diff options
author | Chuck Lever <chuck.lever@oracle.com> | 2007-01-31 12:14:05 -0500 |
---|---|---|
committer | Trond Myklebust <Trond.Myklebust@netapp.com> | 2007-02-03 18:35:09 -0500 |
commit | 8885cb367f86ce02bed3bf18192d74a53ac3b81f (patch) | |
tree | 3d85dd85f176606756720914f46c93af53895295 /net/sunrpc/auth_gss/gss_spkm3_seal.c | |
parent | a3f565b1e530a756472401835107d08fd291f242 (diff) |
SUNRPC: fix print format for tk_pid in auth_gss support
The tk_pid field is an unsigned short. The proper print format specifier for
that type is %5u, not %4d.
Also clean up some miscellaneous print formatting nits.
Signed-off-by: Chuck Lever <chuck.lever@oracle.com>
Signed-off-by: Trond Myklebust <Trond.Myklebust@netapp.com>
Diffstat (limited to 'net/sunrpc/auth_gss/gss_spkm3_seal.c')
-rw-r--r-- | net/sunrpc/auth_gss/gss_spkm3_seal.c | 14 |
1 files changed, 8 insertions, 6 deletions
diff --git a/net/sunrpc/auth_gss/gss_spkm3_seal.c b/net/sunrpc/auth_gss/gss_spkm3_seal.c index b179d58c6249..104cbf4f769f 100644 --- a/net/sunrpc/auth_gss/gss_spkm3_seal.c +++ b/net/sunrpc/auth_gss/gss_spkm3_seal.c | |||
@@ -75,20 +75,21 @@ spkm3_make_token(struct spkm3_ctx *ctx, | |||
75 | now = jiffies; | 75 | now = jiffies; |
76 | 76 | ||
77 | if (ctx->ctx_id.len != 16) { | 77 | if (ctx->ctx_id.len != 16) { |
78 | dprintk("RPC: spkm3_make_token BAD ctx_id.len %d\n", | 78 | dprintk("RPC: spkm3_make_token BAD ctx_id.len %d\n", |
79 | ctx->ctx_id.len); | 79 | ctx->ctx_id.len); |
80 | goto out_err; | 80 | goto out_err; |
81 | } | 81 | } |
82 | 82 | ||
83 | if (!g_OID_equal(&ctx->intg_alg, &hmac_md5_oid)) { | 83 | if (!g_OID_equal(&ctx->intg_alg, &hmac_md5_oid)) { |
84 | dprintk("RPC: gss_spkm3_seal: unsupported I-ALG algorithm." | 84 | dprintk("RPC: gss_spkm3_seal: unsupported I-ALG " |
85 | "only support hmac-md5 I-ALG.\n"); | 85 | "algorithm. only support hmac-md5 I-ALG.\n"); |
86 | goto out_err; | 86 | goto out_err; |
87 | } else | 87 | } else |
88 | checksum_type = CKSUMTYPE_HMAC_MD5; | 88 | checksum_type = CKSUMTYPE_HMAC_MD5; |
89 | 89 | ||
90 | if (!g_OID_equal(&ctx->conf_alg, &cast5_cbc_oid)) { | 90 | if (!g_OID_equal(&ctx->conf_alg, &cast5_cbc_oid)) { |
91 | dprintk("RPC: gss_spkm3_seal: unsupported C-ALG algorithm\n"); | 91 | dprintk("RPC: gss_spkm3_seal: unsupported C-ALG " |
92 | "algorithm\n"); | ||
92 | goto out_err; | 93 | goto out_err; |
93 | } | 94 | } |
94 | 95 | ||
@@ -113,7 +114,8 @@ spkm3_make_token(struct spkm3_ctx *ctx, | |||
113 | 114 | ||
114 | spkm3_make_mic_token(&ptr, tokenlen, &mic_hdr, &md5cksum, md5elen, md5zbit); | 115 | spkm3_make_mic_token(&ptr, tokenlen, &mic_hdr, &md5cksum, md5elen, md5zbit); |
115 | } else if (toktype == SPKM_WRAP_TOK) { /* Not Supported */ | 116 | } else if (toktype == SPKM_WRAP_TOK) { /* Not Supported */ |
116 | dprintk("RPC: gss_spkm3_seal: SPKM_WRAP_TOK not supported\n"); | 117 | dprintk("RPC: gss_spkm3_seal: SPKM_WRAP_TOK " |
118 | "not supported\n"); | ||
117 | goto out_err; | 119 | goto out_err; |
118 | } | 120 | } |
119 | 121 | ||
@@ -153,7 +155,7 @@ make_spkm3_checksum(s32 cksumtype, struct xdr_netobj *key, char *header, | |||
153 | cksumname = "md5"; | 155 | cksumname = "md5"; |
154 | break; | 156 | break; |
155 | default: | 157 | default: |
156 | dprintk("RPC: spkm3_make_checksum:" | 158 | dprintk("RPC: spkm3_make_checksum:" |
157 | " unsupported checksum %d", cksumtype); | 159 | " unsupported checksum %d", cksumtype); |
158 | return GSS_S_FAILURE; | 160 | return GSS_S_FAILURE; |
159 | } | 161 | } |