summaryrefslogtreecommitdiffstats
path: root/src/home/homework-pkcs11.c
diff options
context:
space:
mode:
authorLennart Poettering <lennart@poettering.net>2023-11-02 14:47:35 +0100
committerLuca Boccassi <luca.boccassi@gmail.com>2023-11-02 18:26:46 +0100
commit707de94cbf583dc211a5f9f44f66f94e2a4f3977 (patch)
tree31d6c435d27ec36a3136e7d985a0a799ca3f2de4 /src/home/homework-pkcs11.c
parentMerge pull request #29748 from poettering/tgtmode (diff)
downloadsystemd-707de94cbf583dc211a5f9f44f66f94e2a4f3977.tar.xz
systemd-707de94cbf583dc211a5f9f44f66f94e2a4f3977.zip
tree-wide: never link directly against p11kit
We go via dlopen() at most places, but forgot some. Cover the missing cases too.
Diffstat (limited to 'src/home/homework-pkcs11.c')
-rw-r--r--src/home/homework-pkcs11.c6
1 files changed, 3 insertions, 3 deletions
diff --git a/src/home/homework-pkcs11.c b/src/home/homework-pkcs11.c
index be9d905c0e..f3719948d0 100644
--- a/src/home/homework-pkcs11.c
+++ b/src/home/homework-pkcs11.c
@@ -49,7 +49,7 @@ int pkcs11_callback(
rv = m->C_Login(session, CKU_USER, NULL, 0);
if (rv != CKR_OK)
- return log_error_errno(SYNTHETIC_ERRNO(EIO), "Failed to log into security token '%s': %s", token_label, p11_kit_strerror(rv));
+ return log_error_errno(SYNTHETIC_ERRNO(EIO), "Failed to log into security token '%s': %s", token_label, sym_p11_kit_strerror(rv));
log_info("Successfully logged into security token '%s' via protected authentication path.", token_label);
goto decrypt;
@@ -72,12 +72,12 @@ int pkcs11_callback(
if (rv == CKR_PIN_LOCKED)
return log_error_errno(SYNTHETIC_ERRNO(EOWNERDEAD), "PIN of security token is blocked. Please unblock it first.");
if (!IN_SET(rv, CKR_PIN_INCORRECT, CKR_PIN_LEN_RANGE))
- return log_error_errno(SYNTHETIC_ERRNO(EIO), "Failed to log into security token '%s': %s", token_label, p11_kit_strerror(rv));
+ return log_error_errno(SYNTHETIC_ERRNO(EIO), "Failed to log into security token '%s': %s", token_label, sym_p11_kit_strerror(rv));
}
rv = m->C_GetTokenInfo(slot_id, &updated_token_info);
if (rv != CKR_OK)
- return log_error_errno(SYNTHETIC_ERRNO(EIO), "Failed to acquire updated security token information for slot %lu: %s", slot_id, p11_kit_strerror(rv));
+ return log_error_errno(SYNTHETIC_ERRNO(EIO), "Failed to acquire updated security token information for slot %lu: %s", slot_id, sym_p11_kit_strerror(rv));
if (FLAGS_SET(updated_token_info.flags, CKF_USER_PIN_FINAL_TRY))
return log_error_errno(SYNTHETIC_ERRNO(EUCLEAN), "PIN of security token incorrect, only a single try left.");