Skip to content

Commit f3dbe73

Browse files
Fix issues pointed by linter
1 parent 1973fbf commit f3dbe73

File tree

5 files changed

+59
-59
lines changed

5 files changed

+59
-59
lines changed

internal/ad/backends/winbind/mock/libwbclient_mock.c

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -7,22 +7,22 @@
77
#include <string.h>
88
#include <wbclient.h>
99

10-
char *get_mock_behavior() {
11-
char *behavior = getenv("ADSYS_WBCLIENT_BEHAVIOR");
10+
char* get_mock_behavior() {
11+
char* behavior = getenv("ADSYS_WBCLIENT_BEHAVIOR");
1212
if (behavior == NULL) {
1313
printf("ADSYS_WBCLIENT_BEHAVIOR not set, exiting...");
1414
exit(1);
1515
}
1616
return behavior;
1717
}
1818

19-
wbcErr wbcLookupDomainController(const char *domain, uint32_t flags, struct wbcDomainControllerInfo **dc_info) {
20-
char *behavior = get_mock_behavior();
19+
wbcErr wbcLookupDomainController(const char* domain, uint32_t flags, struct wbcDomainControllerInfo** dc_info) {
20+
char* behavior = get_mock_behavior();
2121
if (strcmp(behavior, "error_getting_dc_name") == 0) {
2222
return WBC_ERR_UNKNOWN_FAILURE;
2323
}
2424

25-
struct wbcDomainControllerInfo *dc = malloc(sizeof(struct wbcDomainControllerInfo));
25+
struct wbcDomainControllerInfo* dc = malloc(sizeof(struct wbcDomainControllerInfo));
2626
// This is the only field used at the moment
2727
dc->dc_name = "\\\\adcontroller.example.com";
2828

@@ -35,26 +35,26 @@ wbcErr wbcLookupDomainController(const char *domain, uint32_t flags, struct wbcD
3535
return WBC_ERR_SUCCESS;
3636
}
3737

38-
wbcErr wbcInterfaceDetails(struct wbcInterfaceDetails **details) {
39-
char *behavior = get_mock_behavior();
38+
wbcErr wbcInterfaceDetails(struct wbcInterfaceDetails** details) {
39+
char* behavior = get_mock_behavior();
4040
if (strcmp(behavior, "domain_not_found") == 0) {
4141
return WBC_ERR_DOMAIN_NOT_FOUND;
4242
}
4343

44-
struct wbcInterfaceDetails *info = malloc(sizeof(struct wbcInterfaceDetails));
44+
struct wbcInterfaceDetails* info = malloc(sizeof(struct wbcInterfaceDetails));
4545
// This is the only field used at the moment
4646
info->dns_domain = "example.com";
4747
*details = info;
4848
return WBC_ERR_SUCCESS;
4949
}
5050

51-
wbcErr wbcDomainInfo(const char *domain, struct wbcDomainInfo **dinfo) {
52-
char *behavior = get_mock_behavior();
51+
wbcErr wbcDomainInfo(const char* domain, struct wbcDomainInfo** dinfo) {
52+
char* behavior = get_mock_behavior();
5353
if (strcmp(behavior, "error_getting_online_status") == 0) {
5454
return WBC_ERR_UNKNOWN_FAILURE;
5555
}
5656

57-
struct wbcDomainInfo *info = malloc(sizeof(struct wbcDomainInfo));
57+
struct wbcDomainInfo* info = malloc(sizeof(struct wbcDomainInfo));
5858
info->domain_flags = WBC_DOMINFO_DOMAIN_PRIMARY;
5959
if (strcmp(behavior, "domain_is_offline") == 0) {
6060
info->domain_flags |= WBC_DOMINFO_DOMAIN_OFFLINE;

internal/ad/mock/libkrb5_mock.c

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,15 @@
11
// TiCS: disabled // This is a kerberos C library that we are mocking for testing purposes.
22

3-
#include "libkrb5_mock.h"
4-
53
#include <krb5.h>
64
#include <stdio.h>
75
#include <string.h>
86

9-
char *get_krb5_mock_behavior() { return getenv("ADSYS_KRB5_BEHAVIOR"); }
7+
#include <libkrb5_mock.h>
8+
9+
char* get_krb5_mock_behavior() { return getenv("ADSYS_KRB5_BEHAVIOR"); }
1010

