e8135d5f5e08fb7e7 (diff)
downloadsamba-40976c3bc606197c001ed497f8e9e5c2ad49056c.tar.gz
samba-40976c3bc606197c001ed497f8e9e5c2ad49056c.tar.bz2
samba-40976c3bc606197c001ed497f8e9e5c2ad49056c.zip
Removed bogus calles to D() debugging function. Perhaps these should
be replaced by DEBUG() calls? (This used to be commit 33dd07d1fc6946e53d3bdaad025adfc20abfab77)
Diffstat (limited to 'source3')
-rw-r--r--source3/nsswitch/pam_winbind.c17
1 files changed, 1 insertions, 16 deletions
diff --git a/source3/nsswitch/pam_winbind.c b/source3/nsswitch/pam_winbind.c
index cc259ab041..7de553da4d 100644
--- a/source3/nsswitch/pam_winbind.c
+++ b/source3/nsswitch/pam_winbind.c
@@ -245,8 +245,6 @@ int _winbind_read_password(pam_handle_t * pamh
const char *item;
char *token;
- D(("called"));
-
/*
* make sure nothing inappropriate gets returned
*/
@@ -502,8 +500,6 @@ PAM_EXTERN int pam_sm_chauthtok(pam_handle_t * pamh, int flags,
int retry = 0;
- D(("called."));
-
/*
* First get the name of a user
*/
@@ -523,15 +519,12 @@ PAM_EXTERN int pam_sm_chauthtok(pam_handle_t * pamh, int flags,
return retval;
}
- D(("Got username of %s", user));
-
/*
* obtain and verify the current password (OLDAUTHTOK) for
* the user.
*/
if (flags & PAM_PRELIM_CHECK) {
- D(("prelim check"));
/* instruct user what is happening */
#define greeting "Changing password for "
@@ -565,7 +558,6 @@ PAM_EXTERN int pam_sm_chauthtok(pam_handle_t * pamh, int flags,
if (retval != PAM_ACCT_EXPIRED
&& retval != PAM_NEW_AUTHTOK_REQD
&& retval != PAM_SUCCESS) {
- D(("Authentication failed"));
pass_old = NULL;
return retval;
}
@@ -582,23 +574,18 @@ PAM_EXTERN int pam_sm_chauthtok(pam_handle_t * pamh, int flags,
* obtain the proposed password
*/
- D(("do update"));
-
/*
* get the old token back.
*/
retval = pam_get_item(pamh, PAM_OLDAUTHTOK
,(const void **) &pass_old);
- D(("pass_old [%s]", pass_old));
if (retval != PAM_SUCCESS) {
_pam_log(LOG_NOTICE, "user not authenticated");
return retval;
}
- D(("get new password now"));
-
lctrl = ctrl;
if (on(WINBIND_USE_AUTHTOK_ARG, lctrl)) {
@@ -626,8 +613,7 @@ PAM_EXTERN int pam_sm_chauthtok(pam_handle_t * pamh, int flags,
pass_old = NULL;/* tidy up */
return retval;
}
- D(("returned to main routine"));
-
+
/*
* At this point we know who the user is and what they
* propose as their new password. Verify that the new
@@ -652,7 +638,6 @@ PAM_EXTERN int pam_sm_chauthtok(pam_handle_t * pamh, int flags,
retval = PAM_SERVICE_ERR;
}
- D(("retval was %d", retval));
return retval;
}