summaryrefslogtreecommitdiff
path: root/src/cryptsetup/cryptsetup.c
diff options
context:
space:
mode:
authorMichal Schmidt <mschmidt@redhat.com>2014-11-28 13:19:16 +0100
committerMichal Schmidt <mschmidt@redhat.com>2014-11-28 13:29:21 +0100
commitda927ba997d68401563b927f92e6e40e021a8e5c (patch)
tree71764cd998aef07b8943c5206c9307a93ba9c528 /src/cryptsetup/cryptsetup.c
parent0a1beeb64207eaa88ab9236787b1cbc2f704ae14 (diff)
treewide: no need to negate errno for log_*_errno()
It corrrectly handles both positive and negative errno values.
Diffstat (limited to 'src/cryptsetup/cryptsetup.c')
-rw-r--r--src/cryptsetup/cryptsetup.c18
1 files changed, 9 insertions, 9 deletions
diff --git a/src/cryptsetup/cryptsetup.c b/src/cryptsetup/cryptsetup.c
index 4afe53138f..487eb111a8 100644
--- a/src/cryptsetup/cryptsetup.c
+++ b/src/cryptsetup/cryptsetup.c
@@ -281,7 +281,7 @@ static int get_password(const char *name, usec_t until, bool accept_cached, char
r = ask_password_auto(text, "drive-harddisk", id, until, accept_cached, passwords);
if (r < 0) {
- log_error_errno(-r, "Failed to query password: %m");
+ log_error_errno(r, "Failed to query password: %m");
return r;
}
@@ -297,7 +297,7 @@ static int get_password(const char *name, usec_t until, bool accept_cached, char
r = ask_password_auto(text, "drive-harddisk", id, until, false, &passwords2);
if (r < 0) {
- log_error_errno(-r, "Failed to query verification password: %m");
+ log_error_errno(r, "Failed to query verification password: %m");
return r;
}
@@ -355,7 +355,7 @@ static int attach_tcrypt(struct crypt_device *cd,
if (key_file) {
r = read_one_line_file(key_file, &passphrase);
if (r < 0) {
- log_error_errno(-r, "Failed to read password file '%s': %m", key_file);
+ log_error_errno(r, "Failed to read password file '%s': %m", key_file);
return -EAGAIN;
}
@@ -439,7 +439,7 @@ static int attach_luks_or_plain(struct crypt_device *cd,
}
if (r < 0) {
- log_error_errno(-r, "Loading of cryptographic parameters failed: %m");
+ log_error_errno(r, "Loading of cryptographic parameters failed: %m");
return r;
}
@@ -454,7 +454,7 @@ static int attach_luks_or_plain(struct crypt_device *cd,
key_file, arg_keyfile_size,
arg_keyfile_offset, flags);
if (r < 0) {
- log_error_errno(-r, "Failed to activate with key file '%s': %m", key_file);
+ log_error_errno(r, "Failed to activate with key file '%s': %m", key_file);
return -EAGAIN;
}
} else {
@@ -567,7 +567,7 @@ int main(int argc, char *argv[]) {
k = crypt_init(&cd, argv[3]);
if (k) {
- log_error_errno(-k, "crypt_init() failed: %m");
+ log_error_errno(k, "crypt_init() failed: %m");
goto finish;
}
@@ -623,7 +623,7 @@ int main(int argc, char *argv[]) {
key_file = NULL;
continue;
} else if (k != -EPERM) {
- log_error_errno(-k, "Failed to activate: %m");
+ log_error_errno(k, "Failed to activate: %m");
goto finish;
}
@@ -641,7 +641,7 @@ int main(int argc, char *argv[]) {
k = crypt_init_by_name(&cd, argv[2]);
if (k) {
- log_error_errno(-k, "crypt_init() failed: %m");
+ log_error_errno(k, "crypt_init() failed: %m");
goto finish;
}
@@ -649,7 +649,7 @@ int main(int argc, char *argv[]) {
k = crypt_deactivate(cd, argv[2]);
if (k < 0) {
- log_error_errno(-k, "Failed to deactivate: %m");
+ log_error_errno(k, "Failed to deactivate: %m");
goto finish;
}