11-
const char *KRB5_CALLCONV krb5_cc_default_name(krb5_context context) {
12-
char *behavior = get_krb5_mock_behavior();
11+
const char* KRB5_CALLCONV krb5_cc_default_name(krb5_context context) {
12+
char* behavior = get_krb5_mock_behavior();
1313
if (behavior == NULL) {
1414
printf("ADSYS_KRB5_BEHAVIOR not set, returning dummy value...");
1515
return "FILE:/tmp/krb5cc_0";
@@ -23,7 +23,7 @@ const char *KRB5_CALLCONV krb5_cc_default_name(krb5_context context) {
2323
}
2424
if (strstr(behavior, "return_ccache") != NULL) {
2525
// split the string by the first colon
26-
char *ccname = strtok(behavior, ":");
26+
char* ccname = strtok(behavior, ":");
2727
ccname = strtok(NULL, "");
2828
return ccname;
2929
}

internal/ad/mock/libkrb5_mock.h

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,6 @@
33
#ifndef LIBKRB5_MOCK_H
44
#define LIBKRB5_MOCK_H
55

6-
char *get_krb5_mock_behavior();
6+
char* get_krb5_mock_behavior();
77

88
#endif

internal/ad/mock/libkrb5_package_tests_mock.c

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,8 +6,8 @@
66

77
#include "libkrb5_mock.h"
88

9-
krb5_error_code KRB5_CALLCONV krb5_init_context(krb5_context *context) {
10-
char *behavior = get_krb5_mock_behavior();
9+
krb5_error_code KRB5_CALLCONV krb5_init_context(krb5_context* context) {
10+
char* behavior = get_krb5_mock_behavior();
1111
if (strcmp(behavior, "error_initializing_context") == 0) {
1212
return KRB5KRB_ERR_GENERIC;
1313
}

pam/pam_adsys.c

Lines changed: 39 additions & 39 deletions
Original file line numberDiff line numberDiff line change
@@ -51,27 +51,27 @@
5151
/*
5252
* Refresh the group policies of current user
5353
*/
54-
static int update_policy(pam_handle_t *pamh, const char *username, const char *krb5ccname, int debug) {
54+
static int update_policy(pam_handle_t* pamh, const char* username, const char* krb5ccname, int debug) {
5555
int retval;
5656
retval = pam_info(pamh, "Applying user settings");
5757
if (retval != PAM_SUCCESS) {
5858
return retval;
5959
}
6060

61-
if (memcmp(krb5ccname, (const char *)"FILE:", 5) == 0) {
61+
if (memcmp(krb5ccname, (const char*)"FILE:", 5) == 0) {
6262
krb5ccname += 5;
6363
}
6464

65-
char **arggv;
66-
arggv = calloc(6, sizeof(char *));
65+
char** arggv;
66+
arggv = calloc(6, sizeof(char*));
6767
if (arggv == NULL) {
6868
return PAM_BUF_ERR;
6969
}
7070

7171
arggv[0] = "/sbin/adsysctl";
7272
arggv[1] = "update";
73-
arggv[2] = (char *)(username);
74-
arggv[3] = (char *)(krb5ccname);
73+
arggv[2] = (char*)(username);
74+
arggv[3] = (char*)(krb5ccname);
7575
arggv[4] = NULL;
7676
if (debug) {
7777
arggv[4] = "-vv";
@@ -130,15 +130,15 @@ static int update_policy(pam_handle_t *pamh, const char *username, const char *k
130130
/*
131131
* Refresh the group policies of machine
132132
*/
133-
static int update_machine_policy(pam_handle_t *pamh, int debug) {
133+
static int update_machine_policy(pam_handle_t* pamh, int debug) {
134134
int retval;
135135
retval = pam_info(pamh, "Applying machine settings");
136136
if (retval != PAM_SUCCESS) {
137137
return retval;
138138
}
139139

140-
char **arggv;
141-
arggv = calloc(5, sizeof(char *));
140+
char** arggv;
141+
arggv = calloc(5, sizeof(char*));
142142
if (arggv == NULL) {
143143
return PAM_BUF_ERR;
144144
}
@@ -202,18 +202,18 @@ static int update_machine_policy(pam_handle_t *pamh, int debug) {
202202
/*
203203
* Get default domain suffix from SSSD_CONF_PATH
204204
*/
205-
static char *get_default_sss_domain(pam_handle_t *pamh) {
206-
FILE *f = fopen(SSSD_CONF_PATH, "r");
205+
static char* get_default_sss_domain(pam_handle_t* pamh) {
206+
FILE* f = fopen(SSSD_CONF_PATH, "r");
207207
if (f == NULL) {
208208
pam_syslog(pamh, LOG_ERR, "Failed to open sssd.conf");
209209
return NULL;
210210
}
211211

