It's that time of year again.
_cleanup_(sd_bus_flush_close_unrefp) sd_bus *bus = NULL;
int r;
- assert(argc == 1 || argc == 2);
+ assert(IN_SET(argc, 1, 2));
r = acquire_bus(&bus, NULL);
if (r < 0)
if (r < 0 && r != -ENOENT)
return r;
- if (f != NULL) {
+ if (f) {
r = json_parse_file(f, pp, /*flags=*/ 0, &policy, &line, &column);
if (r < 0)
return log_error_errno(r, "[%s:%u:%u] Failed to parse JSON policy: %m", pp, line, column);
bool headless,
uint32_t flags) {
- int r = -ENOTSUP;
+ int r = -EOPNOTSUPP;
#if HAVE_LIBCRYPTSETUP_PLUGINS
if (!crypt_get_type(cd) || strcmp(crypt_get_type(cd), CRYPT_LUKS2))
return log_error_errno(SYNTHETIC_ERRNO(EINVAL), "Automatic PKCS#11 metadata requires LUKS2 device.");
.device = arg_tpm2_device
};
- if (crypt_token_external_path() == NULL)
+ if (!crypt_token_external_path())
return log_debug_errno(SYNTHETIC_ERRNO(EOPNOTSUPP),
"Libcryptsetup has external plugins support disabled.");
sd_bus *bus = userdata;
assert(bus);
- assert(argc == 1 || argc == 2);
+ assert(IN_SET(argc, 1, 2));
return verb_log_control_common(bus, "org.freedesktop.resolve1", argv[0], argc == 2 ? argv[1] : NULL);
}
}
if (m->verity_ready)
- m->verity_sig_ready = !!verity->root_hash_sig;
+ m->verity_sig_ready = verity->root_hash_sig;
} else if (m->partitions[verity->designator == PARTITION_USR ? PARTITION_USR_VERITY_SIG : PARTITION_ROOT_VERITY_SIG].found) {
* stdin around. */
fd = open("/dev/tty", O_WRONLY);
if (fd < 0) {
- if (errno != -ENXIO) {
+ if (errno != ENXIO) {
log_error_errno(errno, "Failed to open /dev/tty: %m");
_exit(EXIT_FAILURE);
}
return log_error_errno(SYNTHETIC_ERRNO(EIO),
"Failed to log into security token '%s': %s", token_label, p11_kit_strerror(rv));
- log_notice("PIN for token '%s' is incorrect, please try again.", token_label);
-
- return -ENOLCK;
+ return log_notice_errno(SYNTHETIC_ERRNO(ENOLCK),
+ "PIN for token '%s' is incorrect, please try again.",
+ token_label);
}
int pkcs11_token_login(