212212
size_t buffsize = 256;
213-
char *buf = malloc(sizeof(char) * buffsize);
214-
char *domain = NULL;
213+
char* buf = malloc(sizeof(char) * buffsize);
214+
char* domain = NULL;
215215
while (getline(&buf, &buffsize, f) != -1) {
216-
char *line = buf;
216+
char* line = buf;
217217
// ignores whitespaces listed before the config key
218218
while (strlen(line) > 0 && (*line == ' ' || *line == '\t')) {
219219
line++;
@@ -236,7 +236,7 @@ static char *get_default_sss_domain(pam_handle_t *pamh) {
236236
break;
237237
}
238238

239-
char *newline = strchr(domain, '\n');
239+
char* newline = strchr(domain, '\n');
240240
if (newline != NULL) {
241241
*newline = '\0';
242242
}
@@ -250,18 +250,18 @@ static char *get_default_sss_domain(pam_handle_t *pamh) {
250250
return NULL;
251251
}
252252

253-
char *ret = strdup(domain);
253+
char* ret = strdup(domain);
254254
free(buf);
255255
return ret;
256256
}
257257

258258
/*
259259
* Converts domain\user to user@domain format
260260
*/
261-
static char *slash_to_at_username(const char *username) {
262-
char *backslash = strchr(username, '\\');
261+
static char* slash_to_at_username(const char* username) {
262+
char* backslash = strchr(username, '\\');
263263
if (backslash != NULL) {
264-
char *ret = malloc((strlen(username) + 1) * sizeof(char));
264+
char* ret = malloc((strlen(username) + 1) * sizeof(char));
265265
strcpy(ret, backslash + 1);
266266
strcat(ret, "@");
267267
strncat(ret, username, backslash - username);
@@ -273,17 +273,17 @@ static char *slash_to_at_username(const char *username) {
273273
/*
274274
* Set DCONF_PROFILE for current user
275275
*/
276-
static int set_dconf_profile(pam_handle_t *pamh, const char *username, int debug) {
276+
static int set_dconf_profile(pam_handle_t* pamh, const char* username, int debug) {
277277
int retval = PAM_SUCCESS;
278278

279-
char *profile_name = slash_to_at_username(username);
279+
char* profile_name = slash_to_at_username(username);
280280

281281
// We need to check if the profile name does not already contain the domain.
282282
if (strchr(profile_name, '@') == NULL) {
283-
char *domain = get_default_sss_domain(pamh);
283+
char* domain = get_default_sss_domain(pamh);
284284
if (domain != NULL) {
285285
free(profile_name);
286-
profile_name = (char *)malloc((strlen(username) + strlen(domain) + 2) * sizeof(char));
286+
profile_name = (char*)malloc((strlen(username) + strlen(domain) + 2) * sizeof(char));
287287
strcpy(profile_name, username);
288288
strcat(profile_name, "@");
289289
strcat(profile_name, domain);
@@ -292,11 +292,11 @@ static int set_dconf_profile(pam_handle_t *pamh, const char *username, int debug
292292
}
293293
// We need to lowercase the profile_name, as it can have uppercased letters and we
294294
// always normalize it in adsys.
295-
for (char *s = profile_name; *s; s++) {
295+
for (char* s = profile_name; *s; s++) {
296296
*s = tolower(*s);
297297
}
298298

299-
char *envvar;
299+
char* envvar;
300300
if (asprintf(&envvar, "DCONF_PROFILE=%s", profile_name) < 0) {
301301
pam_syslog(pamh, LOG_CRIT, "out of memory");
302302
free(profile_name);
@@ -312,9 +312,9 @@ static int set_dconf_profile(pam_handle_t *pamh, const char *username, int debug
312312
/*
313313
* Get the ticket path for the user by calling adsysctl policy debug ticket-path
314314
*/
315-
static int get_krb5cc_ticket_path(pam_handle_t *pamh, const char *username, char **path) {
316-
char **arggv;
317-
arggv = calloc(6, sizeof(char *));
315+
static int get_krb5cc_ticket_path(pam_handle_t* pamh, const char* username, char** path) {
316+
char** arggv;
317+
arggv = calloc(6, sizeof(char*));
318318
if (arggv == NULL) {
319319
return 1;
320320
}
@@ -323,7 +323,7 @@ static int get_krb5cc_ticket_path(pam_handle_t *pamh, const char *username, char
323323
arggv[1] = "policy";
324324
arggv[2] = "debug";
325325
arggv[3] = "ticket-path";
326-
arggv[4] = (char *)(username);
326+
arggv[4] = (char*)(username);
327327
arggv[5] = NULL;
328328

329329
int pipefd[2];
@@ -374,7 +374,7 @@ static int get_krb5cc_ticket_path(pam_handle_t *pamh, const char *username, char
374374
return 1;
375375
}
376376
ticket_path[n] = '\0';
377-
char *newline = strchr(ticket_path, '\n');
377+
char* newline = strchr(ticket_path, '\n');
378378
if (newline != NULL) {
379379
*newline = '\0';
380380
}
@@ -396,11 +396,11 @@ static int get_krb5cc_ticket_path(pam_handle_t *pamh, const char *username, char
396396
return 0; /* command had no output and exited with 0 */
397397
}
398398

399-
PAM_EXTERN int pam_sm_authenticate(pam_handle_t *pamh, int flags, int argc, const char **argv) { return PAM_IGNORE; }
399+
PAM_EXTERN int pam_sm_authenticate(pam_handle_t* pamh, int flags, int argc, const char** argv) { return PAM_IGNORE; }
400400

401-
PAM_EXTERN int pam_sm_setcred(pam_handle_t *pamh, int flags, int argc, const char **argv) { return PAM_IGNORE; }
401+
PAM_EXTERN int pam_sm_setcred(pam_handle_t* pamh, int flags, int argc, const char** argv) { return PAM_IGNORE; }
402402

403-
PAM_EXTERN int pam_sm_open_session(pam_handle_t *pamh, int flags, int argc, const char **argv) {
403+
PAM_EXTERN int pam_sm_open_session(pam_handle_t* pamh, int flags, int argc, const char** argv) {
404404
int retval = PAM_SUCCESS;
405405

406406
int debug = 0;
@@ -414,8 +414,8 @@ PAM_EXTERN int pam_sm_open_session(pam_handle_t *pamh, int flags, int argc, cons
414414
}
415415
}
416416

417-
const char *username;
418-
if (pam_get_item(pamh, PAM_USER, (void *)&username) != PAM_SUCCESS) {
417+
const char* username;
418+
if (pam_get_item(pamh, PAM_USER, (void*)&username) != PAM_SUCCESS) {
419419
D(("pam_get_item failed for PAM_USER"));
420420
return PAM_SYSTEM_ERR; /* let pam_get_item() log the error */
421421
}
@@ -425,9 +425,9 @@ PAM_EXTERN int pam_sm_open_session(pam_handle_t *pamh, int flags, int argc, cons
425425
* We do an exception for GDM which is handled by the machine's GPO
426426
* and we must set the DCONF_PROFILE environment variable.
427427
*/
428-
const char *krb5ccname = pam_getenv(pamh, "KRB5CCNAME");
428+
const char* krb5ccname = pam_getenv(pamh, "KRB5CCNAME");
429429
if (krb5ccname == NULL && strcmp(username, "gdm") != 0) {
430-
char *ticket_path = NULL;
430+
char* ticket_path = NULL;
431431

432432
// An error here means the detect_cached_ticket setting is enabled
433433
if (get_krb5cc_ticket_path(pamh, username, &ticket_path) != 0) {
@@ -442,7 +442,7 @@ PAM_EXTERN int pam_sm_open_session(pam_handle_t *pamh, int flags, int argc, cons
442442
}
443443

444444
// We have a ticket, proceed with setting the environment variable
445-
char *envvar;
445+
char* envvar;
446446
if (asprintf(&envvar, "KRB5CCNAME=FILE:%s", ticket_path) < 0) {
447447
pam_syslog(pamh, LOG_CRIT, "out of memory");
448448
free(ticket_path);
@@ -497,6 +497,6 @@ PAM_EXTERN int pam_sm_open_session(pam_handle_t *pamh, int flags, int argc, cons
497497
return update_policy(pamh, username, krb5ccname, debug);
498498
}
499499

500-
PAM_EXTERN int pam_sm_close_session(pam_handle_t *pamh, int flags, int argc, const char **argv) { return PAM_SUCCESS; }
500+
PAM_EXTERN int pam_sm_close_session(pam_handle_t* pamh, int flags, int argc, const char** argv) { return PAM_SUCCESS; }
501501

502502
/* end of module definition */

0 commit comments

Comments
 (0)